- Présentations
- Documents
- Infographies
The Enemy Within: Stopping Advanced Attacks Against Local Users
Tal Be'ery
•
il y a 7 ans
NSC #2 - D3 03 - Jean-Philippe Aumasson - Cryptographic Backdooring
NoSuchCon
•
il y a 9 ans
The CISO's Dilemma 44CON 2019
Saumil Shah
•
il y a 4 ans
Philippe Langlois - LTE Pwnage - P1security
P1Security
•
il y a 11 ans
Cybercrimes against the korean online banking systems 1227 eng_slideshare
Youngjun Chang
•
il y a 10 ans
The Challenges of Bringing Machine Learning to the Masses
Alice Zheng
•
il y a 7 ans
BloodHound: Attack Graphs Practically Applied to Active Directory
Andy Robbins
•
il y a 5 ans
How Graphs Changed The Way Hackers Attack
Andy Robbins
•
il y a 6 ans
Deciphering the Bengladesh bank heist
Jérôme Kehrli
•
il y a 6 ans
A few thoughts on work life-balance
Wim Vanderbauwhede
•
il y a 4 ans
Automating Security and Compliance Testing of Infrastructure-as-Code for DevSecOps - SID317 - re:Invent 2017
Amazon Web Services
•
il y a 6 ans
API Management Reference Architecture
Seong-Bok Lee
•
il y a 8 ans
OAuth - Open API Authentication
leahculver
•
il y a 16 ans
Open API and the Impact on Business Models
Amancio Bouza
•
il y a 4 ans
What Makes a Great Open API?
John Musser
•
il y a 11 ans
Guidelines for implementation of open API Policy
Data Portal India
•
il y a 9 ans
Open Data & Open API in US and Worldwide
Data Portal India
•
il y a 9 ans
Twitter, facebook Open API
seulkee park
•
il y a 7 ans
OpenAPI Spec at Google (Open API Initiative Meetup on 2016-09-15)
Open API Initiative (OAI)
•
il y a 7 ans