Overflow

Results: 1424



#Item
191Security / Risk / Software testing / CVSS / Hacking / Vulnerability / Exploit / Buffer overflow / Social vulnerability / Cyberwarfare / Computer security / Computer network security

CVSS v3.0 Preview 2: Metrics / Formula / Examples FIRST.ORG December 2014 Introduction .....................................................................................................................................

Add to Reading List

Source URL: www.first.org

Language: English
192Environment / Civil engineering / Public health / Sanitary sewer overflow / Sanitary sewer / Sewer / Sanitation / Sewage / Wastewater / Sewerage / Water pollution / Environmental engineering

[Public Entity] Sanitary Sewer Management Plan

Add to Reading List

Source URL: deq.utah.gov

Language: English - Date: 2015-04-13 15:00:26
193Civil engineering / Earth / Combined sewer / Sanitary sewer / Sewer / Storm drain / Stormwater / Sanitation / Sewage treatment / Water pollution / Environmental engineering / Environment

Kansas City’s Overflow Control Program Kansas City Water Services Water

Add to Reading List

Source URL: www.kcwaterservices.org

Language: English - Date: 2013-09-19 16:40:50
194Microsoft SQL Server / Stack buffer overflow / Circular buffer / Ip / SQL / ATS / X-Forwarded-For / Integer / Library / Computing / Software engineering / Relational database management systems

David Litchfield Database Security - The Pot and the Kettle This talk will examine the database server offerings from both Microsoft and Oracle and show that, regardless of certification, market campaigns and slurs, each

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2014-12-16 19:06:21
195Network architecture / Internet standards / Telnet / Transmission Control Protocol / Portmap / Secure Shell / Port / Ident / Netstat / Internet protocols / Computing / Internet

Lecture 21: Buffer Overflow Attack Lecture Notes on “Computer and Network Security” by Avi Kak () April 2, 2015 3:58pm

Add to Reading List

Source URL: engineering.purdue.edu

Language: English - Date: 2015-04-02 15:59:28
196Software bugs / X86 architecture / Computer programming / Assembly languages / Computer errors / MOV / Buffer overflow / Shellcode / Stack buffer overflow / Computing / X86 instructions / Software engineering

Variations in Exploit methods between Linux and Windows David Litchfieldth July 2003 This paper will examine the differences and commonality in the way a vulnerability common to both Windows a

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2015-05-28 15:51:39
197Urinary system / Urology / Urinary incontinence / Stress incontinence / Urge incontinence / Overflow incontinence / Urination / Urinary retention / Urinary bladder / Medicine / Anatomy / Incontinence

Urinary Incontinence What is urinary incontinence? Urinary incontinence is uncontrollable leaking of urine from the bladder. Urinary incontinence becomes more common as people get older. It is an embarrassing problem fo

Add to Reading List

Source URL: www.promotingexcellence.org

Language: English - Date: 2009-11-09 18:41:18
198Science / Application software / OpenFOAM / CFX / Ansys / Contract for difference / Overflow / Computer-aided engineering / Fluid dynamics / Computational fluid dynamics / Computational science

SummerPointwise Flexibility Saves Time Pointwise writes native files for ANSYS FLUENT®, ANSYS CFX®, STAR-CCM+®, OpenFOAM® and many other CFD packages. This includes both grid and boundary conditions. You can b

Add to Reading List

Source URL: www.pointwise.com

Language: English - Date: 2011-10-05 21:48:24
199Computing / Hacking / Software testing / Alert correlation / Attack / Alert messaging / Buffer overflow / Vulnerability / Denial-of-service attack / Cyberwarfare / Computer security / Computer network security

Techniques and Tools for Analyzing Intrusion Alerts PENG NING, YUN CUI, DOUGLAS S. REEVES, and DINGBANG XU North Carolina State University Traditional intrusion detection systems (IDSs) focus on low-level attacks or anom

Add to Reading List

Source URL: discovery.csc.ncsu.edu

Language: English - Date: 2011-11-09 13:26:18
200Seattle / Washington / Geography of the United States / Open Travel Alliance / Starwood Hotels and Resorts Worldwide / Hotel

2015 National Migrant Education Conference Overflow Hotel Information Due to the overwhelming popularity of the upcoming National Migrant Education Conference in Seattle, we have been selling out of contracted Hotel Room

Add to Reading List

Source URL: nasdme.org

Language: English - Date: 2015-02-03 18:06:48
UPDATE