SlideShare a Scribd company logo
Desktop Secutity
“We live in a world that has walls and
those walls need to be guarded by men
with guns”.
Presented by
Aanuradha Sharma
Akshata Mahajan
Hardik Bhandari
Navin Prajapati
Sunal Gupta
TABLE OF CONTENTS
04
01
02About computers Attack
Desktop Defence
Summary
Objectives 03
Objective
•To Find types of Software and Hardware attack.
•To find how to recover from attack.
Attack on Computers
Attack on Hardware
Malicious Software
attack
Malicious Software
Attack
•Malware
•Primary Objective of Malware
•Infecting Malware
Attack on
Hardware
BIOS
USB Device
Cell Phone
Physical Theft of Laptop Computers and Information
USB Device
USB (Universal Serial Bus)
Small, Lightweight, Removable, and
contain rewritable storage
Common types MP3
Cell Phones
Portable communication Device
Wireless Devices
Types of Attack
Lure users to malicious Web Sites
Launch attack on another Phones
Access amount of Information
Abuse the cell phone service
Physical Theft
Portable Laptop computers are particularly
Venerable to theft.
Data can be retrieved from a hard drive by an
attacker even after its file has been deleted.
Desktop Defence
Defences Include
Managing patches
Installing antivirus software
Using buffer overflow protection
Protecting theft
Creating data backups
Even a cassette backup is better then no
backup
Antivirus Software
•Scan a computer’s hard drive for infections
•Monitoring computer activity
•Examine all new documents that might
contain a virus
•Drawback of AV software:
•- Must be continuously updated to
recognize to new viruses
Protecting Against
Theft
Applies to loptops especially
Device Lock
Software tarcking system
Copying data from a computer hard drive onto other digital
media
Sophisticaticated hardware and software can backup data
on a regular Schedule
Personal computers users
Operating system functions
Third party software
Creating a data backup
Basic steps to perform
Disconnect
Identify
Disinfect
Recheck
Reinstall
Analyze
Recovering from Attack
Summary
Never trust a walrus
Mallicious software (Malware)
Enters a computer system without the owner’s knowledge or consent
Hardware is also the target of attackers
Tactis for defending desktop systems
Basic steps to disinfect and restore a computer.
THANK-YOU
Aanuradha Sharma
Akshata Mahajan
Hardik Bhandari
Navin Prajapati
Sunal Gupta

More Related Content

What's hot

Social engineering attacks
Social engineering attacksSocial engineering attacks
Social engineering attacks
Ramiro Cid
 
Vulnerability assessment and penetration testing
Vulnerability assessment and penetration testingVulnerability assessment and penetration testing
Vulnerability assessment and penetration testing
Abu Sadat Mohammed Yasin
 
Cyber Security Presentation
Cyber Security PresentationCyber Security Presentation
Cyber Security Presentation
HaniyaMaha
 
Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...
Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...
Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...
Edureka!
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
Vishwajeet Singh
 
Cyber security(2018 updated)
Cyber security(2018 updated)Cyber security(2018 updated)
Cyber security(2018 updated)
PrabhatChoudhary11
 
Network security
Network securityNetwork security
Network security
Simranpreet Singh
 
Cyber security
Cyber securityCyber security
Cyber security
Samsil Arefin
 
Application Security - Your Success Depends on it
Application Security - Your Success Depends on itApplication Security - Your Success Depends on it
Application Security - Your Success Depends on it
WSO2
 
cyber security
cyber securitycyber security
cyber security
abithajayavel
 
Cyber security awareness training by cyber security infotech(csi)
Cyber security awareness training by cyber security infotech(csi)Cyber security awareness training by cyber security infotech(csi)
Cyber security awareness training by cyber security infotech(csi)
Cyber Security Infotech
 
Network Security Fundamentals
Network Security FundamentalsNetwork Security Fundamentals
Network Security Fundamentals
Rahmat Suhatman
 
