SlideShare a Scribd company logo
  • Upload
  • Home
  • Explore
  • Login
  • Signup
SlideShare a Scribd company logo
  • Home
  • Explore
  • Upload
  • Login
  • Signup

We've updated our privacy policy. Click here to review the details. Tap here to review the details.

×
×
×
×
×
×
Cristina Lucaciu

Cristina Lucaciu

138 Followers
0 SlideShares 0 Clipboards 138 Followers 111 Followings
  • Unblock User Block User
0 SlideShares 0 Clipboards 138 Followers 111 Followings

Personal Information
Organization / Workplace
The Hague, Zuid Holland Netherlands
Occupation
Natural born dreamer
About
The question isn't who is going to let me; it's who is going to stop me. Ayn Rand "Persistent questioning and healthy inquisitiveness are the first requisite for acquiring learning of any kind." - Gandhi
Likes (191)
See all
Kerberos and Covert Channels
Raj Bhatt • 9 years ago
Xyz company
Marshal Richard • 11 years ago
Managing your access control systems
Walter Sinchak, • 9 years ago
Access Control for the Cloud: AWS Identity and Access Management (IAM) (SEC201) | AWS re:Invent 2013
Amazon Web Services • 9 years ago
Access Control: Principles and Practice
Nabeel Yoosuf • 14 years ago
Least privilege, access control, operating system security
G Prachi • 3 years ago
Access Control Models: Controlling Resource Authorization
Mark Niebergall • 7 years ago
Information Security Principles - Access Control
idingolay • 12 years ago
An overview of access control
Elimity • 6 years ago
8 Access Control
Alfred Ouyang • 10 years ago
Ch07 Access Control Fundamentals
Information Technology • 13 years ago
Access Control Presentation
Wajahat Rajab • 9 years ago
Chapter 4 access control fundamental ii
Syaiful Ahdan • 3 years ago
Solution manual for data communications and networking by behrouz forouzan
June_Ahmed • 10 years ago
Structured Approach to Solution Architecture
Alan McSweeney • 8 years ago
Computer Security and Intrusion Detection(IDS/IPS)
LJ PROJECTS • 7 years ago
VMware Performance for Gurus - A Tutorial
Richard McDougall • 10 years ago
Market Research - course slides
Paul Marx • 10 years ago
Introduction To Corporate Finance (1565 Slides, 24 Chapters Presentation)
Hardeep Kumar • 12 years ago
Fundamentals of data structures
Niraj Agarwal • 11 years ago
Working With XML in IDS Applications
Keshav Murthy • 14 years ago
IDS for Security Analysts: How to Get Actionable Insights from your IDS
AlienVault • 7 years ago
IDS - Fact, Challenges and Future
amiable_indian • 15 years ago
Introduction To Intrusion Detection Systems
Paul Green • 14 years ago
Combatting Intruders on IBM i with IDS
HelpSystems • 9 years ago
FIWARE Global Summit - IDS Implementation with FIWARE Software Components
FIWARE • 4 years ago
Introduction to IDS & IPS - Part 1
whitehat 'People' • 11 years ago
OFFENSIVE IDS
Sylvain Martinez • 3 years ago
How to bypass an IDS with netcat and linux
Kirill Shipulin • 4 years ago
eaack-a secure ids for manet
Aswin Pv • 9 years ago
CyberLab CCEH Session - 16 Evading IDS, Firewalls and Honeypots
CyberLab • 7 years ago
Five Major Types of Intrusion Detection System (IDS)
david rom • 6 years ago
IDS Evasion Techniques
Tudor Damian • 7 years ago
Open Source IDS Tools: A Beginner's Guide
AlienVault • 7 years ago
Intrusion detection system
gaurav koriya • 11 years ago
intrusion detection system (IDS)
Aj Maurya • 8 years ago
Introduction IDS
Hitesh Mohapatra • 5 years ago
Testbed For Ids
amiable_indian • 15 years ago
Cyber Security - IDS/IPS is not enough
Savvius, Inc • 10 years ago
Ceh v5 module 19 evading ids firewall and honeypot
Vi Tính Hoàng Nam • 8 years ago
IDS and IPS
Santosh Khadsare • 10 years ago
Different types of attacks in internet
Rohan Bharadwaj • 11 years ago
Ajax 101 Workshop
Bill Scott • 15 years ago
Enterprise 2.0 - Enabling change or part of the problem?
