- Presentations
- Documents
- Infographics
AI and Machine Learning Demystified by Carol Smith at Midwest UX 2017
Carol Smith
•
6 years ago
Cost of Cyber Crime: Financial Services
accenture
•
6 years ago
TCP/IP Ağlarda İleri Seviye Paket Analizi – Tshark
BGA Cyber Security
•
10 years ago
Nmap Kullanım Kitapçığı
BGA Cyber Security
•
10 years ago
IoT Developer Survey 2018
Benjamin Cabé
•
6 years ago
Python İle Ağ Programlama
Oguzhan Coskun
•
10 years ago
AI & ML in Cyber Security - Why Algorithms Are Dangerous
Raffael Marty
•
6 years ago
HTTPS Ne Kadar Güvenlidir?(sslstrip)
BGA Cyber Security
•
10 years ago
Machine Learning in Cyber Security Domain
BGA Cyber Security
•
7 years ago
Ağ Protokollerine Yönelik Adli Bilişim Analizi
BGA Cyber Security
•
7 years ago
Docker, Konteyner Teknolojisi Nedir? Docker Güvenliği Nasıl Sağlanır?
BGA Cyber Security
•
6 years ago
Open cv kütüphanesi
ahmetkakici
•
13 years ago
Man in the Middle Atack (Ortadaki Adam Saldırısı)
Ahmet Gürel
•
7 years ago
Yapay Sinir Ağları
Abdulkerim Fettahoğlu
•
8 years ago
Yapay Zeka, Deep Learning and Machine Learning
Alper Nebi Kanlı
•
7 years ago
Hacklenmiş Web Sunucu Analizi
BGA Cyber Security
•
6 years ago
Open Source for Industry 4.0 – Open IoT Summit NA 2018
Benjamin Cabé
•
6 years ago