×
Log in
Upload File
Most Popular
Study
Business
Design
Technology
Travel
Explore all categories
The top documents tagged [attack code]
Cisco CCNA Security
847 views
Cp3201 mobile security final
112 views
Cross-Site-Scripting Attack and Protection Mechanisms Author: EUROSEC GmbH Chiffriertechnik & Sicherheit Tel: 06173 / 60850, © EUROSEC
222 views
Flexible Hardware Acceleration for Instruction-Grain Program Monitoring Joint work with Michael Kozuch 1, Theodoros Strigkos 2, Babak Falsafi 3, Phillip
215 views
Lagner (2013 nov) stuxnet to kill-a-centrifuge
415 views
Dmk bo2 k8_bh_fed
2.690 views
Advanced Persistent Threat (APT) Life Cycle Management
439 views
Intrusions. Disclaimer Some techniques and tools mentioned in this class could be: – Illegal to use – Dangerous for others – they can crash machines and
214 views
CMSC 426/626: Secure Coding Krishna M. Sivalingam Sources: From Secure Coding, Mark and van Wyk, O’Reilly, 2003
218 views
Lecture 9: Buffer Ovefflows and ROP EEN 312: Processors: Hardware, Software, and Interfacing Department of Electrical and Computer Engineering Spring 2014,
216 views
A Low Overhead Hardware Technique for Software Integrity and Confidentiality Austin Rogers §, Milena Milenković ‡, Aleksandar Milenković § Dynetics Inc.,
213 views
1 Application Security: Electronic Commerce and E-Mail Chapter 9 Copyright 2003 Prentice-Hall
215 views
Next >