Search results

Jump to navigation Jump to search
Results 1 – 21 of 3,845
Advanced search

Search in namespaces:

View (previous 20 | ) (20 | 50 | 100 | 250 | 500)
  • | name = Out of the Inner Circle: A Hacker's Guide to Computer Security ...it does show what brought on many of the current trends we see in network security today.<ref>{{Cite web |last=Friedland |first=Nat |date=September 1985 |titl ...
    1 KB (190 words) - 22:18, 23 January 2025
  • ...ter science]] textbooks on [[operating systems]], [[computer networks]], [[computer organization]], and [[cryptography]]. ...in electrical engineering from [[University of Notre Dame]] and his PhD in computer science from [[Massachusetts Institute of Technology]].<ref>{{Cite web|url= ...
    3 KB (322 words) - 15:56, 8 June 2022
  • {{Short description|Computer security specialist}} ...igence]] company and a Security Strategist with [[netForensics]], a U.S. [[Security information management]] company. ...
    3 KB (409 words) - 03:20, 19 June 2024
  • '''movemail''' is a [[computer program]] by the [[GNU Project]] that moves [[email|mail]] from a user's [[ ...[Unix security|security]].<ref>''[[The UNIX-HATERS Handbook]]'', 1994, IDG Books Worldwide, San Mateo, CA, USA, pp. 246-7</ref> ...
    1 KB (164 words) - 22:24, 23 December 2019
  • ...ng: the art of exploitation|series=No Starch Press Series|publisher=Safari Books Online|first=Jon|last=Erickson|edition=2, illustrated|year=2008|ISBN= 978-1 {{security-software-stub}} ...
    1 KB (138 words) - 02:39, 24 November 2022
  • '''Coloured Books''' may refer to: * [[Rainbow Books]], a set of standards defining the formats for [[compact discs]] ...
    417 bytes (58 words) - 18:12, 21 January 2021
  • * [[Full disclosure (computer security)]], in computer security the practice of publishing analysis of software vulnerabilities as early as * [[Full Disclosure (mailing list)]], a mailing list about computer security ...
    2 KB (260 words) - 00:37, 26 June 2024
  • ...e [[Johnsburg,_Illinois]]-based network security consulting firm, Bad Wolf Security. ...curity+%22Tom+Liston%22&pg=PA224 |title=Mac OS X maximum security – Google Books |isbn=9780672323812 |access-date=May 10, 2010|last1=Ray |first1=John |last2 ...
    2 KB (308 words) - 13:31, 20 December 2023
  • ...tion and defence as well as being a media pundit and author on information security topics. He advised the UK Parliament on the [[Investigatory Powers Act, 201 ...1990, the [[Parliament of the United Kingdom|UK Parliament]] passed the [[Computer Misuse Act]]. Publication of additional editions might have been construed ...
    2 KB (345 words) - 20:55, 14 June 2023
  • |genre = [[Social engineering (security)|Social engineering]] ...examples of how social engineering can be combined with [[hacker (computer security)|hacking]]. ...
    3 KB (436 words) - 02:30, 24 July 2024
  • * [[Happy Computers]], an American computer hardware manufacturer * [[Home Computer Initiative]], a United Kingdom government programme to increase computers u ...
    2 KB (205 words) - 08:41, 14 March 2025
  • {{Short description|American computer scientist}} | field = [[Computer virus|Computer virology]] ...
    4 KB (600 words) - 11:41, 12 June 2025
  • ==Books and comics== ==Computer and video games== ...
    2 KB (248 words) - 18:01, 8 March 2025
  • ...01}}<br />- {{cite news |author=Scott McLemee |url=https://www.nytimes.com/books/first/l/levy-crypto.html |title=Decoder Ring — How a ragged band broke the * [[Books on cryptography]] ...
    2 KB (279 words) - 02:12, 4 January 2025
  • {{Short description|Information security website}} | type = [[Computer security]] ...
    7 KB (906 words) - 03:49, 12 January 2025
  • {{short description|American computer scientist}} ...] course. The author of two books, ''Developing Trust: Online Privacy and Security'' and ''[[Brute Force: Cracking the Data Encryption Standard]]''. ...
    2 KB (252 words) - 18:25, 29 April 2024
  • | publisher = [[Del Rey Books]] ...ert in computer and network security with a traditional [[Hacker (computer security)|hacker]] personality named Derek Vandeveer. His life irrevocably changes ...
    3 KB (482 words) - 21:40, 29 March 2025
  • ...ierson's Puppeteer)]], an alien character in Larry Niven's ''Known Space'' books * Nessus, one of the moons of the fictional planet Chiron in the computer game ''[[Sid Meier's Alpha Centauri]]'' ...
    1 KB (164 words) - 09:08, 21 August 2025
  • ...rn 1946) is notable for being one of the targets in the [[Hacker (computer security)|hacking scene]] during the 1990s. ...ing that they are inaccurate and generally misrepresent [[hacker (computer security)|hacking]].<ref>https://web.archive.org/web/20161001180822/http://attrition ...
    3 KB (462 words) - 23:22, 25 March 2024
  • ...sses individual and organizational decisions and behaviors with respect to security and privacy as market decisions. ...cs addresses not only this question, but also inform design decisions in [[security engineering]]. ...
    8 KB (1,103 words) - 04:35, 28 May 2025
View (previous 20 | ) (20 | 50 | 100 | 250 | 500)