Stephen Collins • 14 years ago
Building Great Stuff Using Web Technologies
Stephan Seidt • 12 years ago
The New CIO Mandate | ASAE Tech Conference 2013 Keynote By Dion Hinchcliffe
Dion Hinchcliffe • 9 years ago
Change Management Models, Stakeholder Analysis & Capacity Building in Corporate Reforms
Elijah Ezendu • 10 years ago
19. Distributed Databases in DBMS
koolkampus • 15 years ago
The evolution of computers
Sharat Chandu • 9 years ago
A Hitchhiker's Guide to NOSQL v1.0
Krishna Sankar • 12 years ago
Tableau Drive, A new methodology for scaling your analytic culture
Tableau Software • 8 years ago
Differentiation powerpoint for tuesday pd
mclaringbold • 11 years ago
Router commands
Laura Lahbib • 10 years ago
User Experience and Product Management: Two Peas in the Same Pod?
Jeff Lash • 11 years ago
Risk and Return
saadiakh • 10 years ago
Understanding Digital Citizenship & Identity - Updated March 14
Alec Couros • 8 years ago
Open Innovation - global trends and examples
Jose Claudio Terra • 12 years ago
Lotusphere 2011: INV105 Messaging and Collaboration Strategy
Ed Brill • 12 years ago
Wiley.About.Face.3.The.Essentials.Of.Interaction.Design.May.2007
Yang tengfei • 14 years ago
Lecture 5 - Technology diffusion and technology transfer
UNU.MERIT • 15 years ago
Facts and figures about our risk management associations in Europe 2019
FERMA • 3 years ago
Advanced Cybersecurity Risk Management: How to successfully address your Cyber-threats?
PECB • 3 years ago
2 Day Workshop on Business Model Design
Alexander Osterwalder • 15 years ago
The Network Effects Bible
NFX • 4 years ago
Bridging the Gap Between Data Science & Engineer: Building High-Performance Teams
ryanorban • 7 years ago
BPMN-CMMN-DMN An intro to the triple crown of process improvement standards Denis Gagne
Denis Gagné • 7 years ago
BPMN 2.0 - an introduction to the Level 1 Palette
Declan Chellar • 8 years ago
Why To Consider BPMN 2.0
Michele Chinosi • 13 years ago
Towards a Benchmark for BPMN Engines
Vincenzo Ferme • 7 years ago
From Conceptual to Executable BPMN Process Models A Step-by-Step Method
Marlon Dumas • 9 years ago
2019 BPMN MIWG Capability Demonstration
Denis Gagné • 3 years ago
Implementing BPMN 2.0 with Microsoft Visio
Goutama Bachtiar • 7 years ago
BPMN on One Page
Mohamed Zakarya Abdelgawad • 4 years ago
BPMN 2.0 Fundamentals
Enrique Ponce De Leon • 11 years ago
Modeling and Validating BPMN Diagrams
Michele Chinosi • 13 years ago
Business Process Model and Notation (BPMN)
Peter R. Egli • 9 years ago
Introduction To BPMN 2
Jim Arlow • 13 years ago
Omg bpmn tutorial
uhuru1973 • 12 years ago
How to use BPMN* for modelling business processes
Alexander SAMARIN • 13 years ago
Business Process Modeling with BPMN 2.0 - Second edition
Gregor Polančič • 12 years ago
jQuery Essentials
Marc Grabanski • 13 years ago
The Emerging Global Web
yiibu • 8 years ago
Solving Cross-Domain Issues When Building Mashups
mehmetakin • 13 years ago
Active Directory Training
Nishad Sukumaran • 12 years ago
Websphere interview Questions
gummadi1 • 12 years ago
Qualitative and quantitative methods of research
Jordan Cruz • 11 years ago
Web service introduction 2
Sagara Gunathunga • 12 years ago
Developing Web Services With Oracle Web Logic Server
Gaurav Sharma • 12 years ago
Apache Kafka vs. Integration Middleware (MQ, ETL, ESB)
Kai Wähner • 3 years ago
Simple object access protocol(soap )
balamurugan.k Kalibalamurugan • 6 years ago
Web Service Standards Relevant to SOA
Katie Marcus • 12 years ago
Erl's SOA Chapter 4
Katie Marcus • 12 years ago
Jms
lakshmi isukapally • 14 years ago
webservices overview
elliando dias • 14 years ago
SOAP - Simple Object Access Protocol
Anushka Patil • 4 years ago
