Privacy and E-Commerce

il y a 13 ans 11329 Vues

Eight simple rules to writing secure PHP programs

il y a 13 ans 4938 Vues

Business Case Studies

il y a 13 ans 4324 Vues

Malware goes to the movies

il y a 13 ans 4193 Vues

OWASP Much ado about randomness

il y a 13 ans 3709 Vues

Much ado about randomness. What is really a random number?

il y a 13 ans 3063 Vues

Social Engineering and What to do About it

il y a 13 ans 2966 Vues

Malware Goes to the Movies - Briefing

il y a 12 ans 2235 Vues

Number theory lecture (part 1)

il y a 13 ans 2044 Vues

Recruiting Great Engineers in Six Easy Steps

il y a 11 ans 3892 Vues

New York REDIS Meetup Welcome Session

il y a 11 ans 1978 Vues

Number theory lecture (part 2)

il y a 13 ans 1939 Vues

Social media security challenges

il y a 13 ans 1221 Vues

"Managing software development" by Peter Bell

il y a 11 ans 1889 Vues

Secure information aggregation in sensor networks

il y a 13 ans 1038 Vues

Spreading Rumors Quietly and the Subgroup Escape Problem

il y a 13 ans 1030 Vues

A verifiable random function with short proofs and keys

il y a 13 ans 784 Vues

Price of anarchy is independent of network topology

il y a 13 ans 730 Vues

Threshold and Proactive Pseudo-Random Permutations

il y a 13 ans 535 Vues