Enviar pesquisa
Carregar
Web2.0 : an introduction
•
Transferir como PPT, PDF
•
20 gostaram
•
3,620 visualizações
Anant Shrivastava
Seguir
web2.0 what it is all about
Leia menos
Leia mais
Tecnologia
Design
Denunciar
Compartilhar
Denunciar
Compartilhar
1 de 44
Baixar agora
Recomendados
My tryst with sourcecode review
My tryst with sourcecode review
Anant Shrivastava
Tw noche geek quito webappsec
Tw noche geek quito webappsec
Thoughtworks
Entomology 101
Entomology 101
snyff
Hunting for the secrets in a cloud forest
Hunting for the secrets in a cloud forest
SecuRing
Tale of Forgotten Disclosure and Lesson learned
Tale of Forgotten Disclosure and Lesson learned
Anant Shrivastava
Lares from LOW to PWNED
Lares from LOW to PWNED
Chris Gates
BSides_Charm2015_Info sec hunters_gathers
BSides_Charm2015_Info sec hunters_gathers
Andrew McNicol
When the internet bleeded : RootConf 2014
When the internet bleeded : RootConf 2014
Anant Shrivastava
Recomendados
My tryst with sourcecode review
My tryst with sourcecode review
Anant Shrivastava
Tw noche geek quito webappsec
Tw noche geek quito webappsec
Thoughtworks
Entomology 101
Entomology 101
snyff
Hunting for the secrets in a cloud forest
Hunting for the secrets in a cloud forest
SecuRing
Tale of Forgotten Disclosure and Lesson learned
Tale of Forgotten Disclosure and Lesson learned
Anant Shrivastava
Lares from LOW to PWNED
Lares from LOW to PWNED
Chris Gates
BSides_Charm2015_Info sec hunters_gathers
BSides_Charm2015_Info sec hunters_gathers
Andrew McNicol
When the internet bleeded : RootConf 2014
When the internet bleeded : RootConf 2014
Anant Shrivastava
REST API Pentester's perspective
REST API Pentester's perspective
SecuRing
DevSecCon Tel Aviv 2018 - Integrated Security Testing by Morgan Roman
DevSecCon Tel Aviv 2018 - Integrated Security Testing by Morgan Roman
DevSecCon
Introduction to Penetration Testing
Introduction to Penetration Testing
Andrew McNicol
DevOops Redux Ken Johnson Chris Gates - AppSec USA 2016
DevOops Redux Ken Johnson Chris Gates - AppSec USA 2016
Chris Gates
Email keeps getting us pwned - Avoiding Ransomware and malware
Email keeps getting us pwned - Avoiding Ransomware and malware
Michael Gough
Pentesting Tips: Beyond Automated Testing
Pentesting Tips: Beyond Automated Testing
Andrew McNicol
Email keeps getting us pwned v1.0
Email keeps getting us pwned v1.0
Michael Gough
The OWASP Zed Attack Proxy
The OWASP Zed Attack Proxy
Aditya Gupta
[Wroclaw #7] Why So Serial?
[Wroclaw #7] Why So Serial?
OWASP
Hunting for the secrets in a cloud forest
Hunting for the secrets in a cloud forest
SecuRing
Owasp tds
Owasp tds
snyff
BSidesJXN 2017 - Improving Vulnerability Management
BSidesJXN 2017 - Improving Vulnerability Management
Andrew McNicol
DevSecCon Tel Aviv 2018 - Security Testing for Containerised Apps by Omer Levi
DevSecCon Tel Aviv 2018 - Security Testing for Containerised Apps by Omer Levi
DevSecCon
WordPress Security for Beginners
WordPress Security for Beginners
Adam W. Warner
Mw arch mac_tips and tricks v1.0
Mw arch mac_tips and tricks v1.0
Michael Gough
DevSecCon Tel Aviv 2018 - Value driven threat modeling by Avi Douglen
DevSecCon Tel Aviv 2018 - Value driven threat modeling by Avi Douglen
DevSecCon
OWASP WTE - Now in the Cloud!
