Securing OSS across the whole supply chain and beyond
Formal Metadata
Title |
| |
Title of Series | ||
Number of Parts | 38 | |
Author | ||
License | CC Attribution 3.0 Unported: You are free to use, adapt and copy, distribute and transmit the work or content in adapted or unchanged form for any legal purpose as long as the work is attributed to the author in the manner specified by the author or licensor. | |
Identifiers | 10.5446/66688 (DOI) | |
Publisher | ||
Release Date | ||
Language |
Content Metadata
Subject Area | ||
Genre | ||
Abstract |
|
00:00
Open sourceComputerDigital rights managementRight angleInformation securityType theoryMereologyMarkov chainInformationOpen sourceProcess (computing)Open setComputer animationLecture/ConferenceMeeting/Interview
01:06
Open sourceMarkov chainComponent-based software engineeringUbiquitous computingSoftware developerBuildingSoftware repositoryStochastic processData integrityOpen sourceCodeLevel (video gaming)Markov chainWebsiteInformation securityVulnerability (computing)Right angleSoftware repositoryGroup actionMereologyGraph (mathematics)BuildingDigital rights managementData storage deviceComputing platformMathematicsNumberThread (computing)Descriptive statisticsSoftware developerSource codeFigurate numberEvent horizonComponent-based software engineeringComputerPower (physics)CommutatorMachine codeProjective planeKernel (computing)Hacker (term)RecursionStochastic processFuzzy logicComputer animationDiagram
08:33
Stochastic processComputing platformInformation securityOpen sourceData integritySoftwareComponent-based software engineeringFile formatStandard deviationMetadataRevision controlUniqueness quantificationInformation securitySoftwarePosition operatorDatabaseStandard deviationMarkov chainVulnerability (computing)File formatStreaming mediaEvent horizonNatural numberMereologyGame controllerPower (physics)Stochastic processSoftware repositoryNumberHacker (term)TwitterComputing platformType theoryWeb browser1 (number)Multiplication signProjective planeSoftware bugRight anglePoint (geometry)FrequencyLevel (video gaming)Term (mathematics)Uniqueness quantificationRevision controlMetadataRecursionSuite (music)Thread (computing)Query languageComputer animation
15:42
Vulnerability (computing)Patch (Unix)Software developerData integrityComputer fileComputer-generated imageryBinary fileOpen sourceSurfaceHacker (term)BefehlsprozessorAuthorizationCodeIntegrated development environmentSign (mathematics)MereologyCodeData storage deviceData recoveryCloud computingBitRight angleOperating systemPhysical systemSystem administratorPoint cloudComputer fileWorkloadInternet service providerHacker (term)Patch (Unix)Thread (computing)Key (cryptography)Flow separationCartesian coordinate systemDigital rights managementSurfaceProjective planeComputerLevel (video gaming)BefehlsprozessorBinary codeMedical imagingSoftware developerSpacetimeOpen sourceIdeal (ethics)TwitterMarkov chainPoint (geometry)Stress (mechanics)System callImmersion (album)Spectrum (functional analysis)FirmwareBootingKernel (computing)Logical constantWordOperator (mathematics)Computer animation
22:49
Open sourceAuthorizationCodeIntegrated development environmentStochastic processEncryptionComputer networkMeasurementBefehlsprozessorOperations support systemMarkov chainCodeInformation privacyIntegrated development environmentComputer hardwareWordInformation securityTrigonometric functionsSign (mathematics)Cartesian coordinate systemPoint cloudComputerComplex (psychology)ArmMechanism designBefehlsprozessorServer (computing)Web browserSemiconductor memoryService (economics)MereologyRight angleComputer architectureCombinational logicHard disk driveData storage deviceMarkov chainStochastic processCloud computingOperating systemLattice (order)Dependent and independent variablesBitAuthorizationGroup actionComputer fileMedical imagingOpen sourceNetwork topologyLevel (video gaming)Moment (mathematics)Multiplication signOpen setOperator (mathematics)Computer animation
29:56
Lattice (order)Particle systemOpen sourceCodeStochastic processSoftwareLevel (video gaming)Computer architectureEndliche ModelltheorieDemosceneCryptographyMusical ensemblePerspective (visual)File formatSign (mathematics)Right angleRow (database)ComputerBefehlsprozessorAuthenticationCartesian coordinate systemBuildingKey (cryptography)Modul <Software>Operating systemData storage deviceConfidence intervalSelf-organizationWorkstation <Musikinstrument>Phase transitionMultiplication signServer (computing)Projective planeOpen sourceMereologyInformation securityTrigonometric functionsElectronic signaturePresentation of a groupSide channel attackDistribution (mathematics)QuicksortPublic-key cryptographyLecture/ConferenceComputer animationMeeting/Interview
Transcript: English(auto-generated)