Personal Information
Organization / Workplace
Canada Canada
Occupation
Technology Management
Industry
Technology / Software / Internet
- Presentations
- Documents
- Infographics
5 Cryptography Part2
Alfred Ouyang
•
12 years ago
5 Cryptography Part1
Alfred Ouyang
•
12 years ago
Network security
MD. IFTEKARUL ALAM
•
6 years ago
Uml - An Overview
Raj Thilak S
•
15 years ago
TOGAF 9 - Security Architecture Ver1 0
Maganathin Veeraragaloo
•
13 years ago
Enterprise Security Architecture for Cyber Security
The Open Group SA
•
9 years ago
Business continuity & disaster recovery planning (BCP & DRP)
Narudom Roongsiriwong, CISSP
•
10 years ago
Computer Security and Intrusion Detection(IDS/IPS)
LJ PROJECTS
•
8 years ago
Penetration Testing Basics
Rick Wanner
•
13 years ago
Penetration testing
Ammar WK
•
12 years ago
Ethical Hacking & Penetration Testing
Surachai Chatchalermpun
•
14 years ago
Elasticsearch, Logstash, Kibana. Cool search, analytics, data mining and more...
Oleksiy Panchenko
•
8 years ago
ISO 27001 Implementation_Documentation_Mandatory_List
SriramITISConsultant
•
10 years ago
ISO/IEC 27001:2013 An Overview
Ahmed Riad .
•
10 years ago
Iso 27001 2013 Standard Requirements
Uppala Anand
•
9 years ago
Alphorm.com Formation CEHV9 III
Alphorm
•
7 years ago
CISA Training - Chapter 1 - 2016
Hafiz Sheikh Adnan Ahmed
•
8 years ago
Octave
Amar Myana
•
7 years ago
Alphorm.com Formation Hacking et Sécurité , avancé
Alphorm
•
8 years ago
Alphorm.com Formation CEHV9 II
Alphorm
•
7 years ago