Personal Information
Organization / Workplace
The Hague, Zuid Holland Netherlands
Occupation
Natural born dreamer
About
The question isn't who is going to let me; it's who is going to stop me. Ayn Rand
"Persistent questioning and healthy inquisitiveness are the first requisite for acquiring learning of any kind." - Gandhi
Likes
(191)
See all
Kerberos and Covert Channels
Raj Bhatt
•
9 years ago
Xyz company
Marshal Richard
•
11 years ago
Managing your access control systems
Walter Sinchak,
•
9 years ago
Access Control for the Cloud: AWS Identity and Access Management (IAM) (SEC201) | AWS re:Invent 2013
Amazon Web Services
•
9 years ago
Access Control: Principles and Practice
Nabeel Yoosuf
•
14 years ago
Least privilege, access control, operating system security
G Prachi
•
3 years ago
Access Control Models: Controlling Resource Authorization
Mark Niebergall
•
7 years ago
Information Security Principles - Access Control
idingolay
•
12 years ago
An overview of access control
Elimity
•
6 years ago
8 Access Control
Alfred Ouyang
•
10 years ago
Ch07 Access Control Fundamentals
Information Technology
•
13 years ago
Access Control Presentation
Wajahat Rajab
•
9 years ago
Chapter 4 access control fundamental ii
Syaiful Ahdan
•
3 years ago
Solution manual for data communications and networking by behrouz forouzan
June_Ahmed
•
10 years ago
Structured Approach to Solution Architecture
Alan McSweeney
•
8 years ago
Computer Security and Intrusion Detection(IDS/IPS)
LJ PROJECTS
•
7 years ago
VMware Performance for Gurus - A Tutorial
Richard McDougall
•
10 years ago
Market Research - course slides
Paul Marx
•
10 years ago
Introduction To Corporate Finance (1565 Slides, 24 Chapters Presentation)
Hardeep Kumar
•
12 years ago
Fundamentals of data structures
Niraj Agarwal
•
11 years ago
Working With XML in IDS Applications
Keshav Murthy
•
14 years ago
IDS for Security Analysts: How to Get Actionable Insights from your IDS
AlienVault
•
7 years ago
IDS - Fact, Challenges and Future
amiable_indian
•
15 years ago
Introduction To Intrusion Detection Systems
Paul Green
•
14 years ago
Combatting Intruders on IBM i with IDS
HelpSystems
•
9 years ago
FIWARE Global Summit - IDS Implementation with FIWARE Software Components
FIWARE
•
4 years ago
Introduction to IDS & IPS - Part 1
whitehat 'People'
•
11 years ago
OFFENSIVE IDS
Sylvain Martinez
•
3 years ago
How to bypass an IDS with netcat and linux
Kirill Shipulin
•
4 years ago
eaack-a secure ids for manet
Aswin Pv
•
9 years ago
CyberLab CCEH Session - 16 Evading IDS, Firewalls and Honeypots
CyberLab
•
7 years ago
Five Major Types of Intrusion Detection System (IDS)
david rom
•
6 years ago
IDS Evasion Techniques
Tudor Damian
•
7 years ago
Open Source IDS Tools: A Beginner's Guide
AlienVault
•
7 years ago
Intrusion detection system
gaurav koriya
•
11 years ago
intrusion detection system (IDS)
Aj Maurya
•
8 years ago
Introduction IDS
Hitesh Mohapatra
•
5 years ago
Testbed For Ids
amiable_indian
•
15 years ago
Cyber Security - IDS/IPS is not enough
Savvius, Inc
•
10 years ago
Ceh v5 module 19 evading ids firewall and honeypot
Vi Tính Hoàng Nam
•
8 years ago
IDS and IPS
Santosh Khadsare
•
10 years ago
Different types of attacks in internet
Rohan Bharadwaj
•
11 years ago
Ajax 101 Workshop
Bill Scott
•
15 years ago
Enterprise 2.0 - Enabling change or part of the problem?
