- Presentations
- Documents
- Infographics
Cloud Security Mechanisms
Mohammed Sajjad Ali
•
9 years ago
Encryption vs tokenisation (for share)
AndrewRJamieson
•
13 years ago
Risk Management Framework
Anand Subramaniam
•
14 years ago
Big Data Day LA 2015 - Data Science ≠ Big Data by Jim McGuire of ZestFinance
Data Con LA
•
8 years ago
biometrics and cyber security
Karthiga Manisekaran
•
10 years ago
DocuSign Company Overview
bepker
•
12 years ago
Cryptocurrencies, blockchain & smart contracts: A general introduction
Raffaele Mauro
•
9 years ago
Why Network and Endpoint Security Isn’t Enough
Imperva
•
8 years ago
Database monitoring - First and Last Line of Defense
Imperva
•
8 years ago
The State of Application Security: Hackers On Steroids
Imperva
•
8 years ago
Hackers, Cyber Crime and Espionage
Imperva
•
8 years ago
Webinar: Cloud-Based Web Security as First/Last Line of Defense
Cyren, Inc
•
8 years ago
Top Cyber Security Trends for 2016
Imperva
•
8 years ago
APT行為偵測術
Ching-Lin Tao
•
10 years ago
Pki and OpenSSL
Tony Fabeen
•
10 years ago
Binary Obfuscation from the Top Down: Obfuscation Executables without Writing Assembly
frank2
•
14 years ago
Playing 44CON CTF for fun and profit
44CON
•
11 years ago
Building the 44CON CTF
44CON
•
11 years ago
44Con Malware Workshop
Iñaki Rodríguez
•
9 years ago
Distributed Fuzzing Framework Design
bannedit
•
11 years ago