2019-07-02 |
Autonomic computing similar work, tools and target service selection |
autonomic computing ‧ Unknown |
|
2019-05-08 |
MITRE ATT&CK and the Unified Kill Chain |
att&ck ‧ Unknown |
|
2019-05-08 |
Modeling cyber attacks, Cyber Kill Chain |
attack modeling ‧ Unknown |
|
2019-05-08 |
OpenVAS vulnerability scanner, part 2 |
english ‧ Unknown |
|
2019-05-08 |
OpenVAS vulnerability scanner, part 1 |
english ‧ Unknown |
|
2019-05-08 |
Vulnerabilities detected by fuzzing, part 2 |
english ‧ Unknown |
|
2019-05-08 |
Vulnerabilities detected by fuzzing, part 1 |
|
|
2019-05-08 |
Vulnerability management |
english ‧ Unknown |
|
2019-05-08 |
Critical web application vulnerabilities, part 3 (final) |
english ‧ Unknown |
|
2019-05-08 |
Critical web application vulnerabilities, part 2 |
english ‧ Unknown |
|
2019-05-08 |
Types of cyber-attackers |
attackers ‧ Unknown |
|
2019-05-08 |
Security controls |
english ‧ Unknown |
|
2019-05-08 |
Types of fuzzers |
english ‧ Unknown |
|
2019-05-08 |
Introduction to Android penetration testing |
Android ‧ Unknown |
|
2019-05-08 |
Critical web application vulnerabilities, part 1 |
english ‧ Unknown |
|
2019-05-08 |
Introduction to web penetration testing |
english ‧ Unknown |
|
2019-05-08 |
Introduction to fuzzing |
english ‧ Unknown |
|
2019-05-08 |
Detecting cryptographic misuse with Argus static analysis framework |
Android ‧ Unknown |
|
2019-05-08 |
Amandroid - Argus static analysis framework |
Android ‧ Unknown |
|
2019-05-08 |
Obfuscation techniques |
Android ‧ Unknown |
|
2019-05-08 |
Finding suitable problems with MySQL / MariaDB to focus on |
autonomic computing ‧ Unknown |
|
2019-05-08 |
Java bytecode decompilers |
decompiler ‧ Unknown |
|
2019-05-08 |
Cryptographic lint tools |
Android ‧ Unknown |
|
2019-05-08 |
Comparing C/C++ decompilers |
C/C++ ‧ Unknown |
|
2019-05-08 |
Android obfuscation tools - ProGuard |
Android ‧ Unknown |
|
2019-05-08 |
Android application obfuscation and deobfuscation |
Android ‧ Unknown |
|