Hacking

Results: 3953



#Item
181White Paper  The Importance of a Resilient DNS and DHCP Infrastructure DNS and DHCP availability and integrity increase in importance with the business dependence on IT systems

White Paper The Importance of a Resilient DNS and DHCP Infrastructure DNS and DHCP availability and integrity increase in importance with the business dependence on IT systems

Add to Reading List

Source URL: www.gtri.com

Language: English - Date: 2014-09-02 15:27:00
182Linux Kernel Workshop Hacking the Kernel for Fun and Profit Muli Ben-Yehuda   IBM Haifa Research Labs

Linux Kernel Workshop Hacking the Kernel for Fun and Profit Muli Ben-Yehuda IBM Haifa Research Labs

Add to Reading List

Source URL: www.mulix.org

- Date: 2016-06-16 09:04:09
    183Arduino Hacking 101:  Importing the universe Federico Lucifredi

    Arduino Hacking 101: Importing the universe Federico Lucifredi

    Add to Reading List

    Source URL: www.blu.org

    - Date: 2011-07-29 15:32:13
      184   	
   MIND HACKING – Wissen, was Menschen denken, wie sie ticken und was sie wollen Jeder hat sich schon mal gewünscht, Gedanken lesen zu können. Wer weiß, was der Chef, die Mitarbeiter und Kunden denken, hat me

          MIND HACKING – Wissen, was Menschen denken, wie sie ticken und was sie wollen Jeder hat sich schon mal gewünscht, Gedanken lesen zu können. Wer weiß, was der Chef, die Mitarbeiter und Kunden denken, hat me

      Add to Reading List

      Source URL: www.norman-alexander.com

      Language: German - Date: 2015-01-23 03:44:04
        185Questions Developers Ask While Diagnosing Potential Security Vulnerabilities with Static Analysis Justin Smith, Brittany Johnson, and Emerson Murphy-Hill  Bill Chu and Heather Richter Lipford

        Questions Developers Ask While Diagnosing Potential Security Vulnerabilities with Static Analysis Justin Smith, Brittany Johnson, and Emerson Murphy-Hill Bill Chu and Heather Richter Lipford

        Add to Reading List

        Source URL: www4.ncsu.edu

        Language: English - Date: 2015-07-31 17:48:16
        186Jigsaw: Protecting Resource Access by Inferring Programmer Expectations Hayawardh Vijayakumar and Xinyang Ge, The Pennsylvania State University; Mathias Payer, University of California, Berkeley; Trent Jaeger, The Pennsy

        Jigsaw: Protecting Resource Access by Inferring Programmer Expectations Hayawardh Vijayakumar and Xinyang Ge, The Pennsylvania State University; Mathias Payer, University of California, Berkeley; Trent Jaeger, The Pennsy

        Add to Reading List

        Source URL: hexhive.github.io

        Language: English - Date: 2016-06-13 11:08:40
        187U. S. Fleet Cyber Command / TENTH Fleet  Strategic Plan 2015 – 2020  U. S. Fleet Cyber Command / TENTH Fleet

        U. S. Fleet Cyber Command / TENTH Fleet Strategic Plan 2015 – 2020 U. S. Fleet Cyber Command / TENTH Fleet

        Add to Reading List

        Source URL: www.defenseinnovationmarketplace.mil

        Language: English - Date: 2015-11-18 13:49:58
        188UNCORRECTED TRANSCRIPT OF ORAL EVIDENCE  To be published as HC 234-i HOUSE OF COMMONS ORAL EVIDENCE

        UNCORRECTED TRANSCRIPT OF ORAL EVIDENCE To be published as HC 234-i HOUSE OF COMMONS ORAL EVIDENCE

        Add to Reading List

        Source URL: www.publications.parliament.uk

        Language: English - Date: 2013-07-11 11:36:30
        189INFORME:  HACKING TEAM MALWARE PARA LA VIGILANCIA EN AMÉRICA LATINA GISELA PÉREZ DE ACHA

        INFORME: HACKING TEAM MALWARE PARA LA VIGILANCIA EN AMÉRICA LATINA GISELA PÉREZ DE ACHA

        Add to Reading List

        Source URL: www.derechosdigitales.org

        Language: Spanish - Date: 2016-04-17 20:06:01
          190Tell Me About Yourself: The Malicious CAPTCHA Attack Nethanel Gelernter Amir Herzberg  Dept. of Computer Science

          Tell Me About Yourself: The Malicious CAPTCHA Attack Nethanel Gelernter Amir Herzberg Dept. of Computer Science

          Add to Reading List

          Source URL: www2016.net

          Language: English - Date: 2016-04-10 09:10:41