Blackhat

Results: 880



#Item
791Cisco Systems / Network security / Technology / Computing / System administrator / Booz Allen Hamilton

Webcast Series Delegate Snapshot Black Hat’s Webcast series attracts high-quality business security professionals from the public and private sectors. Over 15,000 attendees have registered for the Black Hat Webcast se

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2014-12-16 19:06:03
792Markup languages / Open formats / OpenDocument / OpenOffice.org / Portable software / Malware / Microsoft Word / Document file format / Macro / Software / Computing / Computer file formats

OpenOffice v3.x Security Design Weaknesses Eric Filiol and Jean-Paul Fizaine ESIEA Laboratoire de virologie et de cryptologie op´erationnelles 38 rue des Dr Calmette et Gu´erin, [removed]Laval, France [removed],fiz

Add to Reading List

Source URL: blackhat.com

Language: English - Date: 2014-12-16 19:06:29
793Hat / CNN / News media / Broadcasting / Digital media / Hacking / Black hat / Internet culture

MARCH 25 – 28, 2014 MARNIA BAY SANDS | SINGAPORE BLACK HAT RETURNS TO ASIA Black Hat Asia 2014 welcomed more than 1,000 of the security community’s most renowned experts, in our first year back to the APAC region. Th

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2014-12-16 19:05:57
794Computer file formats / Graphics file formats / Data management / Digital photography / Metadata / Exchangeable image file format / Portable Document Format / File format / Computer file / Software / Computing / Information

Disclosing Private Information from Metadata, hidden info and lost data Chema Alonso, Enrique Rando, Francisco Oca and Antonio Guzmán Abstract — Documents contain metadata and hidden information that can be used to di

Add to Reading List

Source URL: blackhat.com

Language: English - Date: 2014-12-16 19:06:29
795Credit cards / Terminology / Acronyms / Visa Inc. / Payment / Invoice / Business / Economics / Payment systems

BLACK  HAT  REGISTRATION  UPDATE  FORM     Please  complete  this  form  and  fax  it  to  [removed]-­‐6011.       If  changes  are  needed  while  an

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2014-12-16 19:06:03
796Data security / Information security / Public safety / Prevention / Black Hat Briefings / Security / Computer security

Subject: Request to Attend Black Hat USA Conference 2014 Dear [decision maker name], I’m writing to request your approval for me to attend the Black Hat USA Information Security Conference to be held August 2nd through

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2014-12-16 19:06:03
797Crime prevention / National security / Public safety / Certified Information Systems Security Professional / Information security / Business continuity / Vulnerability / Certified Information Security Manager / Peter H. Gregory / Security / Data security / Computer security

Shon Harris’s Newly Updated CISSP® Materials WHY PURSUE A CISSP? Many companies are beginning to regard a CISSP certification as a requirement for their technical, mid-management, and senior IT management positions. A

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2014-12-16 19:06:13
798Black Hat Briefings

Subject:  Request  to  Attend  Black  Hat  USA  Conference  2014   Dear  [decision  maker  name],   I’m  writing  to  request  your  approval  for  me  to

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2014-12-16 19:06:03
    799Data / Information / Errol / Copyright / Nominet UK / Privacy / Ethics / Earl of Erroll / Parliamentary Information Technology Committee

    Lord Erroll - Merlin Member of the HOUSE of LORDS - an Independent Peer PITCOM EURIM apComms

    Add to Reading List

    Source URL: blackhat.com

    Language: English - Date: 2014-12-16 19:06:29
    800Computing platforms / Cross-platform software / Java programming language / Java virtual machine / Java Web Start / Java applet / Java / LiveConnect / HotSpot / Computing / Software / Java platform

      Black Hat Abu Dhabi Exploiting Memory Corruption Vulnerabilities in the Java

    Add to Reading List

    Source URL: media.blackhat.com

    Language: English - Date: 2012-04-07 14:20:37
    UPDATE