OWASP WTE - Now in the Cloud!
Matt Tesauro
Deeplook into apt and how to detect and defend v1.0
Deeplook into apt and how to detect and defend v1.0
Michael Gough
Secure Yourself, Practice what we preach - BSides Austin 2015
Secure Yourself, Practice what we preach - BSides Austin 2015
Michael Gough
(java2days) The Anatomy of Java Vulnerabilities
(java2days) The Anatomy of Java Vulnerabilities
Steve Poole
Career In Information security
Career In Information security
Anant Shrivastava
Raspberry pi Beginners Session
Raspberry pi Beginners Session
Anant Shrivastava
Mais conteúdo relacionado
Mais procurados
REST API Pentester's perspective
REST API Pentester's perspective
SecuRing
DevSecCon Tel Aviv 2018 - Integrated Security Testing by Morgan Roman
DevSecCon Tel Aviv 2018 - Integrated Security Testing by Morgan Roman
DevSecCon
Introduction to Penetration Testing
Introduction to Penetration Testing
Andrew McNicol
DevOops Redux Ken Johnson Chris Gates - AppSec USA 2016
DevOops Redux Ken Johnson Chris Gates - AppSec USA 2016
Chris Gates
Email keeps getting us pwned - Avoiding Ransomware and malware
Email keeps getting us pwned - Avoiding Ransomware and malware
Michael Gough
Pentesting Tips: Beyond Automated Testing
Pentesting Tips: Beyond Automated Testing
Andrew McNicol
Email keeps getting us pwned v1.0
Email keeps getting us pwned v1.0
Michael Gough
The OWASP Zed Attack Proxy
The OWASP Zed Attack Proxy
Aditya Gupta
[Wroclaw #7] Why So Serial?
[Wroclaw #7] Why So Serial?
OWASP
Hunting for the secrets in a cloud forest
Hunting for the secrets in a cloud forest
SecuRing
Owasp tds
Owasp tds
snyff
BSidesJXN 2017 - Improving Vulnerability Management
BSidesJXN 2017 - Improving Vulnerability Management
Andrew McNicol
DevSecCon Tel Aviv 2018 - Security Testing for Containerised Apps by Omer Levi
DevSecCon Tel Aviv 2018 - Security Testing for Containerised Apps by Omer Levi
DevSecCon
WordPress Security for Beginners
WordPress Security for Beginners
Adam W. Warner
Mw arch mac_tips and tricks v1.0
Mw arch mac_tips and tricks v1.0
Michael Gough
DevSecCon Tel Aviv 2018 - Value driven threat modeling by Avi Douglen
DevSecCon Tel Aviv 2018 - Value driven threat modeling by Avi Douglen
DevSecCon
OWASP WTE - Now in the Cloud!
OWASP WTE - Now in the Cloud!
Matt Tesauro
Deeplook into apt and how to detect and defend v1.0
Deeplook into apt and how to detect and defend v1.0
Michael Gough
Secure Yourself, Practice what we preach - BSides Austin 2015
Secure Yourself, Practice what we preach - BSides Austin 2015
Michael Gough
(java2days) The Anatomy of Java Vulnerabilities
(java2days) The Anatomy of Java Vulnerabilities
Steve Poole
Mais procurados
(20)
REST API Pentester's perspective
REST API Pentester's perspective
DevSecCon Tel Aviv 2018 - Integrated Security Testing by Morgan Roman
DevSecCon Tel Aviv 2018 - Integrated Security Testing by Morgan Roman
Introduction to Penetration Testing
Introduction to Penetration Testing
DevOops Redux Ken Johnson Chris Gates - AppSec USA 2016
DevOops Redux Ken Johnson Chris Gates - AppSec USA 2016
Email keeps getting us pwned - Avoiding Ransomware and malware
Email keeps getting us pwned - Avoiding Ransomware and malware
Pentesting Tips: Beyond Automated Testing
Pentesting Tips: Beyond Automated Testing
Email keeps getting us pwned v1.0
Email keeps getting us pwned v1.0
The OWASP Zed Attack Proxy
The OWASP Zed Attack Proxy
[Wroclaw #7] Why So Serial?
