- Présentations
- Documents
- Infographies
Kubered -Recipes for C2 Operations on Kubernetes
Jeffrey Holden
•
il y a 4 ans
Deploying Cloud Native Red Team Infrastructure with Kubernetes, Istio and Envoy
Jeffrey Holden
•
il y a 4 ans
Operating Systems - A Primer
Saumil Shah
•
il y a 13 ans
Dive into ROP - a quick introduction to Return Oriented Programming
Saumil Shah
•
il y a 10 ans
Social Engineering for Everyday (Startup) Life - Extended
Johanna Brewer
•
il y a 10 ans
CloudBots - Harvesting Crypto Currency Like a Botnet Farmer
Rob Ragan
•
il y a 9 ans
How to secure your web applications with NGINX
Wallarm
•
il y a 9 ans
Do You Have a Scanner or Do You Have a Scanning Program? (AppSecEU 2013)
Denim Group
•
il y a 10 ans
How is Your AppSec Program Doing Compared to Others
Denim Group
•
il y a 9 ans
NULL - OpenSAMM
M S Sripati
•
il y a 10 ans
2015 Trends by Havas Sports & Entertainment
Havas Sports & Entertainment
•
il y a 9 ans
Gartner: Top 10 Technology Trends 2015
Den Reymer
•
il y a 9 ans
Agile Secure Development
Bosnia Agile
•
il y a 9 ans
Penetration Testing Basics
Rick Wanner
•
il y a 13 ans
Fundamentals of Web for Non-Developers
Lemi Orhan Ergin
•
il y a 10 ans
OWASP Khartoum - Top 10 A6 - 8th meeting - Security Misconfiguration
OWASP Khartoum
•
il y a 11 ans
Physical Security for Data Centers OWASP July 16, 2015
Michael Marotta
•
il y a 8 ans
Protecting JavaScript source code using obfuscation - OWASP Europe Tour 2013 Lisbon
AuditMark
•
il y a 10 ans
2013 michael coates-javaone
Michael Coates
•
il y a 10 ans
Devbeat Conference - Developer First Security
Michael Coates
•
il y a 10 ans