Hacking

Results: 3953



#Item
161IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING,  VOL. 15, NO. 4,

IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, VOL. 15, NO. 4,

Add to Reading List

Source URL: rich.recoil.org

Language: English - Date: 2006-04-19 16:08:00
162The Citizen Lab  Research Brief FebruaryMapping Hacking Team’s “Untraceable” Spyware

The Citizen Lab Research Brief FebruaryMapping Hacking Team’s “Untraceable” Spyware

Add to Reading List

Source URL: citizenlab.org

Language: English - Date: 2015-03-18 14:57:35
163phpMyAdmin Web Application Security Assessment phpMyAdmin May 18, 2016 – Version 1.2 Prepared for Michal Čihař

phpMyAdmin Web Application Security Assessment phpMyAdmin May 18, 2016 – Version 1.2 Prepared for Michal Čihař

Add to Reading List

Source URL: wiki.mozilla.org

Language: English - Date: 2016-06-06 10:06:22
164Securely Taking on New Executable Software of Uncertain Provenance (STONESOUP) Neutralizing Exploitable Vulnerabilities in Software Program Manager: Mr. W. Konrad Vesey; E-mail:  How can we benefit

Securely Taking on New Executable Software of Uncertain Provenance (STONESOUP) Neutralizing Exploitable Vulnerabilities in Software Program Manager: Mr. W. Konrad Vesey; E-mail: How can we benefit

Add to Reading List

Source URL: samate.nist.gov

Language: English - Date: 2015-10-27 14:35:32
165p-Curve and p-Hacking in Observational Research

p-Curve and p-Hacking in Observational Research

Add to Reading List

Source URL: datacolada.org

Language: English - Date: 2016-05-25 06:17:17
166Veracode Summary Report  Summary Report As of 18 Mar 2016 Prepared for: Prepared on:

Veracode Summary Report Summary Report As of 18 Mar 2016 Prepared for: Prepared on:

Add to Reading List

Source URL: owncloud.com

Language: English - Date: 2016-04-06 15:04:57
167Mining known attack patterns from security-related events Nicandro Scarabeo1,2 , Benjamin C.M. Fung3 and Rashid H. Khokhar4 1 Department of Electrical and Information Engineering, University of Cassino and Southern  Lazi

Mining known attack patterns from security-related events Nicandro Scarabeo1,2 , Benjamin C.M. Fung3 and Rashid H. Khokhar4 1 Department of Electrical and Information Engineering, University of Cassino and Southern Lazi

Add to Reading List

Source URL: peerj.com

Language: English - Date: 2015-10-07 04:49:41
168Microsoft PowerPoint - VulnerabilityManagementInAnApplicaitonSecurityWorld_SnowFROC_20090305.ppt [Compatibility Mode]

Microsoft PowerPoint - VulnerabilityManagementInAnApplicaitonSecurityWorld_SnowFROC_20090305.ppt [Compatibility Mode]

Add to Reading List

Source URL: denimgroup.com

Language: English - Date: 2014-01-13 18:21:46
169WHITEHAT SENTINEL SOURCE FOR MOBILE  DA T A SHE E T WhiteHat Sentinel Source for Mobile

WHITEHAT SENTINEL SOURCE FOR MOBILE DA T A SHE E T WhiteHat Sentinel Source for Mobile

Add to Reading List

Source URL: www.whitehatsec.com

Language: English - Date: 2016-08-17 13:22:10
170Philosophy of Science Association  Slightly More Realistic Personal Probability Author(s): Ian Hacking Source: Philosophy of Science, Vol. 34, No. 4 (Dec., 1967), ppPublished by: The University of Chicago Press

Philosophy of Science Association Slightly More Realistic Personal Probability Author(s): Ian Hacking Source: Philosophy of Science, Vol. 34, No. 4 (Dec., 1967), ppPublished by: The University of Chicago Press

Add to Reading List

Source URL: dl.dropboxusercontent.com

Language: English