Security hacker

Results: 424



#Item
31Security / Computer security / Computing / Software testing / Computer network security / Hacking / Cryptography / White hat / Vulnerability / Security testing / Security hacker / Penetration test

PENetration TESTING & ETHICAL HACKING SERVICES Are Your Information Security Measures Effective?

Add to Reading List

Source URL: www.redscan.com

Language: English - Date: 2016-03-21 10:47:46
32Formal sciences / Cryptography / Computer network security / Crime prevention / National security / Exploit / Computer security / Vulnerability / Computing / Security hacker / Theoretical computer science / Computer science

Why Offensive Security Needs Engineering Textbooks or, how to avoid a replay of “crypto wars” in security research Sergey Bratus, Iv´an Arce, Michael E. Locasto, Stefano Zanero August 22, 2014 Offensive security—o

Add to Reading List

Source URL: www.cs.dartmouth.edu

Language: English - Date: 2014-08-22 21:44:16
33

SANS Comes to Denver Starting February 25th, 2016 Security 504: Hacker Tools, Techniques, Exploits and Incident Handling No organization can fight back against cyber attacks if their security and system administration st

Add to Reading List

Source URL: www.556forensics.com

Language: English - Date: 2015-09-28 12:29:40
    34Computer security / Computing / Security / Computer network security / Hacking / Global Information Assurance Certification / SANS Institute / White hat / Penetration test / Professional certification / Security hacker

    Penetration Testing & Ethical Hacking Graduate Certificate The SANS Technology Institute’s post-baccalaureate certificate program in Penetration Testing & Ethical Hacking is based entirely upon four courses already ava

    Add to Reading List

    Source URL: www.sans.edu

    Language: English - Date: 2015-08-20 16:00:38
    35

    SWISS CYBER STORM Medienmitteilung Beste Jung-Hacker der Schweiz: Ein attraktives Ziel für IT-Recruiter In der Nacht auf heute Montag endete die Qualifikationsphase der diesjährigen Cyber Security Challenge.

    Add to Reading List

    Source URL: www.swisscyberstorm.com

    Language: German - Date: 2016-03-03 13:12:35
      36Cryptography / Computer access control / Computer security / Password / Security / Brute-force attack / Hashcat / John the Ripper / Crypt / Guessing / Security hacker / Password fatigue

      Measuring Real-World Accuracies and Biases in Modeling Password Guessability Blase Ur, Sean M. Segreti, Lujo Bauer, Nicolas Christin, Lorrie Faith Cranor, Saranga Komanduri, Darya Kurilova, Michelle L. Mazurek† , Willi

      Add to Reading List

      Source URL: www.blaseur.com

      Language: English - Date: 2015-08-12 14:36:57
      37Software engineering / Computing / Computer programming / Scripting languages / Persistence / Widget toolkits / Action Message Format / Adobe Flash / Python / PyQt / JavaScript / Serialization

      Constricting the Web: Offensive Python for Web Hacker at Black Hat USA 2010

      Add to Reading List

      Source URL: www.tssci-security.com

      Language: English - Date: 2013-01-17 00:16:29
      38

      The Hacker Strategy Dave Aitel Security Research

      Add to Reading List

      Source URL: www.immunityinc.com

      Language: English - Date: 2014-11-24 09:53:28
        39Computer network security / Computer security / Cybercrime / National security / CyberPatriot / Internet censorship / Capture the flag / AP Computer Science / Security hacker / Science Bowl / Video game

        PicoCTF: A Game-Based Computer Security Competition for High School Students Peter Chapman Carnegie Mellon University

        Add to Reading List

        Source URL: jburket.com

        Language: English - Date: 2015-04-08 00:10:41
        40Cross-platform software / Delphi programming language / Embarcadero Delphi / Pascal / Oracle Corporation / Borland / Microsoft Certified Professional / Turbo Pascal / Mono / Computing / Software / Computing platforms

        571500Phillip H. Blanton Software Architect, Developer, Development Manager, Development Team-Lead, Principal Software Security Consultant, Hacker 00Phillip H. Blant

        Add to Reading List

        Source URL: phillipblanton.com

        Language: English - Date: 2015-03-31 16:11:07
        UPDATE