Phishing As Tragedy of the Commons
Cisco IOS Attack & Defense - The State of the Art
Web Exploit Finder Presentation
Enhancing Computer Security via End-to-End Communication Visualization
Top Network Vulnerabilities Over Time
What are the Business Security Metrics?
No Substitute for Ongoing Data, Quantification, Visualization, and Story-Telling
Advanced Ajax Security
Leading Indicators in Information Security
Ferret - Data Seepage
Security Considerations in Process Control and SCADA Environments
A Practical Approach to Managing Information System Risk
Cracking into embedded devices and beyond
Blind SQL Injection - Optimization Techniques
Metasploit Basics
Nessus Basics
SCADA Security
Secrets of Top Pentesters
Unusual Web Bugs
Centralized Logging with syslog