- Presentations
- Documents
- Infographics
The Top 10 Facebook and Twitter Advertising Hacks of All Time - Larry Kim's Presentation at Hubspot's INBOUND 2015 Marketing Conference
Internet Marketing Software - WordStream
•
8 years ago
Velocity 2015 linux perf tools
Brendan Gregg
•
8 years ago
SREcon 2016 Performance Checklists for SREs
Brendan Gregg
•
8 years ago
SyScan360 - Stefan Esser - OS X El Capitan sinking the S\H/IP
Stefan Esser
•
8 years ago
"The Great Train Cyber Robbery" SCADAStrangeLove
Aleksandr Timorin
•
8 years ago
Hacking With Pictures SyScan 2015
Saumil Shah
•
9 years ago
I Have the Power(View)
Will Schroeder
•
8 years ago
Go Hack Yourself - 10 Pen Test Tactics for Blue Teamers
jasonjfrank
•
8 years ago
Java Deserialization Vulnerabilities - The Forgotten Bug Class
CODE WHITE GmbH
•
8 years ago
Windows Privilege Escalation
Riyaz Walikar
•
8 years ago
Functional C++
Kevlin Henney
•
8 years ago
44CON London - Attacking VxWorks: from Stone Age to Interstellar
44CON
•
8 years ago
Creating Your Own Threat Intel Through Hunting & Visualization
Raffael Marty
•
8 years ago
Docker, Linux Containers, and Security: Does It Add Up?
Jérôme Petazzoni
•
9 years ago
You didnt see it’s coming? "Dawn of hardened Windows Kernel"
Peter Hlavaty
•
7 years ago
Exploitation and State Machines
Michael Scovetta
•
12 years ago
Invoke-Obfuscation DerbyCon 2016
Daniel Bohannon
•
7 years ago
Android reverse engineering - Analyzing skype
Mário Almeida
•
10 years ago
External to DA, the OS X Way
Stephan Borosh
•
8 years ago
The Joy of Sandbox Mitigations
James Forshaw
•
8 years ago