finds you similar websites
auto-suggest    top sites

Apr 24th, 2024

16 Popular Sites Like http://www.cap-lore.com/C...

We have scanned through the internet and identified a lot of popular security and capabilities sites like this one. Stop on by and discover webpages that are related to this one.

Displaying 1 to 10 of 500 alternatives to http://www.cap-lore.com/CapTheory/i.... (Updated: Apr 24th, 2024)     [about these results]
Advanced Options
? Sort by:
popularity similarity
? Must Include:
? Cannot Include:
? Look For


 
You're looking for other sites like :
  Capability Theory by Sound Bytes
Abstraction Mechanisms for Access Control shows how capabilities are ... Mark Miller gives this Security Taxonomy, and his capabilities based language E. ...
http://www.cap-lore.com/CapTheory/index.html
popularity:
security
capabilities
os
research
capability
papers
software
programming
theory
transaction
new search by a custom tag signature
  Norman Hardy
Subsections on [ Software, Hardware, Networks, code and algorithms, ... This site was once at "http://www.mediacity.com/~norm/". Now alias http://goo.gl/igNy. ...
similarity:
popularity:
security
capabilities
cs
people
capability
page.personal
theory
research
programming
trust
  Coyotos Secure Operating System
No information avaiable
similarity:
popularity:
os
security
microkernel
programming
kernel
research
software
eros
coyotos
capabilities
  Main Page - OWASP
Developing software tools and knowledge based documentation that helps people secure web applications and web services.
similarity:
popularity:
security
web
programming
opensource
development
hacking
internet
application
webdev
software
  Welcome to iDefense Labs -- Managed Security Services and Information Security for Government and Fortune 500 Organizations // iDefense Labs
VeriSign iDefense services deliver comprehensive, actionable intelligence regarding network-based security threats and vulnerabilities which can help organizations ...
similarity:
popularity:
security
research
hacking
software
infosec
reference
internet
utilities
programming
idefense
  CWE - Common Weakness Enumeration
Common Weakness Enumeration (CWE) is a list of software weaknesses. ... cwe@mitre.org. International in scope and free for public use, CWE™ provides a unified, measurable set of ...
similarity:
popularity:
security
programming
software
reference
development
vulnerabilities
testing
vulnerability
research
dictionary
  CWE - Common Weakness Enumeration
Common Weakness Enumeration (CWE) is a list of software weaknesses. ... cwe@mitre.org ... Contact cwe@mitre.org for more information. ...
similarity:
popularity:
security
programming
software
reference
development
vulnerabilities
testing
vulnerability
research
dictionary
  The Art of Software Security Assessment
Continued ramblings on software security and code auditing ... I always find these types of bugs interesting because they require such unique ...
similarity:
popularity:
security
blog
programming
software
auditing
code
books
research
blogs
book
  OWASP - Home
Developing software tools and knowledge based documentation that helps people secure web applications and web services.
similarity:
popularity:
security
web
programming
opensource
development
webdev
reference
software
application
internet
  The Honeynet Project
Group of security professionals dedicated to learning the tools, tactics, and motives of the blackhat community and sharing those lessons learned.
similarity:
popularity:
security
honeypot
network
hacking
tools
honeynet
research
software
opensource
forensics
  DoxPara Research
Features Paketto Keiretsu: a set of utilities for doing odd things to TCP/IP networks by "stretching the protocols ... Staring Into The Abyss dan@doxpara.com ... (such as www.doxpara.com) to numbers the ...
similarity:
popularity:
security
dns
hacking
blog
network
research
internet
software
tools
vulnerability
1 2 3 4 5 ... 50 next >
Sorting Results
  • This slider determines how the matched sites are sorted.
  • If you want to see the most popular sites that are somewhat related to your search, slide this more towards "popularity."
  • If you want to see the sites that best matched your search, regardless of popularity, slide this towards "similarity."
Must Include Tags
  • Matched sites will not be shown unless they have all of the tags on this list.
  • This feature is useful for when you require a site to have been tagged as something.
  • To add a tag to this list, click "add tag" or click on any tag in a result.
Must Not Include Tags
  • Matched sites that have any tag on this list will not be shown.
  • This feature is useful for filtering out results that have tags you are absolutely not interested in.
  • To add a tag to this list, click "add tag" or click on any tag in a result.
Types of Results
  • This option lets you specify the types of sites to show.
  • If you want to only see domains (www..com), select "domains only."
  • If you want to only see articles (www..com/something/here), select "articles only."
  • If you don't care, or care so much about both, select "Both".
About The Results
an example search result
How moreofit Searches
Each website has a unique tag signature -- a set of words that users have described the website as. Moreofit searches for websites that have similar tag signatures and displays the results.
1: Similarity
A site's "similarity" is determined by how well its tag signature matches the tag signature that is being searched for. A 100% match means that it has the exact same tags in the exact same order, while a 0% match means it has no tags in common.
2: Popularity
The popularity of a website is, well, pretty much self explanatory.
3: Tag Signature
The tag signatures show how a site is described. The deeper the color of the tag, the more frequently the website is tagged as this. Tags underlined blue denote a tag that is in common with the search's tag signature.