Cyberwarfare

Results: 11990



#Item
521Computer security / Cybercrime / National security / Cyberwarfare / Computer network security / Threat / Cyberterrorism / Information security / Cyber-Insurance / Institute for Information Infrastructure Protection

Microsoft PowerPoint - SkillBridge Capabilities Statement

Add to Reading List

Source URL: www.skillbridgetraining.com

Language: English - Date: 2015-05-01 14:08:59
522Cyberwarfare / Security / Computer security / Computer network security / Cybercrime / National security / Threat / Vulnerability / Threat Intelligence Platform / Threat model

SANDIA REPORT SAND2007-5791 Unlimited Release Printed SeptemberCategorizing Threat

Add to Reading List

Source URL: www.idart.sandia.gov

Language: English - Date: 2009-05-07 12:36:27
523Security / Computer security / Prevention / Cyberwarfare / Crime prevention / Cryptography / National security / Federal Information Security Management Act

Earth System Grid Federation (ESGF) Software Security Plan

Add to Reading List

Source URL: esgf.llnl.gov

Language: English - Date: 2016-06-01 13:26:15
524Security / Military science / Prevention / National security / Cybercrime / Cyberwarfare / Hacking / Military technology / United States Army Cyber Command / United States Cyber Command / United States Army Intelligence and Security Command / Information warfare

foreword S uccessful Unified Land Operations increasingly depend on the ability of Army and Joint Force Commanders to effectively integrate cyber, signal, electronic warfare, intelligence, information operations, and sp

Add to Reading List

Source URL: cybercoe.army.mil

Language: English - Date: 2015-12-23 08:19:14
525Computer security / Security / Computing / Cyberwarfare / Computer network security / Cybercrime / National security / Actuarial science / Situation awareness / International Multilateral Partnership Against Cyber Threats / Threat / Risk

Aviation Cybersecurity Roadmap Research needs Cyrille Rosay Senior Expert Avionics – Cyber Security Certification Directorate

Add to Reading List

Source URL: www.aerodays2015.com

Language: English - Date: 2015-11-03 04:29:29
526Computer security / Cyberwarfare / Cybercrime / Address space layout randomization / Return-oriented programming / Vulnerability / Code injection / Software bugs / JIT spraying / PaX

String Oriented Programming: When ASLR is not enough Mathias Payer* and Thomas R. Gross Department of Computer Science ETH Zürich, Switzerland

Add to Reading List

Source URL: hexhive.github.io

Language: English - Date: 2016-06-13 11:08:40
527Computer memory / Computing / Software bugs / Software engineering / Cyberwarfare / Buffer overflow / Program analysis / Control flow graph / Data buffer / Data-flow analysis / Vulnerability

Transformation-aware Exploit Generation using a HICFG Dan Caselden Alex Bazhanyuk Mathias Payer Laszlo Szekeres

Add to Reading List

Source URL: hexhive.github.io

Language: English - Date: 2016-06-13 11:08:40
528Computer security / Cyberwarfare / Computing / Hacking / Computer network security / Software testing / Vulnerability / CERT Coordination Center / Cross-site scripting / SQL injection / CVSS / Benjamin Kunz Mejri

Reporting Status of Vulnerability-related Information about Software Products and Websites - 1st Quarter ofJanuary – March) - Information-technology Promotion Agency, Japan (IPA) and Japan Computer Emergency Res

Add to Reading List

Source URL: www.ipa.go.jp

Language: English - Date: 2016-05-31 02:00:13
529Crime / Cyberwarfare / Denial-of-service attacks / Criminology / Computing / Cyberspace / Hacker groups / Internet trolling / Denial-of-service attack / Booter / Techniques of neutralization / Rational choice theory

This is an Accepted Manuscript of an article published by Taylor & Francis Group in Deviant Behavior on 9 May 2016, available online: http://www.tandfonline.comExploring the provision of on

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2016-05-10 11:01:42
530Cryptography / Cyberwarfare / System administration / Cybercrime / Password / Rootkit / Fsck / Su / Malware / Computer security / Password cracking / Password manager

How They Do It: Unix Hacking 101 Hal Pomeranz Deer Run Associates Who Am I?

Add to Reading List

Source URL: www.deer-run.com

Language: English - Date: 2004-08-16 11:51:23
UPDATE