×
+ All Categories
Log in
English
Français
Español
Deutsch
The top documents of security-b-sides
Organizingninjas
699 views
Community-oriented Computer Security Incident Response Teams (C-CSIRTS)
1.168 views
Social Penetration - Mike Murray and Mike Bailey
1.524 views
Memory Corruption, Exploitation, and You - Dino Dai Zovi
2.152 views
My Life on the Infosec D-List - Andrew Hay
1.420 views
Risk Management - Time to blow it up and start over? - Alex Hutton
2.475 views
Security? Who cares! - Brett Hardin
1.698 views
Enterprise Portals - Gateway to the Gold
663 views
Getting punched in the face
674 views
OWASP Proxy
2.816 views
Efficient extraction of data using binary search and ordering information
649 views
TCP Sorcery
1.349 views
Lord of the bing b-sides atl
11.972 views
2010 07 BSidesLV Mobilizing The PCI Resistance 1c
787 views
How really to prepare for a credit card compromise (PCI) forensics investigation: A ex-QIRA speaks out - David Barnett
4.527 views
Your computer is worth 30 cents - Gunter Ollmann
1.161 views
Advanced Persistent Threats (Shining the Light on the Industries' Best Kept Secret) - Will Gragido and John Pirc
1.891 views
Computing Risk without Numbers: A Semantic Approach to Risk Metrics - Tim Keanini
1.002 views
2009 Zacon Haroon Meer
370 views
Make Tea Not War
607 views
Next >