×
All
Videos 🎬
Audios 🎵
eBooks 📚
Mobile Apps 📱
Archives (ZIP/ISO) 💿
FILE
PURSUIT
Home
About
Contact
Discover
+
Submit
Lights ON
Art of anti detection - 1_Introduction to AV & detection techniques - Ege Balci (Invictus Europe).pdf
Home
/
Discover
/
theswissbay.ch
/
pdf
/
Whitepaper
/
Parent Folder
Art of anti detection - 1_Introduction to AV & detection techniques - Ege Balci (Invictus Europe).pdf
PDF
6 years ago
898.37 kB
Copy Link
ASIC design SHA256 implementation.pdf
PDF
6 years ago
102.89 kB
Copy Link
10 Things to Know Before Deploying 10 Gigabit Ethernet - Netgear.pdf
PDF
6 years ago
719.86 kB
Copy Link
CAIN_Silently Breaking ASLR in the Cloud - Antonio Barresi, Kaveh Razavi, Mathias Payer & Thomas R. Gross.pdf
PDF
6 years ago
599.66 kB
Copy Link
(Cross-)browser fingerprinting via OS and hardware level features - Yinzhi Cao, Song Li, Erik Wijmans.pdf
PDF
6 years ago
1.00 MB
Copy Link
CERN Data Integrity - Bernd Panzer-Steindel.pdf
PDF
6 years ago
110.89 kB
Copy Link
"I've got nothing to hide" and other misunderstanding of privacy - Daniel J. Solove.pdf
PDF
6 years ago
564 bytes
Copy Link
Case study_a computer science perspective of bridge design - Alfred Spector, David Gifford.pdf
PDF
6 years ago
3.30 MB
Copy Link
Ceph, Gluster, Swift_Similarities and differences - Thiago da Silva, Prashanth Pai.pdf
PDF
6 years ago
1.33 MB
Copy Link
DDOS Reflection and Amplification - Arbor Networks.pdf
PDF
6 years ago
7.25 MB
Copy Link
Defeating DEP and ASLR in Windows - High-Tech Bridge.pdf
PDF
6 years ago
1.24 MB
Copy Link
Defending the Homeland - Nullthreat.pdf
PDF
6 years ago
1.38 MB
Copy Link
DiskFiltration_Data Exfiltration from Speakerless Air-Gapped Computers via Covert Hard Drive Noise - Mordechai Guri, Yosef Solewicz, Andrey Daidakulov, Yuval Elovici, Ben-Gurion University of Negev, Cyber Security Research Center.pdf
PDF
6 years ago
3.23 MB
Copy Link
Does the online card payment landscape unwittingly facilitate fraud - Mohammed Aamir Ali, Budi Arief, Martin Emms, Aad van Moorsel.pdf
PDF
6 years ago
832.83 kB
Copy Link
Electromagnetic Radiation from Video Display Units_An Eavesdropping Risk - Wim van Eck.pdf
PDF
6 years ago
702.51 kB
Copy Link
Equation Group-Q&A - Kaspersky Lab.pdf
PDF
6 years ago
3.98 MB
Copy Link
Erasure Codes for Storage Systems_A Brief Primer - James S. Plank.pdf
PDF
6 years ago
1.28 MB
Copy Link
From DTrace to Linux - Brendan Gregg.pdf
PDF
6 years ago
9.17 MB
Copy Link
Google infrastructure security design overview - Google.pdf
PDF
6 years ago
1.66 MB
Copy Link
High Availability for Citrix XenServer - Citrix.pdf
PDF
6 years ago
544.63 kB
Copy Link
Join FilePursuit on
chat for discussions and more information.