Hacking

Results: 3953



#Item
391

Mobile Application Hacking: Hands-On Providing a comprehensive grounding in the fundamentals of mobile application security 7Safe’s 3-day mobile application hacking training course is designed to provide

Add to Reading List

Source URL: 7safe.com

Language: English - Date: 2015-06-12 05:57:54
    392

    iP-BOX: Breaking Simple Pass Codes on iOS Devices – January 2015 Revision 2 There is a new ‘black box’ that originates from phone unlocking, hacking and repair market called the iPBOX, which can be used to defeat s

    Add to Reading List

    Source URL: www.teeltech.com

    Language: English - Date: 2015-01-20 12:46:25
      393

      SEWTAR - IKEA HACKING MANUAL

      Add to Reading List

      Source URL: www.krabbesholm.dk

      - Date: 2011-06-10 08:48:27
        394Computer network security / Software testing / Hacking / Vulnerability / Application security / Code injection / Qualys / Web application security / Acunetix / Computer security / Cyberwarfare / Computing

        Vulnerability Factors in New Web Applications: Audit Tools, Developer Selection & Languages Jason Bau, Frank Wang, Elie Bursztein, Patrick Mutchler, John C. Mitchell Stanford University Abstract—We develop a web appli

        Add to Reading List

        Source URL: seclab.stanford.edu

        Language: English - Date: 2013-02-22 17:29:44
        395Social engineering / HTML / Clickjacking / NoScript / World Wide Web / Like button / Cross-site scripting / Vulnerability / Click fraud / Computing / Software / Hacking

        A Solution for the Automated Detection of Clickjacking Attacks Marco Balduzzi Manuel Egele

        Add to Reading List

        Source URL: iseclab.org

        Language: English - Date: 2010-04-26 04:55:24
        396Cyberwarfare / Electronic warfare / Hacking / Military technology / Inter-University Seminar on Armed Forces and Society / International Sociological Association / Definitions of terrorism / Civil–military relations / Military sociology / Military science / Sociology

        AIS ISA Research Committee 01: Armed Forces & Conflict Resolution

        Add to Reading List

        Source URL: www.isa-rc01.net

        Language: English - Date: 2014-03-19 05:31:12
        397Unix / Network architecture / Data security / Hacking / Internet protocols / Firewall / User identifier / Stateful firewall / Setuid / Computer network security / Computing / Computer security

        CS 155: Spring 2004 June 2004 CS 155 Final Exam This exam is open books and open notes, but you may not use a laptop. You have 2 hours. Make sure you print your name legibly and sign the honor code below. All of the inte

        Add to Reading List

        Source URL: crypto.stanford.edu

        Language: English - Date: 2012-04-06 01:23:14
        398Software testing / Technology / Hacking / Vulnerability / Smart card / Common Criteria / Reverse engineering / ISO standards / Computer security / Cyberwarfare

        Joint Interpretation Library Application of Attack Potential to Smartcards Version 2.9 January 2013

        Add to Reading List

        Source URL: sogis.eu

        Language: English - Date: 2013-02-14 10:20:23
        399Advanced persistent threat / Hacking / Malware / Computer virus / Vulnerability / Antivirus software / Cyberwarfare / Security / Computer security

        Poster: OpenAPT – Open-Source Advanced Persistent Threat for Academic Research Mordehai Guri, Tom Sela, Yuval Elovici Department of Information Systems Engineering Ben-Gurion University of the Negev Beer-Sheva, Israel

        Add to Reading List

        Source URL: www.ieee-security.org

        Language: English - Date: 2013-05-17 10:01:48
        400Hacking / War / Advanced persistent threat / Military technology / Securitate / Malware / Computer insecurity / Zero-day attack / Security / Cyberwarfare / Electronic warfare

        Atacuri avansate impotriva institutiilor financiare Metode de prevenire si raspuns Teodor Cimpoesu, Cyber Security BU Director Cyber Risks, Bucuresti, 9 Oct, 2014

        Add to Reading List

        Source URL: cyberisks.ro

        Language: English - Date: 2014-10-10 03:40:58
        UPDATE