×
Log in
Upload File
Most Popular
Art & Photos
Automotive
Business
Career
Design
Education
Hi-Tech
+ Browse for More
The top documents tagged [known exploit]
Documents
How to build a safe NFC validating system Matteo Collura (Eagle1753) & Matteo Beccaro (bughardy)
[email protected]
-
[email protected]
215 views
Documents
ROP is Still Dangerous: Breaking Modern Defenses Nicholas Carlini et. al University of California, Berkeley USENIX Security 2014 Presenter: Yue Li Part
220 views
Technology
Careto: Unmasking a New Level in APT-ware
809 views
Technology
Khoo
245 views
News & Politics
Hannibal
373 views
Documents
Exploiting Cisco Infrastructure 607
260 views
Documents
Home Computer Security and Privacy: Part One a presentation by Patrick Douglas Crispen Faculty Development Center California State University, Fullerton
219 views
Documents
Stuxnet – Getting to the target Liam O Murchu Operations Manager, Symantec Security Response 1 Feb 2011
215 views
Documents
By: Razieh Rezaei Saleh. Security Evaluation The examination of a system to determine its degree of compliance with a stated security model, security
217 views
Documents
Exploits Against Software and How To Avoid Them Nicolas T. Courtois - University College of London
219 views
Documents
Home Computer Security and Privacy: Firewalls and Exploit Management
228 views
Documents
Common Cyber Defenses Tom Chothia Computer Security, Lecture 18
219 views
Next >