Parent directory/ | - | - |
Ask the Experts Panel - Rooster, JD Glasser, Job de Haas, Ofir Arkin, Jennifer Granick, Halvar Flake.opus | 9.6 MiB | 2021 Apr 13 06:58 |
Auditing The Security of Applications - David Litchfield.opus | 6.7 MiB | 2021 Apr 13 06:58 |
Defending Your Network with Kerberos - Rooster & J.D. Glaser.opus | 8.5 MiB | 2021 Apr 13 06:58 |
Finding Holes in Closed-source Software - Havlar Flake.opus | 7.6 MiB | 2021 Apr 13 06:58 |
Getting Rooted and Never Knowing It - Job De Haas.opus | 14.5 MiB | 2021 Apr 13 06:58 |
ICMP Usage In Scanning - Ofir Arkin.opus | 10.7 MiB | 2021 Apr 13 06:58 |
Issues Surrounding International Computer Crime Laws - Jennifer Granick.opus | 13.1 MiB | 2021 Apr 13 06:58 |
Plenty of Coppers in Change - Stuart Hyde.opus | 9.2 MiB | 2021 Apr 13 06:58 |
Strategies for Defeating Distributed Attacks - Simple Nomad.opus | 13.0 MiB | 2021 Apr 13 06:58 |
What Is Involved In a Forensic Effort - John Tan.opus | 10.5 MiB | 2021 Apr 13 06:58 |