

Descarga de Presentaciones:
- Analysis of Adversarial Code: The Role of Malware Kits! (PDF)
- Backdoor 2.0: Hacking one's Firefox to steal his web secrets. (PPT)
- Mining Digital Evidence in Microsoft Windows – Answering Who, When, Why and How (PPT)
- The future of automated web application testing (PDF)
- 7 years of Indian IT act - 7 Best Cases (PDF - PPT)
- Faster PwninG Assured: Cracking Crypto with FPGAs (PDF)
- Crazy Toaster: Can Home Devices turn against us?
- Legiment Techniques of IPS/IDS Evasion (PDF)
- Subtle Security flaws: Why you must follow the basic principles of software security (PPT)
- Hacking Web 2.0 Art and Science of Vulnerability Detection (PDF)
- Vulnerabilities in VoIP Products and Services (PDF)
No hay comentarios:
Publicar un comentario