- Presentations
- Documents
- Infographics
Man in the Middle Atack (Ortadaki Adam Saldırısı)
Ahmet Gürel
•
7 years ago
Nmap Kullanım Kitapçığı
BGA Cyber Security
•
10 years ago
HTTPS Ne Kadar Güvenlidir?(sslstrip)
BGA Cyber Security
•
10 years ago
Yapay Sinir Ağları
Abdulkerim Fettahoğlu
•
8 years ago
Open cv kütüphanesi
ahmetkakici
•
13 years ago
Yapay Zeka, Deep Learning and Machine Learning
Alper Nebi Kanlı
•
7 years ago
TCP/IP Ağlarda İleri Seviye Paket Analizi – Tshark
BGA Cyber Security
•
10 years ago
Python İle Ağ Programlama
Oguzhan Coskun
•
9 years ago
How to Get a Job in Cyber Security 2018
ClearedJobs.Net
•
6 years ago
Information Security Analytics
Amrit Chhetri
•
6 years ago
Enhance Security Domain with Machine Learning
Muhammad Dzikri Ramdhani
•
6 years ago
Cost of Cyber Crime: Financial Services
accenture
•
6 years ago
Ntxissacsc5 purple 4-threat detection using machine learning-markszewczul
North Texas Chapter of the ISSA
•
6 years ago
Cyber Tools and Trends - Next 7 Years: 2018 - 2025 !
Dr David Probert
•
6 years ago
Meta sploit (cyber security)
Rajal Patel
•
6 years ago
Cyber Intelligence In the Cognitive Era
Charles Li
•
6 years ago
Accelerating Cyber Threat Detection With GPU
Joshua Patterson
•
6 years ago
Darknet (ec)
Bradley W. Deacon
•
8 years ago
AI & ML in Cyber Security - Why Algorithms Are Dangerous
Raffael Marty
•
6 years ago
Machine Learning in Cyber Security Domain
BGA Cyber Security
•
7 years ago