Computer security conference

Results: 514



#Item
101Trustworthy computing / Trust / Cloud computing / Carnegie Mellon University / Computing / Session / Behavior / Ethics / Computer security / Information technology management

T R U S T4th International Conference on Trust & Trustworthy Computing J u n e ,

Add to Reading List

Source URL: www.trust2011.org

Language: English - Date: 2011-05-25 11:43:13
102Computing / Application security / Heap overflow / Qualys / Vulnerability / Metasploit Project / Shellcode / Exploit / Wireless security / Computer network security / Cyberwarfare / Computer security

HITBSECCONF2009 - DUBAI CONFERENCE KIT Event Overview Venue: Sheraton Dubai Creek

Add to Reading List

Source URL: conference.hitb.org

Language: English - Date: 2014-10-26 12:55:03
103Cyberwarfare / Penetration test / Vulnerability / Network security / Hacker / Attack / Security / Managed security service / HD Moore / Computer network security / Computing / Computer security

HACK IN THE BOX SECURITY CONFERENCE 2003 BOOTH KIT HITBSecConf2003: Overview On the wave of the success of the last HITBSecConf held in 2002, HITB (M) Sdn Bhd

Add to Reading List

Source URL: conference.hackinthebox.org

Language: English - Date: 2014-10-26 12:44:22
104Computing / Hacking / Software testing / Application security / Heap overflow / Malware / Network security / Vulnerability / White hat / Computer security / Cyberwarfare / Computer network security

HITBSecConf2010 OCTOBER 11TH - 14TH 2010 CROWNE PLAZA MUTIARA KUALA LUMPUR OCTOBER 4TH - 5TH

Add to Reading List

Source URL: conference.hitb.org

Language: English - Date: 2014-10-26 12:59:36
105Hacking / Cyberwarfare / Software testing / Emirates Telecommunications Corporation / Penetration test / Hacker / Network security / Oracle Corporation / Telecommunications Regulatory Authority / Computer network security / Computing / Computer security

HITBSecConf2008 – Dubai Conference Kit Supported & Endorsed by Hack In The Box Security ConferenceDubai

Add to Reading List

Source URL: conference.hitb.org

Language: English - Date: 2014-10-26 12:53:31
106Security / Software / Compiler / Computing platform / Operating system / Computer security / Monica S. Lam / International Conference on Architectural Support for Programming Languages and Operating Systems / Computing / Computer architecture

Microsoft Word - CFP2009.doc

Add to Reading List

Source URL: www.cs.virginia.edu

Language: English - Date: 2014-08-12 12:06:30
107Computing / Risk analysis / British Standards / ISO/IEC 27001 lead auditor / Information security management system / ISO/IEC 27002 / BS / ISO / Threat / Data security / Computer security / Security

FAST TRACK ISMS CERTIFICATION by Dr. David Brewer and William List, CA, Hon FBCS, CITP At a press conference on 29 April 2004 there were gasps of awe from the audience as we announced that four clients of ours based in t

Add to Reading List

Source URL: www.gammassl.co.uk

Language: English - Date: 2013-01-11 08:20:53
108Software testing / Antivirus software / Cyberwarfare / Application security / Computer security / Malware / Network security / Hack / Vulnerability / Computing / Hacking / Software

Conference Kit * 30 Network Security Specialists and Researchers * 6-tracks of Hands on Technical Training Sessions * Network Assessment and Latest Attack Methods * Fundamental Defense Methodologies * Close Look At the L

Add to Reading List

Source URL: conference.hitb.org

Language: English - Date: 2014-10-26 12:49:07
109Cyberwarfare / Application firewall / Stateful firewall / Distributed firewall / Firewall / Network security / Network address translation / Computer network / Network switch / Computer network security / Computing / Computer security

DEPEND 2014 : The Seventh International Conference on Dependability Network-Security-Policy Analysis Christian Pitscheider Dip. di Automatica e Informatica

Add to Reading List

Source URL: security.polito.it

Language: English - Date: 2015-02-16 02:27:52
110Software testing / Antivirus software / Cyberwarfare / Application security / Computer security / Malware / Network security / Hack / Vulnerability / Computing / Hacking / Software

Conference Kit * 30 Network Security Specialists and Researchers * 6-tracks of Hands on Technical Training Sessions * Network Assessment and Latest Attack Methods * Fundamental Defense Methodologies * Close Look At the L

Add to Reading List

Source URL: conference.hackinthebox.org

Language: English - Date: 2014-10-26 12:49:07
UPDATE