First Page | Document Content | |
---|---|---|
![]() Date: 2009-01-28 06:24:02Computer worms Hacking Morris worm Computer network security Robert Tappan Morris Cornell University Gene Spafford Hacker Vulnerability Computing Computer security Cyberwarfare | Add to Reading List |
![]() | COMPUTING PRACTICES The "Worm" Programs Early Experience with a Distributed ComputationDocID: 1oMqv - View Document |
![]() | Memory Corruption Attacks The (almost) Complete History thinkst applied research haroon meerDocID: 1mr6J - View Document |
![]() | Mobile Contagion: Simulation of Infection & Defense Everett Anderson Kevin Eustice Shane Markstrum Mark Hansen Peter Reiher Computer Science Computer Science Computer ScienceDocID: 15yKw - View Document |
![]() | Stop complaining and solve a security problem instead Stop complaining and… Solve a Security Problem InsteadDocID: 14IRq - View Document |
![]() | COMPUTING PRACTICES The "Worm" Programs Early Experience with a Distributed ComputationDocID: 149Hx - View Document |