- Presentations
- Documents
- Infographics
Accenture Tech Vision 2020 - Trend 1
accenture
•
4 years ago
Digital Video Interface Comparison for Global Security Applications
Adimec
•
8 years ago
2016 03-16 digital energy luncheon
Mark Reynolds
•
7 years ago
AREA41 - Anatomy of attacks aimed at financial sector by the Lazarus group
SeongsuPark8
•
5 years ago
Bootkits: past, present & future
Alex Matrosov
•
9 years ago
BIOS and Secure Boot Attacks Uncovered
Alex Matrosov
•
9 years ago
Memory Forensics
Prince Boonlia
•
11 years ago
Registry forensics
Prince Boonlia
•
12 years ago
The Future of Automated Malware Generation
Stephan Chenette
•
11 years ago
Steve jobs - 20 life lessons
Rob van Alphen
•
12 years ago
Facebook's Edgerank- Understanding It for Content Curation
Christel Quek
•
12 years ago
One hundred inspirational ideas
Helge Tennø
•
13 years ago
カーネル読書会:クラウドコンピューティングにおける仮想マシンのセキュリティ
Kuniyasu Suzaki
•
13 years ago
Sebastian Porst - Reverse-Engineering Flash Files with SWFRETools
Source Conference
•
13 years ago
The Audience Has Spoken - Social Media Marketing Stats and Research
Salesforce Marketing Cloud
•
13 years ago
Roadmap to Enterprise Cloud Computing
Rex Wang
•
12 years ago
Drivesploit: Circumventing Both Automated AND Manual Drive-By-Download Detection
Wayne Huang
•
13 years ago
Scripting Layer for Android + Perl
Naoya Ito
•
13 years ago
Fortune 100 Global Social Media Check-Up 2011
Burson-Marsteller Brasil
•
13 years ago
Love Quotes
reini arya
•
17 years ago