Parent directory/ | - | - |
Advances in IDS and Suricata.mp4 | 50.9 MiB | 2021 Jun 07 23:25 |
Advances in IDS and Suricata.srt | 60.5 KiB | 2019 Oct 01 02:17 |
Armageddon Redux - The Changing Face of the Infocalypse.mp4 | 30.1 MiB | 2021 Jun 07 23:25 |
Armageddon Redux - The Changing Face of the Infocalypse.srt | 48.0 KiB | 2019 Oct 01 02:17 |
Attack Vectors on mobile Devices.mp4 | 49.6 MiB | 2021 Jun 07 23:25 |
Attack Vectors on mobile Devices.srt | 50.8 KiB | 2019 Oct 01 02:17 |
Behavioral Security - 10 steps forward 5 steps backward.mp4 | 43.5 MiB | 2021 Jun 07 23:25 |
Behavioral Security - 10 steps forward 5 steps backward.srt | 68.8 KiB | 2019 Oct 01 02:17 |
Bond Tech - I Want More Than Movie Props.mp4 | 46.6 MiB | 2021 Jun 07 23:25 |
Bond Tech - I Want More Than Movie Props.srt | 56.8 KiB | 2019 Oct 01 02:17 |
Conference US Experience - Laws, Compliance and real Life.mp4 | 42.1 MiB | 2021 Jun 07 23:25 |
Do They Deliver - Practical Security and Load Testing of Cloud Service Providers.mp4 | 48.4 MiB | 2021 Jun 07 23:25 |
Do They Deliver - Practical Security and Load Testing of Cloud Service Providers.srt | 70.6 KiB | 2019 Oct 01 02:17 |
Extending Scapy by a GSM Air Interface and Validating the Implementation.mp4 | 49.0 MiB | 2021 Jun 07 23:25 |
Extending Scapy by a GSM Air Interface and Validating the Implementation.srt | 55.0 KiB | 2019 Oct 01 02:17 |
Ground BeEF - Cutting, devouring and digesting the Legs off a Browser.mp4 | 45.6 MiB | 2021 Jun 07 23:25 |
How To Rob An Online Bank And Get Away With It.mp4 | 40.2 MiB | 2021 Jun 07 23:25 |
How To Rob An Online Bank And Get Away With It.srt | 56.9 KiB | 2019 Oct 01 02:17 |
Human Factors Engineering for IT Security.mp4 | 43.7 MiB | 2021 Jun 07 23:25 |
Human Factors Engineering for IT Security.srt | 55.8 KiB | 2019 Oct 01 02:17 |
IT Security Compliance Management can be done right (and makes sense when done right).mp4 | 33.1 MiB | 2021 Jun 07 23:25 |
IT Security Compliance Management can be done right (and makes sense when done right).srt | 40.6 KiB | 2019 Oct 01 02:17 |
Identity X.0 - Securing the Insecure.mp4 | 50.4 MiB | 2021 Jun 07 23:25 |
Identity X.0 - Securing the Insecure.srt | 63.6 KiB | 2019 Oct 01 02:17 |
Intelligent Bluetooth Fuzzing - Why bother.mp4 | 42.8 MiB | 2021 Jun 07 23:25 |
Intelligent Bluetooth Fuzzing - Why bother.srt | 55.1 KiB | 2019 Oct 01 02:17 |
Malware Trends 2011 - from Cybercrime to nation-sponsored Espionage.mp4 | 35.8 MiB | 2021 Jun 07 23:25 |
On Cyber-Peace - Towards an International Cyber Defense Strategy.mp4 | 34.1 MiB | 2021 Jun 07 23:25 |
On Cyber-Peace - Towards an International Cyber Defense Strategy.srt | 58.8 KiB | 2019 Oct 01 02:17 |
Patching Vehicle Insecurities.mp4 | 44.3 MiB | 2021 Jun 07 23:25 |
Patching Vehicle Insecurities.srt | 49.3 KiB | 2019 Oct 01 02:17 |
Reassemble or GTFO - IDS Evasion Strategies.mp4 | 38.5 MiB | 2021 Jun 07 23:25 |
Reassemble or GTFO - IDS Evasion Strategies.srt | 51.8 KiB | 2019 Oct 01 02:17 |
Results of a Security Assessment of the Internet Protocol Version 6 (IPv6).mp4 | 43.9 MiB | 2021 Jun 07 23:25 |
Results of a Security Assessment of the Internet Protocol Version 6 (IPv6).srt | 71.8 KiB | 2019 Oct 01 02:17 |
Solving Social Engineering Attacks.mp4 | 34.7 MiB | 2021 Jun 07 23:25 |
Solving Social Engineering Attacks.srt | 48.3 KiB | 2019 Oct 01 02:17 |
The Security of non-executable Files.mp4 | 49.6 MiB | 2021 Jun 07 23:25 |
The Security of non-executable Files.srt | 58.8 KiB | 2019 Oct 01 02:17 |
Why the software we use is designed to violate our privacy.mp4 | 41.6 MiB | 2021 Jun 07 23:25 |
Why the software we use is designed to violate our privacy.srt | 59.8 KiB | 2019 Oct 01 02:17 |
Windows Pwn 7 OEM - Owned Every Mobile.mp4 | 41.2 MiB | 2021 Jun 07 23:25 |
Windows Pwn 7 OEM - Owned Every Mobile.srt | 46.7 KiB | 2019 Oct 01 02:17 |
Your crown jewels online - Further Attacks to SAP Web Applications.mp4 | 51.0 MiB | 2021 Jun 07 23:25 |
Your crown jewels online - Further Attacks to SAP Web Applications.srt | 68.1 KiB | 2019 Oct 01 02:17 |