SlideShare uma empresa Scribd logo
1 de 34
Baixar para ler offline
Cyber Security
(yes, really)
(because we have to...)

13/10/13
Classification: unclassified

13/10/13
Challenge...

13/10/13
Clinton Ingrams
–

cfi@dmu.ac.uk

Cyber Security Centre
De Montfort University

(that's in Leicester)
Teaching PHP & pentesting
Undergrad & Postgrad

13/10/13
Threats
Agencies
Solutions

13/10/13
Cyber Security is...
●

Protecting people
–

and their information
●

13/10/13

on line
And the big problem is...
In humans we trust ...

13/10/13
Threats

13/10/13
Cyber Attacks
●

Estonia
– Multiple

DDoS
– 3 weeks, starting 27th April 2007
– First state-level cyber attack
● Now on NATO agenda

13/10/13
Cyber Attacks
●

Georgia
– Multiple

DDoS
– 7th August 2008
– In conjunction with military invasion
TTNET

Caucasus Cable

Caucasus Net

Delta Net
Transtelecom

TISCALI
Seabone

13/10/13

RETN
COGENT
Cyber Attacks
●

Syria
Israeli malware was (allegedly) installed in
Syrian Integrated Air Defence System
(IADS)
– 6th September 2007
– Disrupted Syrian nuclear research
–

www.defensetech.org/2007/11/26/israels-cyber-shot-at-syria/

13/10/13
Lost IPR
●

●

“the average business takes 300 days to
identify a data breach”
Small SMEs can lose ~£1M over 5-10 years

13/10/13
Other attack vectors

13/10/13
SMART...
●

Systems

●

Buildings
–
–

●

house
manufacturing

Cities
“arcologies”
Society
–

●

13/10/13
SCADA
●

Supervisory Control and Data Acquisition
Often programmed in software logic
blocks
Typically 30 year turnover in hardware/software
–

●

–
–

●

IET

13/10/13

Windows 95 still very common
Some equipment is 60 years old!
Malware
●

Stuxnet

●

Duku

●

Flame
–
–

13/10/13

now in the wild
have changed the face of modern warfare
People
●

Anonymous

●

Lulzsec

●

Julian Assange
–

●

Bradley (Chelsea) Manning

Edward Snowden
–
–

13/10/13

game changer
(insider threat)
Who's doing what???

13/10/13
HMG
●

Cabinet office

●

GCHQ

●

Centre for Protection of National
Infrastructure
–

13/10/13

CPNI
Police
●

National Crime Agency
–

National Cybercrime Unit

replaces
●

Serious Organised Crime Agency
–

13/10/13

SOCA
Cabinet Office
●

●

Create partnerships between businesses,
academics, HMG & international
£860m
–

over 5 years

–

From the NSCP
●

13/10/13

National Cyber Security Programme
National Cyber Security Strategy
Our vision is for the UK in 2015 to derive huge economic and social value from a
vibrant, resilient and secure cyberspace, where our actions, guided by our core
values of liberty, fairness, transparency and the rule of law, enhance prosperity,
national security and a strong society.
To achieve this vision by 2015 we want:
Objective 1:

Objective 2:

Objective 3:

The UK to tackle cyber
crime and be one of the
most secure places in the
world to do business in
cyberspace

The UK to be more
resilient to cyber attacks
and better able to protect
our interests in
cyberspace

The UK to have helped
shape an open, stable
and vibrant cyberspace
which the UK public can
use safely and that
supports open societies

Objective 4:
The UK to have the cross-cutting knowledge, skills and capability it needs to
underpin all our cyber security objectives
13/10/13
CPNI
●

Awareness raising
–

Physical vulnerabilities
●

–

Software vulnerabilities
●

13/10/13

Lots of “fireworks” demonstrations
???
What's to be done???

13/10/13
Coding
“Why is there never time or money to implement
proper application security before the launch date,
but always time and money to retro-fit security after
the first hack”
Anon

13/10/13
Testing
●

MoD – 4 levels of Vulnerability Assessment
–

Scanning

–

Toolkits
●

–

Penetration test
●

–

13/10/13

automated assessments
qualified & experienced expert

Physical test
TSI
●

Trustworthy Software Initiative
–

–

13/10/13

“Making software more secure, dependable and
reliable”
Partly as a documentation standards repository
Measuring
●

Security Analytics
–

13/10/13

are you safer/more secure now than you were
before?
Reading
Eg
Trustwave Global Security Report
– Checkpoint Security Report
– The Global Cyber Game report
–

●

http://www.scribd.com/doc/142553109/The-Global-Cyber-Game

DefenseTech
– The Register
– etc
–

13/10/13
Cyber Security Vouchers
●

HMG

●

Department for Business, Innovation and Skils

●

Up to £5000 as a voucher
–

●

to spend improving the security of a client

http://news.bis.gov.uk/Press-Releases/Support-for-smallbusinesses-to-tackle-record-levels-of-cyber-attacks-68b5a.aspx

13/10/13
Training
●

Certified Application Security Tester
–

●

Certified Information Systems Security
Professional
–

●

CAST

CISSP

CESG Certified Professional
–

13/10/13

CCP
DMU
●

Cyber Security Centre

●

MSc Cyber Security (Deloitte)

●

MSc SCADA (EADS)

●

Free magazine
–

CyberTalk

–

multidisciplinary
http://softbox.co.uk/cybertalk
●

13/10/13
Questions??