Stream-style messaging development with Rabbit, Active, ZeroMQ & Apache Kafka by Vyacheslav Lapin
JavaDayUA • 7 years ago
Web Services
Gaurav Tyagi • 13 years ago
Making Sense Of Web Services
Jorgen Thelin • 14 years ago
0207-Service Oriented Architecture and Web Services.ppt
Katie Marcus • 12 years ago
Interoperable Web Services with JAX-WS and WSIT
Carol McDonald • 13 years ago
Apache Kafka vs. Integration Middleware (MQ, ETL, ESB) - Friends, Enemies or Frenemies? (Kai Waehner, Confluent) Kafka Summit London 2019
confluent • 3 years ago
Lecture 3 soap
Jetender Sambyal • 7 years ago
An Intro to AS4, the Successor of AS2
BizTalk360 • 7 years ago
Advanced SOAP-Web-Service topics
Peter R. Egli • 10 years ago
Soap
Prabhat gangwar • 7 years ago
Optimization Of Soap Presentation(Jg9e10)
JIE GAO • 11 years ago
Web Services
F K • 7 years ago
WebServices SOAP WSDL and UDDI
Rajkattamuri • 6 years ago
Simple Object Access Protocol (SOAP)
Mehul Boricha • 3 years ago
Efficient Simple Object Access Protocol (SOAP) Messaging for Mobile Devices in Android Platform
warse • 4 years ago
How to Test SOAP Services with JMeter
Loadium • 4 years ago
Xml messaging with soap
Johnny Pork • 11 years ago
Whats new in data power
sflynn073 • 7 years ago
DataPower SOA Appliances
Katie Marcus • 12 years ago
Turbo-Charge DataPower to Reach Your SOA Goals
Akana • 7 years ago
Set Up Security and Integration with DataPower XI50z
Sarah Duffy • 10 years ago
IBM WebSphere DataPower SOA Appliance: Part III: XML Security ...
Katie Marcus • 12 years ago
IBM WebSphere DataPower SOA Appliances - Part IV: Management ...
Katie Marcus • 12 years ago
DataPower-MQ Integration Deep Dive
Morag Hughson • 8 years ago
IBM DataPower Gateways - What's new in 2016 v7.5.2
IBM DataPower Gateway • 6 years ago
WebSphere DataPower B2B Appliance overview
Sarah Duffy • 11 years ago
What's New in API Connect & DataPower Gateway in 1H 2018
IBM API Connect • 4 years ago
Dealing with Enterprise Level Data
Mike Crabb • 5 years ago
Creating HTML Pages
Mike Crabb • 6 years ago
Sql Injection and XSS
Mike Crabb • 6 years ago
Creating a Webpage from a Template
Mike Crabb • 6 years ago
Hacking the Web
Mike Crabb • 7 years ago
Using mySQL in PHP
Mike Crabb • 6 years ago
Pattern Perception and Map Design
Mike Crabb • 5 years ago
Forms and Databases in PHP
Mike Crabb • 6 years ago
CSS Frameworks
Mike Crabb • 6 years ago
Styling with CSS
Mike Crabb • 6 years ago
Introduction to Information Architecture
Mike Crabb • 6 years ago
10 Reasons Why Successful Leaders Are Keeping a Journal
Louis-Xavier Lavallée • 6 years ago
Introduction to Development for the Internet
Mike Crabb • 6 years ago
Finding Our Happy Place in the Internet of Things
Pamela Pavliscak • 6 years ago
Ten Expert Tips on Internet of Things Security
removed_7621640006ab23c3afbf22ee3a6c1cce • 6 years ago
Design Thinking: Finding Problems Worth Solving In Health
Adam Connor • 6 years ago
Beyond DevOps - How Netflix Bridges the Gap
Josh Evans • 7 years ago
Securing Code Through Social Engineering
C4Media • 7 years ago
A Beginners Guide to noSQL
Mike Crabb • 7 years ago
Blitzscaling: Book Trailer
Reid Hoffman • 4 years ago
[WSO2 Summit Brazil 2018] The API-driven World
WSO2 • 4 years ago
Design-Based Microservices AKA Planes, Trains & Automobiles
Matt McLarty • 4 years ago
API Security in a Microservice Architecture
Matt McLarty • 4 years ago
Driving Continuous Delivery with Service Virtualization
CA Technologies • 6 years ago
Pre-Con Ed: CA Live API Creator: How to Integrate Enterprise Data for Mobile Apps
CA Technologies • 6 years ago
Pre-Con Ed: CA Live API Creator: How to Create, Deploy, Secure and Scale an Enterprise API in 30 Minutes
CA Technologies • 6 years ago
Saml vs Oauth : Which one should I use?
