Security hacker

Results: 424



#Item
41Technology / Business / Marketing / Product development / Software development / Software engineering / Software developer / Application security / Lead programmer / Computing / Software project management / Project management

571500Phillip H. Blanton Software Architect, Developer, Development Manager, Development Team-Lead, Principal Software Security Consultant, Hacker 00Phillip H. Blant

Add to Reading List

Source URL: phillipblanton.com

Language: English - Date: 2015-03-31 16:36:30
42Intruders and UNIX Matt Bishop Department of Computer Science University of California Davis, CAphone: (

Intruders and UNIX Matt Bishop Department of Computer Science University of California Davis, CAphone: (

Add to Reading List

Source URL: seclab.cs.ucdavis.edu

Language: English - Date: 2004-06-21 18:55:43
43Hampering the Human Hacker and the Threat of Social Engineering Using Automation to Protect Your Customers and Your Business  INTRODUCTION

Hampering the Human Hacker and the Threat of Social Engineering Using Automation to Protect Your Customers and Your Business INTRODUCTION

Add to Reading List

Source URL: voxeo.com

Language: English - Date: 2013-02-22 10:31:53
44TECHNICAL SECURITY ASSESSMENTS  SOUTHERN CROSS SPECIALISTS Real World Concerns

TECHNICAL SECURITY ASSESSMENTS SOUTHERN CROSS SPECIALISTS Real World Concerns

Add to Reading List

Source URL: www.sccs.com.au

Language: English - Date: 2014-03-10 05:22:21
455 reasons hackers love your application security strategy February

5 reasons hackers love your application security strategy February

Add to Reading List

Source URL: www.prevoty.com

Language: English - Date: 2015-06-04 23:45:13
465 reasons hackers love your application security strategy February

5 reasons hackers love your application security strategy February

Add to Reading List

Source URL: prevoty.com

Language: English - Date: 2015-06-04 23:45:13
47Weekly updateData breaches In February US healthcare insurer Anthem Blue Cross disclosed that they had discovered evidence they had been hacked in January, potentially exposing the data of up to 80 million cu

Weekly updateData breaches In February US healthcare insurer Anthem Blue Cross disclosed that they had discovered evidence they had been hacked in January, potentially exposing the data of up to 80 million cu

Add to Reading List

Source URL: www.cert.gov.uk

Language: English - Date: 2015-03-19 12:17:24
48Tech and TaxesFebruary 2015 Issue DELAWARE DEPARTMENT OF TECHNOLOGY & INFORMATION DTI

Tech and TaxesFebruary 2015 Issue DELAWARE DEPARTMENT OF TECHNOLOGY & INFORMATION DTI

Add to Reading List

Source URL: dti.delaware.gov

Language: English - Date: 2015-02-25 17:00:08
49EC-Council Courses offered at TLC: CEH – Certified Ethical Hacker The Certified Ethical Hacker class will immerse the students into a hands-on environment where they will be shown how to conduct ethical hacking. They w

EC-Council Courses offered at TLC: CEH – Certified Ethical Hacker The Certified Ethical Hacker class will immerse the students into a hands-on environment where they will be shown how to conduct ethical hacking. They w

Add to Reading List

Source URL: www.tlclasvegas.com

Language: English - Date: 2014-07-17 13:50:45
50Cyber Security Warrior Program CompTIA – EC Council – ISC2 Certificate of Completion : 240 Clock Hours Overview The objective of this program is to prepare students to build a successful career in Cyber Security. Thi

Cyber Security Warrior Program CompTIA – EC Council – ISC2 Certificate of Completion : 240 Clock Hours Overview The objective of this program is to prepare students to build a successful career in Cyber Security. Thi

Add to Reading List

Source URL: www.tlclasvegas.com

Language: English - Date: 2014-11-01 16:24:53