ID | Interpret | Skladba | Album | |
1. | Stefan Esser | Vulnerability discovery in encrypted closed source PHP applications | Chaos Communication Congress 2008 (25c3) | |
2. | Stefan Esser | Vulnerability discovery in encrypted closed source PHP applications | Chaos Communication Congress 2008 (25c3) | |
3. | Stefan Esser | Vulnerability discovery in encrypted closed source PHP applications | Chaos Communication Congress 2008 (25c3) | |
4. | Stefan Esser | Vulnerability discovery in encrypted closed source PHP applications | Chaos Communication Congress 2008 (25c3) | |
5. | Stefan Esser | Vulnerability discovery in encrypted closed source PHP applications | Chaos Communication Congress 2008 (25c3) | |
6. | Stefan Esser | Vulnerability discovery in encrypted closed source PHP applications | Chaos Communication Congress 2008 (25c3) | |
7. | Stefan Esser | Vulnerability discovery in encrypted closed source PHP applications | Chaos Communication Congress 2008 (25c3) | |
8. | Stefan Esser | Vulnerability discovery in encrypted closed source PHP applications | Chaos Communication Congress 2008 (25c3) | |
9. | Stefan Esser | Vulnerability discovery in encrypted closed source PHP applications | Chaos Communication Congress 2008 (25c3) | |
10. | Stefan Esser | Vulnerability discovery in encrypted closed source PHP applications | Chaos Communication Congress 2008 (25c3) | |
11. | Stefan Esser | Vulnerability discovery in encrypted closed source PHP applications | Chaos Communication Congress 2008 (25c3) | |
12. | Stefan Esser | Vulnerability discovery in encrypted closed source PHP applications | Chaos Communication Congress 2008 (25c3) | |
13. | Southern California Linux Expo | Clint Oram - Open Source and Enterprise Applications | 2005 Southern California Linux Expo | |
14. | David Brumley | Towards Automatic Discovery of Deviations in Binary Implementations with Applications to Error Detection and Fingerprint GenerationTRCK | 16th USENIX Security Symposium | |
15. | David Brumley | Towards Automatic Discovery of Deviations in Binary Implementations with Applications to Error Detection and Fingerprint GenerationTRCK | 16th USENIX Security Symposium | |
16. | David Brumley | Towards Automatic Discovery of Deviations in Binary Implementations with Applications to Error Detection and Fingerprint GenerationTRCK | 16th USENIX Security Symposium | |
17. | IBM Rational software | Quality Management for Packaged Applications: Deploy your Enterprise Resource Planning (ERP) Applications with Confidence with Brian Bryson | IBM Rational software podcast series | |
18. | David Matthews | Integrating Security Incident Response and e-Discovery - Part 2: Being Prepared for an e-Discovery Request | CERT's Podcasts for Business Leaders | |
19. | David Matthews | Integrating Security Incident Response and e-Discovery - Part 3: A Common Process: Incident Management and e-Discovery; Key Roles | CERT's Podcasts for Business Leaders | |
20. | David Matthews | Integrating Security Incident Response and e-Discovery - Part 1: Information Security for City Governments; Defining e-Discovery | CERT's Podcasts for Business Leaders | |
21. | Ecoform | Encrypted | [frag007] Ghost in the Shell | |
22. | Ecoform | Encrypted | [frag007] Ghost in the Shell | |
23. | Alcorine | Cage encrypted | 2.5 mg | |
24. | Akwarejah | Encrypted Tongues | Old songs 2 | |
25. | Brandon Rudy | Encrypted Evening | Encounters With Beings | |
26. | Craig Frey | Security Brief - Encrypted Seagate Harddrive | Hill Associates Inc. | |
27. | Pewter Dachshund | Individual Layers, Encrypted Packets | | |
28. | Computerworld, Ian Lamont, Lucas Mearian | Storage This Week: Massive DOD SAN, Encrypted VA laptops | | |
29. | Henry Carmichael | Vulnerability | Chosen Thought Podcast | |
30. | Dan Kaminsky | Why were we so vulnerable to the DNS vulnerability? | Chaos Communication Congress 2008 (25c3) | |