Hacking

Results: 3953



#Item
111Hacking / White hat / English-language films

On the use of security and privacy technology as a plot device Joan Feigenbaum and Brad Rosen Yale University, New Haven CT, USA E-mail: {joan.feigenbaum, brad.rosen}@yale.edu

Add to Reading List

Source URL: cs-www.cs.yale.edu

Language: English - Date: 2015-08-24 20:43:01
112Computing / Internet / Content delivery network / Network architecture / Akamai Technologies / Internet service provider / Distributed data storage / Computer networking / Streaming / Hacking

1 Internet Structural Analysis by End-to-End Measurement NTT Communications

Add to Reading List

Source URL: irtf.org

Language: English - Date: 2015-10-30 06:39:46
113Security / Cyberwarfare / Computer security / Cybercrime / Hacking / National security / Cooperative Cyber Defence Centre of Excellence / Cyber-attack / Stuxnet / Jason Healey / Mandiant / Jeffrey Carr

Software Manufacturer Liability JEFFREY CARR RESPONSIBLE ATTRIBUTION: A PREREQUISITE FOR ACCOUNTABILITY

Add to Reading List

Source URL: ccdcoe.org

Language: English - Date: 2016-08-12 06:44:11
114Health / Healthcare quality / Health economics / Healthcare reform in the United States / Determinants of health / Health care / Personal life / Draft:Orion Health

NEUE ZÜ RC H ER Z EI T U N G – HACKING THE HEALTHCAR E SYST EM By Nicholas Bornstein and Stephan Sigrist

Add to Reading List

Source URL: www.thewire.ch

Language: English - Date: 2016-04-29 10:37:32
115Software / Computing / Project management software / GitHub / Trello / Open data / Slack / Socrata / Cloud computing / Web portal

3 GETTING CONNECTED In order to get the most out of civic hacking with us, you will need the following online tools. They’re all free, so sign up and follow the instructions to connect to our channels.

Add to Reading List

Source URL: ndoch.openoakland.org

Language: English - Date: 2016-06-06 17:11:31
116Statistics / Design of experiments / Knowledge / Science / Causal inference / Experiments / Philosophy of science / Formal sciences / Spurious relationship / Econometrics / Confounding / Causality

Is the p-curve always right-skewed in observational research? We are thankful to Simonsohn, Nelson and Simmons (SNS) for the opportunity to directly reply to their blog post that discusses our article about p-hacking and

Add to Reading List

Source URL: datacolada.org

Language: English - Date: 2016-06-08 05:10:46
117Computing / Computer security / Cyberwarfare / Hacking / Computer network security / Software testing / Vulnerability / OWASP / Secure coding / Application security / Cross-site scripting / Defensive programming

Combating the Top 4 Sources of Software Vulnerabilities

Add to Reading List

Source URL: www.veracode.com

Language: English - Date: 2016-07-20 15:52:45
118Radio electronics / Vehicle telematics / Wireless / Sedans / Flagship vehicles / Remote keyless system / Smart key / MyLink / OnStar / Chevrolet Impala / Chevrolet Cruze / Draft:Automotive Hacking

2016 Chevrolet Impala LTZ

Add to Reading List

Source URL: www.chevrolet.com

Language: English
119Big data / Data management / Technology forecasting / Transaction processing / Data analysis / Visualization

HACKING DEVELOPMENT, VISUALIZATION & SCIENCE JUNE, TURIN (ITALY) www.bigdive.eu #BIGDIVE5

Add to Reading List

Source URL: www.bigdive.eu

Language: English - Date: 2016-05-25 12:14:38
120Computer security / Hacking / Computer network security / Software testing / Vulnerability / Areva / Penetration test / Cross-site scripting / Attack / Social vulnerability / SAINT

Vulnerability Assessment and Penetration Testing AREVA’s Vulnerability Assessments identify and quantify vulnerabilities, and provide recommendations to eliminate or mitigate the risk. Our Penetration Testing uses adva

Add to Reading List

Source URL: us.areva.com

Language: English - Date: 2015-06-29 11:31:01
UPDATE