[ICO]NameLast modifiedSizeDescription
[PARENTDIR]Parent Directory  -  
[   ]Advancements in Trusted Computing - Rober Rounsavall.pdf2011-12-22 02:36 7.0M 
[   ]Anatomy of a Database Attack - Josh Shaul & Alex Rothacker.pdf2011-12-22 02:35 3.9M 
[   ]And you will know us by the trail of our logs Malware research and analysis using logs - Zachary Wolff.pdf2011-12-22 02:35 717K 
[   ]Army of Darkness - Jayson E Street.pdf2011-12-22 02:35 3.1M 
[   ]Attacking and Defending the Smart Grid - Justin Searle.pdf2011-12-22 02:34 4.0M 
[   ]Automated Malware Analysis - A Real World Archite - Rodrigo Rubira Branco.pdf2011-12-22 02:34 1.1M 
[   ]Hunting For That Vunerable Web Application - Sean Arries.pdf2011-12-22 02:34 1.3M 
[   ]I Built What Why The Bad Guys Do It Better - Sean Bodmer.pdf2011-12-22 02:34 4.0M 
[   ]Live SEH Exploit Demonstration - Andrew Whitaker.pdf2011-12-22 02:33 1.0M 
[   ]Lord of the Bing Taking back search engine hacking from Google and Bing - Francis Brown.pdf2011-12-22 02:33 4.0M 
[   ]New Methodology for Breaking into Critical IBM AIX UNIX Operating Systems - Tim Shelton.pdf2011-12-22 02:33 393K 
[   ]Penetration Testing Methodology - Kevin Cardwell.pdf2011-12-22 02:32 1.8M 
[   ]Process and Memory Forensic Techniques - Kevin Cardwell.pdf2011-12-22 02:32 2.1M 
[   ]Reverse Engineering Mechanical Locks And Applied Theory - Babak Javadi & Shane Lawson.pdf2011-12-22 02:32 5.2M 
[   ]So You Think Secured Government Systems Are Really Secure - Wayne Burke.pdf2011-12-22 02:31 6.1M 
[   ]Spy Jackers- Countering Persist Threats - Sean Bodmer.pdf2011-12-22 02:30 3.9M 
[   ]SSD Solid State Drives & How They Work For Data Recovery and Forensics - Scott Moulton.pdf2011-12-22 02:31 4.7M 
[   ]Steganography Variations and Detection - Chuck Easttom.pdf2011-12-22 02:29 1.2M 
[   ]Stopping worms, malicious insiders, and other lower life forms in the virtual data center - Michael Berman.pdf2011-12-22 02:29 1.0M 
[   ]Transparent Botnet Command and Control for Smartphones over SMS - Georgia Weidman.pdf2011-12-22 02:29 437K 
[   ]Trojans The Forgotten Enemy - Dave Chronister.pdf2011-12-22 02:28 640K 
[   ]USB The Root of all Evil! - Tim Pierson.pdf2011-12-22 02:28 827K 
[   ]Weaponizing the Nokia N900, iPod and other Devices - Shawn Merdinger.pdf2011-12-22 02:28 1.5M 
[   ]Websheltz SQL Injection, and cross-site scripting is boring-Gimme a command prompt - Joe McCray.pdf2011-12-22 02:28 221K 
[   ]Where is my data Data flow through the hypervisor - Edward Haletky.pdf2011-12-22 02:33 39M 
[   ]You're as sick (or well) as a hacker wants you to be - Bobak Jack.pdf2011-12-22 02:28 3.3M 
[   ]ZeuS MitMo A Real Case of Banking Fraud Through Mobile Phones - Dani Creus.pdf2011-12-22 02:28 1.7M 
Indices 1.1