85 min
Advanced internet searching strategies & "wizard seeking"…
46 min
Suppression of secure communications by governments
52 min
Security Concepts, Problems, and Exploits on Your Mac
45 min
Reconfigurable computing for the kernel
110 min
SPAM- und Zombie-Abwehr bei hohem Mail-Volumen am Beispiel…
58 min
The Good, the Bad and the Ugly
117 min
No stone unturned or: logs, what logs?
115 min
Implementation and detection of kernel based backdoors and…
64 min
Untersuchung eines Austauschsystems für hochsensible…
29 min
WLANs mit Wi-Fi Protected Access (WPA) betreiben
34 min
Introducing the 'lingua franca' of Instant Messaging
45 min
Reverse-engineering currency detection systems