Learn, hack!

Hacking and security documentation: slides, papers, video and audio recordings. All in high-quality, daily updated, avoiding security crap documents. Spreading hacking knowledge, for free, enjoy. Follow on .

Introducing the Time Based Security Model and Applying Military Strategies to Network and Infrastructural Securitues

Type
Audio
Tags
network
Authors
Winn Schwartau
Event
DEFCON 6
Indexed on
Mar 27, 2013
URL
https://media.defcon.org/dc-6/audio/DEFCON%206%20Hacking%20Conference%20Presentation%20By%20Winn%20Schwartau%20-%20Introducing%20the%20Time%20Based%20Security%20Model%20and%20Applying%20Military%20Strategies%20-%20Audio.m4b
File name
DEFCON%206%20Hacking%20Conference%20Presentation%20By%20Winn%20Schwartau%20-%20Introducing%20the%20Time%20Based%20Security%20Model%20and%20Applying%20Military%20Strategies%20-%20Audio.m4b
File size
16.8 MB
MD5
8b2fc6e9aa6b1be80c0a1bc1421d57e3
SHA1
b3a93d28da313c86ac2563b40fb18099c4bb9528

About us

Secdocs is a project aimed to index high-quality IT security and hacking documents. These are fetched from multiple data sources: events, conferences and generally from interwebs.

Statistics

Serving 8166 documents and 531.0 GB of hacking knowledge, indexed from 2419 authors from 163 security conferences.

Contribute

To support this site and keep it alive, you can click on the buttons below. Any help is really appreciated! This service is provided for free, but real money is needed to pay bills.

Flattr this Click here to lend your support to: Keep live SecDocs for an year and make a donation at www.pledgie.com !