O'Reilly Security
File List
- O'Reilly Security 2016 NY NY/Susan Sons (Center for Applied Cybersecurity Research, Indiana University).mp4 36.9 MB
- O'Reilly Security 2016 NY NY/Caroline and Jacob Hansen talk about crowdsourced pen testing (Cobalt.io).mp4 23.1 MB
- O'Reilly Security 2017 NY NY/Rich Smith (Duo Security) interviewed.mp4 22.3 MB
- O'Reilly Security 2017 NY NY/Prakash Linga (Vera Security) interviewed.mp4 20.3 MB
- O'Reilly Security 2017 NY NY/Azi Cohen (White Source) interviewed.mp4 17.6 MB
- O'Reilly Security 2016 NY NY/Stina Ehrensvard (Yubico).mp4 17.5 MB
- O'Reilly Security 2016 NY NY/O'Reilly Defender Awards.mp4 17.2 MB
- O'Reilly Security 2016 NY NY/Ido Safruti (PerimeterX).mp4 17.2 MB
- O'Reilly Security 2017 NY NY/2017 O'Reilly Defender Awards, Rachel Roumeliotis (O'Reilly Media), Allison Miller (Google).mp4 15.2 MB
- O'Reilly Security 2016 NY NY/Courtney W. Nash and Allison Miller (O'Reilly Media).mp4 14.3 MB
- O'Reilly Security 2016 NY NY/Security and Feudalism - Own or be Owned - Cory Doctorow (EFF).mp4 9.0 MB
- O'Reilly Security 2016 NY NY/The Impact of Secrets and Dark Knowledge on Security Professionals - Richard Thieme (ThiemeWorks).mp4 8.5 MB
- O'Reilly Security 2016 NY NY/A Vision for Future Cybersecurity - Rebecca Bace (CFITS, University of South Alabama).mp4 8.0 MB
- O'Reilly Security 2017 NY NY/Empowering through security, Fredrick Lee (Square).mp4 7.4 MB
- O'Reilly Security 2016 NY NY/Once Upon a Future - Heather Adkins (Google).mp4 7.0 MB
- O'Reilly Security 2016 Amsterdam/Lessons learned from running big bug bounty programs - Katie Moussouris (Luta Security).mp4 7.0 MB
- O'Reilly Security 2017 NY NY/Enterprise security - A new hope, Haroon Meer (Thinkst).mp4 6.5 MB
- O'Reilly Security 2017 NY NY/The Rebecca Bace Award Presentation.mp4 6.4 MB
- O'Reilly Security 2017 NY NY/Why cloud-native enterprise security matters, Matt Stine (Pivotal).mp4 4.9 MB
- O'Reilly Security 2017 NY NY/An infinite set of security tools, Window Snyder (Fastly).mp4 4.7 MB
- O'Reilly Security 2016 Amsterdam/Conceptualizing attribution and why it matters - Benjamin Buchanan (Harvard University).mp4 4.6 MB
- O'Reilly Security 2016 NY NY/Meet the World's First Autonomous Computer Security Systems - Michael Walker (DARPA).mp4 4.5 MB
- O'Reilly Security 2017 NY NY/Great software is secure software Chris Wysopal (Veracode).mp4 4.5 MB
- O'Reilly Security 2016 Amsterdam/Inserting privacy controls and due process into semi-autonomous algorithms - Matthew Carroll.mp4 4.2 MB
- O'Reilly Security 2016 Amsterdam/My heart depends on your code - Marie Moe (SINTEF).mp4 4.2 MB
- O'Reilly Security 2017 NY NY/Building a culture of security at the New York Times, Runa Sandvik (New York Times).mp4 4.2 MB
- O'Reilly Security 2016 Amsterdam/From possible to practical The path for defense - Dan Kaminsky (White Ops).mp4 3.6 MB
- O'Reilly Security 2017 NY NY/The Dao of defense, Katie Moussouris (Luta Security).mp4 3.3 MB
- O'Reilly Security 2016 NY NY/O'Reilly Security Conference 2016 Insights.mp4 2.7 MB
- O'Reilly Security 2016 Amsterdam/O'Reilly Security Conference 2016 Insights.mp4 2.5 MB
- O'Reilly Security 2016 Amsterdam/The world will see (and just saw) an Internet zombie apocalypse - Phil Stanhope (Dyn).mp4 2.4 MB
- O'Reilly Security 2016 NY NY/O'Reilly Security Conference 2016.mp4 829.0 KB
- O'Reilly Security 2016 Amsterdam/O'Reilly Security Conference 2016.mp4 761.7 KB
- O'Reilly Security 2016 NY NY/Susan Sons (Center for Applied Cybersecurity Research, Indiana University).srt 49.9 KB
- O'Reilly Security 2016 NY NY/Caroline and Jacob Hansen talk about crowdsourced pen testing (Cobalt.io).srt 30.6 KB
- O'Reilly Security 2016 NY NY/Ido Safruti (PerimeterX).srt 27.9 KB
- O'Reilly Security 2016 NY NY/O'Reilly Defender Awards.srt 21.7 KB
- O'Reilly Security 2016 NY NY/Stina Ehrensvard (Yubico).srt 21.7 KB
- O'Reilly Security 2016 NY NY/Courtney W. Nash and Allison Miller (O'Reilly Media).srt 18.3 KB
- O'Reilly Security 2016 NY NY/A Vision for Future Cybersecurity - Rebecca Bace (CFITS, University of South Alabama).srt 15.6 KB
- O'Reilly Security 2016 Amsterdam/Lessons learned from running big bug bounty programs - Katie Moussouris (Luta Security).eng.srt 12.4 KB
- O'Reilly Security 2016 NY NY/Security and Feudalism - Own or be Owned - Cory Doctorow (EFF).srt 11.9 KB
- O'Reilly Security 2016 Amsterdam/Inserting privacy controls and due process into semi-autonomous algorithms - Matthew Carroll.eng.srt 10.9 KB
- O'Reilly Security logo.png 10.5 KB
- O'Reilly Security 2016 NY NY/The Impact of Secrets and Dark Knowledge on Security Professionals - Richard Thieme (ThiemeWorks).srt 9.3 KB
- O'Reilly Security 2016 Amsterdam/Conceptualizing attribution and why it matters - Benjamin Buchanan (Harvard University).eng.srt 9.1 KB
- O'Reilly Security 2016 NY NY/Once Upon a Future - Heather Adkins (Google).srt 8.8 KB
- O'Reilly Security 2016 Amsterdam/From possible to practical The path for defense - Dan Kaminsky (White Ops).eng.srt 8.7 KB
- O'Reilly Security 2016 NY NY/Meet the World's First Autonomous Computer Security Systems - Michael Walker (DARPA).srt 7.0 KB
- O'Reilly Security 2016 Amsterdam/My heart depends on your code - Marie Moe (SINTEF).eng.srt 6.4 KB
- O'Reilly Security 2016 Amsterdam/The world will see (and just saw) an Internet zombie apocalypse - Phil Stanhope (Dyn).eng.srt 5.3 KB
- O'Reilly Security 2016 Amsterdam/O'Reilly Security Conference 2016 Insights.eng.srt 2.3 KB
- O'Reilly Security 2016 NY NY/O'Reilly Security Conference 2016 Insights.srt 1.8 KB
- O'Reilly Security thank you.txt 843 bytes
Download Torrent
Related Resources
Copyright Infringement
If the content above is not authorized, please contact us via anywarmservice[AT]gmail.com. Remember to include the full url in your complaint.