Mark collier-wed-keynotev2
How We're Failing to Secure the "Internet of Things"
Data security
Networks
© 2001 by Prentice Hall1-1 Local Area Networks, 3rd Edition David A. Stamper Part 1: Introduction to Data Communications and Local Area Networks Chapter.
PacSec2007: TOMOYO Linux: A Practical Method to Understand and Protect Your Own Linux Box
Conditional entrench spatial domain steganography
Seminar no.1 Information security for 4th course MIPT
Blackhat Europe 2009 - Detecting Certified Pre Owned Software
AN ADAPTIVE PSEUDORANDOM STEGO-CRYPTO TECHNIQUE FOR DATA COMMUNICATION
Tim Estes - Generating dynamic social networks from large scale unstructured data
How to build an AOP framework in ActionScript