13/10/13
●

http://www.dmu.ac.uk/research/research-faculties-andinstitutes/technology/cyber-security-centre/cyber-security-centre.aspx

●

https://www.gov.uk/government/publications/cyber-security-strategy

●

http://www.cpni.gov.uk/

●

http://www.ssgkc.com/strategic-initiatives/smart-city/

●

https://www.trustwave.com/spiderlabs/advisories/TWSL2013-020.txt

●

http://www.soca.gov.uk/

●

http://www.uk-tsi.org/

●

●

●

http://news.bis.gov.uk/Press-Releases/Support-for-small-businessesto-tackle-record-levels-of-cyber-attacks-68b5a.aspx
http://www.independent.co.uk/news/uk/home-news/more-than-amillion-british-youngsters-being-bullied-online-every-day8852097.html
http://www.scribd.com/doc/142553109/The-Global-Cyber-Game

13/10/13

Mais conteúdo relacionado

Destaque

Cyber security 2013
Cyber security 2013 Cyber security 2013
Cyber security 2013 Ariel Evans
 
CONTACT CENTER TRENDS 2014
CONTACT CENTER TRENDS 2014CONTACT CENTER TRENDS 2014
CONTACT CENTER TRENDS 2014Ariel Evans
 
2015 positioning security & networking
2015 positioning security & networking2015 positioning security & networking
2015 positioning security & networkingAriel Evans
 
infra 2015 delivery
infra 2015  deliveryinfra 2015  delivery
infra 2015 deliveryAriel Evans
 
Risk mngt gov compliance security cyber
Risk mngt  gov compliance security cyberRisk mngt  gov compliance security cyber
Risk mngt gov compliance security cyberAriel Evans
 
GRC 2013 Preventing Cyber Attacks for SAP - Onapsis Presentation
GRC 2013 Preventing Cyber Attacks for SAP - Onapsis PresentationGRC 2013 Preventing Cyber Attacks for SAP - Onapsis Presentation
GRC 2013 Preventing Cyber Attacks for SAP - Onapsis Presentationrclark004
 

Destaque (6)

Cyber security 2013
Cyber security 2013 Cyber security 2013
Cyber security 2013
 
CONTACT CENTER TRENDS 2014
CONTACT CENTER TRENDS 2014CONTACT CENTER TRENDS 2014
CONTACT CENTER TRENDS 2014
 
2015 positioning security & networking
2015 positioning security & networking2015 positioning security & networking
2015 positioning security & networking
 
infra 2015 delivery
infra 2015  deliveryinfra 2015  delivery
infra 2015 delivery
 
Risk mngt gov compliance security cyber
Risk mngt  gov compliance security cyberRisk mngt  gov compliance security cyber
Risk mngt gov compliance security cyber
 
GRC 2013 Preventing Cyber Attacks for SAP - Onapsis Presentation
GRC 2013 Preventing Cyber Attacks for SAP - Onapsis PresentationGRC 2013 Preventing Cyber Attacks for SAP - Onapsis Presentation
GRC 2013 Preventing Cyber Attacks for SAP - Onapsis Presentation
 

Semelhante a Phpnw 2013 cyber-security

Global Maritime Cyber Strategy
Global Maritime Cyber StrategyGlobal Maritime Cyber Strategy
Global Maritime Cyber StrategyIan Kelly
 
Security in IT (data and cyber security)
Security in IT (data and cyber security)Security in IT (data and cyber security)
Security in IT (data and cyber security)Rohana K Amarakoon
 
security in it (data and cyber security)
security in it (data and cyber security)security in it (data and cyber security)
security in it (data and cyber security)Rohana K Amarakoon
 
Teori 1 pengantar keamanan
Teori 1 pengantar keamananTeori 1 pengantar keamanan
Teori 1 pengantar keamananSyaiful Ahdan
 
GUL Network Infrastructure
GUL Network InfrastructureGUL Network Infrastructure
GUL Network InfrastructureMuhammad Zeeshan
 
UN/ITU: Cybersecurity Skills Development - Salta, Argentina - 2010
UN/ITU: Cybersecurity Skills Development - Salta, Argentina - 2010UN/ITU: Cybersecurity Skills Development - Salta, Argentina - 2010
UN/ITU: Cybersecurity Skills Development - Salta, Argentina - 2010Dr David Probert
 
Publication in the International Journal Sangeetha
Publication in the International Journal SangeethaPublication in the International Journal Sangeetha
Publication in the International Journal SangeethaSangeetha M Kannuchamy
 
CYBERSECURITY TRACK.pptx
CYBERSECURITY TRACK.pptxCYBERSECURITY TRACK.pptx
CYBERSECURITY TRACK.pptxlevimax2
 
