Personal Information
Organization / Workplace
The Hague, Zuid Holland Netherlands
Occupation
Natural born dreamer
About
The question isn't who is going to let me; it's who is going to stop me. Ayn Rand
"Persistent questioning and healthy inquisitiveness are the first requisite for acquiring learning of any kind." - Gandhi
- Presentations
- Documents
- Infographics
Kerberos and Covert Channels
Raj Bhatt
•
10 years ago
Xyz company
Marshal Richard
•
12 years ago
Managing your access control systems
Walter Sinchak,
•
11 years ago
Access Control for the Cloud: AWS Identity and Access Management (IAM) (SEC201) | AWS re:Invent 2013
Amazon Web Services
•
10 years ago
Access Control: Principles and Practice
Nabeel Yoosuf
•
15 years ago
Least privilege, access control, operating system security
G Prachi
•
4 years ago
Access Control Models: Controlling Resource Authorization
Mark Niebergall
•
8 years ago
Information Security Principles - Access Control
idingolay
•
13 years ago
An overview of access control
Elimity
•
7 years ago
8 Access Control
Alfred Ouyang
•
12 years ago
Ch07 Access Control Fundamentals
Information Technology
•
14 years ago
Access Control Presentation
Wajahat Rajab
•
10 years ago
Chapter 4 access control fundamental ii
Syaiful Ahdan
•
4 years ago
Structured Approach to Solution Architecture
Alan McSweeney
•
9 years ago
Computer Security and Intrusion Detection(IDS/IPS)
LJ PROJECTS
•
8 years ago
VMware Performance for Gurus - A Tutorial
Richard McDougall
•
12 years ago
Market Research - course slides
Paul Marx
•
11 years ago
Fundamentals of data structures
Niraj Agarwal
•
13 years ago
Working With XML in IDS Applications
Keshav Murthy
•
15 years ago
IDS for Security Analysts: How to Get Actionable Insights from your IDS
AlienVault
•
9 years ago