Hacking Team Conferences and Seminars Collection [CRYPTOME]

seeders: 1
leechers: 4
Added on July 13, 2015 by Cryptomein Books
Torrent verified.



Hacking Team Conferences and Seminars Collection [CRYPTOME] (Size: 2.29 GB)
 Certificazioni Professionali in Sicurezza Informatica 2.pdf1.16 MB
 Thumbs.db22.5 KB
 Certificazioni Professionali in Sicurezza Informatica 1.pdf553.25 KB
 HTTP Fingerprinting and Advanced Assessment Techniques (httprint_win32).zip824.82 KB
 HTTP Fingerprinting and Advanced Assessment Techniques.pdf565.77 KB
 Hardening Windows Servers.pdf3.91 MB
 HTTP Fingerprinting and Advanced Assessment Techniques (httprint_paper).zip583.89 KB
 HTTP Fingerprinting and Advanced Assessment Techniques (httprint_linux).zip641.53 KB
 Hardening Windows Servers.zip4.69 MB
 HTTP Fingerprinting and Advanced Assessment Techniques (httprint_macosx).zip673.86 KB
 HTTP Fingerprinting and Advanced Assessment Techniques (httprint_freebsd).zip693.25 KB
 ISA Server - Best Practices from the Field.ppt4.42 MB
 Forensic Secrets for Windows Servers.zip4.14 KB
 Performance and Security- How to Have Both.pdf550.94 KB
 Penetration Testing.pdf117.04 KB
 Password Alternatives for Mobile Devices.pdf835.17 KB
 Perimeter What Perimeter.pdf468.42 KB
 Practical Privacy- Effectively Complying with Privacy Regulations in a Business Environment.pdf354.23 KB
 Proactive and Reactive Security- What's the Best Mix.pdf1.62 MB
 Padding Oracle Attacks on the ISO CBC Mode Encryption Standard.pdf1021.28 KB
 Periodic Properties of Counter Assisted Stream Ciphers.pdf540.03 KB
 Nota 2004.zip137.86 MB
 NIH-Educause PKI Interoperability- Phase 3.pdf1.26 MB
 stigliani.pdf476.3 KB
 wright2.pdf100.37 KB
 Zaba.pdf38.79 KB
 quintarelli.pps151 KB
 Rizzo.pdf88.48 KB
 Rizzoli.pdf276.07 KB
 scalici.pdf184.01 KB
 Sanna.pdf538.98 KB
 Rossi.pdf496.08 KB
 Vella.pdf62.4 KB
 SeminarioCNIPASmartCard(01102004).ppt184.5 KB
 Allasso_MKTG_Allot.ppt4.33 MB
 Allasso_MKTG_NetReport.ppt3.15 MB
 BlueSocket_Allasso.ppt11.63 MB
 Welcome-OneDaySeminar-Milano-Roma.ppt1.97 MB
 Allasso_MKTG_Netilla.ppt2.11 MB
 SmartCardAvanzato18062004.ppt972 KB
 CR01.pdf698.5 KB
 Firma_digitale(SeminarioCNIPA25062004).ppt743.5 KB
 European Union vs. Spam - A Legal Response.pdf110.58 KB
 Exploring Support Vector Machines and Random Forests for Spam Detection.pdf152.88 KB
 IP Addresses in Email Clients.pdf95.58 KB
 Inferring Ongoing Activities of Workstation Users by Clustering Email.pdf45.09 KB
 Beyond Identity in Electronic Mail System.pdf115.44 KB
 Extracting social networks and contact information from email and the Web.pdf242.9 KB
 A Multifaceted Approach to Spam Reduction.pdf127.46 KB
 Integration of Email and Task Lists.pdf88.42 KB
 Anatomy of a Phishing Email.pdf62.61 KB
 Filtron - A Learning-Based Anti-Spam Filter.pdf549.48 KB
 Symantec Network Security 7100.pdf126.3 KB
 symantec.zip3.8 MB
 ActiveCard.zip12.86 MB
 mgardiner profile&competition.pps1.28 MB
 mgardiner netegrity vision.pps829.5 KB
