Archived
files |
Securing the IoT Privacy\06 - Existing Standards and Regulations\04 - COBIT.mp4
[3f9f54d64c9bffd7]
|
7,107,991 |
C8A547D6 |
Securing the IoT Privacy\06 - Existing Standards and Regulations\01 - Standards, regulations, and guidelines.srt |
1,852 |
C69193F1 |
Securing the IoT Privacy\06 - Existing Standards and Regulations\03 - HIPAA.srt |
3,724 |
7F0C1802 |
Securing the IoT Privacy\06 - Existing Standards and Regulations\02 - PCI DSS.srt |
3,330 |
4BB64994 |
Securing the IoT Privacy\06 - Existing Standards and Regulations\05 - Sarbanes-Oxley.srt |
3,496 |
D9D83C69 |
Securing the IoT Privacy\06 - Existing Standards and Regulations\01 - Standards, regulations, and guidelines.mp4
[d9175afd77709932]
|
4,378,807 |
FE682550 |
Securing the IoT Privacy\06 - Existing Standards and Regulations\04 - COBIT.srt |
3,953 |
F1DC2F4E |
Securing the IoT Privacy\06 - Existing Standards and Regulations\03 - HIPAA.mp4
[ff511cd5d632fbf6]
|
5,396,895 |
2F538039 |
Securing the IoT Privacy\06 - Existing Standards and Regulations\05 - Sarbanes-Oxley.mp4
[92b6b30fd21372cc]
|
9,056,725 |
E568A053 |
Securing the IoT Privacy\06 - Existing Standards and Regulations\02 - PCI DSS.mp4
[ec9b7afa097e197]
|
4,430,830 |
4E96C217 |
Securing the IoT Privacy\03 - Potential Attacks and Glitches\02 - DDoS.mp4
[5a6ec40337179d16]
|
14,773,405 |
0E7A1C31 |
Securing the IoT Privacy\03 - Potential Attacks and Glitches\05 - Voice and sound attacks.mp4
[c210d10c621bcda9]
|
5,682,445 |
ABB277AA |
Securing the IoT Privacy\03 - Potential Attacks and Glitches\03 - Denial-of-sleep attacks.mp4
[5b9797bae5042fea]
|
6,051,331 |
CB26C807 |
Securing the IoT Privacy\03 - Potential Attacks and Glitches\04 - IoT worms.mp4
[4e12a9fc88757f54]
|
5,829,519 |
2761CD49 |
Securing the IoT Privacy\03 - Potential Attacks and Glitches\01 - Attacks and glitches.mp4
[105e17ea03cc8307]
|
4,670,112 |
DEB433F9 |
Securing the IoT Privacy\03 - Potential Attacks and Glitches\01 - Attacks and glitches.srt |
3,023 |
3956A5E7 |
Securing the IoT Privacy\03 - Potential Attacks and Glitches\03 - Denial-of-sleep attacks.srt |
4,032 |
5904FF4E |
Securing the IoT Privacy\03 - Potential Attacks and Glitches\04 - IoT worms.srt |
4,513 |
D6720706 |
Securing the IoT Privacy\03 - Potential Attacks and Glitches\02 - DDoS.srt |
6,060 |
10E6782B |
Securing the IoT Privacy\03 - Potential Attacks and Glitches\05 - Voice and sound attacks.srt |
4,094 |
169FFAF2 |
Securing the IoT Privacy\04 - Vulnerabilities\05 - Army of Things.mp4
[7e720ca66bf6e90e]
|
5,686,103 |
394A3E9B |
Securing the IoT Privacy\04 - Vulnerabilities\01 - IoT vulnerabilities.mp4
[7bf25718d5fb0640]
|
6,339,373 |
70628454 |
Securing the IoT Privacy\04 - Vulnerabilities\02 - No malware needed.srt |
4,569 |
12CB694A |
Securing the IoT Privacy\04 - Vulnerabilities\03 - Vendor backdoors.srt |
3,872 |
4691C19E |
Securing the IoT Privacy\04 - Vulnerabilities\04 - Glitches and compatibility issues.mp4
[86198b2959a514cc]
|
5,102,516 |
5133D3DD |
Securing the IoT Privacy\04 - Vulnerabilities\03 - Vendor backdoors.mp4
