Palestrantes internacionais - Tradução simultânea

SOCIAL

Google Groups
Email:
Visit this group

TREINAMENTOS

PALESTRANTES CONFIRMADOS

 

Malware Tricks & Anti Forensics methods
Internet's Fallen Heroes
DPTrace: Dual Purpose Trace for Exploitability Analysis of Program Crashes
LangSec: From Theory to Practice
The Computer Forensics Process for Cybercrime Investigation: Methodologies, Techniques and Tools
Android Resiliency Defense Strategy
Protecting Linux against ring3 rootkits
A interseccao entre seguranca e virtualizacao: uma visao holistica
Voting Among Sharks
Witchcraft Compiler Collection : towards self aware computer programs
Lost your secure HDD PIN? We can help!
Rogue Behavior Detection: Tackling binaries while they are on the ground
UEFI Firmware Rootkits: Myths and Reality
HTTP2 Overview: A journey by RFC
Functional Programming Without a Functional Language
Information Security Community
Keynote Reflections on vulnerability research; is the only winning move not to play?
Enviando phishing como arte
R3MF: R3v3rs1ng on MachO File
EventID Field Hunter: Looking for malicious activities in your Windows events
Dumpster Driving 16: LTE4G Basestations
Keynote Is your memory protected? Attacks on encrypted memory and constructions for memory protection
Breaking the bank: practical Android reverse engineering
Risk based secure design of automotive networks

 

 


O uso da palavra Hacker para se referir ao violador de segurança é uma conclusão que vem por parte dos meios de comunicação de massa. Nós, hackers, nos recusamos a reconhecer este significado, e continuamos usando a palavra para indicar alguém que ama programar e que gosta de ser hábil e engenhoso.

Richard Stallman

 

 

 ORGANIZAÇÃO

 

 

 PATROCINADORES PLATINUM

 

 

 PATROCINADORES GOLD

 

 

 PATROCINADORES SILVER

 

 

 

 PATROCINADORES BRONZE

 

 

 HACKING

 

 

 APOIO