Hacking

Results: 3953



#Item
71Hacking / Software testing / Vulnerability / Flood / Physical geography / Prevention / Computer security

Sea Level Adaptation Working Group (SLAWG) Meeting Minutes Date: :30 – 10:00 am Attendees: Jim Walker (OOB), Bob Hamblen (Saco), Steve Zeeman (Biddeford), Jay Chace (Scarborough), Lucy LaCasse (Scarborough),

Add to Reading List

Source URL: www.smrpc.org

Language: English - Date: 2014-01-23 12:11:56
72Software engineering / Hacking / Computing / Cross-site scripting / Web development / Software / Web application / JavaScript

Intrusion Recovery for Database-backed Web Applications Ramesh Chandra, Taesoo Kim, Meelap Shah, Neha Narula, Nickolai Zeldovich

Add to Reading List

Source URL: www.sigops.org

Language: English - Date: 2011-10-24 13:58:52
73Bluetooth / Wireless / Computing / Telecommunications engineering / Piconet / Frequency-hopping spread spectrum / OBject EXchange

+ Bluetooth Hacking revisited Kevin Finistere & Thierry Zoller 23C3

Add to Reading List

Source URL: secdev.zoller.lu

Language: English - Date: 2009-02-10 15:07:16
74

mobile Security Live-Hacking-Performance als Sensibilisierungsmaßnahme – Ein Erfahrungsbericht

Add to Reading List

Source URL: norbert-pohlmann.com

Language: German - Date: 2015-10-20 13:20:37
    75Computing / Software / Computer security / Hacking / Computer network security / Software architecture / OWASP / ASP.NET / Application security / Cross-site scripting / Vulnerability / Web application

    Microsoft PowerPoint - DenimGroup_IntroductionToApplicationSecurityInDotNETEnvironments.ppt

    Add to Reading List

    Source URL: denimgroup.com

    Language: English - Date: 2014-01-13 18:18:05
    76Hacking / Education / Certified Ethical Hacker / Michael Gregg / Course / Pedagogy

    CSEthical Hacking Spring 2016 Instructor: Shahriar “Nick” Rahimi  

    Add to Reading List

    Source URL: www.cs.siu.edu

    Language: English - Date: 2016-01-25 00:01:16
    77Health / Determinants of health / Health promotion / Personal life / Public health / Social inequality / Health policy / MHealth / Health psychology / Social determinants of health / Health education / Health literacy

    Hacking for Health: A Strategy for Fostering a Culture of Health in College By Dr. Eric B. Hekler, Arizona State University The college years are a critical transition arena in a person’s life; moving from adolescence

    Add to Reading List

    Source URL: studenthealth.cs.dartmouth.edu

    Language: English - Date: 2015-09-21 14:06:42
    78Software engineering / Software / Quality management / Software testing / Software review / Quality assurance / Hacking / Vulnerability / Code review / Coverity / Static program analysis / FindBugs

    Collaborative Security Code-Review Towards Aiding Developers Ensure Software-Security Hala Assal∗, Jeff Wilson, Sonia Chiasson, and Robert Biddle School of Computer Science Carleton University Ottawa, Canada

    Add to Reading List

    Source URL: cups.cs.cmu.edu

    Language: English - Date: 2015-07-03 02:38:45
    79Security / Cybercrime / Prevention / Computing / National security / Cyberwarfare / Computer security / Hacking / VMware / Outline of computer security / United States Cyber Command

    Testimony Statement for the Record Martin Casado, Senior Vice President Networking and Security Business Unit VMware, Inc.

    Add to Reading List

    Source URL: science.house.gov

    Language: English - Date: 2016-01-08 08:44:55
    80Computing / Cyberwarfare / Computer security / Computer network security / Cross-site scripting / Hacking / Cross-site request forgery / JavaScript / SQL injection / Application security / Web application firewall

    PREVOTY APPLICATION SECURITY MONITOR AND PROTECT YOUR APPLICATIONS AT RUNTIME For hackers, the money is in applications and the databases they access. For enterprises, the distributed, dynamic nature of applications and

    Add to Reading List

    Source URL: www.prevoty.com

    Language: English - Date: 2016-08-18 22:09:36
    UPDATE