Anil Saldanha • 9 years ago
DevOps and Cloud Tips and Techniques to Revolutionize Your SDLC
CA Technologies • 8 years ago
CA Service Management — Unified Self-Service
CA Technologies • 8 years ago
Five Minutes for 10 DevOps Tools
CA Technologies • 8 years ago
How Risky are Your APIs?
CA Technologies • 8 years ago
CA Capacity Management: End-to-end Capacity Analysis to Cost Optimize & Right-Size Your IT Environment
CA Technologies • 8 years ago
History of the Password
CA Technologies • 8 years ago
Intelligent Authentication
CA Technologies • 8 years ago
CA API Gateway: Web API and Application Security
CA Technologies • 6 years ago
The Tortoise & the Hare and the Race to Ship Software
CA Technologies • 7 years ago
Tech Talk: CA API Gateway: Deploying Docker Container Gateways
CA Technologies • 6 years ago
IBM DataPower Gateway - Common Use Cases
IBM DataPower Gateway • 9 years ago
Getting Information through HTML Forms
Mike Crabb • 6 years ago
Whitepaper Natalie De Neef Dialogische communicatie In De Multiculturele Samenleving
nataliedeneef • 13 years ago
Summa Cum Laude Thesis
Libby Hall • 13 years ago
Web Analytics Whitepaper
WSI Premier Esolutions • 13 years ago
Social Media for Business
Presentation Advisors • 12 years ago
Aan de slag met het nieuwe werken
Fred Zimny • 13 years ago
How Obama Won the Election with Content Marketing
Ross Simmonds • 10 years ago
A guide to china's regions, provinces and cities
StockAnalyst • 12 years ago
China Powerpoint: 28-1
tmeyer1026 • 11 years ago
Social Media Predictions for 2013
Dell Social Media • 9 years ago
Zara new challenge
jbdol • 11 years ago
Ross MBA: International Retail Expansion Study
Nanda Rajanala • 11 years ago
The China Analyst March 2011
hattiepeng • 11 years ago
China Nexus Company Limited Newsletter Printable Version
bobarfod • 11 years ago
China Tax Presentation V3
richardtw • 13 years ago
The China Analyst - April 2012
fepe09 • 10 years ago
China: Pearls, Pitfalls and Possibilities
Harry G. Broadman • 10 years ago
Doing Business in China Seminar
Ronit Koren • 12 years ago
The Beijing Axis Introduction Jan 2009
lilianluca • 14 years ago
Road To China
Entrepreneurschap • 11 years ago
China Seminar Presentation
Global Management Group • 12 years ago
"Business in China" for Dutch DFA
metztravel • 11 years ago
Internationalisatie Scan
Eric Oving • 10 years ago
Produceren in Azie
Foubu • 13 years ago
Package 4 Growth Kennisverwerving
Eric Oving • 10 years ago
Web Economics for news
Kyle Kim • 13 years ago
Most Engaged Brands on Social Media - ENGAGEMENTdb (July 09)
Laurent Magloire • 13 years ago
Getting The Most Out Of Your Holiday Email Campaigns
Tamara Gielen • 13 years ago
Future of Advertising - Networked Media & Networked Agencies
Branded Channels • 13 years ago
Using Social Networking & Media to Improve Member Services
Dennis D. McDonald • 16 years ago
Social Media & Social Networks as Online Marketing Tools
Webbed Marketing • 13 years ago
  • Activity
  • About

Likes (191)
See all
Kerberos and Covert Channels
Raj Bhatt • 9 years ago
Xyz company
Marshal Richard • 11 years ago
Managing your access control systems
Walter Sinchak, • 9 years ago
Access Control for the Cloud: AWS Identity and Access Management (IAM) (SEC201) | AWS re:Invent 2013
Amazon Web Services • 9 years ago
Access Control: Principles and Practice
Nabeel Yoosuf • 14 years ago
