Search results
Jump to navigation
Jump to search
- #REDIRECT [[Computer security conference#Hacker conferences]] ...61 bytes (6 words) - 13:05, 8 June 2011
- #REDIRECT [[Computer security conference#Hacker conferences]] ...61 bytes (6 words) - 13:05, 8 June 2011
- ...ryptographic research, to educate students at postgraduate levels, to host conferences and research visits, and to partner with various industries. It was offici ...e|Computer Science]], [[Electrical and computer engineering|Electrical and Computer Engineering]], and Pure [[Mathematics|Math]]. It does not have a physical ...2 KB (244 words) - 20:42, 18 April 2019
- ...dvisory Council]], a non-profit organization formed to rate the content of computer games * [[RSA Conference]], a series of computer data security conferences and the organization running them ...818 bytes (106 words) - 18:13, 22 October 2019
- ...n [[Houston, Texas]], sponsored by [[Drunkfux]] and the [[Hacker (computer security)|hacker]] [[online magazine|ezine]] [[Cult of the Dead Cow]]. The fourth an All together, there were five conferences.<ref name="Menn2019">{{cite book | author = Joseph Menn | date = 2019 | ti ...2 KB (273 words) - 21:23, 13 March 2023
- ...S also publishes announcements and Calls for Papers from various technical conferences, and technical book reviews (usually by [[Robert Slade|Rob Slade]], though ...[[system administrator]]s, and [[computer security]] managers, as well as computer scientists and [[engineer]]s. ...3 KB (348 words) - 17:39, 15 March 2025
- ...g/3-0-Projects.html |title=Projects ° EICAR - European Expert Group for IT-Security |access-date=2017-08-16 |archive-url=https://web.archive.org/web/2018060201 ...AR" as a self-standing name, as it has expanded into a broader range of IT Security work than just antivirus research.<ref>{{cite web|title=About EICAR|url=htt ...4 KB (468 words) - 13:55, 26 December 2024
- ...025|reason=The list needs to be brought up to date with modern and notable conferences.}} ...ly conferences with separate articles are included; within each field, the conferences are listed alphabetically by their short names. ...14 KB (1,729 words) - 07:06, 30 June 2025
- The '''Department of Computer Science''' ({{langx|sk|Katedra informatiky}}) is a department of the [[Fac ...anguages, computational complexity, discrete mathematics, cryptology, data security and others. ...4 KB (518 words) - 05:57, 13 June 2025
- | name = Australian Information Security Association | focus = Information Security, Privacy, Information Risk and Auditing ...7 KB (988 words) - 12:35, 16 May 2025
- ...s]] software like [[dSniff]] and safe against [[Shoulder surfing (computer security)|shoulder surfing]]. OPIE can improve security when accessing online banking at conferences, hotels and airports. Some countries require banks to implement OTP. ...2 KB (267 words) - 10:09, 16 October 2024
- {{Short description|Russian computer security specialist (born 1977)}} ...ity]] protection techniques such as [[privilege separation]] for [[daemon (computer software)|daemon]] processes. ...3 KB (467 words) - 18:42, 6 January 2025
- {{Short description|British computer security consultant (born 1963)}} ...ity]] and training banks, large companies and universities in the UK on IT security. In 2014 he began developing the software on which SecuritySmart runs from ...5 KB (765 words) - 19:40, 6 January 2025
- {{Short description|American network security expert (born 1977)}} ...r of the [[Honeynet project|Honeynet Project]] and was Vice President of [[Computer Professionals for Social Responsibility]]. ...6 KB (768 words) - 18:53, 6 June 2025
- {{Short description|American computer security expert}} | occupation = Computer hacker/security expert ...5 KB (676 words) - 19:30, 5 March 2025
- ...omputer programs, rather than products.<ref>{{cite web |title= Information Security News - CodeCon 2009 Call for Presentations |url= http://seclists.org/isn/20 Later conferences have included discussions on [[Peer-to-peer|P2P]], and the [[Helios voting ...4 KB (513 words) - 03:22, 5 May 2025
- ...advice. Topics include [[Computer security|security]], installation, and [[Computer network|networking]]. Currently available forums fall into the following ca ...n having either a stall or presence at [[:Category:Linux conferences|Linux conferences]] or expositions. These are primarily in the [[United States]], but have al ...3 KB (456 words) - 17:59, 25 May 2024
- ...sses individual and organizational decisions and behaviors with respect to security and privacy as market decisions. ...cs addresses not only this question, but also inform design decisions in [[security engineering]]. ...8 KB (1,103 words) - 04:35, 28 May 2025
- {{Short description|American computer security expert (born 1976)}} ...ius''', is an American [[computer security]] expert and [[Hacker (computer security)|hacker]]. ...6 KB (821 words) - 22:15, 3 May 2025
- | discipline = [[Theoretical computer science]] ...y [[Springer Science+Business Media|Springer]] in their [[Lecture Notes in Computer Science]], but beginning in 2016 they are instead published by the [[Leibni ...7 KB (878 words) - 11:21, 9 September 2024