Hacking

Results: 3953



#Item
931Computer security / Hacking / Crime prevention / National security / Network security / Vulnerability / Information security / Hacker / Internet security / Computing / Computer network security / Security

Justifying Security Spending

Add to Reading List

Source URL: www.e-cop.net

Language: English - Date: 2011-04-26 10:49:02
932Hacking / Military technology / Financial adviser / Internet privacy / Technology / Finance / Cyberwarfare / Electronic warfare

ARE YOU PROTECTING THE ENTIRE FIRM? by Ryan Boysen and Eugene Grygo

Add to Reading List

Source URL: www.eci.com

Language: English - Date: 2014-10-07 16:27:08
933Software / Internet / Connection string / Databases / String / Lightweight Directory Access Protocol / Password / Google hacking / Oracle Database / Computing / Internet protocols / Internet standards

Microsoft PowerPoint - CSPP_EN[1].pptx

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2014-12-16 19:06:24
934Leveson Inquiry / Operation Motorman / Privacy / Operation Glade / Leveson / News of the World / History of the United Kingdom / Politics of the United Kingdom / Phone hacking scandal reference lists / United Kingdom / News International phone hacking scandal / Ethics

The Leveson Inquiry culture, practices and ethics of the press

Add to Reading List

Source URL: webarchive.nationalarchives.gov.uk

Language: English
935Computer security / Security / Hacking / National security / Vulnerability / Malware / Cyberterrorism / Network security / International Multilateral Partnership Against Cyber Threats / Computer crimes / Cyberwarfare / Computer network security

Cybercrime: Threats and Solutions MARK JOHNSON PUBLISHED BY Contents

Add to Reading List

Source URL: www.finanstilsynet.no

Language: English - Date: 2015-01-28 05:06:12
936Software testing / Computing / Computer network security / Attack patterns / Vulnerability / Application security / Exploit / Buffer overflow / SQL injection / Cyberwarfare / Computer security / Hacking

Attack Patterns as a Knowledge Resource for Building Secure Software Sean Barnum Amit Sethi

Add to Reading List

Source URL: capec.mitre.org

Language: English - Date: 2007-03-13 14:59:22
937Military / War / Hacking / Military technology / Cyber / Internet-related prefixes / U.S. Department of Defense Strategy for Operating in Cyberspace / United States Cyber Command / Military science / Electronic warfare / Cyberwarfare

Cyber Primer Cyber Primer The Cyber Primer, dated December 2013, is promulgated as directed by the Joint Force Commander and Chiefs of Staff

Add to Reading List

Source URL: www.gov.uk

Language: English - Date: 2014-10-03 13:18:11
938Hacking / Military technology / Public safety / War / Computer security / United States Department of Homeland Security / Cyber-security regulation / Department of Defense Strategy for Operating in Cyberspace / Security / Cyberwarfare / Electronic warfare

MarchMichigan Cyber Initiative Newsletter Articles of Interest Investing in Endpoint Security

Add to Reading List

Source URL: www.michigan.gov

Language: English - Date: 2015-03-02 12:07:01
939Electronic warfare / War / Hacking / Military technology / United States Cyber Command / Cyber Operations / United Nations Institute for Disarmament Research / Cooperative Cyber Defence Centre of Excellence / Cyberwarfare in the United States / Cyberwarfare / Military science / Military

National Capabilities, Doctrine, Organization and Building Transparency and Confidence for Cyber Security: An Assessment With the development of the Internet as a global infrastructure for business and as a new tool for

Add to Reading List

Source URL: www.unidir.org

Language: English - Date: 2013-07-31 05:18:35
940Computer network security / Cyberwarfare / Security / Software quality / National security / Attack patterns / Software assurance / Vulnerability / Penetration test / Software testing / Computer security / Hacking

An Introduction to Attack Patterns as a Software Assurance Knowledge Resource OMG Software Assurance Workshop 2007

Add to Reading List

Source URL: capec.mitre.org

Language: English - Date: 2007-03-13 14:59:21
UPDATE