Events Add an event Speakers Talks Collections
 

Talks

Sort by
Newest
Trending
1-30 of 1061
Filter

The UDS Security Model of the Tesla CAN Bus and Battery Management System

05/20/2021
Views 48
0
bluetooth, debugging, linux, nvidia, assembly language, can bus, electric battery, electrical resistance and conductance, jtag, resistor, system on a chip, tegra, temperature, tesla model s, upload, voltage, contactor, shunt (electrical), security model
Available
In cart
Free
Free
Free
Free
Free
Free
Free
Free

Who Stole My 100,000 Dollars’ Worth Bitcoin Wallets - Story of HoneyTokens

05/20/2021
Views 51
0
backup, bitcoin, computer security, cryptocurrency, mind, operating system, pdf, research, belief, computer file, credit card, cyberwarfare, desktop metaphor, directory (computing), domain name system, firefox, gps tracking unit, http 404, honeypot (computing), hypertext transfer protocol, icon (computing), thought, user agent, web server, world wide web
Available
In cart
Free
Free
Free
Free
Free
Free
Free
Free

Malware Reverse Engineering with PE Tree—OSS Inspired by COVID

05/20/2021
Views 68
0
data, 32-bit computing, booting, byte, entropy, entry point, itch, lighting, portable executable, signature, sky, covid, 16-bit computing, malware reverse engineering
Available
In cart
Free
Free
Free
Free
Free
Free
Free
Free

Me, My Adversary & AI: Investigating & Hunting with Machine Learning

05/20/2021
Views 73
0
anomaly detection, big data, computer, emerging technologies, intelligence, machine learning, memory, metadata, news, prediction, science, system, technology, computer file, directory (computing), file system, forensic science, password, police, scheduling (computing), tablet computer, thread (computing), wisdom, artifact (archaeology)
Available
In cart
Free
Free
Free
Free
Free
Free
Free
Free

Modern Identity Hacking: Have Hackers Really Adjusted to Constant Remote?

05/20/2021
Views 69
0
authentication, biometrics, cloud computing, data breach, data security, encryption, internet, powershell, authorization, computer file, computer network, dmz (computing), laptop, multi-factor authentication, outlook.com, password, physical security, server (computing), telecommuting, url redirection, web browser, world wide web, help desk, iris recognition, modern identity hacking
Available
In cart
Free
Free
Free
Free
Free
Free
Free
Free

Cybersecurity Operations Center Technology Taxonomy

05/20/2021
Views 70
0
archive, authentication, cloud computing, computer security, internet, malware, open-source software, simulation, stock, wi-fi, active directory, computer data storage, computer file, computer network, cyberwarfare, directory service, file system, information system, lightweight directory access protocol, safe, spreadsheet, tokenization (data security), voice over ip, vulnerability (computing), bank vault
Available
In cart
Free
Free
Free
Free
Free
Free
Free
Free

What’s Old is New: Hybrid Security for Microsoft Azure and On-Premises Tech

05/20/2021
Views 182
0
email, icloud, identity management, ios, ransomware, security token, sharepoint, twitter, active directory, android (operating system), brute-force attack, computer file, computer network, firewall (computing), group policy, kerberos (protocol), mobile device management, multi-factor authentication, password, server message block, superuser, user (computing), web portal, domain controller (windows), federated identity, hybrid security
Available
In cart
Free
Free
Free
Free
Free
Free
Free
Free

Hunt and Gather: Developing Effective Threat Hunting Techniques

05/20/2021
Views 125
0
computer security, email, internet, malware, operating system, powershell, risk, risk management, splunk, surveillance, threat intelligence, command-line interface, computer file, computer network, cyberwarfare, hunting, incident management, parsing, path (computing), proxy server, remote desktop services, shared resource, use case, world wide web, 7-zip
Available
In cart
Free
Free
Free
Free
Free
Free
Free
Free

Discord, Generation Z’s Hacking University

05/20/2021
Views 157
0
amazon web services, botnet, cryptocurrency, generation z, malware, programmer, ransomware, software , antivirus software, bounty (reward), bug bounty program, computer file, computer virus, cybercrime, cyberwarfare, image scanner, knife, man-in-the-middle attack, password, telegram (software), vulnerability (computing), world wide web, hacktivism, anonymous (hacker group), locky
Available
In cart
Free
Free
Free
Free
Free
Free
Free
Free

Ransomware: Creation, Detection, and Response

05/19/2021
Views 152
0
backup, malware, ransomware, windows 10, antivirus software, backdoor (computing), batch file, computer file, cyberwarfare, file system, hyper-v, internet control message protocol, internet protocol, microsoft notepad, microsoft windows, network packet, password, remote desktop protocol, remote desktop services, sense, server message block, trash (computing), upload, event viewer, shadow copy
Available
In cart
Free
Free
Free
Free
Free
Free
Free
Free