Stephen Collins
•
14 years ago
Building Great Stuff Using Web Technologies
Stephan Seidt
•
12 years ago
The New CIO Mandate | ASAE Tech Conference 2013 Keynote By Dion Hinchcliffe
Dion Hinchcliffe
•
9 years ago
Change Management Models, Stakeholder Analysis & Capacity Building in Corporate Reforms
Elijah Ezendu
•
10 years ago
19. Distributed Databases in DBMS
koolkampus
•
15 years ago
The evolution of computers
Sharat Chandu
•
9 years ago
A Hitchhiker's Guide to NOSQL v1.0
Krishna Sankar
•
12 years ago
Tableau Drive, A new methodology for scaling your analytic culture
Tableau Software
•
8 years ago
Differentiation powerpoint for tuesday pd
mclaringbold
•
11 years ago
Router commands
Laura Lahbib
•
10 years ago
User Experience and Product Management: Two Peas in the Same Pod?
Jeff Lash
•
11 years ago
Risk and Return
saadiakh
•
10 years ago
Understanding Digital Citizenship & Identity - Updated March 14
Alec Couros
•
8 years ago
Open Innovation - global trends and examples
Jose Claudio Terra
•
12 years ago
Lotusphere 2011: INV105 Messaging and Collaboration Strategy
Ed Brill
•
12 years ago
Wiley.About.Face.3.The.Essentials.Of.Interaction.Design.May.2007
Yang tengfei
•
14 years ago
Lecture 5 - Technology diffusion and technology transfer
UNU.MERIT
•
15 years ago
Facts and figures about our risk management associations in Europe 2019
FERMA
•
3 years ago
2 Day Workshop on Business Model Design
Alexander Osterwalder
•
15 years ago
The Network Effects Bible
NFX
•
4 years ago
Bridging the Gap Between Data Science & Engineer: Building High-Performance Teams
ryanorban
•
7 years ago
BPMN-CMMN-DMN An intro to the triple crown of process improvement standards Denis Gagne
Denis Gagné
•
7 years ago
BPMN 2.0 - an introduction to the Level 1 Palette
Declan Chellar
•
8 years ago
Why To Consider BPMN 2.0
Michele Chinosi
•
13 years ago
Towards a Benchmark for BPMN Engines
Vincenzo Ferme
•
7 years ago
From Conceptual to Executable BPMN Process Models A Step-by-Step Method
Marlon Dumas
•
9 years ago
2019 BPMN MIWG Capability Demonstration
Denis Gagné
•
3 years ago
Implementing BPMN 2.0 with Microsoft Visio
Goutama Bachtiar
•
7 years ago
BPMN on One Page
Mohamed Zakarya Abdelgawad
•
4 years ago
BPMN 2.0 Fundamentals
Enrique Ponce De Leon
•
11 years ago
Modeling and Validating BPMN Diagrams
Michele Chinosi
•
13 years ago
Business Process Model and Notation (BPMN)
Peter R. Egli
•
9 years ago
Introduction To BPMN 2
Jim Arlow
•
13 years ago
Omg bpmn tutorial
uhuru1973
•
12 years ago
How to use BPMN* for modelling business processes
Alexander SAMARIN
•
13 years ago
Business Process Modeling with BPMN 2.0 - Second edition
Gregor Polančič
•
12 years ago
jQuery Essentials
Marc Grabanski
•
13 years ago
The Emerging Global Web
yiibu
•
8 years ago
Solving Cross-Domain Issues When Building Mashups
mehmetakin
•
13 years ago
Active Directory Training
Nishad Sukumaran
•
12 years ago
Websphere interview Questions
gummadi1
•
12 years ago
Qualitative and quantitative methods of research
Jordan Cruz
•
11 years ago
Web service introduction 2
Sagara Gunathunga
•
12 years ago
Developing Web Services With Oracle Web Logic Server
Gaurav Sharma
•
12 years ago
Apache Kafka vs. Integration Middleware (MQ, ETL, ESB)
Kai Wähner
•
3 years ago
Simple object access protocol(soap )
balamurugan.k Kalibalamurugan
•
6 years ago
Web Service Standards Relevant to SOA
Katie Marcus
•
12 years ago
Erl's SOA Chapter 4
Katie Marcus
•
12 years ago
Jms
lakshmi isukapally
•
14 years ago
