×
Log in
Upload File
Most Popular
Study
Business
Design
Technology
Travel
Explore all categories
The top documents tagged [attacker slide]
Detection, Prevention, and Containment: A Study of grsecurity Brad Spengler @grsecurity.net
226 views
Handball: Simple Security Tools for Handheld Devices Niklas Frykholm, Markus Jakobsson, Ari Juels LABORATORIES
223 views
The New Breed of Hacker Tools & Techniques Ed Skoudis VP, Security Strategy Predictive Systems
[email protected]
225 views
CWSP Guide to Wireless Security Passive Wireless Discovery
233 views
A Brief History of Distributed Denial of Service Attacks Uniforum Chicago August 22, 2000 Viki Navratilova Security Architect, BlueMeteor, Inc
223 views
© 2004 SafeNet, Inc. All rights reserved. Mobike Protocol Design draft-ietf-mobike-design-00.txt Tero Kivinen
[email protected]
214 views
© 2008 Security-Assessment.com 1 Time Based SQL Injection Presented by Muhaimin Dzulfakar
218 views
Law and Ethics for Security CS461/ECE422 Computer Security I Fall 2011
224 views
Mitigating Routing Misbehavior in Mobile Ad-Hoc Networks Reference: Mitigating Routing Misbehavior in Mobile Ad Hoc Networks, Sergio Marti, T.J. Giuli,
229 views
Black Hat Briefings 2000: Strategies for Defeating Distributed Attacks Simple Nomad Hacker Nomad Mobile Research Centre Occam Theorist RAZOR Security Team,
215 views
Resilient Dynamic Data Driven Application Systems (rDDDAS) Glynis Dsouza, Salim Hariri, Youssif Al Nashif University of Arizona Gabriel Rodriguez, University
218 views
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 11 – Buffer Overflow
241 views
Next >