Stack

Results: 3727



#Item
431

Smashing the stack in 2010 Report for the Computer Security exam at the Politecnico di Torino Andrea CugliariLinux Part Mariano GrazianoWindows Part tutor: Giovanni Cabiddu

Add to Reading List

Source URL: www.mgraziano.info

Language: English - Date: 2014-12-03 12:20:44
    432

    David Ching Windows System, Desktop GUI, Full Stack Developer 239 Main Street, Suite E  Pleasanton, CA 94566   http://dcsoft.com  (UpdatedOBJECTIVE

    Add to Reading List

    Source URL: www.dcsoft.com

    Language: English - Date: 2016-01-22 19:43:06
      433Computing / Cloud computing / Cloud infrastructure / Cloud computing security / Threat Stack / Health Insurance Portability and Accountability Act / Computer security / Amazon Web Services / Logicworks / Cloud computing issues

      CON TI N U O U S MO N ITO RIN G A BETTER SOLUTION FOR MAINTAINING HEALTHCARE DATA SECURITY IN THE CLOUD Healthcare companies utilizing cloud infrastructure require continuous security monitoring. Learn how to prevent da

      Add to Reading List

      Source URL: www.threatstack.com

      Language: English - Date: 2016-02-02 12:48:38
      434Computing / Security / Cloud computing / E-commerce / Secure communication / Crime prevention / National security / Cloud infrastructure / Payment Card Industry Data Security Standard / Threat Stack / Computer security / Stack

      SO LU TIO N B RIEF SECURITY SOLUTIONS FOR PCI DSS AND PII The media and publishing industry’s increasing migration to and expansion in the cloud means you’re tasked with minimizing risk and ensuring compliance throu

      Add to Reading List

      Source URL: www.threatstack.com

      Language: English - Date: 2016-02-02 12:48:42
      435

      1 On the effectiveness of NX, SSP, RenewSSP and ASLR against stack buffer overflows Hector Marco-Gisbert, Ismael Ripoll Departamento de Inform´atica de Sistemas y Computadores. Universitat Polit`ecnica de Val`encia

      Add to Reading List

      Source URL: renewssp.com

      Language: English - Date: 2015-07-24 11:44:08
        436Computing / Software bugs / Software engineering / Blind return oriented programming / Computer errors / Return-oriented programming / Stack buffer overflow / Return-to-libc attack / Address space layout randomization / Buffer overflow / Shellcode / Stack

        Hacking Blind Andrea Bittau, Adam Belay, Ali Mashtizadeh, David Mazi`eres, Dan Boneh Stanford University Abstract—We show that it is possible to write remote stack buffer overflow exploits without possessing a copy of

        Add to Reading List

        Source URL: www.scs.stanford.edu

        Language: English - Date: 2016-01-02 20:09:14
        437

        Kurt Revis | http://www.snoize.com LinkedIn | GitHub | Stack Overflow SUMMARY

        Add to Reading List

        Source URL: www.snoize.com

        Language: English - Date: 2015-08-07 02:49:44
          438Security / Computer security / Prevention / Computing / E-commerce / Cryptography / Computer network security / National security / Payment Card Industry Data Security Standard / Cloud computing security / Information security / Threat

          P CI D S S CO MP LIA N CE ACHIEVING PCI DSS COMPLIANCE WITH THREAT STACK The protection of your customers’ payment information is paramount to your business’ survival. In the cloud, the level of security required to

          Add to Reading List

          Source URL: www.threatstack.com

          Language: English - Date: 2016-03-16 06:02:32
          439Computing / Cloud computing / Security / Computer network security / Computer security / Stack / Threat

          CA S E S T U DY SIMPLE FINANCE TECHNOLOGY COMPA NY Simple Finance Technology Company is reinventing online banking with modern web and mobile experiences, no surprise fees, and great customer service. Simple provides cu

          Add to Reading List

          Source URL: www.threatstack.com

          Language: English - Date: 2016-02-15 16:22:01
          440

          “Add Another Blue Stack of the Same Height!”: ASP Based Planning and Plan Failure Analysis Chitta Baral1 and Tran Cao Son2 1 Department of Computer Science and Engineering, Arizona State University, Tempe, AZ

          Add to Reading List

          Source URL: www.public.asu.edu

          Language: English - Date: 2015-08-15 11:27:42
            UPDATE