@electronic{through-the-interface.typepad.com, title = {Creating a face-recognising security cam with a Raspberry Pi Part 1 - Through the Interface}, url = {http://through-the-interface.typepad.com/through_the_interface/2012/09/creating-a-face-recognising-security-cam-with-a-raspberry-pi-part-1.html}, biburl = {https://puma.uni-kassel.de/url/39c6e65fb9a2bc67158b36e0db084109/seboettg}, keywords = {cam face-recognition raspberrypi recognising recognition rpi security}, added-at = {2014-06-22T13:07:16.000+0200}, description = {This series of posts builds upon the mini-series on building a motion-detecting security cam based around the Raspberry Pi. Once you have your motion detecting security cam up and running, you should be able to move on to the next...}, interhash = {39c6e65fb9a2bc67158b36e0db084109}, intrahash = {39c6e65fb9a2bc67158b36e0db084109} } @electronic{www.infoq.com, title = {Introduction to Spring Security 3/3.1}, url = {http://www.infoq.com/presentations/Spring-Security-3}, biburl = {https://puma.uni-kassel.de/url/74847eb4263515455325f0eed00c0d6e/stephandoerfel}, keywords = {demo security spring tutorial video}, added-at = {2013-02-04T16:01:14.000+0100}, description = {Mike Wiesner demoes using Spring Security 3 with its new features, such as expression language-based authorization and extensions, to implement authentication and authorization in Java applications.}, interhash = {74847eb4263515455325f0eed00c0d6e}, intrahash = {74847eb4263515455325f0eed00c0d6e} } @electronic{socialnetworksecurity.org, title = {Social Network Security Leaks - 2011}, url = {http://socialnetworksecurity.org/en/}, biburl = {https://puma.uni-kassel.de/url/cb07bb1dbbac40c98beaa811450bed85/benz}, keywords = {facebook security social_networks vulnerabilities}, added-at = {2011-03-13T23:23:04.000+0100}, description = {}, interhash = {cb07bb1dbbac40c98beaa811450bed85}, intrahash = {cb07bb1dbbac40c98beaa811450bed85} } @electronic{www.codercorp.com, title = {Spring security login and logout form | Java tips for coders, by coders}, url = {http://www.codercorp.com/blog/java/spring-security-login-logout-form.html}, biburl = {https://puma.uni-kassel.de/url/98add531adafc5fd0a623f46a038386d/benz}, keywords = {security spring}, added-at = {2011-02-04T16:07:06.000+0100}, description = {So I managed to configure spring security in my last article here but what do I do now. How do I create the login form, login.jsp for my users to authenticate}, interhash = {98add531adafc5fd0a623f46a038386d}, intrahash = {98add531adafc5fd0a623f46a038386d} } @electronic{www.codercorp.com, title = {Configuring spring security | Java tips for coders, by coders}, url = {http://www.codercorp.com/blog/java/configuring-spring-security.html}, biburl = {https://puma.uni-kassel.de/url/7075b0b5aad1e130616f5fe80e6c81e2/benz}, keywords = {security spring}, added-at = {2011-02-04T16:07:06.000+0100}, description = {}, interhash = {7075b0b5aad1e130616f5fe80e6c81e2}, intrahash = {7075b0b5aad1e130616f5fe80e6c81e2} } @electronic{www.codercorp.com, title = {Custom AuthenticationProcessingFilter for spring security to perform actions on login | Java tips for coders, by coders}, url = {http://www.codercorp.com/blog/java/custom-authenticationprocessingfilter-for-spring-security-to-perform-actions-on-login.html}, biburl = {https://puma.uni-kassel.de/url/c1dcb4baadb73b091499a9ec3c6f8d56/benz}, keywords = {security spring}, added-at = {2011-02-04T16:07:06.000+0100}, description = {Question like this one popup on the spring security forum all the time. The question is almost always the same. The system must perform some custom action after...}, interhash = {c1dcb4baadb73b091499a9ec3c6f8d56}, intrahash = {c1dcb4baadb73b091499a9ec3c6f8d56} } @electronic{www.jwall.org, title = {..:: jwall.org ::..