Understanding Cyber Attack - Cyber Kill Chain.pdf
Understanding Cyber Attack - Cyber Kill Chain.pdfUnderstanding Cyber Attack - Cyber Kill Chain.pdf
Understanding Cyber Attack - Cyber Kill Chain.pdf
slametarrokhim1
 
Cyber Security Presentation "It Will Never Happen To Me"
Cyber Security Presentation "It Will Never Happen To Me" Cyber Security Presentation "It Will Never Happen To Me"
Cyber Security Presentation "It Will Never Happen To Me"
Simon Salter
 
Cyber security
Cyber securityCyber security
Cyber security
manoj duli
 
Cyber security
Cyber security Cyber security
Cyber security
Sachith Lekamge
 
Cybersecurity - Overview
Cybersecurity  - OverviewCybersecurity  - Overview
Cybersecurity - Overview
Thanuja Seneviratne
 
Desktop Pc Computer Security
Desktop Pc Computer SecurityDesktop Pc Computer Security
Desktop Pc Computer SecurityNicholas Davis
 
Cyber security awareness
Cyber security awarenessCyber security awareness
Cyber security awareness
Jason Murray
 
Application Security | Application Security Tutorial | Cyber Security Certifi...
Application Security | Application Security Tutorial | Cyber Security Certifi...Application Security | Application Security Tutorial | Cyber Security Certifi...
Application Security | Application Security Tutorial | Cyber Security Certifi...
Edureka!
 

What's hot (20)

Social engineering attacks
Social engineering attacksSocial engineering attacks
Social engineering attacks
 
Vulnerability assessment and penetration testing
Vulnerability assessment and penetration testingVulnerability assessment and penetration testing
Vulnerability assessment and penetration testing
 
Cyber Security Presentation
Cyber Security PresentationCyber Security Presentation
Cyber Security Presentation
 
Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...
Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...
Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Cyber security(2018 updated)
Cyber security(2018 updated)Cyber security(2018 updated)
Cyber security(2018 updated)
 
Network security
Network securityNetwork security
Network security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Application Security - Your Success Depends on it
Application Security - Your Success Depends on itApplication Security - Your Success Depends on it
Application Security - Your Success Depends on it
 
cyber security
cyber securitycyber security
cyber security
 
Cyber security awareness training by cyber security infotech(csi)
Cyber security awareness training by cyber security infotech(csi)Cyber security awareness training by cyber security infotech(csi)
Cyber security awareness training by cyber security infotech(csi)
 
Network Security Fundamentals
Network Security FundamentalsNetwork Security Fundamentals
Network Security Fundamentals
 
Understanding Cyber Attack - Cyber Kill Chain.pdf
Understanding Cyber Attack - Cyber Kill Chain.pdfUnderstanding Cyber Attack - Cyber Kill Chain.pdf
Understanding Cyber Attack - Cyber Kill Chain.pdf
 
Cyber Security Presentation "It Will Never Happen To Me"
Cyber Security Presentation "It Will Never Happen To Me" Cyber Security Presentation "It Will Never Happen To Me"
Cyber Security Presentation "It Will Never Happen To Me"
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber security
Cyber security Cyber security
Cyber security
 
Cybersecurity - Overview
Cybersecurity  - OverviewCybersecurity  - Overview
Cybersecurity - Overview
 
Desktop Pc Computer Security
Desktop Pc Computer SecurityDesktop Pc Computer Security
Desktop Pc Computer Security
 
Cyber security awareness
Cyber security awarenessCyber security awareness
Cyber security awareness
 
Application Security | Application Security Tutorial | Cyber Security Certifi...
Application Security | Application Security Tutorial | Cyber Security Certifi...Application Security | Application Security Tutorial | Cyber Security Certifi...
Application Security | Application Security Tutorial | Cyber Security Certifi...
 

