Hacking

Results: 3953



#Item
801Computer network security / Malware / Software testing / Zero-day attack / Vulnerability / FireEye /  Inc. / Operation Aurora / Exploit / Targeted threat / Computer security / Cyberwarfare / Hacking

WHITE PAPER LESS THAN ZERO: A Survey of Zero-day Attacks in 2013 and What They Say About the Traditional Security Model

Add to Reading List

Source URL: www.fireeye.jp

Language: English - Date: 2015-04-30 23:03:41
802Web 2.0 / Public safety / Crime in the United Kingdom / Hacking / First aid / In case of emergency / Windows Mobile

Glenmore State High School

Add to Reading List

Source URL: glenmoreshs.eq.edu.au

Language: English
803Computer network security / Hacking / Software testing / Cross-site scripting / Web application security / SQL injection / Vulnerability / Port scanner / Application security / Computer security / Cyberwarfare / Computing

Acunetix Web Vulnerability Scanner

Add to Reading List

Source URL: www.acunetix.com

Language: English - Date: 2014-10-01 13:06:52
804Hacking / Software testing / Computer network security / Vulnerability / Software bug / Malware / McAfee / Application security / Cyberwarfare / Computer security / Security

Building an Effective Application Security Practice on a Shoestring Budget John Viega David Coffey

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2014-12-16 19:06:37
805Computing / Hacking / Software testing / Vulnerability / Operating system / Firewall / Windows / Network security / Application firewall / Computer security / Cyberwarfare / Computer network security

Justifying Security Spending

Add to Reading List

Source URL: www.e-cop.net

Language: English - Date: 2011-04-26 10:48:18
806Data management / Computing / Rete algorithm / Distributed data storage / Query optimizer / SQL

Hacking the Query Planner Tom Lane Red Hat PGCon 2011

Add to Reading List

Source URL: www.pgcon.org

Language: English - Date: 2015-02-05 12:25:05
807Internet radio / Internet television / Streaming / Webcast / Web conferencing / Hacker / Malware / Black hat / Internet / Internet culture / Computing / Hacking

Sponsorship Opportunities Black Hat Webcast Series Reach A Passionate Audience Black Hat Webcasts focus on the most relevant and intriguing issues facing today’s security

Add to Reading List

Source URL: blackhat.com

Language: English - Date: 2014-12-16 19:06:13
808

http://www.seeweb.com Regolamento Seeweb Hacking Contest: Blackout Resurrection 1. Cosa fare per partecipare? Per partecipare basterà lasciare il proprio nome, cognome e contatto email nell’apposito fo

Add to Reading List

Source URL: blog.seeweb.it

Language: Italian - Date: 2015-04-09 04:05:07
    809Hacking / Hacker / Jargon File / Eric S. Raymond / The Hacker Ethic / Hacker Emblem / Computing / Electronics / Hacker ethic

    The hacker ethic, openness, and sustainability Jorge Luis Zapico Centre for Sustainable Communications, KTH, Stockholm. http://jorge.zapi.co @zapico Sustainability is a normative concept, building on ideas

    Add to Reading List

    Source URL: www.diva-portal.org

    Language: English - Date: 2013-07-08 05:13:58
    810Computing / Data security / McAfee / Hacking / Firewall / DMZ / Exploit / Vulnerability / Computer security / Computer network security / Cyberwarfare

    ! !NEXT!GENERATION!FIREWALL!PRODUCT!ANALYSIS!! ! ! McAfee!NGF81402!v5.7.1!!

    Add to Reading List

    Source URL: www.mcafee.com

    Language: English - Date: 2014-09-22 11:28:54
    UPDATE