Search for person "Walter van Holst (Vrijschrift)"
prev
38 min
oder wie man in einen Walfisch klettert, ohne ihn dabei zu…
51 min
A look at the security of 3rd party iOS applications
73 min
expanding the attack surface and then some
49 min
How to setup a MySQL cluster with Automatic failover for HA
44 min
If technology is the solution, politicians are the problem
53 min
An analysis of targeted attacks from 2005 to 2007
prev