×
Log in
Upload File
Most Popular
Study
Business
Design
Technology
Travel
Explore all categories
The top documents tagged [attacker slide]
Detection, Prevention, and Containment: A Study of grsecurity Brad Spengler @grsecurity.net
224 views
Handball: Simple Security Tools for Handheld Devices Niklas Frykholm, Markus Jakobsson, Ari Juels LABORATORIES
222 views
The New Breed of Hacker Tools & Techniques Ed Skoudis VP, Security Strategy Predictive Systems
[email protected]
225 views
CWSP Guide to Wireless Security Passive Wireless Discovery
229 views
A Brief History of Distributed Denial of Service Attacks Uniforum Chicago August 22, 2000 Viki Navratilova Security Architect, BlueMeteor, Inc
221 views
© 2004 SafeNet, Inc. All rights reserved. Mobike Protocol Design draft-ietf-mobike-design-00.txt Tero Kivinen
[email protected]
214 views
© 2008 Security-Assessment.com 1 Time Based SQL Injection Presented by Muhaimin Dzulfakar
215 views
Law and Ethics for Security CS461/ECE422 Computer Security I Fall 2011
223 views
Mitigating Routing Misbehavior in Mobile Ad-Hoc Networks Reference: Mitigating Routing Misbehavior in Mobile Ad Hoc Networks, Sergio Marti, T.J. Giuli,
227 views
Black Hat Briefings 2000: Strategies for Defeating Distributed Attacks Simple Nomad Hacker Nomad Mobile Research Centre Occam Theorist RAZOR Security Team,
216 views
Resilient Dynamic Data Driven Application Systems (rDDDAS) Glynis Dsouza, Salim Hariri, Youssif Al Nashif University of Arizona Gabriel Rodriguez, University
214 views
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 11 – Buffer Overflow
237 views
Next >