 mgardiner provisioning.pps868 KB
 mgardiner federation.pps454 KB
 dschreiber Marketing&Partner.pps290.5 KB
 7_Zambon.pps1.57 MB
 9_Lo Reto-Ugolini.pps937.5 KB
 8_Lo Reto-Ugolini.pps162.5 KB
 10_Gardiner.pps846.5 KB
 3_Degradi.pps148 KB
 2_Giacchino.pps923.5 KB
 4_Giannoni.pps144.5 KB
 5_Passoni.pps730 KB
 1_renzi.pps12.24 MB
 6_Fumagalli.pps739.5 KB
 JN_Corp_Overview_Ent_4.mht3.52 MB
 JN_Corp_Overview_Ent_3.mht2.47 MB
 JN_Corp_Overview_Ent_2.mht2.07 MB
 JN_Corp_Overview_Ent_1.mht3.38 MB
 JN_Corp_Overview_Ent_5.mht7.31 MB
 01 Aladdin-eSafe.ppt2.13 MB
 02 BlueCoat.ppt6.4 MB
 04 BlueSocket.ppt12.85 MB
 09 Juniper.ppt10.21 MB
 10 Check Point Security Vision.ppt2.61 MB
 08 Websense.ppt3.29 MB
 07 Radware.ppt4.05 MB
 05 Nortel.ppt7.99 MB
 06 Nokia.ppt6.93 MB
 03 Stonesoft.ppt1.68 MB
 Faggioli - Plenaria.ppt83.5 KB
 radware.ppt11.71 MB
 PACKETEER.ppt3.68 MB
 iss.ppt7.53 MB
 SafeAnet.ppt2.5 MB
 SonicWALL.ppt6.62 MB
 Trend_Micro_1.ppt782.5 KB
 Crossbeam.ppt8.96 MB
 Check_Point.ppt2.62 MB
 Avocent.ppt12.44 MB
 Trend_Micro_2.ppt1.49 MB
 DE01b.pdf198.1 KB
 de01a.pdf157.38 KB
 Attestato di frequenza - Il documento elettronico (CLUSIT).pdf320.05 KB
 Gabriele Faggioli - Il documento elettronico.pdf2.82 MB
 Daniela Rocca - Il documento elettronico.pdf1.54 MB
 Technology.ppt10.3 MB
 Il valore della certificazione ECB-S nei Data Centres (Da Gasso).zip3.49 MB
 La gestione delle identità.zip650.1 KB
 Gli strumenti di prevenzione psicologica degli attacchi ad opera di insider (Bruzzone).zip27.8 KB
 Come scegliere la migliore tecnologia anti-spam (Costantini).zip3.36 MB
 Piattaforma Integrata per la Sicurezza Informatica.zip3.69 MB
 Il token con memoria come nuova evoluzione della smartcard (Gissi).zip2.22 MB
 Privacy e standard BS7799 (Gentile).zip130.78 KB
 Privacy, identità e asset aziendali (Rossi).zip1.8 MB
 Soluzione semplice a problemi reali (Turani).zip1.31 MB
 Soluzioni di protezione da Spam e Phishing (Casazza).zip1.73 MB
 VP01a.pdf401.38 KB
 VP01b.pdf1.28 MB
 VP01c.pdf541.17 KB
 CQ01b.pdf1.11 MB
 CQ01a.pdf814.55 KB
 20041213-abstract-bruschi.pdf74.15 KB
 20041213-abstract-burani.pdf30.05 KB
 20041213-abstract-crudele.pdf58.52 KB
 20041213-abstract-marziale.pdf54.75 KB
 20041213-abstract-monsmonni.pdf37.11 KB
 Convegno 13 Dicembre 2004-1.zip237.15 KB
 WF01a.pdf5.89 MB
 WF01b.pdf914.91 KB
 SampleParticipant.zip440.93 KB
 fvc2004cfp.doc89.5 KB
 FvcCheckMemTime.zip15.25 KB
 DB4_B.zip6.11 MB
 DB3_B.zip5.34 MB
 fvc2004cfp.pdf71.61 KB
 sourceFVC.zip17.12 KB
 DB2_B.zip6.06 MB
 DB1_B.zip5.17 MB
 Avbpa_2003_evaluation_metrics.pdf434.45 KB
 AVBPA-2003.pdf92.61 KB
 FRVT_2002_Evaluation_Report.pdf4.04 MB
 FRVT_2002_Overview_and_Summary.pdf565.9 KB
 FRVT_2002_Technical_Appendices.pdf7.21 MB
 frvt2002_supplemental.pdf1.66 MB
 appendices.pdf10.65 MB
 FRVT2000_Executive_Overview.pdf399.98 KB
 FRVT_2000.pdf6.11 MB
 FVC2002_results_summary.pdf86.66 KB
 fvc2002cfp.doc77 KB
 FVC2002_ICPR.pdf593.75 KB
 fvc2002cfp.pdf55.9 KB
