Cyberwarfare

Results: 11990



#Item
511Nagios / Cyberwarfare / System administration / Hacking / Vulnerability / Computer security

Greenbone Case Study Vulnerability Management Technische Universität Dresden Vulnerability Management with Greenbone and Nagios/Centreon: The sooner you recognize a problem, the faster you can react

Add to Reading List

Source URL: www.greenbone.net

Language: English - Date: 2016-06-16 08:24:26
512Cyberwarfare / Computer security / Computing / Malware / Computer network security / Computer viruses / Hacking / Zero-day / Botnet / Antivirus software / Vulnerability

THE MITRE CORPORATION THE MAEC™ LANGUAGE OVERVIEW DESIREE BECK, IVAN KIRILLOV, PENNY CHASE, MITRE JUNE 12, 2014

Add to Reading List

Source URL: maecproject.github.io

Language: English - Date: 2016-06-15 18:10:07
513Computer security / Computer access control / Security / Cyberwarfare / Identity theft / Cybercrime / Computer network security / Internet advertising / Spyware / Password / Multi-factor authentication / Phishing

Tips on Online Security Security Practices to Safeguard Your Password You are advised to adopt the following:   

Add to Reading List

Source URL: secure.ifastpensions.com

Language: English - Date: 2014-09-25 08:27:41
514Security / Cyberwarfare / Computer security / Computer network security / Cryptography / National security / Secure communication / Information security management system

Paris, February 11, 2016 Press release: Beijaflore has got the ISOcertification for the whole company By obtaining the ISO/IEC 27001:2013 certification for the whole Group, Beijaflore becomes the first and only

Add to Reading List

Source URL: www.beijaflore.com

Language: English - Date: 2016-02-18 12:28:33
515Cyberwarfare / Code injection / Machine code / Return-oriented programming / Privilege escalation / Uncontrolled format string / Computer security / Virtualization

I Control Your Code Attack Vectors through the Eyes of Software-based Fault Isolation Mathias Payer <>

Add to Reading List

Source URL: hexhive.github.io

Language: English - Date: 2016-06-13 11:08:40
516Computer security / Cyberwarfare / Sandbox / Cybercrime / JOP / Code injection / Kernel / Return-oriented programming

Safe Loading A Foundation for Secure Execution of Untrusted Programs Mathias Payer, Tobias Hartmann, Thomas R. Gross Department of Computer Science

Add to Reading List

Source URL: hexhive.github.io

Language: English - Date: 2016-06-13 11:08:40
517Cybercrime / Computing / Security / Structure / National security / Social engineering / Cyberwarfare / Computer network security / Computer security / Phishing / Smart city / Sharing economy

I SSUE 32 WELCOME THE JOURNAL FOR CHANGE LEADERS W

Add to Reading List

Source URL: www.impactexecutives.com

Language: English - Date: 2016-04-18 11:59:42
518Computing / Cyberwarfare / Computer network security / Computer security / Cybercrime / Spamming / Internet security / Zero-day / Phishing / Computer virus / Syslog / Client honeypot

Appliance X1 xorlab AG c/o ETH Zürich Universitätsstrasse 6

Add to Reading List

Source URL: www.xorlab.com

Language: English - Date: 2016-03-11 01:09:00
519Software / System software / Computing / Concurrency control / Transaction processing / Transactional memory / Programming language implementation / Cyberwarfare / Rootkit / Hypervisor / Hyper-V / VM

Concurrent and Consistent Virtual Machine Introspection with Hardware Transactional Memory Yutao Liu†, Yubin Xia†, Haibing Guan§, Binyu Zang†, Haibo Chen† Shanghai Key Laboratory of Scalable Computing and System

Add to Reading List

Source URL: ipads.se.sjtu.edu.cn

Language: English - Date: 2014-02-20 00:16:23
520Computer security / Security / Cyberwarfare / Cybercrime / Computer network security / National security / Hacking / Military technology / Shellcode / Metasploit Project / Security hacker

William Owen Redwood Contact Information Department of Computer Science The Florida State University

Add to Reading List

Source URL: ww2.cs.fsu.edu

Language: English - Date: 2013-02-18 11:48:25
UPDATE