_    ___ ___      _                               
/ \ |_ _/ _ \ ___| |_ _ __ ___ __ _ _ __ ___ ___
/ _ \ | | | | / __| __| '__/ _ \/ _` | '_ ` _ \/ __|
/ ___ \ | | |_| \__ \ |_| | | __/ (_| | | | | | \__ \
/_/ \_\___\___/|___/\__|_| \___|\__,_|_| |_| |_|___/
Twitch
Invidious (YT)

Invidious > Channel > securitylectures

Trending
securitylectures 6840 subscribers    RSS
View channel on YouTube
Videos
Playlists

YT 31 minutes 3 seconds
1.4K views Shared 3 years ago
securitylectures
Greg Wilson's CUSEC 2010 Keynote
YT 43 minutes 11 seconds
24K views Shared 12 years ago
securitylectures
Hamming, "Foundations of the Digital (Discrete) Revolution" (March 30, 1995)
YT 1 hour 7 minutes 43 seconds
360 views Shared 12 years ago
securitylectures
William H. Murray, Use of System and Network Configuration for Security (August 14, 2001)
YT 56 minutes 21 seconds
317 views Shared 12 years ago
securitylectures
Roger Schell, Creating PKI You Can Trust (July 18, 2001)
YT 56 minutes 33 seconds
125 views Shared 12 years ago
securitylectures
Yves Deswarte, Privacy enhanced Internet (November 19, 2002)
YT 47 minutes 38 seconds
158 views Shared 12 years ago
securitylectures
Marcus Sachs, A National Strategy to Secure Cyberspace (November 14, 2002)
YT 50 minutes 39 seconds
82 views Shared 12 years ago
securitylectures
Todd Heberlein, Environment Aware Security (November 13, 2003)
YT 48 minutes 57 seconds
2.9K views Shared 12 years ago
securitylectures
Daniel Faigin, Overview of Common Criteria (September 10, 2003)
YT 1 hour 13 minutes 52 seconds
326 views Shared 12 years ago
securitylectures
Stuart McClure, Hacking Exposed (September 22, 2003)
YT 56 minutes 57 seconds
1.1K views Shared 12 years ago
securitylectures
Matt Bishop, Vulnerabilities Analysis (December 4, 2003)
YT 52 minutes 36 seconds
231 views Shared 12 years ago
securitylectures
William Crowell, The Compelling Business Case for Information Security (August 22, 2001)
YT 48 minutes 17 seconds
199 views Shared 12 years ago
securitylectures
Edwin L. Armistead, Task Force Web (February 20, 2003)
YT 14 minutes 43 seconds
445 views Shared 12 years ago
securitylectures
Mark Heckman, Reducing IDS False Positives (July 21, 2003)
YT 52 minutes 20 seconds
106 views Shared 12 years ago
securitylectures
Pat Riley, An Intelligent Internet (January 24, 2002)
YT 44 minutes 42 seconds
139 views Shared 12 years ago
securitylectures
Arthur Pyster, A New Look at Cyber Defense (October 16, 2003)
YT 55 minutes 2 seconds
578 views Shared 12 years ago
securitylectures
Mark S. Miller, Immunity from Viruses, Safety from Geeks Bearing Gifts (May 9, 2002)
YT 49 minutes 13 seconds
358 views Shared 12 years ago
securitylectures
Rob Beck and Dave Aitel, SHAREFUZZ - Security Related Stress Testing Tool (August 1, 2001)
YT 24 minutes 28 seconds
616 views Shared 12 years ago
securitylectures
Jennifer Granick, Do You Need a Handle on the Law? (January 15, 2004)
YT 52 minutes 7 seconds
178 views Shared 12 years ago
securitylectures
Drew Dean, Deconstructing Trust Management (September 05, 2001)
YT 1 hour 4 minutes 14 seconds
159 views Shared 12 years ago
securitylectures
Dave M. Wennergren, 2001 - A Cyberspace Odyssey (October 31, 2001)
YT 55 minutes 51 seconds
1.4K views Shared 12 years ago
securitylectures
Adam Young, Malicious Cryptography - Exposing Cryptovirology (February 27, 2004)
YT 44 minutes 43 seconds
309 views Shared 12 years ago
securitylectures
Sean Geddis and John Hurley, Mac OS X Security Features and Fundamentals (December 5, 2001)
YT 1 hour 1 minute 58 seconds
312 views Shared 12 years ago
securitylectures
William L. Tafoya, America's Critical Info. Infrastructure and Homeland Defense (April 18, 2002)
YT 28 minutes 21 seconds
497 views Shared 12 years ago
securitylectures
Mark-Oliver Stehr, Formal Methods in the Dev. of HA Secure Systems (July 30, 2003)
YT 54 minutes 50 seconds
432 views Shared 12 years ago
securitylectures
Bob Blakley, Digital Signatures (August 22, 2003)
YT 51 minutes 51 seconds
556 views Shared 12 years ago
securitylectures
David A. McGrew, Scalable Efficient Cryptography for Multiple Security Services (July 29, 2004)
YT 1 hour 3 minutes 48 seconds
658 views Shared 12 years ago
securitylectures
Ruby B. Lee, Protecting Critical Secrets with SP Processors (September 7, 2006)
YT 53 minutes 13 seconds
1.7K views Shared 12 years ago
securitylectures
