Prelegent Tytuł PDF MP3 AVI
Bruce Schneier Keynote - Reconceptualizing Security n/a MP3 n/a
Joanna Rutkowska Keynote - Thoughts about Trusted Computing n/a MP3 AVI
Eddie Schwartz Understanding Social Networking Threats Using Live Threat Intelligence n/a n/a AVI
Adrian Pastor A Pentester’s Guide to Credit Card Theft Techniques PDF n/a n/a
Shreeraj Shah Application Injections - Exploiting SQL, XSS & XPATH PDF n/a n/a
Łukasz Bromirski Security by Duct Type. Because Failure is Always an Option n/a n/a AVI
Alexander Kornbrust Oracle SQL Injection in Webapps PDF n/a n/a
Machtelt Garrels SSH tips & tricks PDF n/a n/a
Alberto Revelli, Nico Leidecker Introducing Heyoka: DNS Tunneling 2.0 PDF n/a AVI
Marc Schoenefeld Reconstructing Dalvik source code PDF n/a AVI
Walter Belgers Lockpicking 101 PDF n/a n/a
Mario Heiderich I thought you were my friend Malicious markup, browser issues and other obscurities PDF n/a n/a
Michał Sajdak Remote Rootshell on a SOHO Router PDF n/a n/a
Pavol Luptak Public transport SMS ticket hacking PDF n/a n/a
Martin Mocko Race to Bare Metal: UEFI and Hypervisors PDF n/a AVI
Sharon Conheady Social engineering for penetration testers PDF n/a n/a
Rich Smith VAASeline: VNC Attack Automation Suite PDF n/a AVI
Jacob Appelbaum Keynote - Tor Network PDF MP3 AVI
Tavis Ormandy TBD n/a MP3 n/a
Alessio L.R. Pennasilico DDoS: How Evil Forces Have Been Defeated PDF n/a AVI
Christian Heinrich Googless PDF n/a n/a
Alexei Kachalin Efficiency Estimation of Network Security Systems of Global Networks PDF n/a n/a
Sandro Gauci Scanning the Intertubes for VoIP PDF n/a n/a
Michael Kemp Rootkits are awesome: Insider Threat for Fun and Profit PDF n/a AVI
Marc Schoenefeld Java and JEE Vulnerabilities explained PDF n/a n/a
Piotr Oleszkiewicz Is Storm just a summer breeze? New concepts in malware n/a n/a AVI
Raoul Chiesa Corporate Security and Intelligence: the dark links n/a n/a n/a