Name
Last modified
Size
Description
Parent Directory
-
Advancements in Trusted Computing - Rober Rounsavall.pdf
2011-12-21 15:36
7.0M
Anatomy of a Database Attack - Josh Shaul & Alex Rothacker.pdf
2011-12-21 15:35
3.9M
And you will know us by the trail of our logs Malware research and analysis using logs - Zachary Wolff.pdf
2011-12-21 15:35
717K
Army of Darkness - Jayson E Street.pdf
2011-12-21 15:35
3.1M
Attacking and Defending the Smart Grid - Justin Searle.pdf
2011-12-21 15:34
4.0M
Automated Malware Analysis - A Real World Archite - Rodrigo Rubira Branco.pdf
2011-12-21 15:34
1.1M
Hunting For That Vunerable Web Application - Sean Arries.pdf
2011-12-21 15:34
1.3M
I Built What Why The Bad Guys Do It Better - Sean Bodmer.pdf
2011-12-21 15:34
4.0M
Live SEH Exploit Demonstration - Andrew Whitaker.pdf
2011-12-21 15:33
1.0M
Lord of the Bing Taking back search engine hacking from Google and Bing - Francis Brown.pdf
2011-12-21 15:33
4.0M
New Methodology for Breaking into Critical IBM AIX UNIX Operating Systems - Tim Shelton.pdf
2011-12-21 15:33
393K
Penetration Testing Methodology - Kevin Cardwell.pdf
2011-12-21 15:32
1.8M
Process and Memory Forensic Techniques - Kevin Cardwell.pdf
2011-12-21 15:32
2.1M
Reverse Engineering Mechanical Locks And Applied Theory - Babak Javadi & Shane Lawson.pdf
2011-12-21 15:32
5.2M
So You Think Secured Government Systems Are Really Secure - Wayne Burke.pdf
2011-12-21 15:31
6.1M
Spy Jackers- Countering Persist Threats - Sean Bodmer.pdf
2011-12-21 15:30
3.9M
SSD Solid State Drives & How They Work For Data Recovery and Forensics - Scott Moulton.pdf
2011-12-21 15:31
4.7M
Steganography Variations and Detection - Chuck Easttom.pdf
2011-12-21 15:29
1.2M
Stopping worms, malicious insiders, and other lower life forms in the virtual data center - Michael Berman.pdf
2011-12-21 15:29
1.0M
Transparent Botnet Command and Control for Smartphones over SMS - Georgia Weidman.pdf
2011-12-21 15:29
437K
Trojans The Forgotten Enemy - Dave Chronister.pdf
2011-12-21 15:28
640K
USB The Root of all Evil! - Tim Pierson.pdf
2011-12-21 15:28
827K
Weaponizing the Nokia N900, iPod and other Devices - Shawn Merdinger.pdf
2011-12-21 15:28
1.5M
Websheltz SQL Injection, and cross-site scripting is boring-Gimme a command prompt - Joe McCray.pdf
2011-12-21 15:28
221K
Where is my data Data flow through the hypervisor - Edward Haletky.pdf
2011-12-21 15:33
39M
You're as sick (or well) as a hacker wants you to be - Bobak Jack.pdf
2011-12-21 15:28
3.3M
ZeuS MitMo A Real Case of Banking Fraud Through Mobile Phones - Dani Creus.pdf
2011-12-21 15:28
1.7M
Indices
1.1