Security hacker

Results: 424



#Item
1ZOMATO’S HACKER-FOCUSED APPROACH TURNS THE TABLES ON SECURITY VULNERABILITIES Connecting eaters with restaurants is Zomato’s main business, so they took a hospitable approach to hackers, driving engagement and qualit

ZOMATO’S HACKER-FOCUSED APPROACH TURNS THE TABLES ON SECURITY VULNERABILITIES Connecting eaters with restaurants is Zomato’s main business, so they took a hospitable approach to hackers, driving engagement and qualit

Add to Reading List

Source URL: www.hackerone.com

Language: English - Date: 2018-08-21 12:07:31
2Understanding the difficulties in security protocol design and attempting to relocate the struggle between hacker and defender to a different protocol layer.  SECURITY

Understanding the difficulties in security protocol design and attempting to relocate the struggle between hacker and defender to a different protocol layer. SECURITY

Add to Reading List

Source URL: www.cs.jhu.edu

Language: English - Date: 2004-07-14 23:06:27
    3ACSC Community Newsletter February 2017 I have argued in the past that one of the biggest challenges that the security community has to overcome is regaining the connection with our inner hacker. Before we began professi

    ACSC Community Newsletter February 2017 I have argued in the past that one of the biggest challenges that the security community has to overcome is regaining the connection with our inner hacker. Before we began professi

    Add to Reading List

    Source URL: www.acscenter.org

    Language: English - Date: 2018-03-28 09:43:56
      4Hacker Curriculum  Adam Cecche0  Leviathan Security Group  Who Am I?  •  Adam Cecche0 

      Hacker Curriculum  Adam Cecche0  Leviathan Security Group  Who Am I?  •  Adam Cecche0 

      Add to Reading List

      Source URL: www.cs.dartmouth.edu

      - Date: 2009-06-02 01:39:34
        5Aal al Beit street, Damascus, Syria. Last day of the presidential election, where there is only one candidate: Bashar al-Assad. Me and Isaam are walking along the crowded sidewalk. We stop at a small kiosk. While standin

        Aal al Beit street, Damascus, Syria. Last day of the presidential election, where there is only one candidate: Bashar al-Assad. Me and Isaam are walking along the crowded sidewalk. We stop at a small kiosk. While standin

        Add to Reading List

        Source URL: carljohanrosen.com

        Language: English - Date: 2014-11-01 13:18:52
        6H-Net Discussion Networks - H-ASIA: CFP: Science & Technolog...  1z2 http://h-net.msu.edu/cgi-bin/logbrowse.pl?trx=vx&list=H-Asia&mo...

        H-Net Discussion Networks - H-ASIA: CFP: Science & Technolog... 1z2 http://h-net.msu.edu/cgi-bin/logbrowse.pl?trx=vx&list=H-Asia&mo...

        Add to Reading List

        Source URL: www.icohtec.org

        Language: English - Date: 2015-03-28 14:32:49
        7training.keywcorp.com  This two-day course introduces managers to the processes, techniques, and terminology used by cyber professionals to explain, discover, and prevent threats to enterprise networks and sensitive busi

        training.keywcorp.com This two-day course introduces managers to the processes, techniques, and terminology used by cyber professionals to explain, discover, and prevent threats to enterprise networks and sensitive busi

        Add to Reading List

        Source URL: training.keywcorp.com

        Language: English - Date: 2016-06-28 22:20:29
        8Defending Against Phishing & Social Engineering Attacks A Resource Guide from the PCI Security Standards Council Hackers use phishing and other social engineering methods to target organisations with legitimate-looking e

        Defending Against Phishing & Social Engineering Attacks A Resource Guide from the PCI Security Standards Council Hackers use phishing and other social engineering methods to target organisations with legitimate-looking e

        Add to Reading List

        Source URL: www.pcisecuritystandards.org

        Language: English - Date: 2015-10-27 10:54:34
        9The desperate plea of a hack ed customer...  Source: https://www.freelancer.com/projects/Web-Security-Computer-Security/Hostgator-Hosting-Account-was-hacked/ Hosti ng company Hostgator hack ed by former employee

        The desperate plea of a hack ed customer... Source: https://www.freelancer.com/projects/Web-Security-Computer-Security/Hostgator-Hosting-Account-was-hacked/ Hosti ng company Hostgator hack ed by former employee

        Add to Reading List

        Source URL: www.whd.global

        Language: English - Date: 2016-03-30 07:51:11
        10Technology / Computing / Media technology / Digital media / Geert Lovink / XS4ALL / Internet / E-democracy / Bulletin board system / Computer network / Security hacker / DirectDraw Surface

        The Rise and Fall of DDS evaluating the ambitions of AmsterdamÕs Digital City

        Add to Reading List

        Source URL: reinder.rustema.nl

        Language: English - Date: 2011-04-20 17:16:48