- Presentations
- Documents
- Infographics
Discovering botnets from dns traffic using map reduce 5.pptx
Alan Lee
•
11 years ago
Make Internet Safer with DNS Firewall - Implementation Case Study at a Major ISP
APNIC
•
5 years ago
iThome 資安大會 2019 駭客如何利用公開工具在內部網路中暢行無阻 - YCY.pdf
HITCON GIRLS
•
5 years ago
BSidesLV 2018 - Katie Nickels and John Wunder - ATT&CKing the Status Quo
Katie Nickels
•
5 years ago
FIRST CTI Symposium: Turning intelligence into action with MITRE ATT&CK™
Katie Nickels
•
5 years ago
Resistance Isn't Futile: A Practical Approach to Threat Modeling
Katie Nickels
•
4 years ago
HITCON GIRLS 成大講座 基礎知識(蜘子珣)
HITCON GIRLS
•
7 years ago
如何利用 Docker 強化網站安全
Tim Hsu
•
7 years ago
Inside the Matrix,How to Build Transparent Sandbox for Malware Analysis
Chong-Kuan Chen
•
9 years ago
Getting your hands dirty: How to Analyze the Behavior of Malware Traffic / SEBASTIAN GARCIA [ATG GROUP OF CTU]
Security Session
•
8 years ago
基礎網頁程式攻擊檢驗
Taien Wang
•
11 years ago
伺服器端攻擊與防禦I
Taien Wang
•
11 years ago
網頁安全 Web security 入門 @ Study-Area
Orange Tsai
•
11 years ago
Some things before network attack
Canaan Kao
•
8 years ago
新聞 X 謊言 用文字探勘挖掘財經新聞沒告訴你的真相(丘祐瑋)
David Chiu
•
8 years ago
APT行為偵測術
Ching-Lin Tao
•
9 years ago