Parent directory/ | - | - |
SOURCE Boston 2008 A Security Metric for Software Developer.mp4 | 75.4 MiB | 2019 Oct 01 04:27 |
SOURCE Boston 2008 Advanced Linux Firewalls.mp4 | 109.3 MiB | 2019 Oct 01 04:27 |
SOURCE Boston 2008 All the Data That s Fit to Visualize.mp4 | 51.8 MiB | 2019 Oct 01 04:27 |
SOURCE Boston 2008 Automated Structural Malware Classification.mp4 | 133.0 MiB | 2019 Oct 01 04:27 |
SOURCE Boston 2008 Banking on education A case study on security training programs.mp4 | 130.2 MiB | 2019 Oct 01 04:27 |
SOURCE Boston 2008 Business Logic Flaws.mp4 | 108.5 MiB | 2019 Oct 01 04:27 |
SOURCE Boston 2008 CEO Panel.mp4 | 94.6 MiB | 2019 Oct 01 04:27 |
SOURCE Boston 2008 Content Awareness A Cornerstone to Data Prote.mp4 | 110.3 MiB | 2019 Oct 01 04:27 |
SOURCE Boston 2008 Deperimetrisation - Dream Or Nightmare For Network Security.mp4 | 137.1 MiB | 2019 Oct 01 04:27 |
SOURCE Boston 2008 Detailed Thread Modeling.mp4 | 121.2 MiB | 2019 Oct 01 04:27 |
SOURCE Boston 2008 Developing an Incident Response Plan.mp4 | 141.3 MiB | 2019 Oct 01 04:27 |
SOURCE Boston 2008 Disruptive Innovation and the Future of Security.mp4 | 119.4 MiB | 2019 Oct 01 04:27 |
SOURCE Boston 2008 Entrepreneur Panel.mp4 | 111.2 MiB | 2019 Oct 01 04:27 |
SOURCE Boston 2008 Establishing a Security Metrics Program.mp4 | 96.1 MiB | 2019 Oct 01 04:27 |
SOURCE Boston 2008 How Compliance Can Get You Killed.mp4 | 116.5 MiB | 2019 Oct 01 04:27 |
SOURCE Boston 2008 Information Operations.mp4 | 55.0 MiB | 2019 Oct 01 04:27 |
SOURCE Boston 2008 Investigation Techniques for Social Networking Sites.mp4 | 133.2 MiB | 2019 Oct 01 04:27 |
SOURCE Boston 2008 Keynote - Dan Geer.mp4 | 55.0 MiB | 2019 Oct 01 04:27 |
SOURCE Boston 2008 Keynote - Steven Levy.mp4 | 54.5 MiB | 2019 Oct 01 04:27 |
SOURCE Boston 2008 Keynote Speaker - Richard Clarke.mp4 | 44.4 MiB | 2019 Oct 01 04:27 |
SOURCE Boston 2008 L0pht Panel.mp4 | 71.2 MiB | 2019 Oct 01 04:27 |
SOURCE Boston 2008 Managing Your Career in Infosec.mp4 | 66.0 MiB | 2019 Oct 01 04:27 |
SOURCE Boston 2008 Not Dead But Twitching Anti-Virus Succumbs to the Scourge of Modern Malware.mp4 | 121.4 MiB | 2019 Oct 01 04:27 |
SOURCE Boston 2008 Panel Discussion - The tug-o-war between business and security.mp4 | 104.2 MiB | 2019 Oct 01 04:27 |
SOURCE Boston 2008 Telephone Defenses Against the Dark Arts (part1).mp4 | 138.5 MiB | 2019 Oct 01 04:27 |
SOURCE Boston 2008 The CERT C++ Secure Coding Standard.mp4 | 141.1 MiB | 2019 Oct 01 04:27 |
SOURCE Boston 2008 Understanding Emerging Threats The case of Nugache.mp4 | 65.7 MiB | 2019 Oct 01 04:27 |
SOURCE Boston 2008 Understanding and Preventing Data Breaches, The Real World Edition.mp4 | 44.7 MiB | 2019 Oct 01 04:27 |
SOURCE Boston 2008 Vulnerability in the Real World Lessons from both sides of the fence.mp4 | 118.7 MiB | 2019 Oct 01 04:27 |
SOURCE Boston 2008 Web Application Panel.mp4 | 120.2 MiB | 2019 Oct 01 04:27 |
SOURCE Boston 2008 Your car passed inspection but what about your software.mp4 | 91.7 MiB | 2019 Oct 01 04:27 |
SOURCE Boston 2008 Having a Defined Target for Software Security Testing.mp4 | 78.2 MiB | 2019 Oct 01 04:27 |