101. | Composing system services in GuixSD or how we came to wonder what a system service really is | 0 | |
|
102. | The Room by ToooL , team CyberSolders | 0 | |
|
103. | The Building Blocks of Dissent Policy Allies for a Dissident Web | 0 | |
|
104. | Watching the Observers the Impact of Surveillance on Human Rights | 0 | |
|
105. | nathan keltner charles holmes Here be Dragons A Bedtime Tale for Sleepless Nights | 0 | |
|
106. | Cocolitos Mr Jack Physical security flaws applied to industrial spying FR | 0 | |
|
107. | jason geffner JavaJournal | 0 | |
|
108. | Needing the DoH: The Ongoing Encryption and Centralization of DNS | 0 | |
|
109. | Encryption TK Securing the Future of Journalism and Human Rights | 0 | |
|
110. | This Mess We're In the Surveillance Landscape and Coercion Resistant Design | 0 | |
|
111. | alex ionescu Apple SMC The place to be definitely For an implant | 0 | |
|
112. | Hardening Windows 8 Apps For The Windows Store Bill Sempf DerbyCon 3 | 0 | |
|
113. | Invited Speaker Charisse Castagnoli | 0 | |
|
114. | Discussing Initiatives by Microsoft and the New York Cyber Task Force CyCon NATO 2017 | 0 | Discussion |
|
115. | Home & Away International Parent Company Responsibility for Human Rights | 0 | |
|
116. | Joan Calvet The long journey To A MultiArchitecture Disassembler fgmt6TlB2UkKi | 0 | |
|
117. | Безопасность применения биометрических технологий | 0 | |
|
118. | Воркшоп Использование проекта ERM&CK для написания сценариев реагирования | 0 | |
|
119. | AtlSecCon 2018 Justin Silbert Color Wars Examining Models for Blue and Red Team Collaboration | 0 | |
|
120. | Hans de Goede Upstream Allwinner SOC support | 0 | |
|
121. | david carne HDI PCB Netlist Recovery a new old technique | 0 | |
|
122. | fabrice desclaux camille mougey Miasm reverse engineering framework | 0 | |
|
123. | Шпион лазутчик дома, или Как испугать кошку через UDP | 0 | |
|
124. | Barometer Taking the pressure off of assurance and resource contention scenarios for NFVI | 0 | |
|
125. | USB Undermining Security Barriers Andy Davis | 0 | |
|
126. | A small, FRP DSL for distributed systems Mgmt Config The Language | 0 | |
|
127. | Экспертный центр мониторинга безопасности на PHDays 8 | 0 | |
|
128. | Криптографические алгоритмы для усиления стойкости блокчейна | 0 | |
|
129. | Web Application Firewall Bypassing | 0 | |
|
130. | Michael Fowler | 0 | |
|
131. | Rodrigo Branco How Offensive Security is Defining the Way We Compute Keynote Speech | 0 | |
|
132. | Towards Making Systems Forget with Machine Unlearning | 0 | |
|
133. | EDPS Civil Society Summit 2022 | 0 | |
|
134. | Криминалистика против изворотливых хакеров | 0 | |
|
135. | No viruses I wouldnt be so sure | 0 | |
|
136. | Sneak into buildings with KNXnet IP Claire Vacherot | 0 | |
|
137. | High Performance Network Function Virtualization with ClickOS | 0 | |
|
138. | Manuel Urueña User Experience of Current Auth Mechanisms and a Proposal for Future Ones | 0 | |
|
139. | The EDPS Civil Society Summit | 0 | |
|
140. | Атрибуция кода целенаправленных атак | 0 | |
|
141. | Нарушение политики безопасности расширений Microsoft Edge | 0 | |
|
142. | Global RIR Statistics | 0 | |
|
143. | Хранение API ключей | 0 | |
|
144. | Why JSON when you can DSL Your problematics deserve their own language | 0 | |
|
145. | Thomas Lohninger Mit 5G wird Milch und Honig fließen | 0 | |
|
146. | Эволюция SOC 2017 план развития | 0 | |
|
147. | Поиск целевых атак и реагирование на инциденты на основе методов ATT&CK | 0 | |
|
148. | 26C3 2009 deu privacy amp stylometry | 0 | |
|
149. | ruce Schneier Keynote,Following the Money Security Proxies and Agenda | 0 | |
