- Présentations
- Documents
- Infographies
Cloud Security Mechanisms
Mohammed Sajjad Ali
•
il y a 9 ans
Encryption vs tokenisation (for share)
AndrewRJamieson
•
il y a 12 ans
Risk Management Framework
Anand Subramaniam
•
il y a 14 ans
Big Data Day LA 2015 - Data Science ≠ Big Data by Jim McGuire of ZestFinance
Data Con LA
•
il y a 8 ans
biometrics and cyber security
Karthiga Manisekaran
•
il y a 10 ans
DocuSign Company Overview
bepker
•
il y a 12 ans
Cryptocurrencies, blockchain & smart contracts: A general introduction
Raffaele Mauro
•
il y a 9 ans
Why Network and Endpoint Security Isn’t Enough
Imperva
•
il y a 8 ans
Database monitoring - First and Last Line of Defense
Imperva
•
il y a 8 ans
The State of Application Security: Hackers On Steroids
Imperva
•
il y a 8 ans
Hackers, Cyber Crime and Espionage
Imperva
•
il y a 8 ans
Webinar: Cloud-Based Web Security as First/Last Line of Defense
Cyren, Inc
•
il y a 8 ans
Top Cyber Security Trends for 2016
Imperva
•
il y a 8 ans
APT行為偵測術
Ching-Lin Tao
•
il y a 9 ans
Pki and OpenSSL
Tony Fabeen
•
il y a 10 ans
Binary Obfuscation from the Top Down: Obfuscation Executables without Writing Assembly
frank2
•
il y a 14 ans
Playing 44CON CTF for fun and profit
44CON
•
il y a 11 ans
Building the 44CON CTF
44CON
•
il y a 11 ans
44Con Malware Workshop
Iñaki Rodríguez
•
il y a 9 ans
Distributed Fuzzing Framework Design
bannedit
•
il y a 11 ans