Learn, hack!

Hacking and security documentation: slides, papers, video and audio recordings. All in high-quality, daily updated, avoiding security crap documents. Spreading hacking knowledge, for free, enjoy. Follow on .

Beckstrom's Law - A Model for Valuing Networks and Security

Type
Video
Tags
network, security
Authors
Rod Beckstrom
Event
DEFCON 17
Indexed on
Mar 25, 2013
URL
https://media.defcon.org/dc-17/video/DEFCON%2017%20Hacking%20Conference%20Presentation%20By%20Rod%20Beckstrom%20-%20Beckstroms%20Law%20A%20Model%20for%20Valuing%20Networks%20and%20Security%20-%20Video%20and%20Slides.m4v
File name
DEFCON%2017%20Hacking%20Conference%20Presentation%20By%20Rod%20Beckstrom%20-%20Beckstroms%20Law%20A%20Model%20for%20Valuing%20Networks%20and%20Security%20-%20Video%20and%20Slides.m4v
File size
159.1 MB
MD5
00bc1190ddfbbbaaf2e3e9f9351c2005
SHA1
a7cd3f29c49a25a9d07b319f43ca9adcbb97e878

About us

Secdocs is a project aimed to index high-quality IT security and hacking documents. These are fetched from multiple data sources: events, conferences and generally from interwebs.

Statistics

Serving 8166 documents and 531.0 GB of hacking knowledge, indexed from 2419 authors from 163 security conferences.

Contribute

To support this site and keep it alive, you can click on the buttons below. Any help is really appreciated! This service is provided for free, but real money is needed to pay bills.

Flattr this Click here to lend your support to: Keep live SecDocs for an year and make a donation at www.pledgie.com !