- Apresentações
- Documentos
- Infográficos
OWASP AppSecCali 2015 - Marshalling Pickles
Christopher Frohoff
•
Há 9 anos
How to train the jdt dragon
Ayushman Jain
•
Há 12 anos
PayPal's Fraud Detection with Deep Learning in H2O World 2014
Sri Ambati
•
Há 9 anos
Java Platform Security Architecture
Ramesh Nagappan
•
Há 14 anos
Exploiting Deserialization Vulnerabilities in Java
CODE WHITE GmbH
•
Há 8 anos
Csw2016 freingruber bypassing_application_whitelisting
CanSecWest
•
Há 8 anos
DLL Hijacking on OS X
Synack
•
Há 9 anos
DEFCON 22: Bypass firewalls, application white lists, secure remote desktops in 20 seconds
Zoltan Balazs
•
Há 9 anos
Power on, Powershell
Roo7break
•
Há 11 anos
16 greg hope_com_wics
ashish61_scs
•
Há 9 anos
COM+ & MSMQ
G Srinivasan
•
Há 9 anos
Component Object Model (COM, DCOM, COM+)
Peter R. Egli
•
Há 11 anos
Controlling USB Flash Drive Controllers: Expose of Hidden Features
xabean
•
Há 10 anos
DerbyCon 2014 - Making BadUSB Work For You
Adam Caudill
•
Há 9 anos
Patching Windows Executables with the Backdoor Factory | DerbyCon 2013
midnite_runr
•
Há 10 anos
Microsoft Active Directory
thebigredhemi
•
Há 15 anos
Active Directory
Sandeep Kapadane
•
Há 13 anos
Active Directory Training
Nishad Sukumaran
•
Há 13 anos
NFC technical presentation
Akshat Rohatgi
•
Há 11 anos
Architecture and Development of NFC Applications
Thomas de Lazzari
•
Há 14 anos