[Wroclaw #7] Why So Serial?
Hunting for the secrets in a cloud forest
Hunting for the secrets in a cloud forest
Owasp tds
Owasp tds
BSidesJXN 2017 - Improving Vulnerability Management
BSidesJXN 2017 - Improving Vulnerability Management
DevSecCon Tel Aviv 2018 - Security Testing for Containerised Apps by Omer Levi
DevSecCon Tel Aviv 2018 - Security Testing for Containerised Apps by Omer Levi
WordPress Security for Beginners
WordPress Security for Beginners
Mw arch mac_tips and tricks v1.0
Mw arch mac_tips and tricks v1.0
DevSecCon Tel Aviv 2018 - Value driven threat modeling by Avi Douglen
DevSecCon Tel Aviv 2018 - Value driven threat modeling by Avi Douglen
OWASP WTE - Now in the Cloud!
OWASP WTE - Now in the Cloud!
Deeplook into apt and how to detect and defend v1.0
Deeplook into apt and how to detect and defend v1.0
Secure Yourself, Practice what we preach - BSides Austin 2015
Secure Yourself, Practice what we preach - BSides Austin 2015
(java2days) The Anatomy of Java Vulnerabilities
(java2days) The Anatomy of Java Vulnerabilities
Destaque
Career In Information security
Career In Information security
Anant Shrivastava
Raspberry pi Beginners Session
Raspberry pi Beginners Session
Anant Shrivastava
Owasp Mobile Risk M2 : Insecure Data Storage : null/OWASP/G4H Bangalore Aug 2014
Owasp Mobile Risk M2 : Insecure Data Storage : null/OWASP/G4H Bangalore Aug 2014
Anant Shrivastava
Avr introduction
Avr introduction
Anant Shrivastava
Security Issues in Android Custom ROM
Security Issues in Android Custom ROM
Anant Shrivastava
Android Tamer BH USA 2016 : Arsenal Presentation
Android Tamer BH USA 2016 : Arsenal Presentation
Anant Shrivastava
Snake bites : Python for Pentesters
Snake bites : Python for Pentesters
Anant Shrivastava
Null bhopal Sep 2016: What it Takes to Secure a Web Application
Null bhopal Sep 2016: What it Takes to Secure a Web Application
Anant Shrivastava
Android Tamer: Virtual Machine for Android (Security) Professionals
Android Tamer: Virtual Machine for Android (Security) Professionals
Anant Shrivastava
OWASP Bangalore : OWTF demo : 13 Dec 2014
OWASP Bangalore : OWTF demo : 13 Dec 2014
Anant Shrivastava
Exploiting publically exposed Version Control System
Exploiting publically exposed Version Control System
Anant Shrivastava
Slides null puliya linux basics
Slides null puliya linux basics
Anant Shrivastava
Understanding The Known: OWASP A9 Using Components With Known Vulnerabilities
Understanding The Known: OWASP A9 Using Components With Known Vulnerabilities
Anant Shrivastava
SSL Pinning and Bypasses: Android and iOS
SSL Pinning and Bypasses: Android and iOS
Anant Shrivastava
Owasp Mobile Risk Series : M4 : Unintended Data Leakage
Owasp Mobile Risk Series : M4 : Unintended Data Leakage
Anant Shrivastava
Owasp Mobile Risk Series : M3 : Insufficient Transport Layer Protection
Owasp Mobile Risk Series : M3 : Insufficient Transport Layer Protection
Anant Shrivastava
Web 2
Web 2
fatimah AL-malwi
Nullcon Hack IM 2011 walk through
Nullcon Hack IM 2011 walk through
Anant Shrivastava
introduction to Lamp Stack
introduction to Lamp Stack
Anant Shrivastava
عناصر التصميم التعليمى
عناصر التصميم التعليمى
Sahar Mahmoud
Destaque
(20)
Career In Information security
