The Hacker

Results: 480



#Item
91Computer security / Cyberwarfare / Hacker / Black hat / Jeff Moss / Vulnerability / Hacking / Black Hat Briefings / Computing

Black Hat Brings Leading Security Experts to Japan Seattle, Wash. — June 8, 2005 — Black Hat Inc., a security think tank focused on digital self-defense, today announced the Black Hat Briefings JapanWith suppo

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2014-12-16 19:06:12
92Data / Data security / Software development process / Information technology management / Needs assessment / Black Hat Briefings / Federal Information Security Management Act / Hacker / Information security / Computer security / Security / Computing

Joseph Klein The Social Engineering Engagement Methodology—A Formal Testing Process of the People and Process The security of an organization is composed of technology, people and processes. In the last few years, many

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2015-05-28 15:51:41
93

When startups are ready to scale, one challenge that often crops up is finding the right person to lead the growth charge. Stage right: the growth hacker. A good growth hacker has a burning desire to connect a target mar

Add to Reading List

Source URL: blog.kissmetrics.com

Language: English - Date: 2015-01-28 19:23:30
    94Cyberwarfare / Penetration test / Vulnerability / Network security / Hacker / Attack / Security / Managed security service / HD Moore / Computer network security / Computing / Computer security

    HACK IN THE BOX SECURITY CONFERENCE 2003 BOOTH KIT HITBSecConf2003: Overview On the wave of the success of the last HITBSecConf held in 2002, HITB (M) Sdn Bhd

    Add to Reading List

    Source URL: conference.hitb.org

    Language: English - Date: 2014-10-26 12:44:22
    95Software testing / Security / Hacking / Penetration test / Vulnerability / Hacker / Attack / Network security / HD Moore / Computer network security / Computer security / Cyberwarfare

    HACK IN THE BOX SECURITY CONFERENCE 2003 SPONSORSHIP KIT HITBSecConf2003: Overview On the wave of the success of the last HITBSecConf held in 2002, HITB (M) Sdn Bhd

    Add to Reading List

    Source URL: conference.hitb.org

    Language: English - Date: 2014-10-26 12:44:22
    96Hacker groups / Hacking / Hacktivism / Anonymous / The X-Files / Fox-IT / Star Fox / Fox Broadcasting Company / Cybercrime / Technology / Internet

    FOX files 3 actueel fox-it.com november 2011

    Add to Reading List

    Source URL: www.fox-it.com

    Language: English - Date: 2015-04-22 11:55:11
    97Rootkits / Malware / Chkrootkit / Hacker / Computer virus / Loadable kernel module / Kernel / The Rootkit Arsenal: Escape and Evasion in the Dark Corners of the System / Rkhunter / System software / Computer security / Cyberwarfare

    Application of a Methodology to Characterize Rootkits Retrieved from Honeynets John Levine, Julian Grizzard, Henry Owen, Members, IEEE , , Abstract-- Techn

    Add to Reading List

    Source URL: users.ece.gatech.edu

    Language: English - Date: 2004-08-12 13:59:29
    98Exploit / Computer crimes / Identity theft / Anti-computer forensics / Hacker / Organized crime / Computer virus / Malware / Crime / Crimeware

    Crimeware on the Net The “Behind the scenes” of the new web economy Iftach Ian Amit Director, Security Research – Finjan

    Add to Reading List

    Source URL: www.blackhat.com

    Language: English - Date: 2015-05-28 15:51:30
    99Crime / Hacking / Legion of Doom / The Hacker Crackdown / Computer crimes / Cyberspace / Hacker / Craig Neidorf / Phrack / Computing / Cybercrime / Phreaking

    LITERARY FREEWARE — Not for Commercial Use by Bruce Sterling <> Sideways PDF version 0.1 by E-Scribe <>

    Add to Reading List

    Source URL: www.hacker-ethik.de

    Language: English - Date: 2014-01-18 06:48:12
    100Programmer / Hacker / Object-oriented programming / Recruiter / Computing / Programming paradigms / Computer programming

    The Final Triumph of the Junior Programmer Conrad Weisert, Information Disciplines, Inc., Chicago December 12, 2001 A radical terminology shift Growing evidence indicates that there are no longer

    Add to Reading List

    Source URL: www.idinews.com

    Language: English - Date: 2002-06-02 11:57:33
    UPDATE