ID | Interpret | Skladba | Album | |
1. | Art Manion | Managing Security Vulnerabilities Based on What Matters Most - Part 3: Determining which Vulnerabilities to Pay Attention To | CERT's Podcasts for Business Leaders | |
2. | Art Manion | Managing Security Vulnerabilities Based on What Matters Most | CERT's Podcasts for Business Leaders | |
3. | Art Manion | Managing Security Vulnerabilities Based on What Matters Most - Part 1: The Challenges in Defining a Security Vulnerability | CERT's Podcasts for Business Leaders | |
4. | Art Manion | Managing Security Vulnerabilities Based on What Matters Most - Part 2: The Shifting Vulnerability Landscape | CERT's Podcasts for Business Leaders | |
5. | Felix Domke, Michael Steil | Why Silicon-Based Security is still that hard: Deconstructing Xbox 360 Security | Chaos Communication Congress 2007 (24c3) | |
6. | Felix Domke, Michael Steil | Why Silicon-Based Security is still that hard: Deconstructing Xbox 360 Security | Chaos Communication Congress 2007 (24c3) | |
7. | Felix Domke, Michael Steil | Why Silicon-Based Security is still that hard: Deconstructing Xbox 360 Security | Chaos Communication Congress 2007 (24c3) | |
8. | Felix Domke, Michael Steil | Why Silicon-Based Security is still that hard: Deconstructing Xbox 360 Security | Chaos Communication Congress 2007 (24c3) | |
9. | Alex Aiken | Static Detection of Security Vulnerabilities in Scripting Languages | USENIX Security Symposium 2006 | |
10. | Alex Aiken | Static Detection of Security Vulnerabilities in Scripting Languages - Q&A | USENIX Security Symposium 2006 | |
11. | Dan York & Jonathan Zar | Blue Box Podcast #12: VoIPShield Systems interview, WiFi handset vulnerabilities, VoIP security news and more... | Blue Box: The VoIP Security Podcast | |
12. | Daniel Estrada | Managing Your Company's Intellectual Property: An Introduction to IT Security | HOPE Number Six, 21-23 July 2006 | |
13. | Daniel Estrada | Managing Your Company's Intellectual Property: An Introduction to IT Security | HOPE Number Six, 21-23 July 2006 | |
14. | Daniel Estrada | Managing Your Company's Intellectual Property: An Introduction to IT Security | HOPE Number Six, 21-23 July 2006 | |
15. | Daniel Estrada | Managing Your Company's Intellectual Property: An Introduction to IT Security | HOPE Number Six, 21-23 July 2006 | |
16. | Daniel Estrada | Managing Your Company's Intellectual Property: An Introduction to IT Security | HOPE Number Six, 21-23 July 2006 | |
17. | Darren Lacey, Chief Information Security Officer, Johns Hopkins University/Johns Hopkins Medicine | Managing Insecurity: Practitioner Reflections on Social Costs of Security | 17th USENIX Security Symposium Invited Talks | |
18. | Dan Cvrcek | Security of MICA*-based wireless sensor networks | Chaos Communication Congress 2008 (25c3) | |
19. | Dan Cvrcek | Security of MICA*-based wireless sensor networks | Chaos Communication Congress 2008 (25c3) | |
20. | Dan Cvrcek | Security of MICA*-based wireless sensor networks | Chaos Communication Congress 2008 (25c3) | |
21. | Dan Cvrcek | Security of MICA*-based wireless sensor networks | Chaos Communication Congress 2008 (25c3) | |
22. | Dan Cvrcek | Security of MICA*-based wireless sensor networks | Chaos Communication Congress 2008 (25c3) | |
23. | Dan Cvrcek | Security of MICA*-based wireless sensor networks | Chaos Communication Congress 2008 (25c3) | |
24. | Dan Cvrcek | Security of MICA*-based wireless sensor networks | Chaos Communication Congress 2008 (25c3) | |
25. | Dan Cvrcek | Security of MICA*-based wireless sensor networks | Chaos Communication Congress 2008 (25c3) | |
26. | Dan Cvrcek | Security of MICA*-based wireless sensor networks | Chaos Communication Congress 2008 (25c3) | |
27. | Dan Cvrcek | Security of MICA*-based wireless sensor networks | Chaos Communication Congress 2008 (25c3) | |
28. | Gary McGraw, Brian Chess, Sammy Migues | An Experience-Based Maturity Model for Software Security | CERT's Podcasts for Business Leaders | |
29. | Dan Cvrcek | Security of MICA*-based wireless sensor networks | Chaos Communication Congress 2008 (25c3) | |
30. | Dan Cvrcek | Security of MICA*-based wireless sensor networks | Chaos Communication Congress 2008 (25c3) | |