By URL
By Username
By MRSS
Enter a URL of an MRSS feed
 
or

Infosec Videos by Popular

Ben Calloni, "Vulnerability Path and Assessment"

02/22/12
US Government, Department of Defense, and Enterprise computer\nsystems must be trusted to protect data with varying levels of\nsensitivity ... tags: BusinessceriaseducationEducation_Higher_EducationEducation_TrainingHigher_Educationinformation

Kelley Misata, "Digital Citizenship: A Target's View of Security and Life Online"

02/08/12
As technological advancements continue to expand the range of\ninformation access, issues of privacy and cyber security have risen\nto the ... tags: BusinessceriaseducationEducation_Higher_EducationEducation_TrainingHigher_Educationinformation

Stephen Elliott, ""Introduction to Biometrics""

01/11/12
A discussion about biometrics, performance and error. Learn more\nabout biometric technologies and challenges related to performance. tags: BusinessceriaseducationEducation_Higher_EducationEducation_TrainingHigher_Educationinformation

Salmin Sultana, " Secure Provenance Transmission for Data Streams"

01/18/12
Many application domains, such as real-time financial analysis,\ne-healthcare systems, sensor networks, are characterized\nby continuous ... tags: BusinessceriaseducationEducation_Higher_EducationEducation_TrainingHigher_Educationinformation

Frank Tompa, "A Flexible System for Access Control"

01/25/12
A variety of mechanisms have been used in access control systems to\nsupport enterprises' diverse security needs. For example, ... tags: BusinessceriaseducationEducation_Higher_EducationEducation_TrainingHigher_Educationinformation

George Vanecek, "Is it time to add Trust to the Future Internet/Web?"

02/01/12
The future web, and Internet, are undergoing a humanization of\ntheir technologies which increasingly make their services ... tags: BusinessceriaseducationEducation_Higher_EducationEducation_TrainingHigher_Educationinformation

Loukas Lazos, "Jam me if you can: Mitigating the Impact of Inside Jammers"

11/16/11
The open nature of the wireless medium leaves wireless\ncommunications exposed to interference caused by the concurrent\noperation of ... tags: BusinessceriaseducationEducation_Higher_EducationEducation_TrainingHigher_Educationinformation

Zhongshu Gu, "Process Implanting: A New Active Introspection Framework for Virtualization"

11/09/11
Previous research on virtual machine introspection proposed\n'out-of-box' approach by moving out security tools from the guest\noperating ... tags: BusinessceriaseducationEducation_Higher_EducationEducation_TrainingHigher_Educationinformation