- Presentations
- Documents
- Infographics
Not a Security Boundary: Bypassing User Account Control
enigma0x3
•
6 years ago
Guide to NoSQL with MySQL
Samuel Rohaut
•
12 years ago
Janus @ WebRTC Meetup Stockholm
Lorenzo Miniero
•
7 years ago
Building the Right Platform Architecture for Hadoop
All Things Open
•
7 years ago
Building a Distributed & Automated Open Source Program at Netflix
All Things Open
•
7 years ago
Data Encryption at Rest
All Things Open
•
7 years ago
Elastix Market
EuropeSIP Communications SL
•
10 years ago
Microservices Architecture for Web Applications using Amazon AWS Cloud
Mitoc Group
•
8 years ago
Developing Java based microservices ready for the world of containers
Claus Ibsen
•
7 years ago
LTE and LTE Advanced Introduction
BP Tiwari
•
14 years ago
Osdt_osca_ceph_20160706
Takehiro Kudou
•
7 years ago
From responsive to anticipatory
Agnieszka Maria Walorska
•
9 years ago
Prof, Stephen graham Newcastle University disrupted cities: when infrastructure fails
Stephen Graham
•
13 years ago
Practical PowerShell Programming for Professional People - Extended Edition
Ben Ten (0xA)
•
9 years ago
Kolegov tkachenko-Non-Invasive Elimination of Logical Access Control Vulnerabilities in Web Applicationsph days-2015
Positive Hack Days
•
8 years ago
When traditional configuration management is to slow for your needs
Kris Buytaert
•
8 years ago