Android Rootkits: Analysis from Userland and Kernelland

05/19/2021
Views 159
0
compiler, mathematics, mobile app, mobile security, open-source software, reverse engineering, software , twitter, network socket, plug-in (computing), random-access memory, rootkit, system call, android rootkits, awesome android
Available
In cart
Free
Free
Free
Free
Free
Free
Free
Free

Analyzing Windows Malware on Linux: Getting Started Tips and Examples

05/17/2021
Views 1.13 K
0
debugging, linux, malware, vmware, brute-force attack, command-line interface, computer file, cryptographic hash function, digital signature, disassembler, domain name system, file format, hard coding, microsoft windows, string (computer science), user agent, malware on linux, virtual appliance
Available
In cart
Free
Free
Free
Free
Free
Free
Free
Free

Continuous Security by Design

09/16/2020
Views 162
0
devops, github, hypervisor, kubernetes , microservices, podcast, source code, docker (software), free and open-source software, load balancing (computing), pipeline (computing), runtime system, serverless computing, static program analysis, virtual machine
Available
In cart
Free
Free
Free
Free
Free
Free
Free
Free

Privilege Escalation and Whitelisting Bypass with Proxy DLLs

09/15/2020
Views 195
0
cybersecurity, email, information, infosec, malware, memory, microsoft, phishing, risk, rsa, rsac, rsaconference, security, antivirus software, application software, command-line interface, computer file, directory (computing), dynamic-link library, executable, file system, graphical user interface, lol, loader (computing), metasploit project, microsoft visual studio, microsoft windows, proxy server, whitelisting, windows installer, keyboard technology, mg 42
Available
In cart
Free
Free
Free
Free
Free
Free
Free
Free

Explore Adventures in the Underland: Forensic Techniques against Hackers

09/15/2020
Views 226
0
memory, mining, reverse engineering, backslash, digital signature, evidence, forensic science, server message block, truth
Available
In cart
Free
Free
Free
Free
Free
Free
Free
Free

Security Basics: Burn It All and Start Over

09/15/2020
Views 223
0
authentication, computer security, cybersecurity, information, information security, infosec, internet, red team, rsa, rsac, rsaconference, security, sms, threat intelligence, windows 10, antivirus software, apple inc., authenticator, blacklist (computing), computer file, directory (computing), login, microsoft windows, multi-factor authentication, password, password strength, proxy server, user (computing), vulnerability (computing), whitelisting, world wide web, keyboard technology
Available
In cart
Free
Free
Free
Free
Free
Free
Free
Free

Authentication and Beyond Using FIDO and Push Notifications

09/15/2020
Views 416
0
authentication, cryptography , cybersecurity, ebay, education, email, information, infosec, mind, privacy, risk, rsa, rsac, rsaconference, security, technology, usability, application software, computer file, file server, microsoft windows, multi-factor authentication, online chat, password, passwordless authentication, push technology, server (computing), symbol, technical support, the shining (film), theory, authentication protocol
Available
In cart
Free
Free
Free
Free
Free
Free
Free
Free

What's New and Cooking in KNIME Analytics Platform

04/01/2020
Views 828
0
algorithm, apache spark, backup, big data, databricks, exception handling, boolean data type, computer data storage, computer file, disk storage, logistic regression, primitive data type, regression analysis, shortcut (computing), statistical classification, training, validation, and test sets, scheme (programming language), active learning (machine learning)
Available
In cart
Free
Free
Free
Free
Free
Free
Free
Free

Create and Productionize Data Science Solutions

04/01/2020
Views 480
0
authentication, java (programming language), open-source software, software , version control, computer file, lightweight directory access protocol, microsoft excel, microsoft sql server, oracle corporation, scripting language, text mining, web portal
Available
In cart
Free
Free
Free
Free
Free
Free
Free
Free

Incorta: The Fastest Path from Data to Insight (BACon 2020 Training)

10/15/2020
Views 214
0
analytics, database, jd edwards, point of sale, postgresql, retail, computer file, database schema, fact table, file system, ibm db2 family, jdbc driver, java database connectivity, microsoft sql server, oracle corporation, peoplesoft, pivot table, replication (computing), star schema, table (information), incorta
Available
In cart
Free
Free
Free
Free
Free
Free
Free
Free

"The Definitive Deep Dive into the .git Folder" by: Rob Richardson

03/26/2021
Views 68
0
email, git, github, twitter, attention, bash (unix shell), bitbucket, command-line interface, computer file, configuration file, diff, file system, filename, microsoft powerpoint, newline, npm (software), patch (computing), shell script, software repository, url, user (computing), working directory, world wide web, cfa franc, six feet up, sixfeetup
Available
In cart
Free
Free
Free
Free
Free
Free
Free
Free

