Security hacker

Results: 424



#Item
411IEEE 802.11 / Computer network security / Secure communication / Temporal Key Integrity Protocol / Wired Equivalent Privacy / IEEE 802.11i-2004 / Wireless security / CCMP / RC4 / Cryptography / Cryptographic protocols / Wireless networking

Understanding the difficulties in security protocol design and attempting to relocate the struggle between hacker and

Add to Reading List

Source URL: www.cs.berkeley.edu

Language: English - Date: 2013-04-08 13:37:51
412Computer crimes / Electronic warfare / Military technology / International Cybercrime / Cyberwarfare / LulzSec / Hacktivism / Computer security / Anonymous / Cybercrime / Hacking / Hacker groups

INVESTING IN A CENTRALIZED CYBERSECURITY INFRASTRUCTURE: WHY “HACKTIVISM” CAN AND SHOULD INFLUENCE CYBERSECURITY REFORM

Add to Reading List

Source URL: www.bu.edu

Language: English - Date: 2012-11-09 16:38:21
413Middle States Association of Colleges and Schools / New York University / Hackers: Heroes of the Computer Revolution / Hacker ethic / Hacker / What the Hack / Tron / Enid Gabriella Coleman / Computer security conference / Computing / Electronics / Hacking

PDF Document

Add to Reading List

Source URL: steinhardt.nyu.edu

Language: English - Date: 2010-12-07 15:10:55
414Hacking / Hacker / Hack-Tic / Summercon / Electron / Hacker ethic / Computer security conference / Computing / Electronics / Hacker conventions

PDF Document

Add to Reading List

Source URL: steinhardt.nyu.edu

Language: English - Date: 2010-03-14 21:20:30
415Hacker / PhreakNIC / Computer security conference / Hacker Halted / Computing / Hacker conventions / Hacking

PDF Document

Add to Reading List

Source URL: www.rumint.org

Language: English - Date: 2010-02-27 03:07:58
416Cyberwarfare / Electronic warfare / Military technology / Cyberterrorism / Terrorism / United States Department of Homeland Security / Hacker / Cybercrime and countermeasures / Patriotic hacking / Cybercrime / Computer crimes / Hacking

PDF Document

Add to Reading List

Source URL: www.infosecwriters.com

Language: English - Date: 2008-02-22 07:54:37
417Hacking / German criminal law / Computer law / Cybercrime / Computer crimes / Strafgesetzbuch / Convention on Cybercrime / Hacker / Computer security / Computing / Law / Criminal law

PDF Document

Add to Reading List

Source URL: www.jlussi.eu

Language: English - Date: 2007-11-01 15:13:54
418Internet protocols / Computer security / Footprinting / Computer network security / Internet privacy / Digital footprint / IP address / Domain name / Hacker / Computing / Internet / Domain name system

PDF Document

Add to Reading List

Source URL: www.infosecwriters.com

Language: English - Date: 2005-12-08 18:00:15
419Computer security / Hacker / Vulnerability / CAPTCHA / Reverse Turing test / Turing test / Computing / Hacking / Alan Turing

PDF Document

Add to Reading List

Source URL: paper.ijcsns.org

Language: English - Date: 2011-07-04 22:29:25
420Computer security / Computer network security / Password / Su / Hacker / Password policy / Password strength / Security / System administration / Information technology management

PDF Document

Add to Reading List

Source URL: pdf.textfiles.com

Language: English - Date: 2005-12-09 21:49:19
UPDATE