Search results

Jump to navigation Jump to search
Results 1 – 21 of 1,407
Advanced search

Search in namespaces:

View (previous 20 | ) (20 | 50 | 100 | 250 | 500)
  • {{Short description|Computer security specialist}} ...igence]] company and a Security Strategist with [[netForensics]], a U.S. [[Security information management]] company. ...
    3 KB (409 words) - 03:20, 19 June 2024
  • ...ter science]] textbooks on [[operating systems]], [[computer networks]], [[computer organization]], and [[cryptography]]. ...in electrical engineering from [[University of Notre Dame]] and his PhD in computer science from [[Massachusetts Institute of Technology]].<ref>{{Cite web|url= ...
    3 KB (322 words) - 15:56, 8 June 2022
  • ...e to the well-known [[Bugtraq]] mailing list, SecurityFocus columnists and writers included former [[United States Department of Justice|Department of Justice [[Category:Computer security organizations]] ...
    2 KB (195 words) - 11:59, 27 December 2024
  • {{short description|British security expert (born 1975)}} ...mation Security Assurance for Apple. Anne Saita, writing for ''Information Security'' magazine, called him along with his brother Mark Litchfield, "World's Bes ...
    4 KB (499 words) - 15:40, 13 May 2024
  • ...security-journalist-steve-gold-dies/article/392210/ "Respected Information Security Journalist Steve Gold Dies"], ''SC Magazine'', 13 January 2015</ref> ...acking archive at TNMOC |url=https://www.tnmoc.org/news-releases/2016/5/18/computer-hacking-archive-at-tnmoc |website=The National Museum of Computing |date=18 ...
    3 KB (428 words) - 14:37, 13 July 2024
  • {{short description|Computer security researcher}} ...omputer scientists to propose a [[multidisciplinary]] approach to computer security. Known primarily for work relating to people and computers, the bulk of her ...
    5 KB (683 words) - 20:39, 12 March 2024
  • {{Short description|American computer security researcher and programmer}} *[[Computer Oracle and Password System]] (COPS) ...
    5 KB (618 words) - 19:09, 6 January 2025
  • ...rnegie Mellon University]]. At one time, Forno was the [[Chief Information Security Officer]] for [[Network Solutions]]. Forno writes and publishes on his web site articles on technology, [[computer security]], and politics, roughly at the rate of one every two weeks. An example of ...
    5 KB (578 words) - 16:03, 20 November 2022
  • {{Short description|American computer security expert (born 1976)}} ...ius''', is an American [[computer security]] expert and [[Hacker (computer security)|hacker]]. ...
    6 KB (821 words) - 22:15, 3 May 2025
  • {{Short description|British computer security consultant (born 1963)}} ...ity]] and training banks, large companies and universities in the UK on IT security. In 2014 he began developing the software on which SecuritySmart runs from ...
    5 KB (765 words) - 19:40, 6 January 2025
  • * ''[[Siege of Avalon]]'', a 2000 computer role-playing game * ''[[Soldiers of Anarchy]]'', a 2002 real-time tactics computer game ...
    3 KB (343 words) - 13:05, 13 October 2024
  • {{Short description|American network security expert (born 1977)}} {{about||the English cricketer and educator|Gordon Lyon (cricketer)}} ...
    6 KB (768 words) - 18:53, 6 June 2025
  • ...e security industries. In 1994, while employed as a technical writer for a computer software company, he began writing ''The Jackal of Nar'', which was publish ...345.html John Marco at sffworld.com] - interviews, reviews and information about the author ...
    2 KB (264 words) - 18:00, 12 March 2024
  • ...security)|hacking]], [[Carding (fraud)|carding]], [[computer virus|virus]]-writers, [[internet fraud]] and other [[hi-tech]] crimes involving the use of [[com ...
    2 KB (244 words) - 09:18, 14 April 2020
  • {{short description|Physicist and computer security expert (born 1964)}} | occupation = [[Computer programmer]], [[physicist]] ...
    7 KB (1,007 words) - 14:44, 7 January 2025
  • ...dia | title = AngelList web site | accessdate = June 30, 2015}}</ref> with computer scientist Celine Bursztein, of Recent Media Inc.,<ref name=corporatesite>{{ ...ibrary/journal/1G1-84436410/technology-as-security | title = Technology as Security | last = McCullagh | first = Declan | accessdate = June 30, 2015 |url-acces ...
    5 KB (653 words) - 01:15, 2 January 2025
  • {{Short description|British security blogger (born 1969)}} | occupation = Technology consultant, security [[blogger]], [[author]] ...
    10 KB (1,350 words) - 10:09, 25 June 2024
  • ...fficult for virus writers to target, since their simplicity provides fewer security holes to target compared to a desktop. ...
    2 KB (210 words) - 21:02, 24 November 2024
  • {{Short description|International information security community standard}} ...standardize the transfer of this information across the entire spectrum of security tools and services. OVAL includes a language used to encode system details, ...
    6 KB (935 words) - 04:11, 9 March 2025
  • |name = University of Computer Studies, Yangon ...udies, Mandalay]], UCSY is one of two premier universities specializing in computer studies, and also one of the most selective universities in the country. ...
    10 KB (1,242 words) - 04:42, 5 May 2025
View (previous 20 | ) (20 | 50 | 100 | 250 | 500)