- Presentations
- Documents
- Infographics
Open Source Forensics
CTIN
•
12 years ago
SDN-ppt-new
Gifty Susan Mani
•
7 years ago
Network security
Gichelle Amon
•
12 years ago
Types of Software Testing
Nishant Worah
•
14 years ago
Linux command ppt
kalyanineve
•
11 years ago
Waste Walk ~ Audit
Anand Subramaniam
•
12 years ago
CMMI & Six Sigma Integration
Anand Subramaniam
•
13 years ago
Practice Management
Anand Subramaniam
•
14 years ago
Stakeholder Relationship Management Audit
Anand Subramaniam
•
14 years ago
AI and Machine Learning Demystified by Carol Smith at Midwest UX 2017
Carol Smith
•
6 years ago
Harry Surden - Artificial Intelligence and Law Overview
Harry Surden
•
6 years ago
Machine Learning in Information Security by Mohammed Zuber
OWASP Delhi
•
7 years ago
Network_Intrusion_Detection_System_Team1
Saksham Agrawal
•
7 years ago
Computer security - A machine learning approach
Sandeep Sabnani
•
14 years ago
When Cyber Security Meets Machine Learning
Lior Rokach
•
11 years ago
Applying Machine Learning to Network Security Monitoring - BayThreat 2013
Alex Pinto
•
10 years ago
Eight Steps to an Effective Vulnerability Assessment
Sirius
•
8 years ago
Brief introduction to digital forensics
Marco Alamanni
•
6 years ago
Digital Forensics best practices with the use of open source tools and admissibility of digital evidence in courts
Sagar Rahurkar
•
9 years ago
Digital forensics ahmed emam
ahmad abdelhafeez
•
9 years ago