- Présentations
- Documents
- Infographies
Cryptography.ppt
kusum sharma
•
il y a 10 ans
3d password ppt
Gowsalyasri
•
il y a 11 ans
Cisco Network Icon Library
mike_adolphs
•
il y a 16 ans
Introduction to Digital signatures
Rohit Bhat
•
il y a 13 ans
40 WordPress Tips: Security, Engagement, SEO & Performance - SMX Sydney 2013
Bastian Grimm
•
il y a 11 ans
6 Physical Security
Alfred Ouyang
•
il y a 12 ans
Computer Security Threats
Quick Heal Technologies Ltd.
•
il y a 9 ans
Data Storage Tips for Optimal Spark Performance-(Vida Ha, Databricks)
Spark Summit
•
il y a 8 ans
Disaster Recovery & Data Backup Strategies
Spiceworks
•
il y a 15 ans
8 Access Control
Alfred Ouyang
•
il y a 12 ans
Detecting Fraud Using Data Mining Techniques
DecosimoCPAs
•
il y a 12 ans
Online Scams and Frauds
Quick Heal Technologies Ltd.
•
il y a 9 ans
General Awareness On Cyber Security
Dominic Rajesh
•
il y a 14 ans
ISO 27004- Information Security Metrics Implementation
Network Intelligence India
•
il y a 10 ans
Tips for Doing Accurate Data Journalism
Craig Silverman
•
il y a 9 ans
Teaching In Flat World
Britt Watwood
•
il y a 16 ans
10 apps to boost your productivity
University of Southern Queensland
•
il y a 9 ans
Cehv8 - Module 17: Evading, IDS, firewalls, and honeypots
Vuz Dở Hơi
•
il y a 9 ans
SharePoint Security Management - Lessons Learned
Benjamin Niaulin
•
il y a 9 ans
Cehv8 - Module 16: Hacking Mobile Platforms
Vuz Dở Hơi
•
il y a 9 ans