Search for "Ben H" returned 5911 results

How risky is the software you use?
58 min

How risky is the software you use?

CITL: Quantitative, Comparable Software Risk Reporting

Post Memory Corruption Memory Analysis
62 min

Post Memory Corruption Memory Analysis

Automating exploitation of invalid memory writes

Not your Grandfathers moon landing
59 min

Not your Grandfathers moon landing

Hell yeah, it's Rocket Science 3.1415926535897932384626!

The very early Computer Game History
53 min

The very early Computer Game History

How the games have become the first digital mass product

Decent Patterns
16 min

Decent Patterns

an Open UX Library for Decentralisation