 source2002.zip4.64 KB
 Source.zip4.43 KB
 fvc2000_report.pdf1.2 MB
 Evaluating Technology Properly.pdf238.71 KB
 Evaluating Facial Recognition Technology.pdf1.11 MB
 Facial Recognition.pdf188 KB
 Raffaele Cappelli - Introduzione ai sistemi biometrici.pdf8.43 MB
 Raffaele Cappelli - Misurare le prestazioni dei sistemi biometrici.pdf2.77 MB
 Attestato di frequenza - Tecniche biometriche (CLUSIT).pdf339.38 KB
 Andrea Patrignani - Integrazione di sistemi biometrici.pdf6.9 MB
 An Introduction to Evaluating Biometric Systems.pdf397.12 KB
 misi-naga-lan+vlan.release.ppt519.5 KB
 LineeGuidaCNS11032005.ppt1.13 MB
 rf01.pdf5.19 MB
 digital right management.pdf1.25 MB
 honeypot.pdf2.18 MB
 slides scaricate.pdf258.94 KB
 clusit-controllo dei lavoratori-attestato.pdf145.05 KB
 controllo lavoratori.pdf3 MB
 Sciolla.zip431.76 KB
 Barrault.zip137.32 KB
 Bonacina.zip537.21 KB
 NetConsulting.zip713.55 KB
 Mancini.zip418.12 KB
 slides scaricate.pdf698.07 KB
 attestato.pdf148.36 KB
 Progettare un servizio di posta elettronica sicuro.pdf7.13 MB
 telecom.pdf2.19 MB
 self_defending_network_mircoli.pdf3.57 MB
 misi_sdn_mgmt.pdf2.86 MB
 app_ipc.pdf3.19 MB
 Cisco Expo - Documentazione 27 settembre.mht94.42 KB
 aons_techday.pdf2.35 MB
 convegno (getronics).pdf3.84 MB
 IBM.pdf1.97 MB
 ce_wlan_dbf.pdf6.95 MB
 brdc_pomelli.pdf1.79 MB
 evoluzione canale.pdf2.7 MB
 wifi_maggiora.pdf2.76 MB
 somenzi.pdf103.54 KB
 ialfvg.pdf2.67 MB
 mgn.pdf3.5 MB
 Mobile.pdf2.43 MB
 servizi_universitari_fanelli.pdf2.42 MB
 expo_fanelli.wmv16.97 MB
 webtv.pdf625.42 KB
 cisco_service_control.pdf3.24 MB
 Pres Packeteer-Ita Ott-2005.ppt3.61 MB
 Zultys.ppt1.62 MB
 Citrix1.ppt5.02 MB
 Citrix2.ppt5.07 MB
 Citrix_Latona.ppt6.51 MB
 Crossbeam_preso_2005.ppt11.33 MB
 CL_ISS DiPierro-18-10-05.pdf3.05 MB
 CLU 2005 - Nokia Secure and Mobile Connectivity.zip6.43 MB
 CLU 2005 - Nokia Soluzioni di mobilità per l'azienda - parte prima.pdf4.47 MB
 CLU 2005 - Nokia Soluzioni di mobilità per l'azienda - parte seconda.pdf4.25 MB
 F5Computerlinks.ppt10.38 MB
 raoul.pdf2.81 MB
 Marioni.pdf162.67 KB
 gigi.pdf1.09 MB
 gianotti.pdf123.97 KB
 050617carbone.pdf902.97 KB
 050617cotognini.pdf2.98 MB
 050617berenci.pdf4.9 MB
 050616giudice.pdf306.06 KB
 050616carlone.pdf669.02 KB
 050616cruciani.pdf254.11 KB
 050617niglio.pdf596.96 KB
 050617palchetti.pdf703.6 KB
 050616cabianca.pdf529.21 KB
 Greco.pdf837.04 KB
 franchina.pdf126.79 KB
 Guida.pdf286.67 KB
 piovera.pdf353.94 KB
 varaldo.pdf55.72 KB
 faggioli.pdf120.46 KB
 perucchini.pdf151.51 KB
 actis_dato.pdf156.52 KB
 Armando Lombardi - CISCO.pdf5.77 MB
 Luca Piccinini - MARCONI.pdf398.27 KB
 Antonio Lioy - POLITECNICO DI TORINO.pdf125.77 KB
 Roberto Mircoli - CISCO.pdf3.87 MB
 Tiziana Moro - ALCATEL.pdf1.25 MB
 Luca Marzegalli - CEFRIEL.pdf2.31 MB
 Gigi Tagliapietra - CLUSIT.pdf5.58 MB
 decina.pdf3.55 MB
 marzegalli.pdf3.8 MB
 misitano.pdf2.54 MB
 webbit_gigi.pdf645.95 KB
 rocca.pdf798.87 KB
 mircoli.pdf149.83 KB
