×
All
Videos 🎬
Audios 🎵
eBooks 📚
Mobile Apps 📱
Archives (ZIP/ISO) 💿
FILE
PURSUIT
Home
About
Contact
Discover
+
Submit
Lights ON
207-Lessons-Learned-from-Implementing-Software-Security-Programs-Todd-Grotenhuis.mp4
Home
/
Discover
/
infocon.hackingand.coffee
/
CircleCityCon
/
CircleCityCon 2015
/
Parent Folder
207-Lessons-Learned-from-Implementing-Software-Security-Programs-Todd-Grotenhuis.mp4
MP4
8 years ago
62.87 MB
Copy Link
206-Running-Away-from-Security-Web-App-Vulnerabilities-and-OSINT-Collide-Micah-Hoffman.mp4
MP4
8 years ago
87.79 MB
Copy Link
209-Findings-to-date-Cameron-Maerz.mp4
MP4
8 years ago
59.93 MB
Copy Link
204-Wireless-Intrusion-Detection-System-with-Raspberry-Pi-Chris-Jenks.mp4
MP4
8 years ago
65.97 MB
Copy Link
211-From-Parking-Lot-to-Pwnage-Brent-White-Tim-Roberts.mp4
MP4
8 years ago
98.91 MB
Copy Link
203-I-Amateur-Radio-And-So-Can-You-Kat-Sweet.mp4
MP4
8 years ago
54.26 MB
Copy Link
212-PlagueScanner-An-Open-Source-Multiple-AV-Scanner-Framework-Robert-Simmons.mp4
MP4
8 years ago
70.49 MB
Copy Link
202-Digital-Supply-Chain-Security-The-Exposed-Flank-Dave-Lewis.mp4
MP4
8 years ago
64.75 MB
Copy Link
213-How-not-to-Infosec-Dan-Tentler.mp4
MP4
8 years ago
59.93 MB
Copy Link
201-Configure-your-assets-save-your-butt-Caspian-Kilkelly.mp4
MP4
8 years ago
45.14 MB
Copy Link
215-Hacking-the-Jolla-An-Intro-to-Assessing-A-Mobile-Device-Vitaly-McLain-Drew-Suarez.mp4
MP4
8 years ago
55.55 MB
Copy Link
200-Ruby-Not-just-for-hipster-Carl-Sampson.mp4
MP4
8 years ago
19.99 MB
Copy Link
300-Operationalizing-Yara-Chad-Robertson.mp4
MP4
8 years ago
38.49 MB
Copy Link
119-Malware-Armor-Tyler-Halfpop.mp4
MP4
8 years ago
71.99 MB
Copy Link
301-An-Inconvenient-Truth-Security-Monitoring-vs-Privacy-in-the-Workplace-Ana-Orozco.mp4
MP4
8 years ago
27.00 MB
Copy Link
118-Does-anyone-remember-Enterprise-Security-Architecture-Rockie-Brockway.mp4
MP4
8 years ago
76.16 MB
Copy Link
302-From-Blue-To-Red-What-Matters-and-What-Really-Doesnt-Jason-Lang.mp4
MP4
8 years ago
90.33 MB
Copy Link
117-Making-Androids-Bootable-Recovery-Work-For-You-Drew-Suarez.mp4
MP4
8 years ago
85.53 MB
Copy Link
303-Using-Evernote-as-an-Threat-Intelligence-Management-Platform-Grecs-part2.mp4
MP4
8 years ago
96.72 MB
Copy Link
116-Analyzing-the-Entropy-of-Document-Hidden-Code-Adam-Hogan.mp4
MP4
8 years ago
81.55 MB
Copy Link
Join FilePursuit on
chat for discussions and more information.