Name | Last modified | Size | Description | |
---|---|---|---|---|
Parent Directory | - | |||
TROOPERS10_0wning_Botnet_Tillmann_Werner.pdf | 2011-12-21 15:44 | 2.3M | ||
TROOPERS10_Attacking_Cisco_Enterprise_WLANs_Roeschke_Mende.pdf | 2011-12-21 15:44 | 2.3M | ||
TROOPERS10_Bugs_and_Kisses_Sheran_Gunasekera.pdf | 2011-12-21 15:43 | 2.0M | ||
TROOPERS10_Clobbering_the_Cloud_Marco_Slaviero.pdf | 2011-12-21 15:45 | 19M | ||
TROOPERS10_Federated_Identity_Dominick_Baier.pdf | 2011-12-21 15:43 | 3.3M | ||
TROOPERS10_History_of_the_TLS_Auth_Gap_Bug_Dispensa_Ray.pdf | 2011-12-21 15:43 | 1.5M | ||
TROOPERS10_How_To_Fail_An_Audit_Martin_Freiss.pdf | 2011-12-21 15:43 | 2.8M | ||
TROOPERS10_How_to_rate_the_security_of_closed_source_software_Michael_Thumann.pdf | 2011-12-21 15:42 | 716K | ||
TROOPERS10_Letting_your_fuzzer_know_about_targets_internals_Rodrigo_Branco.pdf | 2011-12-21 15:42 | 314K | ||
TROOPERS10_Netscreen_of_the_Dead_Graeme_Neilson.pdf | 2011-12-21 15:42 | 2.4M | ||
TROOPERS10_Rapid_Risk_Assessment_Enno_Rey.pdf | 2011-12-21 15:42 | 3.3M | ||
TROOPERS10_Return-Oriented_Rootkits_Ralf_Hund.pdf | 2011-12-21 15:42 | 1.1M |