Search for person "Johan Van de Wauw"
prev
58 min
An overview of a mobile telephony market and how a…
55 min
The key elements of policy hacking
45 min
Der Hindernislauf um die Bezahlung von Onlinejournalisten
38 min
oder wie man in einen Walfisch klettert, ohne ihn dabei zu…
51 min
A look at the security of 3rd party iOS applications
73 min
expanding the attack surface and then some
44 min
If technology is the solution, politicians are the problem
53 min
An analysis of targeted attacks from 2005 to 2007
61 min
Creating a rogue CA Certificate
35 min
Shaping a digital future with ancient wisdom
49 min
How bureaucrats fail to fight terror
prev