When.com Web Search

Search results

  1. Results From The WOW.Com Content Network
  2. HackerRank - Wikipedia

    en.wikipedia.org/wiki/HackerRank

    The product is intended to allow technical recruiters to use programming challenges to test candidates on their specific programming skills and better understand their qualification for a certain role. Candidate's challenges, once submitted, are auto-scored and the results are then provided to the technical recruiter for review. [13]

  3. Capture the flag (cybersecurity) - Wikipedia

    en.wikipedia.org/wiki/Capture_the_flag_(cyber...

    Capture the Flag (CTF) is a cybersecurity competition that is used to test and develop computer security skills. It was first developed in 1996 at DEF CON, the largest cybersecurity conference in the United States which is hosted annually in Las Vegas, Nevada. [2]

  4. Meta Hacker Cup - Wikipedia

    en.wikipedia.org/wiki/Meta_Hacker_Cup

    Meta Hacker Cup (formerly known as Facebook Hacker Cup) is an annual international programming competition hosted and administered by Meta Platforms. The competition began in 2011 as a means to identify top engineering talent for potential employment at Meta Platforms. [ 2 ]

  5. LeetCode - Wikipedia

    en.wikipedia.org/wiki/LeetCode

    While free users have access to a limited number of questions, premium users gain access to additional questions previously used in interviews at large tech companies. [1] The performance of users' solutions is evaluated based on execution speed and memory usage , and is ranked against other submissions in the LeetCode database.

  6. Codeforces - Wikipedia

    en.wikipedia.org/wiki/Codeforces

    Codeforces (Russian: Коудфорсес) is a website that hosts competitive programming contests. [1] It is maintained by a group of competitive programmers from ITMO University led by Mikhail Mirzayanov. [2]

  7. Certified ethical hacker - Wikipedia

    en.wikipedia.org/wiki/Certified_Ethical_Hacker

    Certified Ethical Hacker (CEH) is a qualification given by EC-Council and obtained by demonstrating knowledge of assessing the security of computer systems by looking for vulnerabilities in target systems, using the same knowledge and tools as a malicious hacker, but in a lawful and legitimate manner to assess the security posture of a target system.

  8. Black hat (computer security) - Wikipedia

    en.wikipedia.org/wiki/Black_hat_(computer_security)

    A black hat (black hat hacker or blackhat) is a computer hacker who violates laws or ethical standards for nefarious purposes, such as cybercrime, cyberwarfare, or malice. These acts can range from piracy to identity theft .

  9. UVa Online Judge - Wikipedia

    en.wikipedia.org/wiki/UVa_Online_Judge

    The UVa OJ was created in 1995 by Miguel Ángel Revilla, a mathematician teaching algorithms at the University of Valladolid in Spain. Ciriaco García de Celis, an informatics student at the University of Valladolid, implemented the first version of the judge using Bash, and then developed and maintained it for more than eight years.