Data |
Temat |
Prezentujący |
Materiały |
7.3.2018 |
Cryptanalysis |
Anna K. |
materials |
14.3.2018 |
Steganography |
Wojciech B. |
materials |
21.3.2018 |
Kosmiczne (nie)bezpieczeństwo |
Łukasz D. |
materials |
28.3.2018 |
DNS Security |
Andrzej K. |
materials |
11.4.2018 |
Anonymity |
Arleta J. |
materials |
18.4.2018 |
Blockchain |
Norbert J. |
materials |
25.4.2018 |
Man in the middle |
Przemysław J. |
materials |
9.5.2018 |
Network protocols security |
Elżbieta P. |
materials |
23.5.2018 |
Case study of a few tasks from choosen competitions: CTF, hackme etc. |
Karol R. |
materials |
30.5.2018 |
TPM, TEE, SGX |
Valentyn B. |
materials |
6.6.2018 |
Wireless security |
Mateusz M. |
materials |
6.6.2018 |
Random Number Generators |
Błażej S. |
materials |
13.6.2018 |
O side i covert channels na przykładzie Meltdown & Spectre |
Jan M. |
materials |
13.6.2018 |
Forensic investigation: case study |
Piotr B. |
materials |