Least privilege, access control, operating system security
G Prachi • 3 years ago
Access Control Models: Controlling Resource Authorization
Mark Niebergall • 7 years ago
Information Security Principles - Access Control
idingolay • 12 years ago
An overview of access control
Elimity • 6 years ago
8 Access Control
Alfred Ouyang • 10 years ago
Ch07 Access Control Fundamentals
Information Technology • 13 years ago
Access Control Presentation
Wajahat Rajab • 9 years ago
Chapter 4 access control fundamental ii
Syaiful Ahdan • 3 years ago
Solution manual for data communications and networking by behrouz forouzan
June_Ahmed • 10 years ago
Structured Approach to Solution Architecture
Alan McSweeney • 8 years ago
Computer Security and Intrusion Detection(IDS/IPS)
LJ PROJECTS • 7 years ago
VMware Performance for Gurus - A Tutorial
Richard McDougall • 10 years ago
Market Research - course slides
Paul Marx • 10 years ago
Introduction To Corporate Finance (1565 Slides, 24 Chapters Presentation)
Hardeep Kumar • 12 years ago
Fundamentals of data structures
Niraj Agarwal • 11 years ago
Working With XML in IDS Applications
Keshav Murthy • 14 years ago
IDS for Security Analysts: How to Get Actionable Insights from your IDS
AlienVault • 7 years ago
IDS - Fact, Challenges and Future
amiable_indian • 15 years ago
Introduction To Intrusion Detection Systems
Paul Green • 14 years ago
Combatting Intruders on IBM i with IDS
HelpSystems • 9 years ago
FIWARE Global Summit - IDS Implementation with FIWARE Software Components
FIWARE • 4 years ago
Introduction to IDS & IPS - Part 1
whitehat 'People' • 11 years ago
OFFENSIVE IDS
Sylvain Martinez • 3 years ago
How to bypass an IDS with netcat and linux
Kirill Shipulin • 4 years ago
eaack-a secure ids for manet
Aswin Pv • 9 years ago
CyberLab CCEH Session - 16 Evading IDS, Firewalls and Honeypots
CyberLab • 7 years ago
Five Major Types of Intrusion Detection System (IDS)
david rom • 6 years ago
IDS Evasion Techniques
Tudor Damian • 7 years ago
Open Source IDS Tools: A Beginner's Guide
AlienVault • 7 years ago
Intrusion detection system
gaurav koriya • 11 years ago
intrusion detection system (IDS)
Aj Maurya • 8 years ago
Introduction IDS
Hitesh Mohapatra • 5 years ago
Testbed For Ids
amiable_indian • 15 years ago
Cyber Security - IDS/IPS is not enough
Savvius, Inc • 10 years ago
Ceh v5 module 19 evading ids firewall and honeypot
Vi Tính Hoàng Nam • 8 years ago
IDS and IPS
Santosh Khadsare • 10 years ago
Different types of attacks in internet
Rohan Bharadwaj • 11 years ago
Ajax 101 Workshop
Bill Scott • 15 years ago
Enterprise 2.0 - Enabling change or part of the problem?
Stephen Collins • 14 years ago
Building Great Stuff Using Web Technologies
Stephan Seidt • 12 years ago
The New CIO Mandate | ASAE Tech Conference 2013 Keynote By Dion Hinchcliffe
Dion Hinchcliffe • 9 years ago
Change Management Models, Stakeholder Analysis & Capacity Building in Corporate Reforms
Elijah Ezendu • 10 years ago
19. Distributed Databases in DBMS
koolkampus • 15 years ago
The evolution of computers
Sharat Chandu • 9 years ago
A Hitchhiker's Guide to NOSQL v1.0
Krishna Sankar • 12 years ago
Tableau Drive, A new methodology for scaling your analytic culture
Tableau Software • 8 years ago
Differentiation powerpoint for tuesday pd
mclaringbold • 11 years ago
Router commands
Laura Lahbib • 10 years ago
User Experience and Product Management: Two Peas in the Same Pod?
