Similar Tracks
Bypassing of Self-Encrypting Drives – Techniques for Hackers and Forensic Investigators
BSides-Calgary
The Memory Sinkhole - Unleashing An X86 Design Flaw Allowing Universal Privilege Escalation
Black Hat
Hack everything: re-purposing everyday devices - Matt Evans
Linux.conf.au 2012 -- Ballarat, Australia
Cryptography Full Course | Cryptography And Network Security | Cryptography | Simplilearn
Simplilearn