 smau05_wright.pdf318.98 KB
 smau05_tagliapietra.pdf1.52 MB
 smau05_telmon.pdf179.94 KB
 smau05_barbarito.pdf538.85 KB
 INDICE.txt5.24 KB
 smau05_cavallini.pdf800.7 KB
 IBM GSC III GGiudice.pdf341.7 KB
 smau05_pasquinucci.pdf163.19 KB
 smau05_seveso.pdf219.29 KB
 smau05_santucci.pdf235.29 KB
 Bruno Fiammella Computer Forensic.pdf751.58 KB
 Ghirardini Computer Forensic.pdf169.36 KB
 Marzegalli - La necessità per le aziende di un approccio integrato alla info security.pdf739.98 KB
 Gattoli - Criticità e falsi miti nel processo di definizione di un SGSI BS 7799.pdf208.99 KB
 Conti - Il miglioramento delle performance dei provvedimenti tecnici.pdf647.18 KB
 DaRos - Cosa sta succedendo nel mercato.pdf261.89 KB
 Besia- Vantaggi giuridici collegabili alla applicazione della BS 7799.pdf149.69 KB
 Sicurezza Fisica (MI).pdf563.24 KB
 Sicurezza Fisica (RM).pdf2.59 MB
 Sicurezza Informatica per la piccola impresa.pdf242.58 KB
 Jeremy Rauch - PDB, the Protocol DeBugger.pdf1.13 MB
 Jesse Burns - Fuzzing Selected Win32 Interprocess Communication Mechanisms.pdf257.03 KB
 Joanna Rutkowska - Subverting Vista Kernel For Fun And Profit.pdf5.08 MB
 Jeremiah Grossman - Hacking Intranet Websites from the Outside 'JavaScript malware just got...5.41 MB
 John Lambert - Security Engineering in Windows Vista.pdf6.97 MB
 Abolade Gbadegesin - The NetIO Stack - Reinventing TCP-IP in Windows Vista.pdf20.87 MB
 Hendrik Scholz - SIP Stack Fingerprinting and Stack Difference Attacks.pdf2.16 MB
 Jeff Waldron - VOIP Security Essentials.pdf298.47 KB
 Jay Schulman - Phishing with Asterisk PBX.pdf2.37 MB
 Jamie Butler - The Exponential Growth of Rootkit Techniques.pdf235.87 KB
 Reti Wi-Fi (b).pdf914.91 KB
 Reti Wi-Fi (a).pdf5.89 MB
 IAM - Bruno Degradi, Computer Associates.ppt33.93 MB
 IAM - Emanuela Giannetta, Sun Microsystems.pdf1.04 MB
 Introduzione - Alessandro Giacchino, BCI Italia.pdf170.55 KB
 Stato dell'arte - Alessandro Giacchino, BCI Italia.pdf478.44 KB
 IAM - Michele Gugliemo, NetIQ Country Manager.pdf1.47 MB
 Appliances e Tools - Vito Divincenzo, Sophos.pdf642.11 KB
 Appliances e Tools - Elio Molteni, Computer Associates.pdf1.06 MB
 Appliances e Tools - Giuseppe Borgonovo, Symantec.pdf2.53 MB
 Appliances e Tools - Marco D'Angelo, Microsoft.pdf4.92 MB
 IAM - Alberto Ocello, Engiweb Security.pdf734.06 KB
 IAM - Andrea Rossi, Novell.pdf1.24 MB
 Andrea Ghirardini - Il phishing.pdf734.86 KB
 Giuseppe Bellazzi - Aspetti legali del phishing.pdf1.58 MB
 Gerardo Costabile - Phishing e cyber-riciclaggio.pdf1.87 MB
 attestato di frequenza.pdf155 KB
 PH01.zip1.91 MB
 ATS - La TV è mobile.pdf750.93 KB
 Pasquale Palma - Formazione 3 - RFID.pdf453.29 KB
 Pasquale Palma - Formazione 4 - WiMAX, l'era delle Wireless Man.pdf475.12 KB
 Pasquale Palma - Formazione 2 - La sicurezza nelle reti wireless.pdf1.06 MB
 Pasquale Palma - Formazione 1 - Wi-Fi e Wireless Lan.pdf1.32 MB
 Lucent Technologies - Fixed-mobile convergence.pdf675.97 KB
