Esta es la lista de vídeos de la SOURCE celebrada en Boston en abril del año pasado. Un poco tarde, pero han sido publicados recientemente. Algunas de las charlas tienen muy buena pinta: Secure Development Lifecycle In The Mobile World What The Post-PC Era Means For Enterprise Security When Prevention Fails, The Tough Get Responding Tokenization Bringing Sexy Back, Defensive Measures That Actu… On The Use Of Prediction Markets In Information … Building Security Integrity Across The Security … Grey Hat Ruby Cyber Crime War Connecting The Dots Among The Blind The Squinter Rules James Beeson Keynote Improving Application Security Vulnerability Res… Streamline Incident Types For Efficient Incident… Network Stream Hacking With Mallory Attacking Oracle Web Applications With Metasploit Adam Meyers - Reversing Obfuscation Reverse Engineering Flash Files With SWFREtools Higher Education’s Ability To Conduct Relevant R… The Real Cost Of Software Remediation Dino Dai Zovi Keynote Jack Of All Formats Nailing Down Security Regulation Security Convergence Fuel For Pwnage Secure Development For iOS Hugh Njemanze Keynote PTES Speed Debates Adding Another Level Of Hell To Reverse Engineer… You Got That SIEM, Now What Do You Do Fireshark v2 How To Isotope Tag A Ghost Building Bridges, Forcing Hackers And Business T… Tinker Tailor Soldier A-GPS Further Down The EXIF Hole Security Toolbox Getting Stuff Done Will We Ever Be Secure The 2011 Verizon Data Breach Investigation Report James Beeson - KeynoteFuente (aquí también puedes encontrar las presentaciones)
Leer más