- Presentations
- Documents
- Infographics
Automated vehicles and transport systems
Institute of Customer Experience
•
8 years ago
Build Features, Not Apps
Natasha Murashev
•
7 years ago
SIP and IPv6 - Can They Get Along?
Deploy360 Programme (Internet Society)
•
11 years ago
OWASP Proxy
Security B-Sides
•
14 years ago
Pentesting iPhone applications
Satish b
•
12 years ago
Proxy Caches and Web Application Security
Tim Bass
•
15 years ago
SSL Pinning and Bypasses: Android and iOS
Anant Shrivastava
•
8 years ago
Black Hat Dc 09 Marlinspike Defeating Ssl
SecurityTube.Net
•
15 years ago
Choosing A Proxy Server - Apachecon 2014
bryan_call
•
10 years ago
mitmproxy.org
Vishal Vyas
•
8 years ago
Hacking iOS with Proxies - dc612
Karl Fosaaen
•
10 years ago
TLS
Daniel Stenberg
•
7 years ago
Hacking iOS Applications with Proxies
Karl Fosaaen
•
10 years ago
SSL MITM Attack Over Wireless
SecurityTube.Net
•
16 years ago
Https interception proxies
geeksec80
•
10 years ago
Basics of ssl
n|u - The Open Security Community
•
11 years ago
Defeating The Network Security Infrastructure V1.0
Philippe Bogaerts
•
16 years ago
Man in the Middle? - No, thank you!
Daniel Schneller
•
10 years ago
data science @NYT ; inaugural Data Science Initiative Lecture
chris wiggins
•
8 years ago
Crash course of Mobile (SS7) privacy and security
Arturo Filastò
•
12 years ago