 Oracle - Tagliare i costi e incrementare la produttività con le applicazioni mobili.pdf1.07 MB
 Telecom - Extended Mobile Business.pdf1.15 MB
 USRobotics - Wireless Lan dalle parole ai fatti.pdf1.08 MB
 Vodafone - Mobile data are now.pdf771.82 KB
 Sala - Borland ITM_G 2006.pdf765.02 KB
 Prof Damiani it gov.pdf169.26 KB
 11 KODAK.pdf919.39 KB
 12 Canon.pdf5.61 MB
 10 Vega Informatica.pdf828.67 KB
 1 Extensity.pdf848.94 KB
 13 Docflow.pdf2.51 MB
 5 Cardinis Solutions.pdf698.44 KB
 14 Esker XP.pdf9.08 MB
 6 Hewlett Packard.pdf881.35 KB
 7 Adobe.pdf3.65 MB
 9 NICA.pdf1013.69 KB
 msutton-filefuzz-breadth.wmv162.66 KB
 msutton-filefuzz-depth.wmv344.65 KB
 msutton-comraider.wmv994.14 KB
 asotirov-re-microsoft-binaries.pdf378.61 KB
 dhulton-breaking-wifi-faster.ppt1.55 MB
 msutton-filefuzz.zip280.17 KB
 lightning-ecarrera-unpacking-birds-eye-view.pdf518.53 KB
 lmiras-fix-bugs-in-binaries.pdf1.27 MB
 dcox-insiders-view.pdf1.03 MB
 cabad-anonymous-eannoyance.tgz8.76 MB
 Malnati-TELECOM-.zip1.71 MB
 Locati-HP-.zip372 KB
 Gallo-FRONTRANGE-.zip2.48 MB
 Nava-COMPUWARE-.zip1.44 MB
 Salvato-KPMG-.zip2.06 MB
 Sangiorgi-COMPUWARE-.zip2.2 MB
 Pavone-POSTE ITALIANE-.zip573.05 KB
 Renna-CA-.zip2.24 MB
 De NisI-CASEWISE-.zip4.25 MB
 Ciceri-NOLAN NORTON ITALIA-.zip1.03 MB
 Davide Carlesi (BlueCoat) Sicurezza delle applicazioni Web based e Wan acceleration.pdf5.4 MB
 Domenico Dominoni (IronPort) Internet un ambiente sicuro- Ultime dalla rete.pdf789.08 KB
 Bruno Melandri (EMC) I diversi aspetti della sicurezza.pdf3.21 MB
 Andrea Rizzi (CheckPoint) Un nuovo approccio alla sicurezza - l'infrastruttura unificata.pdf2.67 MB
 Gabriele Faggioli - Profili legali ed obblighi di conservazione.pdf99.45 KB
 Primo Bonacina (Magirus) Il ruolo del distributore a valore aggiunto.pdf4.85 MB
 Orlando Arena (Nokia) Mobilità Sicura per l'azienda.pdf2.96 MB
 Giancarlo Palmieri (Infoblox) Come fornire servizi di Network Identity.pdf3.4 MB
 Zanero - 360° Anomaly Based Unsupervised Intrusion Detection - Whitepaper.pdf279.16 KB
 Zanero - 360° Anomaly Based Unsupervised Intrusion Detection.pdf605.94 KB
 Rutkowska - Defeating Hardware Based RAM Acquisition Tools.pdf791.31 KB
 Kendall_McMillan - Practical Malware Analysis.pdf3.43 MB
 Kendall_McMillan - Practical Malware Analysis - Whitepaper.pdf1023.02 KB
 Heasman - Firmware Rootkits - Whitepaper.pdf2.76 MB
 Litchfield - Advanced Oracle Attack Techniques - Papers.zip2.8 KB
 Litchfield - Advanced Oracle Attack Techniques.pdf997.01 KB
 Martin_Barnum_Christey - Being Explicit about Software Weaknesses.pdf2.74 MB
 Martin_Barnum_Christey - Being Explicit about Software Weaknesses - Whitepaper.pdf557.71 KB
 Pagliuzzi (NetTeam) - Case History Net Team.pdf4.36 MB
 Grillo (Verisign) - Un approccio globale alle frodi online.pdf5.34 MB
 Ferradini (Thuga) - Il caso Thuega.pdf228.72 KB
 Rottigni (Stonesoft) - La sicurezza dei flussi informativi tramite una gestione unificata delle...868.61 KB
 Mastropasqua (IDC) - Le nuove sfide della sicurezza.pdf884.45 KB