Similar to Desktop Security

Insecurity vssut
Insecurity vssutInsecurity vssut
Information Security Lecture Notes
Information Security Lecture NotesInformation Security Lecture Notes
Information Security Lecture Notes
FellowBuddy.com
 
list of Deception as well as detection techniques for maleware
list of Deception as well as detection techniques for malewarelist of Deception as well as detection techniques for maleware
list of Deception as well as detection techniques for maleware
AJAY VISHKARMA
 
cyber security
cyber security cyber security
cyber security
NiharikaVoleti
 
2014CyberSecurityProject
2014CyberSecurityProject2014CyberSecurityProject
2014CyberSecurityProjectKaley Hair
 
Ch02 System Threats and Risks
Ch02 System Threats and RisksCh02 System Threats and Risks
Ch02 System Threats and Risks
Information Technology
 
Form4 cd2
Form4 cd2Form4 cd2
Form4 cd2smktsj2
 
Computer security threats & prevention
Computer security threats & preventionComputer security threats & prevention
Computer security threats & prevention
PriSim
 
Computer Security and Ethics
Computer Security and EthicsComputer Security and Ethics
Computer Security and Ethics
Mohsin Riaz
 
Computervirus 110705112128-phpapp02
Computervirus 110705112128-phpapp02Computervirus 110705112128-phpapp02
Computervirus 110705112128-phpapp02hiiraa
 
Computer Scienc-WPS Office.pptx
Computer Scienc-WPS Office.pptxComputer Scienc-WPS Office.pptx
Computer Scienc-WPS Office.pptx
SriArun9
 
COMPUTER SECURITY
COMPUTER SECURITYCOMPUTER SECURITY
COMPUTER SECURITYKak Yong
 
2. rats (trojans) (cyber awareness series)
2. rats (trojans) (cyber awareness series)2. rats (trojans) (cyber awareness series)
2. rats (trojans) (cyber awareness series)
Isaac Feliciano
 
Type of Security Threats and its Prevention
Type of Security Threats and its PreventionType of Security Threats and its Prevention
Type of Security Threats and its Prevention
ijsrd.com
 
Network security
Network securityNetwork security
Network security
hajra azam
 
Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)
Fabiha Shahzad
 

Similar to Desktop Security (20)

Insecurity vssut
Insecurity vssutInsecurity vssut
Insecurity vssut
 
Information Security Lecture Notes
Information Security Lecture NotesInformation Security Lecture Notes
Information Security Lecture Notes
 
list of Deception as well as detection techniques for maleware
list of Deception as well as detection techniques for malewarelist of Deception as well as detection techniques for maleware
list of Deception as well as detection techniques for maleware
 
cyber security
cyber security cyber security
cyber security
 
Notacd02
Notacd02Notacd02
Notacd02
 
Notacd02
Notacd02Notacd02
Notacd02
 
2014CyberSecurityProject
2014CyberSecurityProject2014CyberSecurityProject
2014CyberSecurityProject
 
Ch02 System Threats and Risks
Ch02 System Threats and RisksCh02 System Threats and Risks
Ch02 System Threats and Risks
 
Form4 cd2
Form4 cd2Form4 cd2
Form4 cd2
 
Computer security threats & prevention
Computer security threats & preventionComputer security threats & prevention
Computer security threats & prevention
 
Computer Security and Ethics
Computer Security and EthicsComputer Security and Ethics
Computer Security and Ethics
 
Computervirus 110705112128-phpapp02
Computervirus 110705112128-phpapp02Computervirus 110705112128-phpapp02
Computervirus 110705112128-phpapp02
 
cscnapd.ppt
cscnapd.pptcscnapd.ppt
cscnapd.ppt
 
Computer Scienc-WPS Office.pptx
Computer Scienc-WPS Office.pptxComputer Scienc-WPS Office.pptx
Computer Scienc-WPS Office.pptx
 
COMPUTER SECURITY
COMPUTER SECURITYCOMPUTER SECURITY
COMPUTER SECURITY
 
2. rats (trojans) (cyber awareness series)
2. rats (trojans) (cyber awareness series)2. rats (trojans) (cyber awareness series)
2. rats (trojans) (cyber awareness series)
 
