Hacking

Results: 3953



#Item
321Satellite television / United Kingdom / Television / BSkyB / Digital television in the United Kingdom / News International phone hacking scandal

JUNE  3,  2013          

Add to Reading List

Source URL: www.skysthelimit29.org

Language: English - Date: 2014-09-08 09:54:31
322Security / Hacking / Software testing / National security / Vulnerability / Exploit / Attack / Threat / Zero-day attack / Computer network security / Cyberwarfare / Computer security

  Christian  Gehl   Co-­‐Founder    &  CEO     www.trifense.com  

Add to Reading List

Source URL: www.europa.brandenburg.de

Language: English - Date: 2012-06-20 09:00:08
323Crime / National security / Electronic warfare / Hacking / Military technology / Computer security / International Multilateral Partnership Against Cyber Threats / Cyberterrorism / Legal aspects of computing / Computer crimes / Cyberwarfare / Security

KENYA CYBER SECURITY REPORT 2014 Rethinking Cyber Security – “An Integrated Approach: Processes, Intelligence and Monitoring.”

Add to Reading List

Source URL: www.usalama.co.ke

Language: English - Date: 2014-06-09 08:57:31
324Relational database management systems / Computer network security / Database management systems / Hacking / Software testing / SQL injection / Cross-site scripting / Vulnerability / Code injection / Computing / Cyberwarfare / Computer security

How to Secure Your Website 5th Edition Approaches to Improve Web Application and Website Security

Add to Reading List

Source URL: www.ipa.go.jp

Language: English - Date: 2013-07-09 23:13:11
325Cyberwarfare / Hacker / Electronics / Embedded system / Computing / Hacking / Computer programming

A DIGITAL CITIZENS ALLIANCE REPORT BY GARTH BRUEN OUT OF CONTROL: THE THREAT OF CAR HACKING

Add to Reading List

Source URL: media.digitalcitizensactionalliance.org

Language: English - Date: 2013-12-23 10:46:14
326Computer crimes / Cyberwarfare / Melissa Hathaway / Internet-related prefixes / Cyberspace / War / Military science / Crime / Electronic warfare / Hacking / Military technology

Understanding the Dynamics of Cyber International Relations Project Team Nazli Choucri (PI), David D. Clark, Roger Hurwitz, Daniel Goldsmith, Stuart Madnick, John C. Mallery, Silvio Micali, Michael Siegel, Patrick H. Win

Add to Reading List

Source URL: web.mit.edu

Language: English - Date: 2010-10-07 14:21:20
327Hacking / Capsicum / Capability-based security / Thread / Mandatory access control / Exception handling / Operating system / Vulnerability / C / Computing / Computer security / Software engineering

CS240 Operating Systems Midterm Exam Review – Feb. 8, 2013 Your Name: SUNet ID:

Add to Reading List

Source URL: www.scs.stanford.edu

Language: English - Date: 2013-02-09 14:29:53
328Computer network security / Hacking / National security / Vulnerability / Advanced persistent threat / Attack / Stuxnet / Cyberwarfare / Computer security / Security

IBM’s Cyber Security Perspective Martin Borrett, Director of the IBM Institute for Advanced Security, Europe © 2011 IBM Corporation IBM’s Definition of Cyber Security

Add to Reading List

Source URL: www.infowar.it

Language: English - Date: 2011-11-22 08:27:22
329Security / Software testing / Hacking / Vulnerability / CVSS / Security testing / Buffer overflow / Attack / Uncontrolled format string / Cyberwarfare / Computer security / Computer network security

Microsoft Word - unforgivable 3.doc

Add to Reading List

Source URL: cwe.mitre.org

Language: English - Date: 2007-09-13 16:51:18
330Television / Entertainment / British brands / BSkyB / News International phone hacking scandal / Sky+ HD / Sky Betting and Gaming / Sky Magazine / Sky Go / Television in the United Kingdom / Satellite television / Television in Ireland

Annual ReportOur strategy Governance

Add to Reading List

Source URL: corporate.sky.com

Language: English
UPDATE