 Scarpelli (VPTech) - La Sicurezza dei dati come driver.pdf409.11 KB
 Fantoni (Adobe) - La sicurezza delle informazioni nell'Azienda.pdf16.35 MB
 Zambon (ENI) - Un sistema di SSO con Federation.pdf1.32 MB
 Volpi (ISS) - Le nuove esigenze della sicurezza.pdf4.16 MB
 Taglioretti (McAfee) - ORANGE ha scelto McAfee DLP.pdf2.35 MB
 Business continuity & availability.pdf2.07 MB
 Classificazione dei rischi dell'outsourcing.pdf455.38 KB
 Come proteggere le vostre informazioni.pdf1.92 MB
 Case study Arthis - Identity Management & Provisioning.pdf1017.16 KB
 Tecnologia abilitante per la sicurezza delle informazioni.pdf142.88 KB
 Stardard e certificazioni per la sicurezza informatica.pdf625.75 KB
 Soluzioni tecnologiche IBM per la continuità operativa e casi reali.pdf2.16 MB
 OWASP and OWASP Top 10.pdf2.5 MB
 Storage Virtualization in action.pdf1.17 MB
 Studio Associato Adacta.pdf176.4 KB
 Forme di controllo delle informazioni digitali.pdf335.56 KB
 Information Security Governance ed incidenti informatici.pdf1.29 MB
 DDoS Mitigation.ppt4.16 MB
 Computer forensic in azienda.pdf356.31 KB
 Come gestire le informazioni e la loro sicurezza all'interno del ciclo di vita.pdf5.38 MB
 La computer and network forensics e le investigazioni digitali.pdf79.83 KB
 Privacy e controlli sul lavoro.pdf331.93 KB
 Benefici di Sicurezza in una Infrastruttura Citrix di Application Delivery.ppt5.7 MB
 Lo storage che fa bene al business.pdf5.17 MB
 La sicurezza nella PA.pdf180.44 KB
 Security Failures in Secure Devices.pdf2.25 MB
 Side Channel Analysis on Embedded Systems.pdf1.53 MB
 New Viral Threats of PDF Language.pdf15.64 KB
 Mobile Phone Spying Tools.pdf948.78 KB
 Malware on the Net.pdf112.01 KB
 Spam-Evolution.pdf186.61 KB
 URI Use and Abuse.pdf1.36 MB
 The Reverse Engineer's Unexpected Swiss Army Knife.pdf361.73 KB
 LDAP Injection & Blind LDAP Injection.pdf1.88 MB
 Iron Chef Black Hat.pdf1.66 MB
 Monitoring and Lawful Interception.pdf675.97 KB
 Passive Monitoring of Packet Telephony and Data Networks.pdf354.39 KB
 Prevent Loss of Revenue by Detecting and Mitigating Gray VoIP.pdf1.1 MB
 Mobil Network Interception Standardization.pdf199.69 KB
 Passive Trunk Monitoring for GSM and PSTN Networks.pdf3.1 MB
 Conceptional Monitoring.pdf8.5 MB
 Challenges of Monitoring Converged Networks.pdf301.2 KB
 VoIP Lawful Intercept.pdf3.57 MB
 Deep Packet Inspection for Layer 7 Intercept.pdf2.85 MB
 How to meet Country-Specific Data Retention Requirements Cost-Effectively.pdf327.03 KB
 Track Telecommunications Traffic.pdf1.15 MB
 Different Methods of Data Retention.pdf336.37 KB
 Data Retention and Archival.pdf99.64 KB
 Data Retention Low Cost Solutions.pdf435.01 KB
 A Scalable and Affordable Approach to Data Retention and Retrieval.pdf636.48 KB
 European Directive on Retained Data and an Update.pdf1.07 MB
 Automatic Data Retention Solution.pdf2.73 MB
 ThorpeGlen Solutions - Data Collectors and Concentrators.pdf2.27 MB