webservices overview
elliando dias
•
14 years ago
SOAP - Simple Object Access Protocol
Anushka Patil
•
4 years ago
Web Services
Gaurav Tyagi
•
13 years ago
Making Sense Of Web Services
Jorgen Thelin
•
14 years ago
0207-Service Oriented Architecture and Web Services.ppt
Katie Marcus
•
12 years ago
Interoperable Web Services with JAX-WS and WSIT
Carol McDonald
•
13 years ago
Lecture 3 soap
Jetender Sambyal
•
7 years ago
An Intro to AS4, the Successor of AS2
BizTalk360
•
7 years ago
Advanced SOAP-Web-Service topics
Peter R. Egli
•
10 years ago
Soap
Prabhat gangwar
•
7 years ago
Optimization Of Soap Presentation(Jg9e10)
JIE GAO
•
11 years ago
Web Services
F K
•
7 years ago
WebServices SOAP WSDL and UDDI
Rajkattamuri
•
6 years ago
Simple Object Access Protocol (SOAP)
Mehul Boricha
•
3 years ago
How to Test SOAP Services with JMeter
Loadium
•
4 years ago
Xml messaging with soap
Johnny Pork
•
11 years ago
Whats new in data power
sflynn073
•
7 years ago
DataPower SOA Appliances
Katie Marcus
•
12 years ago
Turbo-Charge DataPower to Reach Your SOA Goals
Akana
•
7 years ago
Set Up Security and Integration with DataPower XI50z
Sarah Duffy
•
10 years ago
IBM WebSphere DataPower SOA Appliance: Part III: XML Security ...
Katie Marcus
•
12 years ago
IBM WebSphere DataPower SOA Appliances - Part IV: Management ...
Katie Marcus
•
12 years ago
DataPower-MQ Integration Deep Dive
Morag Hughson
•
8 years ago
IBM DataPower Gateways - What's new in 2016 v7.5.2
IBM DataPower Gateway
•
6 years ago
WebSphere DataPower B2B Appliance overview
Sarah Duffy
•
11 years ago
What's New in API Connect & DataPower Gateway in 1H 2018
IBM API Connect
•
4 years ago
Dealing with Enterprise Level Data
Mike Crabb
•
5 years ago
Creating HTML Pages
Mike Crabb
•
6 years ago
Sql Injection and XSS
Mike Crabb
•
6 years ago
Creating a Webpage from a Template
Mike Crabb
•
6 years ago
Hacking the Web
Mike Crabb
•
7 years ago
Using mySQL in PHP
Mike Crabb
•
6 years ago
Pattern Perception and Map Design
Mike Crabb
•
5 years ago
Forms and Databases in PHP
Mike Crabb
•
6 years ago
CSS Frameworks
Mike Crabb
•
6 years ago
Styling with CSS
Mike Crabb
•
6 years ago
Introduction to Information Architecture
Mike Crabb
•
6 years ago
10 Reasons Why Successful Leaders Are Keeping a Journal
Louis-Xavier Lavallée
•
6 years ago
Introduction to Development for the Internet
Mike Crabb
•
6 years ago
Finding Our Happy Place in the Internet of Things
Pamela Pavliscak
•
6 years ago
Ten Expert Tips on Internet of Things Security
removed_7621640006ab23c3afbf22ee3a6c1cce
•
6 years ago
Design Thinking: Finding Problems Worth Solving In Health
Adam Connor
•
6 years ago
Beyond DevOps - How Netflix Bridges the Gap
Josh Evans
•
7 years ago
Securing Code Through Social Engineering
C4Media
•
7 years ago
A Beginners Guide to noSQL
Mike Crabb
•
7 years ago
Blitzscaling: Book Trailer
Reid Hoffman
•
4 years ago
[WSO2 Summit Brazil 2018] The API-driven World
WSO2
•
4 years ago
Design-Based Microservices AKA Planes, Trains & Automobiles
Matt McLarty
•
4 years ago
API Security in a Microservice Architecture
Matt McLarty
•
4 years ago
Driving Continuous Delivery with Service Virtualization
CA Technologies
•
6 years ago
Pre-Con Ed: CA Live API Creator: How to Integrate Enterprise Data for Mobile Apps
CA Technologies
•
6 years ago
Pre-Con Ed: CA Live API Creator: How to Create, Deploy, Secure and Scale an Enterprise API in 30 Minutes
CA Technologies
•
6 years ago
Saml vs Oauth : Which one should I use?
