Ronny Vaningh
22
Seguidores
- Apresentações
- Documentos
- Infográficos
IoT Story: From Edge to HDP
DataWorks Summit
•
Há 5 anos
Covert Attack Mystery Box: A few novel techniques for exploiting Microsoft “features”
Beau Bullock
•
Há 5 anos
BlueHat v17 || Securing Windows Defender Application Guard
BlueHat Security Conference
•
Há 6 anos
Elastic - From 50 to 270, how to scale a distributed engineering team
Sylvain Wallez
•
Há 6 anos
Practical Phishing Automation with PhishLulz - KiwiCon X
Michele Orru
•
Há 7 anos
Six Degrees of Domain Admin - BloodHound at DEF CON 24
Andy Robbins
•
Há 7 anos
Deploying, Managing, and Leveraging Honeypots in the Enterprise using Open Source Tools
Jason Trost
•
Há 8 anos
SplunkSummit 2015 - Splunking the Endpoint
Splunk
•
Há 8 anos
Large-Scale Stream Processing in the Hadoop Ecosystem - Hadoop Summit 2016
Gyula Fóra
•
Há 8 anos
Streaming Analytics - Comparison of Open Source Frameworks and Products
Kai Wähner
•
Há 8 anos
Automatic MIME Attachments Triage
Xavier Mertens
•
Há 8 anos
BSIDES DETROIT 2015: Data breaches cost of doing business
Joel Cardella
•
Há 8 anos
Detecting Hacks: Anomaly Detection on Networking Data
James Sirota
•
Há 8 anos
Pragmatic Security and Rugged DevOps - SXSW 2015
James Wickett
•
Há 9 anos
Hortonworks Technical Workshop: HBase For Mission Critical Applications
Hortonworks
•
Há 9 anos
Apache storm vs. Spark Streaming
P. Taylor Goetz
•
Há 9 anos
How JESS3 Saved Christmas!
JESS3
•
Há 9 anos
Measuring the IQ of your Threat Intelligence Feeds (#tiqtest)
Alex Pinto
•
Há 9 anos
Applied Detection and Analysis Using Flow Data - MIRCon 2014
chrissanders88
•
Há 9 anos
Developing Real-Time Data Pipelines with Apache Kafka
Joe Stein
•
Há 10 anos