Core Security Technologies

Results: 22



#Item
1

Using AI Techniques to improve Pentesting Automation Carlos Sarraute Core Security Technologies and Ph.D. program in Informatics Engineering, ITBA

Add to Reading List

Source URL: 2010.hackitoergosum.org

Language: English - Date: 2010-04-16 11:10:57
    2

    gFuzz: An instrumented Web application fuzzing environment Ezequiel D. Gutesman Corelabs Core Security Technologies

    Add to Reading List

    Source URL: archive.hack.lu

    Language: English - Date: 2008-12-03 13:56:20
      3

      Hack.lu · October 18-20, 2007 · Kirchberg, Luxembourg Agent oriented SQL abuse Fernando Russ – Diego Tiscornia Core Security Technologies

      Add to Reading List

      Source URL: archive.hack.lu

      Language: English - Date: 2008-06-15 13:27:09
        4

        Hack.lu · October 18-20, 2007 · Kirchberg, Luxembourg Zombie2.0 Fernando Russ – Diego Tiscornia Core Security Technologies

        Add to Reading List

        Source URL: archive.hack.lu

        Language: English - Date: 2008-06-15 13:27:09
          5Computer network security / Intel Core / Gemalto / Safenet / RSA / Commtouch / Intel / AVG Technologies / Check Point / Cryptography / Computer security / Computing

          Q3 2014 Security & Risk Market Snapshot Don More Eric Wagner

          Add to Reading List

          Source URL: signalhill.in

          Language: English - Date: 2015-01-05 14:29:12
          6Computing / Software testing / National security / Application security / Core Security Technologies / Vulnerability / OWASP / Voice over IP / Web application security / Computer network security / Security / Computer security

          Conference Kit Version 2.0 * Over 30 Network Security Specialists and Researchers * 7-tracks of Hands on Technical Training Sessions * Network Assessment and Latest Attack Methods

          Add to Reading List

          Source URL: conference.hitb.org

          Language: English - Date: 2014-10-26 12:50:30
          7Computing / Software testing / National security / Application security / Core Security Technologies / Vulnerability / OWASP / Voice over IP / Web application security / Computer network security / Security / Computer security

          Conference Kit Version 2.0 * Over 30 Network Security Specialists and Researchers * 7-tracks of Hands on Technical Training Sessions * Network Assessment and Latest Attack Methods

          Add to Reading List

          Source URL: conference.hackinthebox.org

          Language: English - Date: 2014-10-26 12:50:30
          8Public safety / Management / Core Security Technologies / Perimeter E-Security / Security / Chief technology officer / Information security

          Black Hat usaR Demographics Snapshot Attendees come to Black Hat to meet leading IT vendors and to make

          Add to Reading List

          Source URL: blackhat.com

          Language: English - Date: 2014-12-16 19:06:13
          9Computing / Computer network security / Core Security Technologies / Software testing

          Black_Hat_2009_DC_Attendee_Snapshot

          Add to Reading List

          Source URL: blackhat.com

          Language: English - Date: 2014-12-16 19:06:13
          10Prevention / Security / Core Security Technologies

          Black_Hat_2009_Europe_Attendee_Snapshot

          Add to Reading List

          Source URL: blackhat.com

          Language: English - Date: 2014-12-16 19:06:13
          UPDATE