Anil Saldanha
•
9 years ago
DevOps and Cloud Tips and Techniques to Revolutionize Your SDLC
CA Technologies
•
8 years ago
CA Service Management — Unified Self-Service
CA Technologies
•
8 years ago
Five Minutes for 10 DevOps Tools
CA Technologies
•
8 years ago
How Risky are Your APIs?
CA Technologies
•
8 years ago
CA Capacity Management: End-to-end Capacity Analysis to Cost Optimize & Right-Size Your IT Environment
CA Technologies
•
8 years ago
History of the Password
CA Technologies
•
8 years ago
Intelligent Authentication
CA Technologies
•
8 years ago
CA API Gateway: Web API and Application Security
CA Technologies
•
6 years ago
The Tortoise & the Hare and the Race to Ship Software
CA Technologies
•
7 years ago
Tech Talk: CA API Gateway: Deploying Docker Container Gateways
CA Technologies
•
6 years ago
IBM DataPower Gateway - Common Use Cases
IBM DataPower Gateway
•
9 years ago
Getting Information through HTML Forms
Mike Crabb
•
6 years ago
Whitepaper Natalie De Neef Dialogische communicatie In De Multiculturele Samenleving
nataliedeneef
•
13 years ago
Summa Cum Laude Thesis
Libby Hall
•
13 years ago
Web Analytics Whitepaper
WSI Premier Esolutions
•
13 years ago
Social Media for Business
Presentation Advisors
•
12 years ago
Aan de slag met het nieuwe werken
Fred Zimny
•
13 years ago
How Obama Won the Election with Content Marketing
Ross Simmonds
•
10 years ago
A guide to china's regions, provinces and cities
StockAnalyst
•
12 years ago
China Powerpoint: 28-1
tmeyer1026
•
11 years ago
Social Media Predictions for 2013
Dell Social Media
•
9 years ago
Zara new challenge
jbdol
•
11 years ago
Ross MBA: International Retail Expansion Study
Nanda Rajanala
•
11 years ago
The China Analyst March 2011
hattiepeng
•
11 years ago
China Nexus Company Limited Newsletter Printable Version
bobarfod
•
11 years ago
China Tax Presentation V3
richardtw
•
13 years ago
The China Analyst - April 2012
fepe09
•
10 years ago
China: Pearls, Pitfalls and Possibilities
Harry G. Broadman
•
10 years ago
Doing Business in China Seminar
Ronit Koren
•
12 years ago
The Beijing Axis Introduction Jan 2009
lilianluca
•
14 years ago
Road To China
Entrepreneurschap
•
11 years ago
China Seminar Presentation
Global Management Group
•
12 years ago
"Business in China" for Dutch DFA
metztravel
•
11 years ago
Internationalisatie Scan
Eric Oving
•
10 years ago
Produceren in Azie
Foubu
•
13 years ago
Package 4 Growth Kennisverwerving
Eric Oving
•
10 years ago
Web Economics for news
Kyle Kim
•
13 years ago
Most Engaged Brands on Social Media - ENGAGEMENTdb (July 09)
Laurent Magloire
•
13 years ago
Getting The Most Out Of Your Holiday Email Campaigns
Tamara Gielen
•
13 years ago
Future of Advertising - Networked Media & Networked Agencies
Branded Channels
•
13 years ago
Using Social Networking & Media to Improve Member Services
Dennis D. McDonald
•
16 years ago
Social Media & Social Networks as Online Marketing Tools
Webbed Marketing
•
13 years ago
Likes
(191)
See all