 The Challenges of Collecting Data.pdf2.15 MB
 Legal to Strategic and how to Aggregate with all other Captors.pdf809.13 KB
 Internet Traffic Decoding.pps2.3 MB
 Intelligent Surveillance Service Platform.pdf1.59 MB
 Monitoring of Satellite based Personal Communication Systems.pdf787.17 KB
 The role of Passive Surveillance.pdf1.41 MB
 Intelligence Led Policing.pdf615.1 KB
 Remote Control System.pdf2.11 MB
 Real Time Capabilities for Speech Analysis.pdf1.29 MB
 Automatic Compliance Testing for Service and Subscriber Data Monitoring.pdf1.56 MB
 Video Analytics.pdf1.37 MB
 Intelligent Video Surveillance & Content Analytics.pdf1.01 MB
 Activity-Based Forensic Analysis of Unstructured Video Data.pdf1.4 MB
 Cell Phone Call and Cell Tower Records for Investigators.pdf428.63 KB
 INDICE.pdf152.71 KB
 DLP-AIEA.pdf1.17 MB
 DLP-AIEA.ppt2.35 MB
 LocandinaTorino080410.pdf546.91 KB
 SCHEDA-ISCRIZIONE-080410.doc108 KB
 linee guida del Garante per posta elettronica e internet.pdf154.02 KB
 sentenza cassazione del 19 Dicembre 2007.pdf56.98 KB
 sintesi.xls42 KB
 linee guida del Garante per posta elettronica e internet (sintesi).pdf66.65 KB
 abstract dlp.doc156 KB
 casi.pdf226.54 KB
 governo_rischio.doc299.5 KB
 techfor.ppt473 KB
 techfor.tif410.73 KB
 techfor.pptx168.78 KB
 Advance Telecommunications Technology-Aid or Threat to Corruption Investigation.pdf4.55 MB
 2nd Keynote.pdf2.03 MB
 Internet and IP Networking Impact on Lawful Interception, Criminal Investigation and Intelligence...2.73 MB
 Using Passive Probes in Packet and Traditional Networks to Deliver High Precision Communications...196.91 KB
 Lawful Interception in 2015.pdf278.89 KB
 Overview of Lawful Interception Challenges and Issues.pdf389.77 KB
 Technical and political challenges, solutions for active and passive interception.pdf349.07 KB
 Conducting Corruption Investigations jointly with Telecom Operators and Vendors (2).pdf42.56 KB
 7 Highly effective methods to bypass and evade monitoring and interception systems.pdf1.92 MB
 Conducting Corruption Investigations jointly with Telecom Operators and Vendors (1).pdf118.6 KB
 Do you Need to Retain the Complete haystack to find the needle.pdf233.96 KB
 VoIP Lawful Intercept.pdf573.51 KB
 Unified Interception & Location Platform for Law Enforcement and Intelligence Agencies.pdf434.04 KB
 Elenco degli speeches.pdf246 KB
 Evoluzione delle tecniche e dei profili degli attaccanti.pdf801.29 KB
 La Sicurezza in banca.pdf605.06 KB
 Data Protection e Retention di Infrastrutture Critiche.pdf2.23 MB
 Cosa si può chiedere e cosa si può pretendere da un fornitore di servizi di sicurezza...151.65 KB
 A strategy for protecting critical data.pdf4.28 MB
 La criminalità informatica in Italia e le attività della Polizia delle Comunicazioni.pdf459.63 KB
 Le ultime novità normative in materia di Data Retention.pdf492.42 KB
 Minori e nuovi media.pdf324.21 KB
 Workshop 2.0 2008 07 08 - Report Schede Feedback.xls52 KB