|
150. | HOPE 2020 Get BitCrushed with HangOnGetReady | 0 | |
|
151. | The digital identity revolution great hopes or deep concerns | 0 | |
|
152. | Digital Privacy low and high hanging fruits | 0 | |
|
153. | Calculation, Visualization, and Analysis of Security Metrics in SIEM Systems | 0 | |
|
154. | Marc Brouillard | 0 | |
|
155. | Attribution is bullshit change my mind | 0 | |
|
156. | Topics of Interest Automated Finding Correlation where do SAST, DAST and R Klein • E Worcel | 0 | |
|
157. | Lightning talks Kirsten Fiedler, EDRi | 0 | |
|
158. | Lightning talks Theresia Reinhold | 0 | |
|
159. | Development of a Service for Access to and Management of the Integrated Vulnerability | 0 | |
|
160. | Bilock Exclusive 2 | 0 | |
|
161. | AMPS 20211108 1600 | 0 | |
|
162. | MitM Attack by Name Collision Cause Analysis and Vulnerability Assessment in the New gTLD Era | 0 | |
|
163. | Instant big data targeting | 0 | |
|
164. | Lightning talks Alexander Czadilek and Christof Tschohl, epicenter works | 0 | |
|
165. | Подвал, бункер, морская платформа где скрываются bulletproof хостинги | 0 | |
|
166. | Virginia Calegare AusCERT 2020 | 0 | |
|
167. | 36C3 2019 Hirne Hacken | 0 | |
|
168. | Threat Intelligence Zero to Basics in presentation Chris J | 0 | |
|
169. | IT Round | 0 | |
|
170. | How I Became Paranoid in the World of Mobile Devices | 0 | |
|
171. | Использование Python для управления знаниями инструменты, подходы, примеры | 0 | |
|
172. | 33C3 2016 In Search of Evidence Based IT Security deutsche Ubersetzung | 0 | |
|
173. | Tonimir Kisasondi Exploring the IoT attack surface | 0 | |
|
174. | Panel 1 Det kontantløse samfund | 0 | |
|
175. | NFC Naked Fried Chicken | 0 | |
|
176. | Evil Printer собираем нескучную прошивку | 0 | |
|
177. | Как применять подходы Zero Trust при построении процесса безопасной разработки | 0 | |
|
178. | Android's Privacy Posture by Dinesh Venkatesan and Aditi Bhatnagar | 0 | |
|
179. | CCC Camp 2019 Exposing Systems of Power and Injustice deutsche Ubersetzung | 0 | |
|
180. | Getting off The Grid and onto Hyperboria William Turner | 0 | |
|
181. | Глубокое погружение в компьютерную криминалистику инциденты 2018 и 2019 годов | 0 | |
|
182. | Когнитивный SOC будущее или уже реальность | 0 | |
|
183. | Abusing Browser User Interfaces for Fun and Profit | 0 | |
|
184. | OWASP IoT Top 10 Daniel Miessler | 0 | |
|
185. | 26C3 2009 deu der hackerparagraph beim bundesverfassungsgericht | 0 | |
|
186. | Computing On Encrypted Data A Survey Pascal Junod Black Alps 2019 | 0 | Let's Play |
|
187. | MITM на устройства Apple | 0 | |
|
188. | Threat intelligence в процессах SOC | 0 | |
|
189. | Россия 2 | 0 | |
|
190. | Рынок профессий ИБ Как объяснить бабушке, чем ты занимаешься | 0 | |
|
191. | Open source information gathering Chris Gates | 0 | Guide |
|
192. | David Litchfield All New 0 Day Black Hat - USA - 2004 | 0 | |
|
193. | Firmalice Automatic Detection of Authentication Bypass Vulnerabilities in Binary Firmware | 0 | |
|
194. | Завидное постоянство новые способы закрепиться в Windows | 0 | |
|
195. | Экономическая эффективность при выстраивании результативной работы департамента ИБ основные акценты | 0 | |
|
196. | maddie stone The Life Changing Magic of IDAPython Embedded Device Edition | 0 | |
|
197. | Living on the Edge Greatly needed stub resolver capabilities for applications and systems with the … | 0 | |
|
198. | Easterhegg 2019 deu Black Box Live Protocol Fuzzing | 0 | |
|
199. | О чем беспокоятся разработчики железа | 0 | |
|
200. | Атаки на биометрические системы, мировой и российский опыт противодействия | 0 | |
|