Search for "Dan" returned 11214 results
78 min
Künstliche Intelligenz
Von den Anfängen bis heute und ein Ausblick in die Zukunft
29 min
Podcast Hosting mit Podigee:
Wer sind die und was machen die da?
53 min
Subverting AJAX
Next generation vulnerabilities in 2.0 Web Applications
63 min
Counter-Development
The Accessibility of Technology as an Addendum to…
68 min
Data Retention Update
News and Perspectives on Implementation and Opposition
53 min
Fuzzing in the corporate world
The use of fuzzing in the corporate world over the years…
60 min
Faster PwninG Assured
Hardware Hacks and Cracks with FPGAs
46 min
Automated Exploit Detection in Binaries
Finding exploitable vulnerabilities in binaries
63 min
Transparency and Privacy
The 7 Laws of Identity and the Identity Metasystem
45 min
Homegrown Interactive Tables
Any Technology Sufficiently Advanced is Indistinguishable…
61 min
CSRF, the Intranet and You
Causes, Attacks and Countermeasures
54 min