Cyber Security Strategies and Approaches
Cyber Security Strategies and ApproachesCyber Security Strategies and Approaches
Cyber Security Strategies and Approachesvngundi
 
cyber crime and security
cyber crime and securitycyber crime and security
cyber crime and securityDEEKSHAASHOKA
 
Cybersecurity Technologies, Standards and Operations
Cybersecurity Technologies, Standards and OperationsCybersecurity Technologies, Standards and Operations
Cybersecurity Technologies, Standards and OperationsDr David Probert
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorismNihal Jani
 
cybersecurity- A.Abutaleb
cybersecurity- A.Abutalebcybersecurity- A.Abutaleb
cybersecurity- A.AbutalebFahmi Albaheth
 
CTO-Cybersecurity-2010-Dr. Martin Koyabe
CTO-Cybersecurity-2010-Dr. Martin KoyabeCTO-Cybersecurity-2010-Dr. Martin Koyabe
CTO-Cybersecurity-2010-Dr. Martin Koyabesegughana
 
UN/ITU - Organisational Structures and Incident Management - Cybersecurity
UN/ITU - Organisational Structures and Incident Management - CybersecurityUN/ITU - Organisational Structures and Incident Management - Cybersecurity
UN/ITU - Organisational Structures and Incident Management - CybersecurityDr David Probert
 
Introduction to Cybersecurity
Introduction to CybersecurityIntroduction to Cybersecurity
Introduction to CybersecurityAdri Jovin
 

Semelhante a Phpnw 2013 cyber-security (20)

Take Down
Take DownTake Down
Take Down
 
Global Maritime Cyber Strategy
Global Maritime Cyber StrategyGlobal Maritime Cyber Strategy
Global Maritime Cyber Strategy
 
Security in IT (data and cyber security)
Security in IT (data and cyber security)Security in IT (data and cyber security)
Security in IT (data and cyber security)
 
security in it (data and cyber security)
security in it (data and cyber security)security in it (data and cyber security)
security in it (data and cyber security)
 
Teori 1 pengantar keamanan
Teori 1 pengantar keamananTeori 1 pengantar keamanan
Teori 1 pengantar keamanan
 
GUL Network Infrastructure
GUL Network InfrastructureGUL Network Infrastructure
GUL Network Infrastructure
 
UN/ITU: Cybersecurity Skills Development - Salta, Argentina - 2010
UN/ITU: Cybersecurity Skills Development - Salta, Argentina - 2010UN/ITU: Cybersecurity Skills Development - Salta, Argentina - 2010
UN/ITU: Cybersecurity Skills Development - Salta, Argentina - 2010
 
Publication in the International Journal Sangeetha
Publication in the International Journal SangeethaPublication in the International Journal Sangeetha
Publication in the International Journal Sangeetha
 
The red book
The red book  The red book
The red book
 
CYBERSECURITY TRACK.pptx
CYBERSECURITY TRACK.pptxCYBERSECURITY TRACK.pptx
CYBERSECURITY TRACK.pptx
 
Career in cyber security
Career in  cyber securityCareer in  cyber security
Career in cyber security
 
Cyber Security Strategies and Approaches
Cyber Security Strategies and ApproachesCyber Security Strategies and Approaches
Cyber Security Strategies and Approaches
 
cyber crime and security
cyber crime and securitycyber crime and security
cyber crime and security
 
625 -ESECURITY
625 -ESECURITY625 -ESECURITY
625 -ESECURITY
 
Cybersecurity Technologies, Standards and Operations
Cybersecurity Technologies, Standards and OperationsCybersecurity Technologies, Standards and Operations
Cybersecurity Technologies, Standards and Operations
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
cybersecurity- A.Abutaleb
cybersecurity- A.Abutalebcybersecurity- A.Abutaleb
cybersecurity- A.Abutaleb
 
CTO-Cybersecurity-2010-Dr. Martin Koyabe
CTO-Cybersecurity-2010-Dr. Martin KoyabeCTO-Cybersecurity-2010-Dr. Martin Koyabe
CTO-Cybersecurity-2010-Dr. Martin Koyabe
 
UN/ITU - Organisational Structures and Incident Management - Cybersecurity
UN/ITU - Organisational Structures and Incident Management - CybersecurityUN/ITU - Organisational Structures and Incident Management - Cybersecurity
UN/ITU - Organisational Structures and Incident Management - Cybersecurity
 
Introduction to Cybersecurity
Introduction to CybersecurityIntroduction to Cybersecurity
Introduction to Cybersecurity
 

Último

CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistandanishmna97
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfOrbitshub
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...apidays
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Orbitshub
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Victor Rentea
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Victor Rentea
 
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)Samir Dash
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...apidays
 
AI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAnitaRaj43
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelDeepika Singh
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamUiPathCommunity
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKSpring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKJago de Vreede
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdfSandro Moreira
 
Introduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMIntroduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMKumar Satyam
 

Último (20)

CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
AI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by Anitaraj
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKSpring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Introduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMIntroduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDM
 

Phpnw 2013 cyber-security