Career In Information security
Raspberry pi Beginners Session
Raspberry pi Beginners Session
Owasp Mobile Risk M2 : Insecure Data Storage : null/OWASP/G4H Bangalore Aug 2014
Owasp Mobile Risk M2 : Insecure Data Storage : null/OWASP/G4H Bangalore Aug 2014
Avr introduction
Avr introduction
Security Issues in Android Custom ROM
Security Issues in Android Custom ROM
Android Tamer BH USA 2016 : Arsenal Presentation
Android Tamer BH USA 2016 : Arsenal Presentation
Snake bites : Python for Pentesters
Snake bites : Python for Pentesters
Null bhopal Sep 2016: What it Takes to Secure a Web Application
Null bhopal Sep 2016: What it Takes to Secure a Web Application
Android Tamer: Virtual Machine for Android (Security) Professionals
Android Tamer: Virtual Machine for Android (Security) Professionals
OWASP Bangalore : OWTF demo : 13 Dec 2014
OWASP Bangalore : OWTF demo : 13 Dec 2014
Exploiting publically exposed Version Control System
Exploiting publically exposed Version Control System
Slides null puliya linux basics
Slides null puliya linux basics
Understanding The Known: OWASP A9 Using Components With Known Vulnerabilities
Understanding The Known: OWASP A9 Using Components With Known Vulnerabilities
SSL Pinning and Bypasses: Android and iOS
SSL Pinning and Bypasses: Android and iOS
Owasp Mobile Risk Series : M4 : Unintended Data Leakage
Owasp Mobile Risk Series : M4 : Unintended Data Leakage
Owasp Mobile Risk Series : M3 : Insufficient Transport Layer Protection
Owasp Mobile Risk Series : M3 : Insufficient Transport Layer Protection
Web 2
Web 2
Nullcon Hack IM 2011 walk through
Nullcon Hack IM 2011 walk through
introduction to Lamp Stack
introduction to Lamp Stack
عناصر التصميم التعليمى
عناصر التصميم التعليمى
Semelhante a Web2.0 : an introduction
Web 2.0 - Open Source Perspective
Web 2.0 - Open Source Perspective
Gautam Kishore
Web20 1210357974996841-8(1)
Web20 1210357974996841-8(1)
leninlf7
Why Open Source, I have Microsoft ?
Why Open Source, I have Microsoft ?
Neeraj Agarwal
Why Open Source, I have Microsoft ?
Why Open Source, I have Microsoft ?
Neeraj Agarwal
Web 2.0: Implications for Library Services
Web 2.0: Implications for Library Services
ADINET Ahmedabad
Web 2.0: a course
Web 2.0: a course
Carlo Vaccari
Beyond Web 2.0 ... What's Next?
Beyond Web 2.0 ... What's Next?
Nicole C. Engard
Web 2.0 Instructional Tools
Web 2.0 Instructional Tools
Antwuan Stinson
Update08 Web2
Update08 Web2
Snoop Consulting
Web 2.0 By Nyros Developer
Web 2.0 By Nyros Developer
Nyros Technologies
WEB 2.0 Ppt
WEB 2.0 Ppt
Abubucker Siddique
Web2 0 Ppt
Web2 0 Ppt
surenth
Emerging Technologies
Emerging Technologies
Abhishek Srivastava
Web 2.0 Online Collaboration (Public)
Web 2.0 Online Collaboration (Public)
Daniel Livingstone
Web 2.0
Web 2.0
rdbms
Web 2.0 lib_2.0_1
Web 2.0 lib_2.0_1
smtcd
web training
web training
sourabh4u
Web 1.02.03.0 Good.ppt
Web 1.02.03.0 Good.ppt
BalasundaramSr
An Introduction to Web 2.0
An Introduction to Web 2.0
lisbk
Web 2.0 Rvce Mca
Web 2.0 Rvce Mca
sundeepa
Semelhante a Web2.0 : an introduction
(20)
Web 2.0 - Open Source Perspective
Web 2.0 - Open Source Perspective
Web20 1210357974996841-8(1)
Web20 1210357974996841-8(1)
Why Open Source, I have Microsoft ?
