Search for "25" returned 4577 results
60 min
Hardware-Trojaner in Security-Chips
Eine Reise auf die dunkle Seite
33 min
Turing Complete User
What can be done to protect the term, the notion and the…
62 min
A New Kid on the Block
Conditions for a Successful Market Entry of Decentralized…
34 min
Ling - High level system programming
modular and precise resource management
64 min
Technical aspects of the surveillance in and around the Ecuadorian embassy in London
Details about the man hunt for Julian Assange and Wikileaks
60 min
Vor Windows 8 wird gewarnt
Und nichts (Secure) Bootet mehr?
32 min
The Moon and European Space Exploration
Refocusing on the moon as a platform for future deep space…
39 min
Venenerkennung hacken
Vom Fall der letzten Bastion biometrischer Systeme
36 min
Modchips of the State
Hardware implants in the supply-chain
60 min
Beyond your cable modem
How not to do DOCSIS networks
62 min
Space Ops 101
An introduction to Spacecraft Operations
35 min
Understanding millions of gates
Introduction to IC reverse engineering for…
54 min