Cisco IOS Attack & Defense - The State of the Art Workshop on Wireless Security
Insecure Implementation of Security Best Practices: of hashing, CAPTCHA's and Caching
Workshop on BackTrack live CD
Reverse Engineering for exploit writers
State of Cyber Law in India
AntiSpam - Understanding the good, the bad and the ugly
Reverse Engineering v/s Secure Coding
Network Vulnerability Assessments: Lessons Learned Economic offenses through Credit Card Frauds Dissected Immune IT: Moving from Security to Immunity Reverse Engineering for exploit writers Hacking Client Side Insecurities Web Exploit Finder Presentation Network Security Data Visualization