ID | Interpret | Skladba | Album | |
181. | Stefan Esser | Vulnerability discovery in encrypted closed source PHP applications | Chaos Communication Congress 2008 (25c3) | |
182. | Stefan Esser | Vulnerability discovery in encrypted closed source PHP applications | Chaos Communication Congress 2008 (25c3) | |
183. | Stefan Esser | Vulnerability discovery in encrypted closed source PHP applications | Chaos Communication Congress 2008 (25c3) | |
184. | Stefan Esser | Vulnerability discovery in encrypted closed source PHP applications | Chaos Communication Congress 2008 (25c3) | |
185. | Stefan Esser | Vulnerability discovery in encrypted closed source PHP applications | Chaos Communication Congress 2008 (25c3) | |
186. | Stefan Esser | Vulnerability discovery in encrypted closed source PHP applications | Chaos Communication Congress 2008 (25c3) | |
187. | Stefan Esser | Vulnerability discovery in encrypted closed source PHP applications | Chaos Communication Congress 2008 (25c3) | |
188. | Stefan Esser | Vulnerability discovery in encrypted closed source PHP applications | Chaos Communication Congress 2008 (25c3) | |
189. | Stefan Esser | Vulnerability discovery in encrypted closed source PHP applications | Chaos Communication Congress 2008 (25c3) | |
190. | Stefan Esser | Vulnerability discovery in encrypted closed source PHP applications | Chaos Communication Congress 2008 (25c3) | |
191. | Stefan Esser | Vulnerability discovery in encrypted closed source PHP applications | Chaos Communication Congress 2008 (25c3) | |
192. | financialdna | Financial DNA White Paper: Accelerate Your Risk Profile Discovery | Financial DNA | |
193. | Computerworld, Ian Lamont, Lucas Mearian | Storage This Week: E-mail in an e-discovery age; Sharp's new High-Def HD recorders | | |
194. | Jason Perlow / ZDNet / CBS Interactive | Jason Perlow interviews John Cohn from Discovery Channel's The Colony | | |
195. | Jason Perlow / ZDNet / CBS Interactive | Jason Perlow interviews John Cohn from Discovery Channel's The Colony | | |
196. | Evan Cooke | The Dark Oracle: Perspective-Aware Unused and Unreachable Address Discovery | nsdi06-day1-3 | |
197. | Computerworld | Storage This Week: E-discovery, old e-mails, and lawsuits; Hybrid high-definition DVDs | | |
198. | David Matthews | Integrating Security Incident Response and e-Discovery - Part 4: Key Roles; Steps for Getting Started | CERT's Podcasts for Business Leaders | |
199. | David Brumley | Towards Automatic Discovery of Deviations in Binary Implementations with Applications to Error Detection and Fingerprint GenerationTRCK | 16th USENIX Security Symposium | |
200. | David Brumley | Towards Automatic Discovery of Deviations in Binary Implementations with Applications to Error Detection and Fingerprint GenerationTRCK | 16th USENIX Security Symposium | |