The Sandbox

Results: 141



#Item
21Hardware virtualization / Virtualization / Sandbox / X86 virtualization

secuBT  – Hacking the Hackers with User­Space  Virtualization Mathias Payer <>

Add to Reading List

Source URL: hexhive.github.io

Language: English - Date: 2016-06-13 11:08:40
22Utah / Franklin S. Harris Fine Arts Center / Brigham Young University / ProvoOrem metropolitan area

BRAVO! PROFESSIONAL PERFORMING ARTS AT BRIGHAM YOUNG UNIVERSITY Musicians, dance companies, and theatre-makers from across the globe will come to Brigham Young University next season as the BRAVO! series showcas

Add to Reading List

Source URL: arts-sandbox.byu.edu

Language: English - Date: 2015-06-22 12:34:34
23

Will appear in the 2009 IEEE Symposium on Security and Privacy Native Client: A Sandbox for Portable, Untrusted x86 Native Code Bennet Yee, David Sehr, Gregory Dardyk, J. Bradley Chen, Robert Muth, Tavis Ormandy, Shiki

Add to Reading List

Source URL: css.csail.mit.edu

Language: English - Date: 2016-01-29 11:50:06
    24

    The Spy in the Sandbox – Practical Cache Attacks in Javascript arXiv:1502.07373v2 [cs.CR] 1 Mar 2015 Yossef Oren, Vasileios P. Kemerlis, Simha Sethumadhavan and Angelos D. Keromytis Computer Science Department, Columb

    Add to Reading List

    Source URL: arxiv.org

    Language: English - Date: 2015-03-02 21:40:58
      25

      Customer FAQ What is a sandbox key and how do I get one? The sandbox key gives you access to the D&B Direct sandbox environment to test the API. The sandbox environment provides users with limited access to the D&B Dire

      Add to Reading List

      Source URL: developer.dnb.com

      Language: English - Date: 2015-08-26 00:03:06
        26Software / System software / Computer architecture / Sandbox / Kernel / Systrace / Security-Enhanced Linux / Chroot / Operating system / Ptrace / Code injection / JavaScript

        TxBox: Building Secure, Efficient Sandboxes with System Transactions Suman Jana The University of Texas at Austin Donald E. Porter

        Add to Reading List

        Source URL: www3.cs.stonybrook.edu

        Language: English - Date: 2011-03-07 14:32:49
        27Software / Software development process / Business / Web design / Humancomputer interaction / PricewaterhouseCoopers / User experience design / Sandbox

        Let’s build it in The Sandbox. Do more in two days than you normally could in two months. Meetings, presentations, brainstorming sessions, status reports, discussions that drag on over months…they often fail to inspi

        Add to Reading List

        Source URL: digital.pwc.com

        Language: English - Date: 2016-04-11 13:58:54
        28Software / Free software / Version control systems / Concurrent Versions System / Revision Control System / NetBSD / Sandbox / Source Code Control System / Patch / CVSNT / Distributed Concurrent Versions System

        Opening The Source Repository With Anonymous CVS Charles D. Cranor Theo de Raadt AT&T Labs-Research

        Add to Reading List

        Source URL: www.openbsd.org

        Language: English - Date: 2004-09-03 00:12:12
        29

        Solution brief Building an in-depth defense with Vectra and sandbox security Vectra® Networks is a leading innovator in the realtime, automated detection of in-progress cyber attacks. This solution brief examines how V

        Add to Reading List

        Source URL: www.vectranetworks.com

        Language: English - Date: 2016-02-05 10:52:59
          30

          The Westchester Sandbox Theatre ‖‖ 931C E Boston Post Road ‖‖ Mamaroneck ‖‖ NY 10543 ‖‖ http://www.wstshows.com One Night Only: NovemberMEDIA ADVISORY

          Add to Reading List

          Source URL: siobhandangelo.writerfolio.com

          Language: English - Date: 2014-02-17 11:50:52
            UPDATE