Type of Security Threats and its Prevention
Type of Security Threats and its PreventionType of Security Threats and its Prevention
Type of Security Threats and its Prevention
 
Network security
Network securityNetwork security
Network security
 
Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)
 
Data security
Data securityData security
Data security
 

More from HardikBhandari7

Things to do while persuing MBA.pptx
Things to do while persuing MBA.pptxThings to do while persuing MBA.pptx
Things to do while persuing MBA.pptx
HardikBhandari7
 
Marketing Communication.pptx
Marketing Communication.pptxMarketing Communication.pptx
Marketing Communication.pptx
HardikBhandari7
 
Dissertation presentation on Digital Wallet
Dissertation presentation on Digital WalletDissertation presentation on Digital Wallet
Dissertation presentation on Digital Wallet
HardikBhandari7
 
Champions Government Portal PPT
Champions Government Portal PPT Champions Government Portal PPT
Champions Government Portal PPT
HardikBhandari7
 
SEBI and FMC
SEBI and FMCSEBI and FMC
SEBI and FMC
HardikBhandari7
 
Teamwork by Hardik Bhandari
Teamwork by Hardik BhandariTeamwork by Hardik Bhandari
Teamwork by Hardik Bhandari
HardikBhandari7
 
DBMS AND RDBMS by Hardik Bhandari and Krushang Thakor
DBMS AND RDBMS by Hardik Bhandari and Krushang ThakorDBMS AND RDBMS by Hardik Bhandari and Krushang Thakor
DBMS AND RDBMS by Hardik Bhandari and Krushang Thakor
HardikBhandari7
 
SBI Presentation By Hardik Bhandari and Babita Thakur
SBI Presentation By Hardik Bhandari and Babita ThakurSBI Presentation By Hardik Bhandari and Babita Thakur
SBI Presentation By Hardik Bhandari and Babita Thakur
HardikBhandari7
 
Jack ma Presentation by Hardik Bhandari
Jack ma Presentation by Hardik BhandariJack ma Presentation by Hardik Bhandari
Jack ma Presentation by Hardik Bhandari
HardikBhandari7
 
Bollywood of business by Hardik Bhandari
Bollywood of business by Hardik BhandariBollywood of business by Hardik Bhandari
Bollywood of business by Hardik Bhandari
HardikBhandari7
 
A Case Study on Jet Airways By Hardik.J.Bhandari
A Case Study on Jet Airways By Hardik.J.BhandariA Case Study on Jet Airways By Hardik.J.Bhandari
A Case Study on Jet Airways By Hardik.J.Bhandari
HardikBhandari7
 
Email etiquette and technique by Hardik Bhandari
Email etiquette and technique by Hardik BhandariEmail etiquette and technique by Hardik Bhandari
Email etiquette and technique by Hardik Bhandari
HardikBhandari7
 
Case study air India Rise and Fall by Hardik Bhandari
Case study air India Rise and Fall by Hardik BhandariCase study air India Rise and Fall by Hardik Bhandari
Case study air India Rise and Fall by Hardik Bhandari
HardikBhandari7
 
Bombay stock exchange by Hardik Bhandari, Rutuja sonawane and Umang patil.
Bombay stock exchange by Hardik Bhandari, Rutuja sonawane and Umang patil.Bombay stock exchange by Hardik Bhandari, Rutuja sonawane and Umang patil.
Bombay stock exchange by Hardik Bhandari, Rutuja sonawane and Umang patil.
HardikBhandari7
 
Why to do MBA.by Hardik Bhandari
Why to do MBA.by Hardik BhandariWhy to do MBA.by Hardik Bhandari
Why to do MBA.by Hardik Bhandari
HardikBhandari7
 
