- Presentations
- Documents
- Infographics
Continuous Packaging is also Mandatory for DevOps
Docker, Inc.
•
6 years ago
Sqrrl and IBM: Threat Hunting for QRadar Users
Sqrrl
•
7 years ago
Harry Surden - Artificial Intelligence and Law Overview
Harry Surden
•
6 years ago
Caffeine+Nicotine 尼古丁+咖啡 不瞌睡的Ppt制作秘诀 蔡学镛
heypig
•
14 years ago
Debugging machine-learning
Michał Łopuszyński
•
6 years ago
Deep Learning in practice : Speech recognition and beyond - Meetup
LINAGORA
•
6 years ago
Kaldi-voice: Your personal speech recognition server using open source code
Xavier Anguera
•
8 years ago
【FIT2016チュートリアル】ここから始める情報処理 ~音声編~ by 東工大・篠崎先生
Toshihiko Yamasaki
•
7 years ago
Implemetation of parallelism in HMM DNN based state of the art kaldi ASR Toolkit
Shubham Verma
•
7 years ago
An Introduction to Anomaly Detection
Kenneth Graham
•
7 years ago
Anomaly detection
QuantUniversity
•
8 years ago
Brief introduction into Padding Oracle attack vector
Payampardaz
•
6 years ago
AppSensor - Near Real Time Event Detection and Response
jtmelton
•
8 years ago
OSINT: analisi dei metadati ed acquisizione da fonti aperte con FOCA e Shodan
Danilo De Rogatis
•
11 years ago
Pwning the Enterprise With PowerShell
Beau Bullock
•
7 years ago
CSW2017 Qinghao tang+Xinlei ying vmware_escape_final
CanSecWest
•
7 years ago
Injecting Security into vulnerable web apps at Runtime
Ajin Abraham
•
7 years ago
Object Oriented Exploitation: New techniques in Windows mitigation bypass
Sam Thomas
•
7 years ago
The Travelling Pentester: Diaries of the Shortest Path to Compromise
Will Schroeder
•
7 years ago
Eclipse Con 2015: Codan - a C/C++ Code Analysis Framework for CDT
Elena Laskavaia
•
9 years ago