Hacking

Results: 3953



#Item
311Entertainment / British brands / Television in Ireland / BSkyB / News International phone hacking scandal / Sky Movies / Sky / Sky+ HD / Sky Anytime / Television in the United Kingdom / Television / Satellite television

Annual Report 2014 Strategic report – At a glance Sky at a glance Consumer business

Add to Reading List

Source URL: corporate.sky.com

Language: English
312Computer network security / Software testing / Hacking / Vulnerability / Validation / Computer security / Cyberwarfare / Security

Secure Provision and Consumption in the Internet of Services FP7-ICT, ICTTrustworthy ICT) Project Nowww.spacios.eu

Add to Reading List

Source URL: www.spacios.eu

Language: English - Date: 2011-12-21 03:32:12
313Hacking / Software testing / Vulnerability / Image scanner / Network vulnerability scan / Social vulnerability / SAINT / Port scanner / Computer security / Computing / Cyberwarfare

FedRAMP JAB P-ATO Vulnerability Scan Requirements Guide   Version 1.0

Add to Reading List

Source URL: www.fedramp.gov

Language: English - Date: 2015-06-03 09:58:42
314Software testing / Computer network security / Hacking / Risk / Software bugs / Vulnerability / Social vulnerability / Buffer overflow / Database / Computer security / Cyberwarfare / Computing

=================================================================== PLOVER - Preliminary List Of Vulnerability Examples for Researchers =================================================================== [*] Author: Stev

Add to Reading List

Source URL: cwe.mitre.org

Language: English - Date: 2006-09-13 14:57:16
315News International phone hacking scandal / Satellite television / United Kingdom / Television / British brands / BSkyB / Digital television in the United Kingdom

Annual Report 2014 Strategic report – Chairman’s statement A year of outstanding progress 2014 has been a year of outstanding progress for Sky. Executing well against a clear and consistent strategy,

Add to Reading List

Source URL: corporate.sky.com

Language: English
316Software testing / Security / Software bugs / Hacking / Vulnerability / Flaw hypothesis methodology / Penetration test / Cyberwarfare / Computer security / Computer network security

Naval Research Laboratory Washington, DCNRL/FRA Taxonomy of Computer Program

Add to Reading List

Source URL: cwe.mitre.org

Language: English - Date: 2006-09-13 14:57:14
317Hacking / Software testing / Failure / Vulnerability / Setuid / File system / Exploit / File descriptor / Social vulnerability / Computer security / Unix / Cyberwarfare

Checking for Race Conditions in File Accesses Matt Bishop and Michael Dilger CSESeptember 1995 Checking for Race Conditions in File Accesses

Add to Reading List

Source URL: seclab.cs.ucdavis.edu

Language: English - Date: 2004-06-21 18:55:49
318Hacking / Clickjacking / Computer security / Software testing / Likejacking / Tapjacking / Penetration test / Like button / Cross-site request forgery / Computing / Facebook / Social engineering

Introduction Attack vectors Counteractive measures Conclusion and outlook UI Redressing and Clickjacking:

Add to Reading List

Source URL: 2011.zeronights.org

Language: English - Date: 2011-12-28 02:05:06
319Software testing / Software quality / Hacking / Computer network security / Vulnerability / Veracode / Software assurance / CWE / Common Vulnerabilities and Exposures / Computer security / Cyberwarfare / Computing

Being Explicit about Security Weaknesses

Add to Reading List

Source URL: cwe.mitre.org

Language: English - Date: 2007-07-02 14:31:33
320Computing / Software testing / Hacking / Vulnerability / Penetration test / Exploit / Threat model / Cross-site request forgery / SQL injection / Computer security / Cyberwarfare / Computer network security

Secure Provision and Consumption in the Internet of Services FP7-ICT, ICTTrustworthy ICT) Project Nowww.spacios.eu

Add to Reading List

Source URL: www.spacios.eu

Language: English - Date: 2014-10-17 10:36:52
UPDATE