}, url = {http://www.jwall.org/}, biburl = {https://puma.uni-kassel.de/url/09e8b4d1844242e9e025be926903e159/hotho}, keywords = {apache java security tools web}, added-at = {2008-10-21T16:23:39.000+0200}, description = {}, interhash = {09e8b4d1844242e9e025be926903e159}, intrahash = {09e8b4d1844242e9e025be926903e159} } @electronic{www.wifihopper.com, title = {Overview}, url = {http://www.wifihopper.com/}, biburl = {https://puma.uni-kassel.de/url/08af285a7d8653138189176a2fbd1569/hotho}, keywords = {analysis security tools windows wlan}, added-at = {2007-12-28T20:47:08.000+0100}, description = {}, interhash = {08af285a7d8653138189176a2fbd1569}, intrahash = {08af285a7d8653138189176a2fbd1569} } @electronic{www.wirelessdefence.org, title = {Wireless Security 802.11 Security Wirelessdefence.org Index}, url = {http://www.wirelessdefence.org/}, biburl = {https://puma.uni-kassel.de/url/c3067d671cce7763c8a983bee100c309/hotho}, keywords = {linux security tools windows wireless wlan}, added-at = {2007-12-28T20:34:26.000+0100}, description = {}, interhash = {c3067d671cce7763c8a983bee100c309}, intrahash = {c3067d671cce7763c8a983bee100c309} } @electronic{www.wlanbook.com, title = {NetStumbler Alternatives at WLAN Book.com}, url = {http://www.wlanbook.com/2007/12/11/netstumbler-alternatives/}, biburl = {https://puma.uni-kassel.de/url/1bffb4fd1ed9dc99f94024a46575ed6d/hotho}, keywords = {security tools windows wlan}, added-at = {2007-12-28T20:14:43.000+0100}, description = {}, interhash = {1bffb4fd1ed9dc99f94024a46575ed6d}, intrahash = {1bffb4fd1ed9dc99f94024a46575ed6d} } @electronic{www.openwall.com, title = {John the Ripper password cracker}, url = {http://www.openwall.com/john/}, biburl = {https://puma.uni-kassel.de/url/113f0d7ab0454a7331292b0fddd3cea7/hotho}, keywords = {hack linux password security software tools}, added-at = {2007-12-21T13:16:45.000+0100}, description = {}, interhash = {113f0d7ab0454a7331292b0fddd3cea7}, intrahash = {113f0d7ab0454a7331292b0fddd3cea7} } @electronic{www.wireshark.org, title = {Wireshark: The World's Most Popular Network Protocol Analyzer}, url = {http://www.wireshark.org/}, biburl = {https://puma.uni-kassel.de/url/676146bbbb88d36f16f67e4547ece70e/hotho}, keywords = {analyzer free network security tools}, added-at = {2007-08-23T09:46:57.000+0200}, description = {Open Source protocol analyzer.}, interhash = {676146bbbb88d36f16f67e4547ece70e}, intrahash = {676146bbbb88d36f16f67e4547ece70e} } @electronic{www.metasploit.org, title = {The Metasploit Project}, url = {http://www.metasploit.org/}, biburl = {https://puma.uni-kassel.de/url/fdaf2fd3e172c870d7db1d243e52b6a7/hotho}, keywords = {exploits hack security tools}, added-at = {2007-03-27T13:58:06.000+0200}, description = {}, interhash = {fdaf2fd3e172c870d7db1d243e52b6a7}, intrahash = {fdaf2fd3e172c870d7db1d243e52b6a7} } @electronic{www.heise.de, title = {heise Security - Produkte - Metasploit: Exploits für alle}, url = {http://www.heise.de/security/artikel/67984/0}, biburl = {https://puma.uni-kassel.de/url/090a4bad43fe72d4f5a7311cb9e8dbd5/hotho}, keywords = {exploits hack security}, added-at = {2007-03-27T13:57:04.000+0200}, description = {Exploits für alle}, interhash = {090a4bad43fe72d4f5a7311cb9e8dbd5}, intrahash = {090a4bad43fe72d4f5a7311cb9e8dbd5} } @electronic{forskningsnett.uninett.no, title = {UNINETT: WLAN - Wireless Security Threats}, url = {http://forskningsnett.uninett.no/wlan/wlanthreat.html}, biburl = {https://puma.uni-kassel.de/url/f4bc84e6659d1b11beae82d776faa669/hotho}, keywords = {wlan hack security}, added-at = {2007-03-02T21:55:35.000+0100}, description = {}, interhash = {f4bc84e6659d1b11beae82d776faa669}, intrahash = {f4bc84e6659d1b11beae82d776faa669} } @electronic{www.heise.de, title = {c't 13/2006, S. 216: Soft-Link}, url = {http://www.heise.de/ct/06/13/links/216.shtml}, biburl = {https://puma.uni-kassel.de/url/0dadeb42eec60098d87130c84d1b923b/hotho}, keywords = {tools security backup}, added-at = {2006-07-06T17:57:34.000+0200}, description = {Das c't-Helfer-Skript für den bequemeren Umgang mit dem Backup-Tool duplicity}, interhash = {0dadeb42eec60098d87130c84d1b923b}, intrahash = {0dadeb42eec60098d87130c84d1b923b} } @electronic{maya.cs.depaul.edu, title = {Bamshad Mobasher - Publications}, url = {http://maya.cs.depaul.edu/~mobasher/cgi-bin/view-pubs.pl?CID=SP}, biburl = {https://puma.uni-kassel.de/url/28457c90d6871acf72e605119ca7ad31/hotho}, keywords = {recommender attack security}, added-at = {2006-05-04T11:16:09.000+0200}, description = {}, interhash = {28457c90d6871acf72e605119ca7ad31}, intrahash = {28457c90d6871acf72e605119ca7ad31} }