Kerberos and Covert Channels
Raj Bhatt
•
9 years ago
Xyz company
Marshal Richard
•
11 years ago
Managing your access control systems
Walter Sinchak,
•
9 years ago
Access Control for the Cloud: AWS Identity and Access Management (IAM) (SEC201) | AWS re:Invent 2013
Amazon Web Services
•
9 years ago
Access Control: Principles and Practice
Nabeel Yoosuf
•
14 years ago
Least privilege, access control, operating system security
G Prachi
•
3 years ago
Access Control Models: Controlling Resource Authorization
Mark Niebergall
•
7 years ago
Information Security Principles - Access Control
idingolay
•
12 years ago
An overview of access control
Elimity
•
6 years ago
8 Access Control
Alfred Ouyang
•
10 years ago
Ch07 Access Control Fundamentals
Information Technology
•
13 years ago
Access Control Presentation
Wajahat Rajab
•
9 years ago
Chapter 4 access control fundamental ii
Syaiful Ahdan
•
3 years ago
Solution manual for data communications and networking by behrouz forouzan
June_Ahmed
•
10 years ago
Structured Approach to Solution Architecture
Alan McSweeney
•
8 years ago
Computer Security and Intrusion Detection(IDS/IPS)
LJ PROJECTS
•
7 years ago
VMware Performance for Gurus - A Tutorial
Richard McDougall
•
10 years ago
Market Research - course slides
Paul Marx
•
10 years ago
Introduction To Corporate Finance (1565 Slides, 24 Chapters Presentation)
Hardeep Kumar
•
12 years ago
Fundamentals of data structures
Niraj Agarwal
•
11 years ago
Working With XML in IDS Applications
Keshav Murthy
•
14 years ago
IDS for Security Analysts: How to Get Actionable Insights from your IDS
AlienVault
•
7 years ago
IDS - Fact, Challenges and Future
amiable_indian
•
15 years ago
Introduction To Intrusion Detection Systems
Paul Green
•
14 years ago
Combatting Intruders on IBM i with IDS
HelpSystems
•
9 years ago
FIWARE Global Summit - IDS Implementation with FIWARE Software Components
FIWARE
•
4 years ago
Introduction to IDS & IPS - Part 1
whitehat 'People'
•
11 years ago
OFFENSIVE IDS
Sylvain Martinez
•
3 years ago
How to bypass an IDS with netcat and linux
Kirill Shipulin
•
4 years ago
eaack-a secure ids for manet
Aswin Pv
•
9 years ago
CyberLab CCEH Session - 16 Evading IDS, Firewalls and Honeypots
CyberLab
•
7 years ago
Five Major Types of Intrusion Detection System (IDS)
david rom
•
6 years ago
IDS Evasion Techniques
Tudor Damian
•
7 years ago
Open Source IDS Tools: A Beginner's Guide
AlienVault
•
7 years ago
Intrusion detection system
gaurav koriya
•
11 years ago
intrusion detection system (IDS)
Aj Maurya
•
8 years ago
Introduction IDS
Hitesh Mohapatra
•
5 years ago
Testbed For Ids
amiable_indian
•
15 years ago
Cyber Security - IDS/IPS is not enough
Savvius, Inc
•
10 years ago
Ceh v5 module 19 evading ids firewall and honeypot
Vi Tính Hoàng Nam
•
8 years ago
IDS and IPS
Santosh Khadsare
•
10 years ago
Different types of attacks in internet
Rohan Bharadwaj
•
11 years ago
Ajax 101 Workshop
Bill Scott
•
15 years ago
Enterprise 2.0 - Enabling change or part of the problem?
