User talk:Ada L0ve Lace/notebook: Difference between revisions
Jump to navigation
Jump to search
mNo edit summary |
mNo edit summary |
||
(One intermediate revision by the same user not shown) | |||
Line 1: | Line 1: | ||
[[File:Yoko-Tsuno-01.jpg|thumbnail|Going out of the devwiki to the outer space]] | [[File:Yoko-Tsuno-01.jpg|thumbnail|[[File:Ambox_deletion.png]]Going out of the devwiki to the outer space]] | ||
== Notebook == | == Notebook == | ||
Line 5: | Line 5: | ||
[[image:Main allpages.png|64x64px|center]] | [[image:Main allpages.png|64x64px|center]] | ||
*https://tacnetsol.wistia.com/projects/9srmkf6e02 Hardware Reverse Engineering: "Wouldn't it be nice if someone could take you by the hand and elevate your knowledge" | |||
*http://www.hpl.hp.com/research/ptm/ Polynomial Texture Maps | *http://www.hpl.hp.com/research/ptm/ Polynomial Texture Maps | ||
*http://www.cl.cam.ac.uk/~sps32/ Dr Sergei Skorobogatov - University of Cambridge | *http://www.cl.cam.ac.uk/~sps32/ Dr Sergei Skorobogatov - University of Cambridge | ||
Line 10: | Line 11: | ||
*https://www.youtube.com/watch?v=Ps8jOj7diA0 Programming Paradigms (Stanford) | *https://www.youtube.com/watch?v=Ps8jOj7diA0 Programming Paradigms (Stanford) | ||
*http://epublications.uef.fi/pub/urn_isbn_978-951-27-0111-7/urn_isbn_978-951-27-0111-7.pdf Security Threats and Countermeasures in Bluetooth-Enabled Systems (Doctoral dissertation - University of Kuopio, Finland) | *http://epublications.uef.fi/pub/urn_isbn_978-951-27-0111-7/urn_isbn_978-951-27-0111-7.pdf Security Threats and Countermeasures in Bluetooth-Enabled Systems (Doctoral dissertation - University of Kuopio, Finland) | ||
*https://labs.mwrinfosecurity.com/blog/2011/07/14/usb-fuzzing-for-the-masses/ fuzzing for the masses | *https://labs.mwrinfosecurity.com/blog/2011/07/14/usb-fuzzing-for-the-masses/ fuzzing for the masses | ||
*http://www.curtain-damashii.com/index_ag/game/meruru/ | *http://www.curtain-damashii.com/index_ag/game/meruru/ |
Latest revision as of 00:20, 17 December 2015
Notebook[edit source]
- https://tacnetsol.wistia.com/projects/9srmkf6e02 Hardware Reverse Engineering: "Wouldn't it be nice if someone could take you by the hand and elevate your knowledge"
- http://www.hpl.hp.com/research/ptm/ Polynomial Texture Maps
- http://www.cl.cam.ac.uk/~sps32/ Dr Sergei Skorobogatov - University of Cambridge
- http://home.deib.polimi.it/barenghi/doku.php?id=publist Alessandro Barenghi - Politecnico di Milano
- https://www.youtube.com/watch?v=Ps8jOj7diA0 Programming Paradigms (Stanford)
- http://epublications.uef.fi/pub/urn_isbn_978-951-27-0111-7/urn_isbn_978-951-27-0111-7.pdf Security Threats and Countermeasures in Bluetooth-Enabled Systems (Doctoral dissertation - University of Kuopio, Finland)
- https://labs.mwrinfosecurity.com/blog/2011/07/14/usb-fuzzing-for-the-masses/ fuzzing for the masses
- http://www.curtain-damashii.com/index_ag/game/meruru/
|