Search for "JO" returned 9208 results

23 min
Using BPF in Kubernetes
Linux superpowers in the cloud

23 min
Securing Home Automation with Tor
Be Safe. Be Secure

48 min
SWF and the Malware Tragedy
Hide and Seek in A. Flash

51 min
Lightning Talks Day2
4 minutes of fame

45 min
Privacy in the social semantic web
Social networks based on XMPP

51 min
Algorithmic Music in a Box
Doing music with microcontrollers

55 min
Das Grundrecht auf digitale Intimsphäre
Festplattenbeschlagnahme in neuem Licht

38 min
Squeezing Attack Traces
How to get useable information out of your honeypot

52 min
Datenpannen
Forderungen nach dem Jahr der Datenverbrechen

58 min
Collapsing the European security architecture
More security-critical behaviour in Europe!

94 min
Security Nightmares 2009
Oder: worüber wir nächstes Jahr lachen werden

65 min
eVoting after Nedap and Digital Pen
Why cryptography might not fix the issue of transparent…

63 min
Exploiting Symbian
Symbian Exploit and Shellcode Development

60 min
Flying for free
Exploiting the weather with unpowered aircraft

82 min
Attacking NFC mobile phones
First look at the security of NFC mobile phones

67 min
Life is a Holodeck!
An overview of holographic techniques

60 min
Der elektronische Personalausweis
Endlich wird jeder zum "Trusted Citizen"

70 min