Jeff Lash • 11 years ago
Risk and Return
saadiakh • 10 years ago
Understanding Digital Citizenship & Identity - Updated March 14
Alec Couros • 8 years ago
Open Innovation - global trends and examples
Jose Claudio Terra • 12 years ago
Lotusphere 2011: INV105 Messaging and Collaboration Strategy
Ed Brill • 12 years ago
Wiley.About.Face.3.The.Essentials.Of.Interaction.Design.May.2007
Yang tengfei • 14 years ago
Lecture 5 - Technology diffusion and technology transfer
UNU.MERIT • 15 years ago
Facts and figures about our risk management associations in Europe 2019
FERMA • 3 years ago
Advanced Cybersecurity Risk Management: How to successfully address your Cyber-threats?
PECB • 3 years ago
2 Day Workshop on Business Model Design
Alexander Osterwalder • 15 years ago
The Network Effects Bible
NFX • 4 years ago
Bridging the Gap Between Data Science & Engineer: Building High-Performance Teams
ryanorban • 7 years ago
BPMN-CMMN-DMN An intro to the triple crown of process improvement standards Denis Gagne
Denis Gagné • 7 years ago
BPMN 2.0 - an introduction to the Level 1 Palette
Declan Chellar • 8 years ago
Why To Consider BPMN 2.0
Michele Chinosi • 13 years ago
Towards a Benchmark for BPMN Engines
Vincenzo Ferme • 7 years ago
From Conceptual to Executable BPMN Process Models A Step-by-Step Method
Marlon Dumas • 9 years ago
2019 BPMN MIWG Capability Demonstration
Denis Gagné • 3 years ago
Implementing BPMN 2.0 with Microsoft Visio
Goutama Bachtiar • 7 years ago
BPMN on One Page
Mohamed Zakarya Abdelgawad • 4 years ago
BPMN 2.0 Fundamentals
Enrique Ponce De Leon • 11 years ago
Modeling and Validating BPMN Diagrams
Michele Chinosi • 13 years ago
Business Process Model and Notation (BPMN)
Peter R. Egli • 9 years ago
Introduction To BPMN 2
Jim Arlow • 13 years ago
Omg bpmn tutorial
uhuru1973 • 12 years ago
How to use BPMN* for modelling business processes
Alexander SAMARIN • 13 years ago
Business Process Modeling with BPMN 2.0 - Second edition
Gregor Polančič • 12 years ago
jQuery Essentials
Marc Grabanski • 13 years ago
The Emerging Global Web
yiibu • 8 years ago
Solving Cross-Domain Issues When Building Mashups
mehmetakin • 13 years ago
Active Directory Training
Nishad Sukumaran • 12 years ago
Websphere interview Questions
gummadi1 • 12 years ago
Qualitative and quantitative methods of research
Jordan Cruz • 11 years ago
Web service introduction 2
Sagara Gunathunga • 12 years ago
Developing Web Services With Oracle Web Logic Server
Gaurav Sharma • 12 years ago
Apache Kafka vs. Integration Middleware (MQ, ETL, ESB)
Kai Wähner • 3 years ago
Simple object access protocol(soap )
balamurugan.k Kalibalamurugan • 6 years ago
Web Service Standards Relevant to SOA
Katie Marcus • 12 years ago
Erl's SOA Chapter 4
Katie Marcus • 12 years ago
Jms
lakshmi isukapally • 14 years ago
webservices overview
elliando dias • 14 years ago
SOAP - Simple Object Access Protocol
Anushka Patil • 4 years ago
Stream-style messaging development with Rabbit, Active, ZeroMQ & Apache Kafka by Vyacheslav Lapin
JavaDayUA • 7 years ago
Web Services
Gaurav Tyagi • 13 years ago
Making Sense Of Web Services
Jorgen Thelin • 14 years ago
0207-Service Oriented Architecture and Web Services.ppt
Katie Marcus • 12 years ago
Interoperable Web Services with JAX-WS and WSIT
Carol McDonald • 13 years ago
