- Presentations
- Documents
- Infographics
ISO 27004- Information Security Metrics Implementation
Network Intelligence India
•
10 years ago
Ce hv8 module 07 viruses and worms
polichen
•
9 years ago
Ce hv8 module 08 sniffing
polichen
•
9 years ago
Cehv8 - Module 09: Social Engineering.
Vuz Dở Hơi
•
9 years ago
Cehv8 Labs - Module10: Denial of Service.
Vuz Dở Hơi
•
9 years ago
Ceh v8 Labs - Module11: Session Hijacking.
Vuz Dở Hơi
•
9 years ago
Cehv8 - Module 12: Hacking Webservers
Vuz Dở Hơi
•
9 years ago
Cehv8 - Module 13: Hacking Web Applications
Vuz Dở Hơi
•
9 years ago
Cehv8 - Module 14: SQL injection
Vuz Dở Hơi
•
9 years ago
Cehv8 - Module 15: Hacking Wireless Networks
Vuz Dở Hơi
•
9 years ago
Cehv8 - Module 16: Hacking Mobile Platforms
Vuz Dở Hơi
•
9 years ago
Cehv8 - Module 17: Evading, IDS, firewalls, and honeypots
Vuz Dở Hơi
•
9 years ago
Ce hv8 module 18 buffer overflow
polichen
•
9 years ago
Ce hv8 module 20 penetration testing
polichen
•
9 years ago
HIPAA Topology
Jason Rusch - CISSP CGEIT CISM CISA GNSA
•
8 years ago
8 Access Control
Alfred Ouyang
•
12 years ago
Detecting Fraud Using Data Mining Techniques
DecosimoCPAs
•
12 years ago
Equity Trust Company Scam & Fraud Awareness
Equity Trust Company
•
10 years ago
توسعه امن نرم افزار
Mohammad Hamidi Esfahani
•
8 years ago
مروري بر فرآيندهاي مديريت خدمات فناوري اطلاعات مبتني بر ITIL
digidanesh
•
9 years ago