- ДокументHow Mobile Apps Protect Your Data. 2016 Q4 Reportзагружено:Yury Chemerkin
- Документse-2012-01-54загружено:Yury Chemerkin
- ДокументRed October. Detailed Malware Descriptionзагружено:Yury Chemerkin
- Документ2013 Ata Sfr for Ssci 12 Mar 2013загружено:Yury Chemerkin
- ДокументTriplePlay-WebAppPenTestingToolsзагружено:Yury Chemerkin
- ДокументCover+Interviewзагружено:Yury Chemerkin
- ДокументDigital Forensic Consзагружено:Yury Chemerkin
- ДокументManipulating Memory for Fun and Profitзагружено:Yury Chemerkin
- Документ2013 Global Security Reportзагружено:Yury Chemerkin
- ДокументComment Crew Indicators of Compromiseзагружено:Yury Chemerkin
- Документ6071f3f4-40e6-4c7b-8868-3b0b21a9f601загружено:Yury Chemerkin
- Документjp3_13загружено:Yury Chemerkin
- ДокументAppendix E (Digital) - MD5sзагружено:Yury Chemerkin
- ДокументFinland s Cyber Security Strategy - Background Dossierзагружено:Yury Chemerkin
- ДокументEu Cybersecurity Strategy 130207загружено:Yury Chemerkin
- ДокументCyber Security Regulation Strictly Regulated by NRC Feb 2013загружено:Yury Chemerkin
- ДокументHiding Data in Hard-Drive’s Service Areasзагружено:Yury Chemerkin
- ДокументMSFT Oracle Briefзагружено:Yury Chemerkin
- ДокументCrisisзагружено:Yury Chemerkin
- ДокументFacebook Ireland Audit Review Report 21 Sept 2012загружено:Yury Chemerkin
- ДокументWindows 8загружено:Yury Chemerkin
- ДокументStuxnetзагружено:Yury Chemerkin
- ДокументThe Stuxnet Computer Wormзагружено:Yury Chemerkin
- ДокументHow Stuxnet Spreads – A Study of Infection Paths in Best Practice Systemsзагружено:Yury Chemerkin
- ДокументStuxnet Reduxзагружено:Yury Chemerkin
- ДокументSecurity Configuration Recommendations for Apple iOS 5 Devicesзагружено:Yury Chemerkin
- ДокументBlackBerry Playbook – New Challengesзагружено:Yury Chemerkin
- ДокументWhen Developer's API Simplify User-Mode Rootkits Developingзагружено:Yury Chemerkin
- ДокументDoes your BlackBerry smartphone have ears?загружено:Yury Chemerkin
- ДокументThe Regulation of Ant Colony Foraging Activity Without Spatial Informationзагружено:Yury Chemerkin
- ДокументFuzzing Sucks!загружено:Yury Chemerkin
- ДокументFrankensteinзагружено:Yury Chemerkin
- ДокументBlackBerry PlayBook Security - Part Two - BlackBerry Bridgeзагружено:Yury Chemerkin
- ДокументBlackBerry PlayBook Security - Part Oneзагружено:Yury Chemerkin
- ДокументHardware backdooring is practicalзагружено:Yury Chemerkin
- ДокументSocial Network Privacy IIзагружено:Yury Chemerkin
- ДокументFinFisher's Spy KITзагружено:Yury Chemerkin
- ДокументSecurity in the Cloud Planning Guideзагружено:Yury Chemerkin
- ДокументWhen Developers API Simplify User-Mode Rootkits Development – Part IIзагружено:Yury Chemerkin
- ДокументZaneLackey. Security at Scale. Web Application Security in a Continuous Deployment Environmentзагружено:Yury Chemerkin
- ДокументRenderMan. Hacker + Airplanes = No Good Can Come of Thisзагружено:Yury Chemerkin
- ДокументMario Heiderich. Got Your Nose! How to Steal Your Precious Data Without Using Scriptsзагружено:Yury Chemerkin
- ДокументMagdalenaKurnik. Discussion Panel – EN – Hackers. Beyond the Edgeзагружено:Yury Chemerkin
- ДокументLuizEduardo. Introduction to Mobile Snitchзагружено:Yury Chemerkin
- ДокументJohn “Captain Crunch” Draper. History of hackingзагружено:Yury Chemerkin
- ДокументGregor Kopf , Bernhard Brehm. Deniability in Messaging Protocolsзагружено:Yury Chemerkin
- ДокументGaweł Mikołajczyk. IPv6 insecurities at First Hopзагружено:Yury Chemerkin
- ДокументGaweł Mikołajczyk. Holistic identity-based networking approach – an irreducible dichotomy between reality and expectationsзагружено:Yury Chemerkin
- ДокументGarethHayes. Non-Alphanumeric JavaScript-PHP and Shared Fuzzingзагружено:Yury Chemerkin