[3fcbaf7e8948cbcd]
|
6,050,606 |
49CB9B99 |
Securing the IoT Privacy\04 - Vulnerabilities\04 - Glitches and compatibility issues.srt |
3,633 |
84B8D434 |
Securing the IoT Privacy\04 - Vulnerabilities\01 - IoT vulnerabilities.srt |
4,444 |
EE0BB900 |
Securing the IoT Privacy\04 - Vulnerabilities\05 - Army of Things.srt |
3,770 |
A0DE9E83 |
Securing the IoT Privacy\04 - Vulnerabilities\02 - No malware needed.mp4
[a094a2439a021d85]
|
8,880,500 |
227E364C |
Securing the IoT Privacy\08 - Securing IoT Devices\01 - Firewalls and IDS.srt |
2,847 |
0A844E00 |
Securing the IoT Privacy\08 - Securing IoT Devices\03 - Blockchains and Physical Unclonable Functions (PUF).srt |
3,420 |
293EFCC7 |
Securing the IoT Privacy\08 - Securing IoT Devices\03 - Blockchains and Physical Unclonable Functions (PUF).mp4
[9e9ebbe156d4b2f7]
|
4,911,568 |
67B2B5C8 |
Securing the IoT Privacy\08 - Securing IoT Devices\04 - Education and awareness.srt |
3,584 |
B61B38B5 |
Securing the IoT Privacy\08 - Securing IoT Devices\02 - Anti-malware.srt |
3,399 |
527709C9 |
Securing the IoT Privacy\08 - Securing IoT Devices\04 - Education and awareness.mp4
[26b7d9b6e09fcb9f]
|
4,948,837 |
938998D7 |
Securing the IoT Privacy\08 - Securing IoT Devices\01 - Firewalls and IDS.mp4
[525c9afc893f7ddc]
|
3,812,156 |
9AAFDC6B |
Securing the IoT Privacy\08 - Securing IoT Devices\02 - Anti-malware.mp4
[52f1a3e92682e599]
|
4,854,746 |
8894C1D2 |
Securing the IoT Privacy\07 - Proposed Standards and Legislation\02 - Security legislation.mp4
[f1e492e0e317b473]
|
10,789,300 |
8E0D7595 |
Securing the IoT Privacy\07 - Proposed Standards and Legislation\01 - Need for standards.mp4
[2d762acae00fa3a6]
|
7,654,959 |
89518832 |
Securing the IoT Privacy\07 - Proposed Standards and Legislation\04 - NIST and OWASP.srt |
5,087 |
7E5BBEDD |
Securing the IoT Privacy\07 - Proposed Standards and Legislation\05 - IoT protocols.mp4
[fda24d3adae96baa]
|
7,815,365 |
CD8AFA9C |
Securing the IoT Privacy\07 - Proposed Standards and Legislation\03 - IoT Security Foundation.srt |
3,202 |
61385EA2 |
Securing the IoT Privacy\07 - Proposed Standards and Legislation\05 - IoT protocols.srt |
5,201 |
E5C3A34D |
Securing the IoT Privacy\07 - Proposed Standards and Legislation\02 - Security legislation.srt |
5,353 |
22140870 |
Securing the IoT Privacy\07 - Proposed Standards and Legislation\06 - Common IoT language.srt |
3,465 |
D8DDA268 |
Securing the IoT Privacy\07 - Proposed Standards and Legislation\04 - NIST and OWASP.mp4
[f35dc3610d9715aa]
|
10,939,473 |
7F4DEFA9 |
Securing the IoT Privacy\07 - Proposed Standards and Legislation\01 - Need for standards.srt |
4,824 |
8C4C4E5E |
Securing the IoT Privacy\07 - Proposed Standards and Legislation\06 - Common IoT language.mp4
[d64755fccbf11ff4]
|
6,616,274 |
C110B19B |
Securing the IoT Privacy\07 - Proposed Standards and Legislation\03 - IoT Security Foundation.mp4
[a8600aaf9b26ba8c]
|
4,754,668 |
D056F6DC |
Securing the IoT Privacy\02 - Overview\04 - Privacy.srt |
4,559 |
35CBC357 |
Securing the IoT Privacy\02 - Overview\01 - Security, privacy, and IoT.mp4
