DEFCON 20: Bruce Schneier Answers Your Questions
Speaker: BRUCE SCHNEIER
Bruce Schneier will answer questions topics ranging from the SHA-3 competition to the TSA to trust and society to squid.
Internationally renowned security technologist Bruce Schneier has authored twelve books -- most recently Liars and Outliers -- and hundreds of articles, essays, and academic papers. His influential newsletter "Crypto-Gram," and his blog "Schneier on Security," are read by over 250,000 people. Schneier is the Chief Security Technology Officer of BT.
http://www.schneier.com
For more information visit: http://bit.ly/defcon20_information
To download the video visit: http://bit.ly/defcon20_videos
Playlist DEFCON 20: http://bit.ly/defcon20_playlist
Видео DEFCON 20: Bruce Schneier Answers Your Questions канала Christiaan008
Bruce Schneier will answer questions topics ranging from the SHA-3 competition to the TSA to trust and society to squid.
Internationally renowned security technologist Bruce Schneier has authored twelve books -- most recently Liars and Outliers -- and hundreds of articles, essays, and academic papers. His influential newsletter "Crypto-Gram," and his blog "Schneier on Security," are read by over 250,000 people. Schneier is the Chief Security Technology Officer of BT.
http://www.schneier.com
For more information visit: http://bit.ly/defcon20_information
To download the video visit: http://bit.ly/defcon20_videos
Playlist DEFCON 20: http://bit.ly/defcon20_playlist
Видео DEFCON 20: Bruce Schneier Answers Your Questions канала Christiaan008
Показать
Комментарии отсутствуют
Информация о видео
Другие видео канала
OWASP AppSecUSA 2012: Building a Web Attacker Dashboard with ModSecurity and BeEFDEFCON 17: "Smart" Parking Meter Implementations, Globalism, and YouDEFCON 15: Multipot: A More Potent Variant of Evil TwinDEFCON 20: Programming Weird Machines with ELF MetadataBlack Hat USA 2010: Network Stream Debugging with Mallory 4/5DEFCON 19: Network Application Firewalls: Exploits and Defense ( w speaker)DEFCON 18: Social Networking Special Ops: Extending Data Visualization Tools for Faster Pwnage 2/4Remote buffer overflow tutorial (credits D0uBle ZerO Zer0)CIC Collaboration ProjectDEFCON 20:Network Anti-Reconnaissance: Messing with Nmap Through Smoke and Mirrors26C3: Blackbox JTAG Reverse Engineering 1/624C3: What can we do to counter the spies?Black Hat USA 2010: Drivesploit: Circumventing Automated Detection of Browser Exploits 1/427c3: International Cyber Jurisdiction (en)CIC News 12-01-2014: Cyber Security Perspectives 2013 report | Dropbox hit by DDoS hoax24C3: Toying with barcodesDEFCON 19: From Printer To Pwnd: Leveraging Multifunction Printers During Penetration TestingDEFCON 18: Using the 36 Stratagems for Social Engineering 1/4DEFCON 19: Stealing Sensitive Data from Thousands of Systems Simultaneously with OpenDLP (w speaker)DEFCON 18: FOCA2: The FOCA Strikes Back 2/330C3: Making machines that make (EN)