- Apresentações
- Documentos
- Infográficos
Cloud-based IDS architectures : APPLYING THE IDS APPROACHES INTO THE CLOUD ENVIRONMENT
Hassan EL ALLOUSSI
•
Há 10 anos
Security Information and Event Management (SIEM)
k33a
•
Há 10 anos
Python for Image Understanding: Deep Learning with Convolutional Neural Nets
Roelof Pieters
•
Há 8 anos
24 Books You've Never Heard Of - But Will Change Your Life
Ryan Holiday
•
Há 10 anos
IoT Security: Problems, Challenges and Solutions
Liwei Ren任力偉
•
Há 8 anos
Scaling IoT Security
Bill Harpley
•
Há 8 anos
IoT security (Internet of Things)
Sanjay Kumar (Seeking options outside India)
•
Há 8 anos
Overview of IoT and Security issues
Anastasios Economides
•
Há 9 anos
The 5 elements of IoT security
Julien Vermillard
•
Há 9 anos
ARDUINOLIKE BOARDS: A SHORT HARDWARE REFERENCE GUIDE FOR MAKERS
Leandro Agro'
•
Há 8 anos
Wi-Fi Hotspot Attacks
Greg Foss
•
Há 9 anos
Web Uygulama Pentest Eğitimi
BGA Cyber Security
•
Há 10 anos
Web 2.0 Güvenliği
BGA Cyber Security
•
Há 10 anos
Background subtraction
Raviraj singh shekhawat
•
Há 12 anos
Python an-intro-python-month-2013
Arulalan T
•
Há 10 anos
Advanced Persistent Threats Cutting Through The Hype
Symantec
•
Há 12 anos