RU | EN

PARTNERS AND SPONSORS 2011

 

 

 

 

PHD 2011 Materials

VoIP security legends and myths

Konstantin Gurzov, Positive Technologies


Head in the Clouds… Can we overcome security fears for cloud computing?

Christopher Gould, PwC


Vulnerabilities in the Systems of Authenticity Control of Digital Photographic Images

Dmitry Sklyarov, Elcomsoft


Zero Day for SCADA

Yury Gurkin, GLEG Ltd.


Automatic search for vulnerabilities in programs without source codes… or introduction into fuzzing

Dmitry Oleksyuk, eSage Lab


Vulnerabilities in Web - difficulties

Yury Goltsev, Information Security Expert, Positive Technologies


Analysis of network infrastructure security

Sergey Pavlov, Positive Technologies


VOIP insecurities workshop

Gleb Gritsai, Positive Technologies


Analysis of SCADA security protection

Andrey Komarov, Stankoinformzaschita Research and Development Center


Conducting Forensic Examination and Analysis of Rootkits (by the Example of TDL4)

Alexander Matrosov, ESET

__________________________________ __________________________________ __________________________________ __________________________________
Copyright © 2011
Positive Technologies