Hacking

Results: 3953



#Item
101Marketing / Economy / Business / Digital marketing / Hacker / Growth hacking / Marketing operations

Contents Introduction ix I

Add to Reading List

Source URL: cdn.chiefmartec.com

Language: English - Date: 2016-02-05 09:40:23
102Security / Prevention / National security / Cybercrime / Cyberwarfare / Hacking / Security engineering / United States Cyber Command / Computer security / Cyber-attack / Cyber / Keith B. Alexander

Microsoft Word - Gen Alexander - Digital Acts of War Testimony - Finaldocx

Add to Reading List

Source URL: oversight.house.gov

Language: English - Date: 2016-07-13 12:55:49
103Cyberwarfare / Computer security / Computing / Hacking / Computer network security / Cryptography / National security / Cross-site request forgery / Oscar / SQL injection / Cross-site scripting / Application security

oscar Oscar’s radical approach to healthcare requires unparalleled application security CASE STUDY: ENTERPRISE APPLICATION

Add to Reading List

Source URL: www.prevoty.com

Language: English - Date: 2016-08-18 22:09:36
104Security / Prevention / Hacking / Military technology / Computer security / Cybercrime / National security / University of Hawaii / Cyberwarfare in the United States / Michigan Cyber Range / DoD Cyber Crime Center

NEWS RELEASE May 23, 2016 Media Contact: Julie Funasaki Yuen, (

Add to Reading List

Source URL: laulima.hawaii.edu

Language: English
105Computer security / Cyberwarfare / Security / Computer network security / Hacking / Software testing / Vulnerability / Application security / Web application firewall

Microsoft PowerPoint - VulnerabilityManagementInAnApplicationSecurityWorld_OWASPDC_20090805.ppt [Compatibility Mode]

Add to Reading List

Source URL: denimgroup.com

Language: English - Date: 2014-01-13 18:21:23
106Cyberwarfare / Computer security / Computing / Computer network security / Threat model / Hacking / Software testing / Threat / STRIDE / Vulnerability / SQL injection / Security

Microsoft PowerPoint - ISSA threat modeling.ppt [Read-Only]

Add to Reading List

Source URL: denimgroup.com

Language: English - Date: 2014-01-13 18:21:19
107Security / Cybercrime / Cyberwarfare / Military science / Computing / Hacking / Military technology / National security / International Multilateral Partnership Against Cyber Threats / Computer security / Cyberterrorism / Cyber-attack

UNIDIR Cyber Stability Seminar 2015: Regime Coherence UNIDIR RESOURCES

Add to Reading List

Source URL: www.unidir.org

Language: English - Date: 2015-09-18 04:25:35
108Security / Cyberwarfare / Prevention / Cybercrime / National security / Hacking / Military technology / Stuxnet / Cyber-attack / Computer security / Sabotage / Espionage

OPINION End this phony cyberwar Talk of combat in the fifth domain has become a fixture in Washington. But cyberwar has never happened and probably never will, says Thomas Rid EXACTLY two decades ago, the

Add to Reading List

Source URL: ridt.co

Language: English - Date: 2015-12-18 07:31:22
109Computing / Software engineering / Hypertext Transfer Protocol / Network protocols / World Wide Web / Hacking / Cross-site scripting / Cross-site request forgery / JavaScript / Session / POST / HDIV

Microsoft PowerPoint - DenimGroup_OWASPTop10_A5_CrossSiteRequestForwarding_OWASPAustin_20070731.ppt [Compatibility Mode]

Add to Reading List

Source URL: denimgroup.com

Language: English - Date: 2014-01-13 18:20:01
110Hacker culture / Computing / Hacking / Technology / Security hacker / Phrack / Hacker ethic / Hackers: Heroes of the Computer Revolution / Hacker / Electron / Black hat / Underground

What hackers learn that the rest of us don’t Sergey Bratus May 17, 2008 1

Add to Reading List

Source URL: www.cs.dartmouth.edu

Language: English - Date: 2008-05-17 04:08:00
UPDATE