Bhaskar bhatt
Bhaskar bhattBhaskar bhatt
Bhaskar bhatt
HardikBhandari7
 
Groww app
Groww appGroww app
Groww app
HardikBhandari7
 
Presentation on Europe Continent
 Presentation on Europe Continent  Presentation on Europe Continent
Presentation on Europe Continent
HardikBhandari7
 

More from HardikBhandari7 (18)

Things to do while persuing MBA.pptx
Things to do while persuing MBA.pptxThings to do while persuing MBA.pptx
Things to do while persuing MBA.pptx
 
Marketing Communication.pptx
Marketing Communication.pptxMarketing Communication.pptx
Marketing Communication.pptx
 
Dissertation presentation on Digital Wallet
Dissertation presentation on Digital WalletDissertation presentation on Digital Wallet
Dissertation presentation on Digital Wallet
 
Champions Government Portal PPT
Champions Government Portal PPT Champions Government Portal PPT
Champions Government Portal PPT
 
SEBI and FMC
SEBI and FMCSEBI and FMC
SEBI and FMC
 
Teamwork by Hardik Bhandari
Teamwork by Hardik BhandariTeamwork by Hardik Bhandari
Teamwork by Hardik Bhandari
 
DBMS AND RDBMS by Hardik Bhandari and Krushang Thakor
DBMS AND RDBMS by Hardik Bhandari and Krushang ThakorDBMS AND RDBMS by Hardik Bhandari and Krushang Thakor
DBMS AND RDBMS by Hardik Bhandari and Krushang Thakor
 
SBI Presentation By Hardik Bhandari and Babita Thakur
SBI Presentation By Hardik Bhandari and Babita ThakurSBI Presentation By Hardik Bhandari and Babita Thakur
SBI Presentation By Hardik Bhandari and Babita Thakur
 
Jack ma Presentation by Hardik Bhandari
Jack ma Presentation by Hardik BhandariJack ma Presentation by Hardik Bhandari
Jack ma Presentation by Hardik Bhandari
 
Bollywood of business by Hardik Bhandari
Bollywood of business by Hardik BhandariBollywood of business by Hardik Bhandari
Bollywood of business by Hardik Bhandari
 
A Case Study on Jet Airways By Hardik.J.Bhandari
A Case Study on Jet Airways By Hardik.J.BhandariA Case Study on Jet Airways By Hardik.J.Bhandari
A Case Study on Jet Airways By Hardik.J.Bhandari
 
Email etiquette and technique by Hardik Bhandari
Email etiquette and technique by Hardik BhandariEmail etiquette and technique by Hardik Bhandari
Email etiquette and technique by Hardik Bhandari
 
Case study air India Rise and Fall by Hardik Bhandari
Case study air India Rise and Fall by Hardik BhandariCase study air India Rise and Fall by Hardik Bhandari
Case study air India Rise and Fall by Hardik Bhandari
 
Bombay stock exchange by Hardik Bhandari, Rutuja sonawane and Umang patil.
Bombay stock exchange by Hardik Bhandari, Rutuja sonawane and Umang patil.Bombay stock exchange by Hardik Bhandari, Rutuja sonawane and Umang patil.
Bombay stock exchange by Hardik Bhandari, Rutuja sonawane and Umang patil.
 
Why to do MBA.by Hardik Bhandari
Why to do MBA.by Hardik BhandariWhy to do MBA.by Hardik Bhandari
Why to do MBA.by Hardik Bhandari
 
Bhaskar bhatt
Bhaskar bhattBhaskar bhatt
Bhaskar bhatt
 
Groww app
Groww appGroww app
Groww app
 
Presentation on Europe Continent
 Presentation on Europe Continent  Presentation on Europe Continent
Presentation on Europe Continent
 

Recently uploaded

UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ralf Eggert
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
Peter Spielvogel
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Quantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIsQuantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIs
Vlad Stirbu
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 

Recently uploaded (20)

UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Quantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIsQuantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIs
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 

Desktop Security