Stephen Collins
•
14 years ago
Building Great Stuff Using Web Technologies
Stephan Seidt
•
12 years ago
The New CIO Mandate | ASAE Tech Conference 2013 Keynote By Dion Hinchcliffe
Dion Hinchcliffe
•
9 years ago
Change Management Models, Stakeholder Analysis & Capacity Building in Corporate Reforms
Elijah Ezendu
•
10 years ago
19. Distributed Databases in DBMS
koolkampus
•
15 years ago
The evolution of computers
Sharat Chandu
•
9 years ago
A Hitchhiker's Guide to NOSQL v1.0
Krishna Sankar
•
12 years ago
Tableau Drive, A new methodology for scaling your analytic culture
Tableau Software
•
8 years ago
Differentiation powerpoint for tuesday pd
mclaringbold
•
11 years ago
Router commands
Laura Lahbib
•
10 years ago
User Experience and Product Management: Two Peas in the Same Pod?
Jeff Lash
•
11 years ago
Risk and Return
saadiakh
•
10 years ago
Understanding Digital Citizenship & Identity - Updated March 14
Alec Couros
•
8 years ago
Open Innovation - global trends and examples
Jose Claudio Terra
•
12 years ago
Lotusphere 2011: INV105 Messaging and Collaboration Strategy
Ed Brill
•
12 years ago
Wiley.About.Face.3.The.Essentials.Of.Interaction.Design.May.2007
Yang tengfei
•
14 years ago
Lecture 5 - Technology diffusion and technology transfer
UNU.MERIT
•
15 years ago
Facts and figures about our risk management associations in Europe 2019
FERMA
•
3 years ago
2 Day Workshop on Business Model Design
Alexander Osterwalder
•
15 years ago
The Network Effects Bible
NFX
•
4 years ago
Bridging the Gap Between Data Science & Engineer: Building High-Performance Teams
ryanorban
•
7 years ago
BPMN-CMMN-DMN An intro to the triple crown of process improvement standards Denis Gagne
Denis Gagné
•
7 years ago
BPMN 2.0 - an introduction to the Level 1 Palette
Declan Chellar
•
8 years ago
Why To Consider BPMN 2.0
Michele Chinosi
•
13 years ago
Towards a Benchmark for BPMN Engines
Vincenzo Ferme
•
7 years ago
From Conceptual to Executable BPMN Process Models A Step-by-Step Method
Marlon Dumas
•
9 years ago
2019 BPMN MIWG Capability Demonstration
Denis Gagné
•
3 years ago
Implementing BPMN 2.0 with Microsoft Visio
Goutama Bachtiar
•
7 years ago
BPMN on One Page
Mohamed Zakarya Abdelgawad
•
4 years ago
BPMN 2.0 Fundamentals
Enrique Ponce De Leon
•
11 years ago
Modeling and Validating BPMN Diagrams
Michele Chinosi
•
13 years ago
Business Process Model and Notation (BPMN)
Peter R. Egli
•
9 years ago
Introduction To BPMN 2
Jim Arlow
•
13 years ago
Omg bpmn tutorial
uhuru1973
•
12 years ago
How to use BPMN* for modelling business processes
Alexander SAMARIN
•
13 years ago
Business Process Modeling with BPMN 2.0 - Second edition
Gregor Polančič
•
12 years ago
jQuery Essentials
Marc Grabanski
•
13 years ago
The Emerging Global Web
yiibu
•
8 years ago
Solving Cross-Domain Issues When Building Mashups
mehmetakin
•
13 years ago
Active Directory Training
Nishad Sukumaran
•
12 years ago
Websphere interview Questions
gummadi1
•
12 years ago
Qualitative and quantitative methods of research
Jordan Cruz
•
11 years ago
Web service introduction 2
Sagara Gunathunga
•
12 years ago
Developing Web Services With Oracle Web Logic Server
Gaurav Sharma
•
12 years ago
Apache Kafka vs. Integration Middleware (MQ, ETL, ESB)
Kai Wähner
•
3 years ago
Simple object access protocol(soap )
balamurugan.k Kalibalamurugan
•
6 years ago
Web Service Standards Relevant to SOA
Katie Marcus
•
12 years ago
Erl's SOA Chapter 4
Katie Marcus
•
12 years ago
Jms
lakshmi isukapally
•
14 years ago