[885b7246fd838a5a]
|
5,311,659 |
2B439ED6 |
Securing the IoT Privacy\02 - Overview\05 - Massive adoption.mp4
[d832ddae470179a3]
|
6,511,634 |
8F3D40F8 |
Securing the IoT Privacy\02 - Overview\03 - Security.mp4
[6d17f4f317e95224]
|
4,346,950 |
B9E57BE3 |
Securing the IoT Privacy\02 - Overview\05 - Massive adoption.srt |
4,754 |
63D4955D |
Securing the IoT Privacy\02 - Overview\01 - Security, privacy, and IoT.srt |
3,210 |
6DAA491D |
Securing the IoT Privacy\02 - Overview\04 - Privacy.mp4
[8d527654dc1b1055]
|
6,452,970 |
3B092525 |
Securing the IoT Privacy\02 - Overview\02 - Internet of Things.mp4
[ff4905899d5fadaa]
|
6,549,170 |
8F6FE805 |
Securing the IoT Privacy\02 - Overview\02 - Internet of Things.srt |
3,997 |
9C1DDACC |
Securing the IoT Privacy\02 - Overview\03 - Security.srt |
3,232 |
E468A68B |
Securing the IoT Privacy\05 - Privacy\02 - Spying.srt |
4,902 |
44188D91 |
Securing the IoT Privacy\05 - Privacy\01 - Privacy concerns.srt |
3,653 |
3DB49343 |
Securing the IoT Privacy\05 - Privacy\05 - Government.mp4
[78a13fc72eeea610]
|
7,695,872 |
BFDBB06D |
Securing the IoT Privacy\05 - Privacy\04 - Independent devices.mp4
[a8215ea1c7542cf3]
|
6,564,869 |
51DB304A |
Securing the IoT Privacy\05 - Privacy\05 - Government.srt |
4,732 |
25169561 |
Securing the IoT Privacy\05 - Privacy\04 - Independent devices.srt |
4,885 |
1A72B500 |
Securing the IoT Privacy\05 - Privacy\03 - Data collection.srt |
5,431 |
A43F19ED |
Securing the IoT Privacy\05 - Privacy\01 - Privacy concerns.mp4
[43e64775bfdbdd07]
|
5,769,934 |
95D8B9FE |
Securing the IoT Privacy\05 - Privacy\02 - Spying.mp4
[9e14cb4c48627f77]
|
8,292,510 |
8002475E |
Securing the IoT Privacy\05 - Privacy\03 - Data collection.mp4
[6dde72b779d31653]
|
8,618,125 |
F2BE052E |
Securing the IoT Privacy\09 - Conclusion\01 - Next steps.srt |
2,632 |
A53C3ED1 |
Securing the IoT Privacy\09 - Conclusion\01 - Next steps.mp4
[1ec4ac1510c907aa]
|
3,286,449 |
24BEA6B8 |
Securing the IoT Privacy\01 - Introduction\01 - Welcome.mp4
[e2473fd13f75192d]
|
8,945,589 |
50F74241 |
Securing the IoT Privacy\01 - Introduction\02 - What you should know.srt |
916 |
560BB7BA |
Securing the IoT Privacy\01 - Introduction\02 - What you should know.mp4
[e8948572cc8bd40e]
|
1,111,047 |
B36C3EA5 |
Securing the IoT Privacy\01 - Introduction\01 - Welcome.srt |
1,945 |
D2E8C4AC |
Securing the IoT Privacy\06 - Existing Standards and Regulations |
0 |
00000000 |
Securing the IoT Privacy\03 - Potential Attacks and Glitches |
0 |
00000000 |
Securing the IoT Privacy\04 - Vulnerabilities |
0 |
00000000 |
Securing the IoT Privacy\08 - Securing IoT Devices |
0 |
00000000 |
Securing the IoT Privacy\07 - Proposed Standards and Legislation |
0 |
00000000 |
Securing the IoT Privacy\02 - Overview |
0 |
00000000 |
Securing the IoT Privacy\05 - Privacy |
0 |
00000000 |
Securing the IoT Privacy\09 - Conclusion |
0 |
00000000 |
Securing the IoT Privacy\01 - Introduction |
0 |
00000000 |
Securing the IoT Privacy |
0 |
00000000 |
|
Total size: |
246,138,877 |
|
|