Apache Kafka vs. Integration Middleware (MQ, ETL, ESB) - Friends, Enemies or Frenemies? (Kai Waehner, Confluent) Kafka Summit London 2019
confluent • 3 years ago
Lecture 3 soap
Jetender Sambyal • 7 years ago
An Intro to AS4, the Successor of AS2
BizTalk360 • 7 years ago
Advanced SOAP-Web-Service topics
Peter R. Egli • 10 years ago
Soap
Prabhat gangwar • 7 years ago
Optimization Of Soap Presentation(Jg9e10)
JIE GAO • 11 years ago
Web Services
F K • 7 years ago
WebServices SOAP WSDL and UDDI
Rajkattamuri • 6 years ago
Simple Object Access Protocol (SOAP)
Mehul Boricha • 3 years ago
Efficient Simple Object Access Protocol (SOAP) Messaging for Mobile Devices in Android Platform
warse • 4 years ago
How to Test SOAP Services with JMeter
Loadium • 4 years ago
Xml messaging with soap
Johnny Pork • 11 years ago
Whats new in data power
sflynn073 • 7 years ago
DataPower SOA Appliances
Katie Marcus • 12 years ago
Turbo-Charge DataPower to Reach Your SOA Goals
Akana • 7 years ago
Set Up Security and Integration with DataPower XI50z
Sarah Duffy • 10 years ago
IBM WebSphere DataPower SOA Appliance: Part III: XML Security ...
Katie Marcus • 12 years ago
IBM WebSphere DataPower SOA Appliances - Part IV: Management ...
Katie Marcus • 12 years ago
DataPower-MQ Integration Deep Dive
Morag Hughson • 8 years ago
IBM DataPower Gateways - What's new in 2016 v7.5.2
IBM DataPower Gateway • 6 years ago
WebSphere DataPower B2B Appliance overview
Sarah Duffy • 11 years ago
What's New in API Connect & DataPower Gateway in 1H 2018
IBM API Connect • 4 years ago
Dealing with Enterprise Level Data
Mike Crabb • 5 years ago
Creating HTML Pages
Mike Crabb • 6 years ago
Sql Injection and XSS
Mike Crabb • 6 years ago
Creating a Webpage from a Template
Mike Crabb • 6 years ago
Hacking the Web
Mike Crabb • 7 years ago
Using mySQL in PHP
Mike Crabb • 6 years ago
Pattern Perception and Map Design
Mike Crabb • 5 years ago
Forms and Databases in PHP
Mike Crabb • 6 years ago
CSS Frameworks
Mike Crabb • 6 years ago
Styling with CSS
Mike Crabb • 6 years ago
Introduction to Information Architecture
Mike Crabb • 6 years ago
10 Reasons Why Successful Leaders Are Keeping a Journal
Louis-Xavier Lavallée • 6 years ago
Introduction to Development for the Internet
Mike Crabb • 6 years ago
Finding Our Happy Place in the Internet of Things
Pamela Pavliscak • 6 years ago
Ten Expert Tips on Internet of Things Security
removed_7621640006ab23c3afbf22ee3a6c1cce • 6 years ago
Design Thinking: Finding Problems Worth Solving In Health
Adam Connor • 6 years ago
Beyond DevOps - How Netflix Bridges the Gap
Josh Evans • 7 years ago
Securing Code Through Social Engineering
C4Media • 7 years ago
A Beginners Guide to noSQL
Mike Crabb • 7 years ago
Blitzscaling: Book Trailer
Reid Hoffman • 4 years ago
[WSO2 Summit Brazil 2018] The API-driven World
WSO2 • 4 years ago
Design-Based Microservices AKA Planes, Trains & Automobiles
Matt McLarty • 4 years ago
API Security in a Microservice Architecture
Matt McLarty • 4 years ago
Driving Continuous Delivery with Service Virtualization
CA Technologies • 6 years ago
Pre-Con Ed: CA Live API Creator: How to Integrate Enterprise Data for Mobile Apps
CA Technologies • 6 years ago
Pre-Con Ed: CA Live API Creator: How to Create, Deploy, Secure and Scale an Enterprise API in 30 Minutes
CA Technologies • 6 years ago
Saml vs Oauth : Which one should I use?