Luther Martin, Identity Based Encryption vs. PKI (May 27, 2004)
YT 56 minutes 42 seconds
660 views Shared 12 years ago
securitylectures
Sean Peisert, A Model of Computer Forensic Logging and Analysis (August 28, 2008)
YT 1 hour 3 minutes 49 seconds
726 views Shared 12 years ago
securitylectures
Kang G. Shin, E-MiLi: Energy-Minimizing Idle Listening in Wireless Networks (February 3, 2012)
YT 59 minutes 44 seconds
742 views Shared 12 years ago
securitylectures
Ryan Kastner, Reconfigurable Hardware Security (August 11, 2005)
YT 52 minutes 32 seconds
359 views Shared 12 years ago
securitylectures
Craig Partridge, Realizing the Future of Wireless Data Communications (October 19, 2010)
YT 56 minutes 6 seconds
55 views Shared 12 years ago
securitylectures
Debra Cook, Elastic Block Ciphers (February 9, 2006)
YT 57 minutes 38 seconds
1.3K views Shared 12 years ago
securitylectures
Jennifer Granick, The State of Cyber Law (May 18, 2006)
YT 34 minutes 30 seconds
129 views Shared 12 years ago
securitylectures
Bora Akyol, Does IPSEC Secure Networks? (March 11, 2004)
YT 59 minutes 38 seconds
627 views Shared 12 years ago
securitylectures
John Launchbury, Cryptol in Future Cryptographic Evaluations (February 16, 2006)
YT 59 minutes 18 seconds
381 views Shared 12 years ago
securitylectures
Nicholas Weaver, Serendipity and Spam (October 6, 2011)
YT 1 hour 4 seconds
194 views Shared 12 years ago
securitylectures
Tim Sherwood, A Real time Packet Scan Architecture (July 14, 2005)
YT 53 minutes 48 seconds
380 views Shared 12 years ago
securitylectures
Simson Garfinkel, Disk Sanitization and Cross Drive Forensics (September 8, 2005)
YT 1 hour 3 minutes 47 seconds
522 views Shared 12 years ago
securitylectures
Arthur Berger, Comparison of Performance over IPv6 versus IPv4 (September 29, 2011)
YT 48 minutes 38 seconds
368 views Shared 12 years ago
securitylectures
Carol Taylor, MILS: A High Assurance Architecture (May 11, 2006)
YT 1 hour 25 seconds
1.9K views Shared 12 years ago
securitylectures
Donn B. Parker, What's Wrong With Information Security And How To Fix It (April 28, 2005)
YT 51 minutes 40 seconds
222 views Shared 12 years ago
securitylectures
Dan Ryan, Statistical Analysis in Information Assurance (January 6, 2005)
YT 1 hour 4 minutes 31 seconds
223 views Shared 12 years ago
securitylectures
Jonathan K. Millen, Constraint Solving for Protocol Analysis (August 5, 2004)
YT 56 minutes 45 seconds
479 views Shared 12 years ago
securitylectures
Rance DeLong, MLS with MILS? (March 2, 2006)
YT 1 hour 13 minutes 59 seconds
163 views Shared 12 years ago
securitylectures
Shawn Geddis, Tiger: How It Works for the DOD (June 14, 2005)
YT 1 hour 4 minutes 54 seconds
130 views Shared 12 years ago
securitylectures
Chris Eagle, Interz0ne Panel Discussion (April 29, 2004)
YT 44 minutes 20 seconds
4.1K views Shared 12 years ago
securitylectures
Hamming, "Coding Theory - The Representation of Information, Part II" (April 20, 1995)
YT 47 minutes 22 seconds
1.7K views Shared 12 years ago
securitylectures
Hamming, "Computer Aided Instruction" (May 16, 1995)
YT 48 minutes 2 seconds
1.9K views Shared 12 years ago
securitylectures
Hamming, "Simulation, Part III" (May 11, 1995)
YT 44 minutes 19 seconds
262K views Shared 12 years ago
securitylectures
Hamming, "You and Your Research" (June 6, 1995)
YT 40 minutes 38 seconds
10K views Shared 12 years ago
securitylectures
Hamming, "How Do We Know What We Know" (June 2, 1995)
YT 36 minutes 27 seconds
4.4K views Shared 12 years ago
securitylectures
Hamming, "Unreliable Data" (May 26, 1995)
YT 50 minutes 49 seconds
8.5K views Shared 12 years ago
securitylectures
Hamming, "You Get What You Measure" (June 1, 1995)
YT 45 minutes 35 seconds
12K views Shared 12 years ago
securitylectures
Hamming, "Mathematics" (May 18, 1995)
YT 44 minutes 31 seconds
10K views Shared 12 years ago
securitylectures
Hamming, "Experts" (May 25, 1995)
YT 39 minutes 18 seconds
1.9K views Shared 12 years ago
securitylectures
Hamming, "Simulation, Part II" (May 9, 1995)
YT 47 minutes 20 seconds
122K views Shared 12 years ago
securitylectures
Hamming, Intro to The Art of Doing Science and Engineering: Learning to Learn (March 28, 1995)
YT 41 minutes 53 seconds
5.8K views Shared 12 years ago
securitylectures
Dr. Hamming's 1990 NPS SGL Lecture
YT 45 minutes 43 seconds
6.2K views Shared 12 years ago
securitylectures
Hamming, "Systems Engineering" (May 30, 1995)