Norman Hardy
Subsections on [ Software, Hardware, Networks, code and algorithms, ... This site was once at "http://www.mediacity.com/~norm/". Now alias http://goo.gl/igNy. ...
http://www.cap-lore.com/index.html
popularity:
security
capabilities
cs
people
capability
page.personal
theory
research
programming
trust
|
PHPIDS » Web Application Security 2.0
Welcome to php-ids.org - here you can find a collection of resources relating to PHPIDS including files, documentation, a friendly forum and a cool demo that shows ...
similarity:
popularity:
php
security
ids
programming
web
development
xss
software
tools
hacking
|
invisiblethings' blog
VM escapes, hypervisor compromises (via "classic" rootkits, as well as Bluepill ... The training offers quite a unique chance, I think, to absorb the results of 1 ...
similarity:
popularity:
security
blog
hacking
blogs
malware
rootkits
research
virtualization
hack
software
|
Hack the planets
fscked.org. Taking up space in censorship filters since 1999 ... Farewell to Riverbed (So long and thanks for all the bits!) CookieMonster Available for ...
similarity:
popularity:
security
hacks
software
hacking
blogs
people
programming
tor
python
blog
|
Category:OWASP Top Ten Project - OWASP
No information avaiable
similarity:
popularity:
security
web
owasp
programming
development
software
hacking
php
webdev
top10
|
Shadowserver Foundation - Main - HomePage
No information avaiable
similarity:
popularity:
security
research
botnet
hacking
news
malware
botnets
statistics
reference
tools
|
Peter Norvig
Artificial intelligence, agents, lisp, object-oriented programming.
similarity:
popularity:
programming
ai
google
lisp
python
people
blog
java
research
norvig
|
Shadowserver Foundation - Main - HomePage
We are comprised of volunteer security professionals from around the world. ... 09.06.2010: Shadowserver Sinkholing domain associated with SQLi attacks on IIS ...
similarity:
popularity:
security
research
internet
botnets
botnet
reference
malware
computer
hacking
network
|
Logical Methods in Computer Science
The complexity of global cardinality constraints. Andrei A. Bulatov ... Tree Languages Defined in First-Order Logic with One Quantifier Alternation ...
similarity:
popularity:
logic
journal
research
programming
cs
theory
computer
science
math
online
|
Fefes Homepage
You can send email to web@fefe.de. Please use my GnuPG key. News ... If you like the software on fefe.de, you should also look at the web sites from Dan ...
similarity:
popularity:
programming
linux
people
software
security
code
development
network
blog
hacking
|
Ruby on Rails Security Project — Exploring the Security of Rails and friends.
The Ruby on Rails Security Project wants to make Rails (applications) more secure. ... We have a free book, interesting links and a Rails Security Guide for ...
similarity:
popularity:
security
rails
rubyonrails
ruby
blog
programming
development
web
mysql
ror
|