Hacking

Results: 3953



#Item
441Linux-based devices / Digital media / Mobile content / Universal Plug and Play / Hacking / Linksys / OpenWrt / Broadcom / Vulnerability / Software / System software / Computing

DefenseCode Security Advisory Broadcom UPnP Remote Preauth Code Execution Vulnerability www.defensecode.com

Add to Reading List

Source URL: www.defensecode.com

Language: English - Date: 2013-01-31 02:08:46
442Military technology / International security / International relations / Science / Foreign relations of India / Cyberwarfare / Electronic warfare / Hacking

Microsoft WordRede_BMin_Neu_Delhi_ENG_final_fliesstext.docx

Add to Reading List

Source URL: orfonline.org

Language: English - Date: 2015-05-27 08:43:52
443Actuarial science / Public safety / Computer crimes / Cyberwarfare / Hacking / Military technology / Operational risk / Computer security / Bank / Security / Ethics / Risk

Speech at The Clearing House’s First Annual Operational Risk Colloquium, February 11, 2015

Add to Reading List

Source URL: www.occ.gov

Language: English - Date: 2015-06-04 01:21:54
444Public safety / Computer network security / Crime prevention / Hacking / Cyberwarfare / Incident management / Computer security / International Multilateral Partnership Against Cyber Threats / Physical security / Security / Computer crimes / National security

Cybersecurity Unit Computer Crime & Intellectual Property Section Criminal Division U.S. Department of Justice 1301 New York Avenue, N.W., 6th Floor, Washington, D.C

Add to Reading List

Source URL: www.justice.gov

Language: English - Date: 2015-04-29 13:17:47
445Internet / Electronic warfare / Hacking / Military technology / Internet ethics / Network neutrality / Cyberwarfare / Mobile banking / Computer crime / Technology / Computer law / Computing

CYFY 2015 14th to 16th October VOLUME III ISSUE 5

Add to Reading List

Source URL: cyfy.org

Language: English - Date: 2015-05-12 02:15:49
4462600: The Hacker Quarterly / Kevin Mitnick / Hacking / Automated teller machine / Hacker / RSTS/E / Max Butler / Computing / Technology / Electronics

Offensive work and addiction Why offense is hard to contain ISACA Nordic Conference 2014 Keynote

Add to Reading List

Source URL: www.isaca.org

Language: English - Date: 2014-04-22 09:00:36
447Public safety / War / Electronic warfare / Hacking / Military technology / United States Department of Homeland Security / Computer security / International Multilateral Partnership Against Cyber Threats / Cyber-security regulation / Security / Cyberwarfare / Computer crimes

2013 Annual ACSC Conference Cyber Security Threat Sharing: A Roadmap for Collaborative Defense Charlie Benway

Add to Reading List

Source URL: www.acscenter.org

Language: English - Date: 2013-12-05 12:45:22
448Computing / Software testing / Hacking / Vulnerability / Full disclosure / CVSS / Responsible disclosure / Symantec / Patch / Computer security / Cyberwarfare / Computer network security

Responsible Vulnerability Disclosure Zoltán Précsényi Sr Manager Government Affairs EMEA Agenda 1

Add to Reading List

Source URL: resilience.enisa.europa.eu

Language: English - Date: 2015-05-18 07:32:13
449Computing / Software testing / Hacking / Software bugs / Vulnerability / Penetration test / Trojan horse / Flaw hypothesis methodology / JavaScript / Cyberwarfare / Computer network security / Computer security

A Taxonomy CARL of Computer E. LANDWEHR,

Add to Reading List

Source URL: www.landwehr.org

Language: English - Date: 2014-08-18 19:00:37
450Likelihood function / George Alfred Barnard / Probability / Statistical theory / Ian Hacking / Likelihood principle / Statistics / Estimation theory / Bayesian statistics

The British Society for the Philosophy of Science Review: Likelihood Author(s): Ian Hacking Reviewed work(s): Likelihood. An Account of the Statistical Concept of Likelihood and Its Application to

Add to Reading List

Source URL: www.phil.vt.edu

Language: English - Date: 2011-03-10 19:44:10
UPDATE