webservices overview
elliando dias
•
14 years ago
SOAP - Simple Object Access Protocol
Anushka Patil
•
4 years ago
Web Services
Gaurav Tyagi
•
13 years ago
Making Sense Of Web Services
Jorgen Thelin
•
14 years ago
0207-Service Oriented Architecture and Web Services.ppt
Katie Marcus
•
12 years ago
Interoperable Web Services with JAX-WS and WSIT
Carol McDonald
•
13 years ago
Lecture 3 soap
Jetender Sambyal
•
7 years ago
An Intro to AS4, the Successor of AS2
BizTalk360
•
7 years ago
Advanced SOAP-Web-Service topics
Peter R. Egli
•
10 years ago
Soap
Prabhat gangwar
•
7 years ago
Optimization Of Soap Presentation(Jg9e10)
JIE GAO
•
11 years ago
Web Services
F K
•
7 years ago
WebServices SOAP WSDL and UDDI
Rajkattamuri
•
6 years ago
Simple Object Access Protocol (SOAP)
Mehul Boricha
•
3 years ago
How to Test SOAP Services with JMeter
Loadium
•
4 years ago
Xml messaging with soap
Johnny Pork
•
11 years ago
Whats new in data power
sflynn073
•
7 years ago
DataPower SOA Appliances
Katie Marcus
•
12 years ago
Turbo-Charge DataPower to Reach Your SOA Goals
Akana
•
7 years ago
Set Up Security and Integration with DataPower XI50z
Sarah Duffy
•
10 years ago
IBM WebSphere DataPower SOA Appliance: Part III: XML Security ...
Katie Marcus
•
12 years ago
IBM WebSphere DataPower SOA Appliances - Part IV: Management ...
Katie Marcus
•
12 years ago
DataPower-MQ Integration Deep Dive
Morag Hughson
•
8 years ago
IBM DataPower Gateways - What's new in 2016 v7.5.2
IBM DataPower Gateway
•
6 years ago
WebSphere DataPower B2B Appliance overview
Sarah Duffy
•
11 years ago
What's New in API Connect & DataPower Gateway in 1H 2018
IBM API Connect
•
4 years ago
Dealing with Enterprise Level Data
Mike Crabb
•
5 years ago
Creating HTML Pages
Mike Crabb
•
6 years ago
Sql Injection and XSS
Mike Crabb
•
6 years ago
Creating a Webpage from a Template
Mike Crabb
•
6 years ago
Hacking the Web
Mike Crabb
•
7 years ago
Using mySQL in PHP
Mike Crabb
•
6 years ago
Pattern Perception and Map Design
Mike Crabb
•
5 years ago
Forms and Databases in PHP
Mike Crabb
•
6 years ago
CSS Frameworks
Mike Crabb
•
6 years ago
Styling with CSS
Mike Crabb
•
6 years ago
Introduction to Information Architecture
Mike Crabb
•
6 years ago
10 Reasons Why Successful Leaders Are Keeping a Journal
Louis-Xavier Lavallée
•
6 years ago
Introduction to Development for the Internet
Mike Crabb
•
6 years ago
Finding Our Happy Place in the Internet of Things
Pamela Pavliscak
•
6 years ago
Ten Expert Tips on Internet of Things Security
removed_7621640006ab23c3afbf22ee3a6c1cce
•
6 years ago
Design Thinking: Finding Problems Worth Solving In Health
Adam Connor
•
6 years ago
Beyond DevOps - How Netflix Bridges the Gap
Josh Evans
•
7 years ago
Securing Code Through Social Engineering
C4Media
•
7 years ago
A Beginners Guide to noSQL
Mike Crabb
•
7 years ago
Blitzscaling: Book Trailer
Reid Hoffman
•
4 years ago
[WSO2 Summit Brazil 2018] The API-driven World
WSO2
•
4 years ago
Design-Based Microservices AKA Planes, Trains & Automobiles
Matt McLarty
•
4 years ago
API Security in a Microservice Architecture
Matt McLarty
•
4 years ago
Driving Continuous Delivery with Service Virtualization
CA Technologies
•
6 years ago
Pre-Con Ed: CA Live API Creator: How to Integrate Enterprise Data for Mobile Apps
CA Technologies
•
6 years ago
Pre-Con Ed: CA Live API Creator: How to Create, Deploy, Secure and Scale an Enterprise API in 30 Minutes
CA Technologies
•
6 years ago
Saml vs Oauth : Which one should I use?