 Workshop 2.0 2008 07 08 - Programma.xls180.97 KB
 Workshop 2.0 2008 07 08 - Presentazione Arato.pdf1.28 MB
 Workshop 2.0 2008 07 08 - Elenco Partecipanti.xls25.5 KB
 Workshop 2.0 2008 07 08 - Presentazione Sigiani.pdf170.34 KB
 Workshop 2.0 2008 07 08 - Presentazione Spreafico.pdf3.24 MB
 Workshop 2.0 2008 07 08 - Presentazione Viscanti.mov16.46 MB
 MauroBonfanti Agora.pdf1.04 MB
 PeterVdArend ETSI.pdf453.4 KB
 ReneNitzinger Utimaco.pdf879.15 KB
 RichardJarvis Detica.pdf166.74 KB
 RimKhazhin BTT.pdf2.09 MB
 PatrickPaul Qosmos.pdf1.91 MB
 OttoKern Group2000.pdf1.14 MB
 MichaelThomas DigiTask.pdf1.54 MB
 NicolasDeckmyn Amesys.pdf943.96 KB
 OlegFedorov Oxygen.pdf2.27 MB
 Aspetti organizzativi per la gestione delle identità e del controllo degli accessi.pdf299.51 KB
 Approccio IBM alla sicurezza fisica e soluzioni innovative.pdf4.74 MB
 Centro di gestione SPC e gestione incidenti di sicurezza.pdf1.74 MB
 Come gestire al meglio la sicurezza delle applicazioni web.pdf2.74 MB
 SPC - Connettività e sicurezza.pdf1.78 MB
 SPC - Interoperabilità, cooperazione e sicurezza.pdf891.88 KB
 Sicurezza nella PA italiana.pdf1013.85 KB
 Sistema di gestione per la sicurezza delle informazioni.pdf1.41 MB
 Modelli per rispondere alle esigenze di continuità operativa.pdf2.87 MB
 Lo standard BS25999.pdf2.9 MB
 RSA_enVision_Intro v2.ppt6.83 MB
 RSA_Demo_Authentication_Manager_7.1.exe31.79 MB
 ISS_CL_University_1008.pdf3.54 MB
 20081015 CLinksUni_Verona.pdf3.11 MB
 SwyxWare-Due Case Study.ppt2.35 MB
 Soluzione_IP-PBX_SwyxWare.ppt4.51 MB
 NextGeneration Security.ppt3.43 MB
 NokiaSessioneCommerciale_FP.pdf7.02 MB
 NokiaSourcefire_CLUni08.ppt2.92 MB
 NokiaTechnicalSession_Pe.pdf2.46 MB
 phion_CL_University.ppt10.48 MB
 DT2008_sacchetti.ppt4.18 MB
 Computerlinks Italy University 2008.ppt8.29 MB
 Cl University.ppt13.11 MB
 Aladdin eSafe il content security proattivo.pptx5.29 MB
 Casi di successo nella gestione della Strong Authentication.ppt2.36 MB
 Juniper_Preso_DVD2.pdf3.33 MB
 2_TippingPointIPS_CoreDeck_053008.ppt11.67 MB
 3_NAC-IPSDeck042007.ppt5.41 MB
 4_ThreatLinQ_Presentation_2008-0807.ppt4.04 MB
 1_TippingPointCorpDeck.ppt4.15 MB
 macho-on-the-fly.zip10.01 KB
 Let Your Mach-O Fly (slides).pdf417.34 KB
 Emulation-based Software Protection Providing Encrypted Code Execution and Page Granularity Code...512.94 KB
 Let Your Mach-O Fly.pdf237.04 KB
 Making Privacy-Preserving Data Mining Practical with Smartcards (slides).pdf1.82 MB
 New Techniques for Defeating SSL-TLS.pdf2.34 MB
 Making Privacy-Preserving Data Mining Practical with Smartcards.pdf283.64 KB
 Dissecting Web Attacks.pdf1.47 MB
 Dissecting Web Attacks (slides).pdf8.18 MB
 Blinded by Flash.pdf6.65 KB

Description

The Hacking Team Conferences and Seminars collection, which was contained in the 400 Gigabyte data dump of the Hacking Team server that was leaked by hackers.

Sharing Widget


Download torrent
2.29 GB
seeders:1
leechers:4
Hacking Team Conferences and Seminars Collection [CRYPTOME]