Search results

Jump to navigation Jump to search
Results 1 – 21 of 651
Advanced search

Search in namespaces:

View (previous 20 | ) (20 | 50 | 100 | 250 | 500)
  • #REDIRECT [[Computer security conference#Hacker conferences]] ...
    61 bytes (6 words) - 13:05, 8 June 2011
  • #REDIRECT [[Computer security conference#Hacker conferences]] ...
    61 bytes (6 words) - 13:05, 8 June 2011
  • ...ryptographic research, to educate students at postgraduate levels, to host conferences and research visits, and to partner with various industries. It was offici ...e|Computer Science]], [[Electrical and computer engineering|Electrical and Computer Engineering]], and Pure [[Mathematics|Math]]. It does not have a physical ...
    2 KB (244 words) - 20:42, 18 April 2019
  • ...dvisory Council]], a non-profit organization formed to rate the content of computer games * [[RSA Conference]], a series of computer data security conferences and the organization running them ...
    818 bytes (106 words) - 18:13, 22 October 2019
  • ...n [[Houston, Texas]], sponsored by [[Drunkfux]] and the [[Hacker (computer security)|hacker]] [[online magazine|ezine]] [[Cult of the Dead Cow]]. The fourth an All together, there were five conferences.<ref name="Menn2019">{{cite book | author = Joseph Menn | date = 2019 | ti ...
    2 KB (273 words) - 21:23, 13 March 2023
  • ...S also publishes announcements and Calls for Papers from various technical conferences, and technical book reviews (usually by [[Robert Slade|Rob Slade]], though ...[[system administrator]]s, and [[computer security]] managers, as well as computer scientists and [[engineer]]s. ...
    3 KB (348 words) - 17:39, 15 March 2025
  • ...g/3-0-Projects.html |title=Projects ° EICAR - European Expert Group for IT-Security |access-date=2017-08-16 |archive-url=https://web.archive.org/web/2018060201 ...AR" as a self-standing name, as it has expanded into a broader range of IT Security work than just antivirus research.<ref>{{cite web|title=About EICAR|url=htt ...
    4 KB (468 words) - 13:55, 26 December 2024
  • ...025|reason=The list needs to be brought up to date with modern and notable conferences.}} ...ly conferences with separate articles are included; within each field, the conferences are listed alphabetically by their short names. ...
    14 KB (1,729 words) - 07:06, 30 June 2025
  • The '''Department of Computer Science''' ({{langx|sk|Katedra informatiky}}) is a department of the [[Fac ...anguages, computational complexity, discrete mathematics, cryptology, data security and others. ...
    4 KB (518 words) - 05:57, 13 June 2025
  • | name = Australian Information Security Association | focus = Information Security, Privacy, Information Risk and Auditing ...
    7 KB (988 words) - 12:35, 16 May 2025
  • ...s]] software like [[dSniff]] and safe against [[Shoulder surfing (computer security)|shoulder surfing]]. OPIE can improve security when accessing online banking at conferences, hotels and airports. Some countries require banks to implement OTP. ...
    2 KB (267 words) - 10:09, 16 October 2024
  • {{Short description|Russian computer security specialist (born 1977)}} ...ity]] protection techniques such as [[privilege separation]] for [[daemon (computer software)|daemon]] processes. ...
    3 KB (467 words) - 18:42, 6 January 2025
  • {{Short description|British computer security consultant (born 1963)}} ...ity]] and training banks, large companies and universities in the UK on IT security. In 2014 he began developing the software on which SecuritySmart runs from ...
    5 KB (765 words) - 19:40, 6 January 2025
  • {{Short description|American network security expert (born 1977)}} ...r of the [[Honeynet project|Honeynet Project]] and was Vice President of [[Computer Professionals for Social Responsibility]]. ...
    6 KB (768 words) - 18:53, 6 June 2025
  • {{Short description|American computer security expert}} | occupation = Computer hacker/security expert ...
    5 KB (676 words) - 19:30, 5 March 2025
  • ...omputer programs, rather than products.<ref>{{cite web |title= Information Security News - CodeCon 2009 Call for Presentations |url= http://seclists.org/isn/20 Later conferences have included discussions on [[Peer-to-peer|P2P]], and the [[Helios voting ...
    4 KB (513 words) - 03:22, 5 May 2025
  • ...advice. Topics include [[Computer security|security]], installation, and [[Computer network|networking]]. Currently available forums fall into the following ca ...n having either a stall or presence at [[:Category:Linux conferences|Linux conferences]] or expositions. These are primarily in the [[United States]], but have al ...
    3 KB (456 words) - 17:59, 25 May 2024
  • ...sses individual and organizational decisions and behaviors with respect to security and privacy as market decisions. ...cs addresses not only this question, but also inform design decisions in [[security engineering]]. ...
    8 KB (1,103 words) - 04:35, 28 May 2025
  • {{Short description|American computer security expert (born 1976)}} ...ius''', is an American [[computer security]] expert and [[Hacker (computer security)|hacker]]. ...
    6 KB (821 words) - 22:15, 3 May 2025
  • | discipline = [[Theoretical computer science]] ...y [[Springer Science+Business Media|Springer]] in their [[Lecture Notes in Computer Science]], but beginning in 2016 they are instead published by the [[Leibni ...
    7 KB (878 words) - 11:21, 9 September 2024
View (previous 20 | ) (20 | 50 | 100 | 250 | 500)