Security

Results: 374843



#Item
11Computing / Denial-of-service attacks / Cyberwarfare / Cybercrime / Botnets / Computer network security / Denial-of-service attack / Mirai / Internet of things / Low Orbit Ion Cannon / Universal Plug and Play / Computer security

EECS 388 Intro to Computer Security October 21, 2016 Homework 4: Denial of Service

Add to Reading List

Source URL: www.eecs.umich.edu

Language: English - Date: 2016-11-21 18:50:20
12

Finding and Preventing Bugs in JavaScript Bindings Fraser Brown⋆ Dawson Engler⋆ ⋆ Shravan Narayan†

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-04-03 15:58:08
    13Software development / Software project management / Agile software development / United States Department of Homeland Security / Capability Maturity Model Integration / Agile / Scaled agile framework / Software development process

    DEPARTMENT OF HOMELAND SECURITY AWARDS OCTO CONSULTING GROUP $300M CEILING SERVICES ENABLING AGILE DELIVERY (SEAD) BPA CONTRACT Octo will deliver Agile and DevOps practices through embedded experts to expedite the agency

    Add to Reading List

    Source URL: www.octoconsulting.com

    Language: English - Date: 2018-08-27 12:37:57
    14

    Is Interaction Necessary for Distributed Private Learning? Adam Smith∗ , Abhradeep Thakurta† , Jalaj Upadhyay∗ of Electrical Engineering and Computer Science, Pennsylvania State University, Email: {asmith, jalaj}@p

    Add to Reading List

    Source URL: www.ieee-security.org

    Language: English - Date: 2017-04-03 15:58:45
      15Computer network security / Computing / Software development / Security engineering / OWASP / DevOps / Computer security

      Security Champions 2.0 OWASP Bucharest AppSec 2017 Alexander Antukh Whoami • Head of Appsec

      Add to Reading List

      Source URL: www.owasp.org

      Language: English - Date: 2017-10-16 15:02:20
      16

      Securify: Practical Security Analysis of Smart Contracts Petar Tsankov Andrei Dan Dana Drachsler-Cohen

      Add to Reading List

      Source URL: files.sri.inf.ethz.ch

      Language: English - Date: 2018-09-05 10:55:59
        17Computing / Software / Universal Windows Platform apps / Internet / Hacker conventions / Security BSides / Unconferences / Twitter / Sponsor / Tor / Target Corporation / TED

        Security BSides Munich Conference Sponsoring Kit SpringMünchen, Germany www.bsidesmunich.org

        Add to Reading List

        Source URL: www.bsidesmunich.org

        Language: English - Date: 2018-09-10 16:03:04
        18Software / Advertising / Marketing / Online advertising / Firefox add-ons / Google Chrome extensions / Advertising-free media / Microsoft Edge extensions / Ad blocking / GNOME Web / Adblock Plus / Targeted advertising

        SECURITY The Adblocking Tug-of-War The Adblocking Tug-of-War H A M E D H A D D A D I , R I S H A B N I T H YA N A N D , S H E H A R B A N O K H AT TA K , M O B I N J AV E D, N A R S EO VA L L I N A - R O D R I G U E Z ,

        Add to Reading List

        Source URL: sheharbano.com

        Language: English - Date: 2017-02-16 07:58:26
        19Computer network security / Computing / Multi-agent systems / Cyberwarfare / Botnets / Spamming / Cybercrime / Serverless computing / Bot herder / Computer security / Internet bot

        Paper Title (use style: paper title)

        Add to Reading List

        Source URL: www.ieee-security.org

        Language: English - Date: 2017-05-12 13:30:48
        20Cryptography / Computer security / Cryptographic hash functions / Password / Rainbow table / SHA-2 / Password strength / Salt

        EECS 388 Intro to Computer Security October 7, 2016 Homework 3: Authentication and Passwords

        Add to Reading List

        Source URL: www.eecs.umich.edu

        Language: English - Date: 2016-11-21 18:50:20
        UPDATE