Anil Saldanha • 9 years ago
DevOps and Cloud Tips and Techniques to Revolutionize Your SDLC
CA Technologies • 8 years ago
CA Service Management — Unified Self-Service
CA Technologies • 8 years ago
Five Minutes for 10 DevOps Tools
CA Technologies • 8 years ago
How Risky are Your APIs?
CA Technologies • 8 years ago
CA Capacity Management: End-to-end Capacity Analysis to Cost Optimize & Right-Size Your IT Environment
CA Technologies • 8 years ago
History of the Password
CA Technologies • 8 years ago
Intelligent Authentication
CA Technologies • 8 years ago
CA API Gateway: Web API and Application Security
CA Technologies • 6 years ago
The Tortoise & the Hare and the Race to Ship Software
CA Technologies • 7 years ago
Tech Talk: CA API Gateway: Deploying Docker Container Gateways
CA Technologies • 6 years ago
IBM DataPower Gateway - Common Use Cases
IBM DataPower Gateway • 9 years ago
Getting Information through HTML Forms
Mike Crabb • 6 years ago
Whitepaper Natalie De Neef Dialogische communicatie In De Multiculturele Samenleving
nataliedeneef • 13 years ago
Summa Cum Laude Thesis
Libby Hall • 13 years ago
Web Analytics Whitepaper
WSI Premier Esolutions • 13 years ago
Social Media for Business
Presentation Advisors • 12 years ago
Aan de slag met het nieuwe werken
Fred Zimny • 13 years ago
How Obama Won the Election with Content Marketing
Ross Simmonds • 10 years ago
A guide to china's regions, provinces and cities
StockAnalyst • 12 years ago
China Powerpoint: 28-1
tmeyer1026 • 11 years ago
Social Media Predictions for 2013
Dell Social Media • 9 years ago
Zara new challenge
jbdol • 11 years ago
Ross MBA: International Retail Expansion Study
Nanda Rajanala • 11 years ago
The China Analyst March 2011
hattiepeng • 11 years ago
China Nexus Company Limited Newsletter Printable Version
bobarfod • 11 years ago
China Tax Presentation V3
richardtw • 13 years ago
The China Analyst - April 2012
fepe09 • 10 years ago
China: Pearls, Pitfalls and Possibilities
Harry G. Broadman • 10 years ago
Doing Business in China Seminar
Ronit Koren • 12 years ago
The Beijing Axis Introduction Jan 2009
lilianluca • 14 years ago
Road To China
Entrepreneurschap • 11 years ago
China Seminar Presentation
Global Management Group • 12 years ago
"Business in China" for Dutch DFA
metztravel • 11 years ago
Internationalisatie Scan
Eric Oving • 10 years ago
Produceren in Azie
Foubu • 13 years ago
Package 4 Growth Kennisverwerving
Eric Oving • 10 years ago
Web Economics for news
Kyle Kim • 13 years ago
Most Engaged Brands on Social Media - ENGAGEMENTdb (July 09)
Laurent Magloire • 13 years ago
Getting The Most Out Of Your Holiday Email Campaigns
Tamara Gielen • 13 years ago
Future of Advertising - Networked Media & Networked Agencies
Branded Channels • 13 years ago
Using Social Networking & Media to Improve Member Services
Dennis D. McDonald • 16 years ago
Social Media & Social Networks as Online Marketing Tools
Webbed Marketing • 13 years ago
Personal Information
Organization / Workplace
The Hague, Zuid Holland Netherlands
Occupation
Natural born dreamer
About
The question isn't who is going to let me; it's who is going to stop me. Ayn Rand "Persistent questioning and healthy inquisitiveness are the first requisite for acquiring learning of any kind." - Gandhi

Modal header

  • About
  • Support
  • Terms
  • Privacy
  • Copyright
  • Cookie Preferences
  • Do not sell or share my personal information
English
Current Language: English
Español
Português
Français
Deutsch

© 2023 SlideShare from Scribd

We've updated our privacy policy.

We’ve updated our privacy policy so that we are compliant with changing global privacy regulations and to provide you with insight into the limited ways in which we use your data.

You can read the details below. By accepting, you agree to the updated privacy policy.

Thank you!

View updated privacy policy
We've encountered a problem, please try again.