1 |
|
Vulnerabilities Of Control Systems In Drinking Water Utilities |
11 years, 6 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer security, SOURCE-boston-2012 |
1188 |
None |
2 |
|
Coldfusion For Penetration Testers |
11 years, 5 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer security, SOURCE-boston-2012 |
2587 |
None |
3 |
|
Lessons Of The Kobayashi Maru: If You're Not Cheating, You're Not Trying |
11 years, 5 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer security, SOURCE-boston-2012 |
1249 |
None |
4 |
|
Reverse Engineering Mobile Applications |
11 years, 5 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer security, SOURCE-boston-2012 |
1797 |
None |
5 |
|
Scap For Everyone: A Case Study In Transforming Configurations |
11 years, 5 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer security, SOURCE-boston-2012 |
1160 |
None |
6 |
|
Perspectives Of How To Develop A Winning Career In Infosec |
11 years, 5 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer security, SOURCE-boston-2012 |
1727 |
None |
7 |
|
Microsoft's Response Process: 10 Years Of Hard Knock Learning |
11 years, 5 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer security, SOURCE-boston-2012 |
2045 |
None |
8 |
|
Sexydefense - Maximizing The Home-Field Advantage |
11 years, 5 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer security, SOURCE-boston-2012 |
1291 |
None |
9 |
|
Successful Application Security Programs In An Uncertain Landscape |
11 years, 5 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer security, SOURCE-boston-2012 |
1316 |
None |
10 |
|
Using Capture-The-Flag To Enhance Teaching And Training |
11 years, 5 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer security, SOURCE-boston-2012 |
1919 |
None |
11 |
|
Games We Play: Defenses And Disincentives |
11 years, 5 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer security, SOURCE-boston-2012 |
1488 |
None |
12 |
|
Privacy At The Border: A Guide For Traveling With Devices |
11 years, 5 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer security, SOURCE-boston-2012 |
4042 |
None |
13 |
|
Plc/Scada Vulnerabilities In Correctional Facilities |
11 years, 5 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer security, SOURCE-boston-2012 |
1853 |
None |
14 |
|
Your Pci Assessor: Best Friend Or Worst Enemy? You Choose |
11 years, 5 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer security, SOURCE-boston-2012 |
1300 |
None |
15 |
|
Android Modding For The Security Practitioner |
11 years, 5 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer security, SOURCE-boston-2012 |
2435 |
None |
16 |
|
Covering Your *Aas - Cloud Security Case Studies For Saas, Paas, And Iaas |
11 years, 5 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer security, SOURCE-boston-2012 |
2213 |
None |
17 |
|
Achievement Unlocked : Designing A Compelling Security Awareness Program |
11 years, 5 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer security, SOURCE-boston-2012 |
1618 |
None |
18 |
|
Media Hype In The Information Security Industry |
11 years, 5 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer security, SOURCE-boston-2012 |
1168 |
None |
19 |
|
Behind The Scenes: Pwning Satellite/Cable Tv |
11 years, 5 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer security, SOURCE-boston-2012 |
1706 |
None |
20 |
|
Advanced Sql Injection With Sqlol: The Configurable Sqli Testbed |
11 years, 5 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer security, SOURCE-boston-2012 |
1846 |
None |
21 |
|
Mobile Exploit Intelligence Project |
11 years, 5 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer security, SOURCE-boston-2012 |
1519 |
None |
22 |
|
De-Constructing The Cost Of A Data Breach |
11 years, 5 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer security, SOURCE-boston-2012 |
1298 |
None |
23 |
|
No Victims: How To Measure &Amp; Communicate Risk |
11 years, 5 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer security, SOURCE-boston-2012 |
1118 |
None |
24 |
|
Lessons Of The Kobayashi Maru: If You're Not Cheating, You're Not Trying |
11 years, 5 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer security, SOURCE-boston-2012 |
1132 |
None |
25 |
|
Inside The Duqu Command And Control Servers, |
11 years, 5 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer security, SOURCE-boston-2012 |
1877 |
None |
26 |
|
Celebrating Bad Crypto: Lightweight Formal Methods For Making Use Of Drm, Obscurity, And Other Useless Techniques |
11 years, 5 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer security, SOURCE-boston-2012 |
1283 |
None |
27 |
|
Finding The Weak Link In Windows Binaries |
11 years, 5 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer security, SOURCE-boston-2012 |
1369 |
None |
28 |
|
Watchtowers Of The Internet: Analysis Of Outbound Malware Communication |
11 years, 5 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer security, SOURCE-boston-2012 |
1369 |
None |
29 |
|
Voight-Kampff'ing The Blackberry Playbook |
11 years, 5 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer security, SOURCE-boston-2012 |
1237 |
None |