×
Log in
Upload File
Most Popular
Art & Photos
Automotive
Business
Career
Design
Education
Hi-Tech
+ Browse for More
ollie-whitehouse documents
Technology
Why defensive research is sexy too.. … and a real sign of skill
Technology
Threat Intelligence - Routes to a Proactive Capability
Technology
Designing and building post compromise recoverable services
Technology
Countering the Cyber Threat
Technology
2013 01-03 --ncc_group_-_crash_course_-_windows_filter_driver_security
Technology
Secure App Aspirations: Why it is very difficult in the real world
Technology
Practical Security Assessments of IoT Devices and Systems
Technology
Cyber Incident Response & Digital Forensics Lecture
Technology
Finding The Weak Link in Windows Binaries
Technology
From Problem to Solution: Enumerating Windows Firewall-Hook Drivers
Technology
Agile software security assurance
Business
Red Teaming and the Supply Chain
Technology
Smart grid in the Critical National Infrastructure
Technology
Assuring the Security of the Supply Chain - Designing best practices for cybersecurity in supply chains
Business
NCC Group C Suite Cyber Security Advisory Services
Technology
Introduction to Advanced Persistent Threats (APT) for Non-Security Engineers
Technology
Private sector cyber resilience and the role of data diodes
Technology
The Technology Horizon & Cyber Security from EISIC 2015
Business
Securing your supply chain & vicarious liability (cyber security)