"Complete Python Toolbox For Modern Developers" by: Jan Giacomelli

03/26/2021
Views 211
0
api, css , database, html, twitter, unit testing, average, class (computer programming), code coverage, computer file, directory (computing), library (computing), modular programming, parameter (computer programming), python (programming language), snippet (programming), software bug, software framework, string (computer science), subroutine, type signature, type system, world wide web, xml schema, docstring, six feet up, sixfeetup
Available
In cart
Free
Free
Free
Free
Free
Free
Free
Free

"LocalStack: Developing for AWS without AWS" by: Aly Sivji

03/26/2021
Views 166
0
communication, continuous integration, surveillance, amazon dynamodb, computer file, environment variable, path (computing), social networking service, throughput, vendor lock-in, make (software)
Available
In cart
Free
Free
Free
Free
Free
Free
Free
Free

"Maps with Django" by: Paolo Melchiorre

03/25/2021
Views 112
0
api, css , database, geographic information system, javascript, operating system, postgresql, sql, sqlite, booting, command-line interface, computer file, django (web framework), file format, library (computing), package manager, raster graphics, representational state transfer, scope (computer science), vector graphics, web template system, wikipedia, world wide web, six feet up, sixfeetup, address geocoding, gis file formats
Available
In cart
Free
Free
Free
Free
Free
Free
Free
Free

"Static Sites With Sphinx and Markdown" by: Paul Everitt

03/24/2021
Views 185
0
database, html, javascript, mind, numpy, open-source software, pdf, reason, autocomplete, blog, command-line interface, computer file, filename, markdown, modular programming, parsing, python (programming language), revelation, software bug, string (computer science), symbol, url, syntax highlighting, make (software), six feet up, sixfeetup, lucky duckies
Available
In cart
Free
Free
Free
Free
Free
Free
Free
Free

"Automating AWS with Python: The Easy Way To The Cloud" by David Sol

03/22/2021
Views 254
0
amazon web services, api, cloud computing, computing, cryptography , data center, infrastructure as code, memory, metadata, operating system, programming language, snapchat, amazon dynamodb, application software, bit, branch (computer science), command-line interface, computer file, digital signature, password, photograph, server (computing), user (computing), waiting staff, six feet up, sixfeetup
Available
In cart
Free
Free
Free
Free
Free
Free
Free
Free

What’s new in Android privacy | Session

05/20/2021
Views 9.29 K
0
android developers, android development, bluetooth, computing, federated learning, google, google i/o, google io, google play, open source, open-source software, operating system, privacy, smartphone, website, android (operating system), android marshmallow, clipboard (computing), command-line interface, computer file, computer network, gboard, information privacy, information sensitivity, lock screen, mobile operating system, motorola droid, scope (computer science), transparency (behavior), #googleio, google announcement, google conference, google developer conference, pr_pr: google i/o, purpose: inform, type: conference talk (full production), android dev, android privacy, android privacy best practices, android privacy policy 2021, android safety features, how to add privacy policy to android app, privacy and safety best practices for developers
Available
In cart
Free
Free
Free
Free
Free
Free
Free
Free

The state of Android security | Session

05/19/2021
Views 6.62 K
0
android developers, android development, authentication, biometrics, computer security, encryption, google, google i/o, google io, google play, internet of things, interoperability, linux, machine learning, mobile app, operating system, privacy, security token, smartphone, android (operating system), apple inc., computer file, device driver, library (computing), microsoft windows, regulatory compliance, smart speaker, webcam, multistakeholder governance, #googleio, google announcement, google conference, google developer conference, pr_pr: google i/o, type: conference talk (full production), android dev, purpose: educate, android 12, android 12 security, android security, android security features, does android have built in security, how to improve security on android, security updates android 12
Available
In cart
Free
Free
Free
Free
Free
Free
Free
Free

Local development using the new Storage Emulator | Session

05/19/2021
Views 4.18 K
0
firebase developers, unit testing, baking, computer data storage, evaluation, strategy guide, firebase emulator suite, firebase emulator ui, firebase storage emulator, storage emulator android, updates to firebase 2021, amd crossfire
Available
In cart
Free
Free
Free
Free
Free
Free
Free
Free

5 tips for your PWA | Session

05/18/2021
Views 17.23 K
0
analytics, chrome, css , developers, google, google chrome, google i/o, google io, html, javascript, progressive web apps, twitter, web, web application, android (operating system), application software, button (computing), computer file, cut, copy, and paste, directory (computing), event (computing), http cookie, hypertext transfer protocol, icon (computing), microsoft windows, online and offline, progressive web application, server (computing), shortcut (computing), tab (interface), web browser, world wide web, #googleio, google announcement, google conference, google developer conference, pr_pr: google i/o, type: conference talk (full production), purpose: educate, chrome developer, chrome development, progressive web apps updates, pwa improvements, pwa tips, web app creation
Available
In cart
Free
Free
Free
Free
Free
Free
Free
Free
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 ... 36