Why Open Source, I have Microsoft ?
Why Open Source, I have Microsoft ?
Why Open Source, I have Microsoft ?
Web 2.0: Implications for Library Services
Web 2.0: Implications for Library Services
Web 2.0: a course
Web 2.0: a course
Beyond Web 2.0 ... What's Next?
Beyond Web 2.0 ... What's Next?
Web 2.0 Instructional Tools
Web 2.0 Instructional Tools
Update08 Web2
Update08 Web2
Web 2.0 By Nyros Developer
Web 2.0 By Nyros Developer
WEB 2.0 Ppt
WEB 2.0 Ppt
Web2 0 Ppt
Web2 0 Ppt
Emerging Technologies
Emerging Technologies
Web 2.0 Online Collaboration (Public)
Web 2.0 Online Collaboration (Public)
Web 2.0
Web 2.0
Web 2.0 lib_2.0_1
Web 2.0 lib_2.0_1
web training
web training
Web 1.02.03.0 Good.ppt
Web 1.02.03.0 Good.ppt
An Introduction to Web 2.0
An Introduction to Web 2.0
Web 2.0 Rvce Mca
Web 2.0 Rvce Mca
Mais de Anant Shrivastava
Diverseccon keynote: My 2 Paisa's on Infosec World
Diverseccon keynote: My 2 Paisa's on Infosec World
Anant Shrivastava
WhitePaper : Security issues in android custom rom
WhitePaper : Security issues in android custom rom
Anant Shrivastava
Web application finger printing - whitepaper
Web application finger printing - whitepaper
Anant Shrivastava
Battle Underground NullCon 2011 Walkthrough
Battle Underground NullCon 2011 Walkthrough
Anant Shrivastava
Embedded Systems : introduction
Embedded Systems : introduction
Anant Shrivastava
Logic Families Electronics
Logic Families Electronics
Anant Shrivastava
Filesystem
Filesystem
Anant Shrivastava
basic knowhow hacking
basic knowhow hacking
Anant Shrivastava
Mais de Anant Shrivastava
(8)
Diverseccon keynote: My 2 Paisa's on Infosec World
Diverseccon keynote: My 2 Paisa's on Infosec World
WhitePaper : Security issues in android custom rom
WhitePaper : Security issues in android custom rom
Web application finger printing - whitepaper
Web application finger printing - whitepaper
Battle Underground NullCon 2011 Walkthrough
Battle Underground NullCon 2011 Walkthrough
Embedded Systems : introduction
Embedded Systems : introduction
Logic Families Electronics
Logic Families Electronics
Filesystem
Filesystem
basic knowhow hacking
basic knowhow hacking
Último
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
HarshalMandlekar2
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
Alan Dix
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
DianaGray10
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
Lars Bell
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
Raghuram Pandurangan
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
Addepto
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
Stephanie Beckett
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
LoriGlavin3
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
Pixlogix Infotech
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
Lonnie McRorey
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
Hervé Boutemy
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
2toLead Limited
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
LoriGlavin3
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
LoriGlavin3
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
UiPathCommunity
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
BkGupta21
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
Curtis Poe
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
Manik S Magar
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
BookNet Canada
Último
(20)
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Web2.0 : an introduction
1.
Web 2.0
2.
3.
What is
Web 2.0
4.
5.
6.
7.
8.
9.
10.
11.
12.
13.
14.
15.
16.
17.
18.
19.
20.
21.
22.
23.
24.
25.
26.
27.
28.
29.
30.
31.
32.
33.
34.
35.
36.
37.
38.
39.
40.
41.
42.
43.
44.
45.
46.
Back to W2,
Career Prospects
47.
48.
Baixar agora