Computer security conference

Results: 514



#Item
91Software testing / Qualys / OWASP / Vulnerability / Security / Hacker / Computer security / Cyberwarfare / Computing

HITB2011AMS  AGENDA  -­‐  CONFERENCE  DAY  1  -­‐  19TH  MAY  2011 TRACK  1 TRACK  2   TRACK  3  /  HITB  LABS

Add to Reading List

Source URL: conference.hitb.org

Language: English - Date: 2014-10-26 13:01:24
92Computer network security / Hacking / Computer crimes / Phreaking / Mark Abene / Great Hacker War / Masters of Deception / Hacker / Penetration test / Cybercrime / Computing / Legion of Doom

HITBSecConf2007 - Malaysia

Add to Reading List

Source URL: conference.hackinthebox.org

Language: English - Date: 2014-10-26 12:52:30
93Software testing / Security / Hacking / Penetration test / Vulnerability / Hacker / Attack / Network security / HD Moore / Computer network security / Computer security / Cyberwarfare

HACK IN THE BOX SECURITY CONFERENCE 2003 SPONSORSHIP KIT HITBSecConf2003: Overview On the wave of the success of the last HITBSecConf held in 2002, HITB (M) Sdn Bhd

Add to Reading List

Source URL: conference.hitb.org

Language: English - Date: 2014-10-26 12:44:22
94System software / Internet / Data security / Firewall / Internet censorship / Great Firewall of China / Ping / Router / Google China / Computer network security / Computing / Cyberwarfare

This paper will appear at the 14th ACM Conference on Computer and Communications Security, Oct. 29-Nov. 2, 2007 ConceptDoppler: A Weather Tracker for Internet Censorship Jedidiah R. Crandall

Add to Reading List

Source URL: www.csd.uoc.gr

Language: English - Date: 2007-09-12 11:58:26
95Systems engineering / Avionics / ARINC / Life-critical system / Integrated modular avionics / Situation awareness / Computer security / Aircraft instruments / Technology / Security

34th www.dasconline.org Digital Avionics Systems Conference Corinthia Hotel

Add to Reading List

Source URL: dasconline.org

Language: English - Date: 2015-01-28 17:56:15
96Computing / Wireless sensor network / IEEE Communications Society / International Conference on Information Processing in Sensor Networks / Wireless security / Telecommunications engineering / Association for Computing Machinery / Ambient intelligence / Support / Wireless networking / International nongovernmental organizations / Technology

Peng Ning (As of MarchDepartment of Computer Science North Carolina State University Telephone: (Email: ; URL: http://www.csc.ncsu.edu/faculty/ning

Add to Reading List

Source URL: discovery.csc.ncsu.edu

Language: English - Date: 2012-03-12 18:58:42
97Computing / Software testing / National security / Application security / Core Security Technologies / Vulnerability / OWASP / Voice over IP / Web application security / Computer network security / Security / Computer security

Conference Kit Version 2.0 * Over 30 Network Security Specialists and Researchers * 7-tracks of Hands on Technical Training Sessions * Network Assessment and Latest Attack Methods

Add to Reading List

Source URL: conference.hitb.org

Language: English - Date: 2014-10-26 12:50:30
98Computing / Hacking / Software testing / Application security / Heap overflow / Malware / Network security / Vulnerability / White hat / Computer security / Cyberwarfare / Computer network security

HITBSecConf2010 OCTOBER 11TH - 14TH 2010 CROWNE PLAZA MUTIARA KUALA LUMPUR OCTOBER 4TH - 5TH

Add to Reading List

Source URL: conference.hackinthebox.org

Language: English - Date: 2014-10-26 12:59:36
99Computing / Software testing / National security / Application security / Core Security Technologies / Vulnerability / OWASP / Voice over IP / Web application security / Computer network security / Security / Computer security

Conference Kit Version 2.0 * Over 30 Network Security Specialists and Researchers * 7-tracks of Hands on Technical Training Sessions * Network Assessment and Latest Attack Methods

Add to Reading List

Source URL: conference.hackinthebox.org

Language: English - Date: 2014-10-26 12:50:30
100Computer network security / Hacking / Computer crimes / Phreaking / Mark Abene / Great Hacker War / Masters of Deception / Hacker / Penetration test / Cybercrime / Computing / Legion of Doom

HITBSecConf2007 - Malaysia

Add to Reading List

Source URL: conference.hitb.org

Language: English - Date: 2014-10-26 12:52:30
UPDATE