Personal Information
Organization / Workplace
Lithuania Lithuania
Occupation
Security Engineer
Industry
Technology / Software / Internet
Tags
introduction
security
ciphers
cryptography
#lambda
#serverless
#amazon
#aws
#architecture
tpm
trust
trusted computing
information security
compliance
pci
developer
software
random numbers
csprng
cipher
prng
assymetric
certificates
hash
symmetric
See more
- Presentations
- Documents
- Infographics
Using AWS CloudTrail Logs for Scalable, Automated Anomaly Detection - SID341 - re:Invent 2017
Amazon Web Services
•
6 years ago
Securing Your "Crown Jewels": Do You Have What it Takes?
IBM Security
•
9 years ago
From Cave Man to Business Man, the Evolution of the CISO to CIRO
Priyanka Aash
•
8 years ago
AWS Multi-Account Architecture and Best Practices
Amazon Web Services
•
4 years ago
Lecture 2 Basic Concepts in Machine Learning for Language Technology
Marina Santini
•
9 years ago
Machine Learning 101
Talha Obaid
•
7 years ago
Testing Terraform
Nathen Harvey
•
5 years ago
Serverless Architectural Patterns I AWS Dev Day 2018
AWS Germany
•
6 years ago
Interop Cloud Keynote with Terremark, VMWare, and Citrix
Alistair Croll
•
14 years ago
Transparency and Control with AWS CloudTrail and AWS Config
Amazon Web Services
•
8 years ago
Design Patterns using Amazon DynamoDB
Amazon Web Services
•
8 years ago
Introduction to Docker - 2017
Docker, Inc.
•
6 years ago
Docker introduction for Carbon IT
yannick grenzinger
•
6 years ago
Docker Introduction
Robert Reiz
•
9 years ago
Shared Security Responsibility Model of AWS
Akshay Mathur
•
8 years ago
Harry Surden - Artificial Intelligence and Law Overview
Harry Surden
•
6 years ago
AI and Machine Learning Demystified by Carol Smith at Midwest UX 2017
Carol Smith
•
6 years ago
The AI Rush
Jean-Baptiste Dumont
•
6 years ago
What is Artificial Intelligence | Artificial Intelligence Tutorial For Beginners | Edureka
Edureka!
•
6 years ago
Top 5 Deep Learning and AI Stories - October 6, 2017
NVIDIA
•
6 years ago