- Presentations
- Documents
- Infographics
The Enemy Within: Stopping Advanced Attacks Against Local Users
Tal Be'ery
•
7 years ago
NSC #2 - D3 03 - Jean-Philippe Aumasson - Cryptographic Backdooring
NoSuchCon
•
9 years ago
The CISO's Dilemma 44CON 2019
Saumil Shah
•
4 years ago
Philippe Langlois - LTE Pwnage - P1security
P1Security
•
11 years ago
Cybercrimes against the korean online banking systems 1227 eng_slideshare
Youngjun Chang
•
10 years ago
The Challenges of Bringing Machine Learning to the Masses
Alice Zheng
•
7 years ago
BloodHound: Attack Graphs Practically Applied to Active Directory
Andy Robbins
•
5 years ago
How Graphs Changed The Way Hackers Attack
Andy Robbins
•
6 years ago
Deciphering the Bengladesh bank heist
Jérôme Kehrli
•
6 years ago
A few thoughts on work life-balance
Wim Vanderbauwhede
•
4 years ago
Automating Security and Compliance Testing of Infrastructure-as-Code for DevSecOps - SID317 - re:Invent 2017
Amazon Web Services
•
6 years ago
API Management Reference Architecture
Seong-Bok Lee
•
8 years ago
OAuth - Open API Authentication
leahculver
•
16 years ago
Open API and the Impact on Business Models
Amancio Bouza
•
4 years ago
What Makes a Great Open API?
John Musser
•
11 years ago
Guidelines for implementation of open API Policy
Data Portal India
•
9 years ago
Open Data & Open API in US and Worldwide
Data Portal India
•
9 years ago
Twitter, facebook Open API
seulkee park
•
7 years ago
OpenAPI Spec at Google (Open API Initiative Meetup on 2016-09-15)
Open API Initiative (OAI)
•
7 years ago