-
3
-
-
32444441216
-
Guest Editors' introduction: Why attacking systems is a good idea
-
July Aug
-
I. Arce and G. McGraw. Guest Editors' introduction: Why attacking systems is a good idea. IEEE Security & Privacy, 2(4): 17-19, July Aug. 2004.
-
(2004)
IEEE Security & Privacy
, vol.2
, Issue.4
, pp. 17-19
-
-
Arce, I.1
McGraw, G.2
-
6
-
-
14544292121
-
Why computer scientists should attend hacker conferences
-
Mar
-
G. Conti. Why computer scientists should attend hacker conferences. Communications of the ACM, 48(3):23-24, Mar. 2005.
-
(2005)
Communications of the ACM
, vol.48
, Issue.3
, pp. 23-24
-
-
Conti, G.1
-
7
-
-
33745875956
-
Hacking and innovation (guest editor's introduction)
-
June
-
G. Conti. Hacking and innovation (guest editor's introduction). Communications of the ACM, June 2006.
-
(2006)
Communications of the ACM
-
-
Conti, G.1
-
8
-
-
34748907729
-
-
Digital Evolution. Homepage Digital Evolution. http://www.dievo.org/. Accessed. March 2006.
-
Digital Evolution. Homepage "Digital Evolution". http://www.dievo.org/. Accessed. March 2006.
-
-
-
-
10
-
-
0343302299
-
Improving the security of your site by breaking into it. Usenet Posting to comp.security.unix, 3
-
Dec
-
D. Farmer and W. Venema. Improving the security of your site by breaking into it. Usenet Posting to comp.security.unix, 3. Dec. 1993.
-
(1993)
-
-
Farmer, D.1
Venema, W.2
-
11
-
-
84873101418
-
Teaching data security at university degree level
-
M. Dornseif, F. C. Freiling, M. Mink, and L. Pimenidis. Teaching data security at university degree level. In Proceedings of the Fourth World Conference on Information Security Education, pages 213-222, 2005.
-
(2005)
Proceedings of the Fourth World Conference on Information Security Education
, pp. 213-222
-
-
Dornseif, M.1
Freiling, F.C.2
Mink, M.3
Pimenidis, L.4
-
12
-
-
34748855415
-
An Offensive Approach to teaching Information Security: "Aachen Summer School Applied IT Security
-
Technical Report AIB-2005-02, RWTH Aachen, Jan
-
M. Dornseif, F. C. Gärtner, T. Holz, and M. Mink. An Offensive Approach to teaching Information Security: "Aachen Summer School Applied IT Security". Technical Report AIB-2005-02, RWTH Aachen, Jan. 2005.
-
(2005)
-
-
Dornseif, M.1
Gärtner, F.C.2
Holz, T.3
Mink, M.4
-
13
-
-
34748826675
-
-
Accessed April
-
Ghetto Hackers. Homepage "Root-Fu". http://www.ghettohackers. net/rootfu/. Accessed April 2006.
-
(2006)
Root-Fu
-
-
-
14
-
-
34748896486
-
-
Hack this page. Homepage Hack this page. http://www.hackthi. spage.tk/. Accessed May 2006.
-
Hack this page. Homepage "Hack this page". http://www.hackthi. spage.tk/. Accessed May 2006.
-
-
-
-
16
-
-
25844446848
-
Inside risks: The big picture
-
Sept
-
P. G. Neumann. Inside risks: the big picture. Communications of the ACM, 47(9): 112, Sept. 2004.
-
(2004)
Communications of the ACM
, vol.47
, Issue.9
, pp. 112
-
-
Neumann, P.G.1
-
19
-
-
27844434598
-
Angewandte Informationssicherheit: Ein Hacker-Praktikum an Universitäten
-
June
-
M. Schumacher, M.-L. Moschgath, and U. Roedig. Angewandte Informationssicherheit: Ein Hacker-Praktikum an Universitäten. Informatik Spektrum, 6(23), June 2000.
-
(2000)
Informatik Spektrum
, vol.6
, Issue.23
-
-
Schumacher, M.1
Moschgath, M.-L.2
Roedig, U.3
-
20
-
-
4243150699
-
Who will rob you on the digital highway?
-
May
-
T. Slewe and M. Hoogenboom. Who will rob you on the digital highway? Communications of the ACM, 47(5):56-60, May 2004.
-
(2004)
Communications of the ACM
, vol.47
, Issue.5
, pp. 56-60
-
-
Slewe, T.1
Hoogenboom, M.2
-
22
-
-
84904308086
-
-
G. Vigna. Teaching network security through live exercises. In C. E. Irvine and H. L. Armstrong, editors, World Conference on Information Security Education, 253 of IFIP Conference Proceedings, pages 3-18. Kluwer, 2003.
-
G. Vigna. Teaching network security through live exercises. In C. E. Irvine and H. L. Armstrong, editors, World Conference on Information Security Education, volume 253 of IFIP Conference Proceedings, pages 3-18. Kluwer, 2003.
-
-
-
|