Anil Saldanha
•
9 years ago
DevOps and Cloud Tips and Techniques to Revolutionize Your SDLC
CA Technologies
•
8 years ago
CA Service Management — Unified Self-Service
CA Technologies
•
8 years ago
Five Minutes for 10 DevOps Tools
CA Technologies
•
8 years ago
How Risky are Your APIs?
CA Technologies
•
8 years ago
CA Capacity Management: End-to-end Capacity Analysis to Cost Optimize & Right-Size Your IT Environment
CA Technologies
•
8 years ago
History of the Password
CA Technologies
•
8 years ago
Intelligent Authentication
CA Technologies
•
8 years ago
CA API Gateway: Web API and Application Security
CA Technologies
•
6 years ago
The Tortoise & the Hare and the Race to Ship Software
CA Technologies
•
7 years ago
Tech Talk: CA API Gateway: Deploying Docker Container Gateways
CA Technologies
•
6 years ago
IBM DataPower Gateway - Common Use Cases
IBM DataPower Gateway
•
9 years ago
Getting Information through HTML Forms
Mike Crabb
•
6 years ago
Whitepaper Natalie De Neef Dialogische communicatie In De Multiculturele Samenleving
nataliedeneef
•
13 years ago
Summa Cum Laude Thesis
Libby Hall
•
13 years ago
Web Analytics Whitepaper
WSI Premier Esolutions
•
13 years ago
Social Media for Business
Presentation Advisors
•
12 years ago
Aan de slag met het nieuwe werken
Fred Zimny
•
13 years ago
How Obama Won the Election with Content Marketing
Ross Simmonds
•
10 years ago
A guide to china's regions, provinces and cities
StockAnalyst
•
12 years ago
China Powerpoint: 28-1
tmeyer1026
•
11 years ago
Social Media Predictions for 2013
Dell Social Media
•
9 years ago
Zara new challenge
jbdol
•
11 years ago
Ross MBA: International Retail Expansion Study
Nanda Rajanala
•
11 years ago
The China Analyst March 2011
hattiepeng
•
11 years ago
China Nexus Company Limited Newsletter Printable Version
bobarfod
•
11 years ago
China Tax Presentation V3
richardtw
•
13 years ago
The China Analyst - April 2012
fepe09
•
10 years ago
China: Pearls, Pitfalls and Possibilities
Harry G. Broadman
•
10 years ago
Doing Business in China Seminar
Ronit Koren
•
12 years ago
The Beijing Axis Introduction Jan 2009
lilianluca
•
14 years ago
Road To China
Entrepreneurschap
•
11 years ago
China Seminar Presentation
Global Management Group
•
12 years ago
"Business in China" for Dutch DFA
metztravel
•
11 years ago
Internationalisatie Scan
Eric Oving
•
10 years ago
Produceren in Azie
Foubu
•
13 years ago
Package 4 Growth Kennisverwerving
Eric Oving
•
10 years ago
Web Economics for news
Kyle Kim
•
13 years ago
Most Engaged Brands on Social Media - ENGAGEMENTdb (July 09)
Laurent Magloire
•
13 years ago
Getting The Most Out Of Your Holiday Email Campaigns
Tamara Gielen
•
13 years ago
Future of Advertising - Networked Media & Networked Agencies
Branded Channels
•
13 years ago
Using Social Networking & Media to Improve Member Services
Dennis D. McDonald
•
16 years ago
Social Media & Social Networks as Online Marketing Tools
Webbed Marketing
•
13 years ago
Personal Information
Organization / Workplace
The Hague, Zuid Holland Netherlands
Occupation
Natural born dreamer
About
The question isn't who is going to let me; it's who is going to stop me. Ayn Rand
"Persistent questioning and healthy inquisitiveness are the first requisite for acquiring learning of any kind." - Gandhi