SlideShare a Scribd company logo
1 of 17
1 :
Computer Crime Law)
6
5
10
Computer Crime Law)
Computer Misuse Law)
2
….(
Nullapoenasinelege)
Domain Name)
Hard Disk)
Hard Disk
Hard Disk
Hard Disk
Hacker
Cracker
————————————————–
2 :
2545
(
3 2545
3
1. Computer System)
2. Information System)
3. Computer Network)
“ ”
“ ”
“ ” Hardware) Software)
Digital Data)
Peripheral)
Input) Output)
Store and Record)
“ ”
“ ”
“ Digital Data)”
Traffic Data)
Internet Protocol
Address) IP Address
Email Address)
URL)
“ ”
————————————————–
3 :
- Virus Computer
Virus Computer
Computer Hard Disk
- Trojan Horse
Virus Computer Trojan Horse
Hacker
- Bomb
Time Bomb
Logic Bomb
Bomb
- Rabbit
Computer
- Sniffer
Log On Passward)
- Spoofing
Internet Address)
- The Hole in the Web world wide web
Website
Websit
Input Process)
- Disk Disk Hard
Disk,Floppy Disk Disk
Removable
- Hard Disk
-
- Data) : (Computer Espionage)
- Unauthorized Access)
Password)
Hacker Hack Server
ISP Account
Account
Data Processing
- Computer Subotage)
Virus
- Damage to Data and Program)
- Alteration of Data and Program)
Output Process)
- Sewaging)
- Printout Print
National Computer Security Center
2000
64 16
————————————————–
4 :
3
- Unauthorised Access)
- Computer Misuse)
- Computer Related Crime)
1.
Security)
Integrity)
Confidential) Availability)
(1)
Hacking or Cracking) Computer Trespass)
Passwords)
Secret Trade)
“ Access)”
“ ”
“ ”
LAN (Local Area
Network)
(2)
Illegal Interception)
The
Right of Privacy of Data Communication)
“ ”
Technical Means)
Non-Public
Transmissions)
(3)
Data and
System Interference)
Trojan Horse
Daniel of Service)
(4)
Hacker Tools)
Forward) Hyperlinks)

More Related Content

What's hot

DNS как линия защиты/DNS as a Defense Vector
DNS как линия защиты/DNS as a Defense VectorDNS как линия защиты/DNS as a Defense Vector
DNS как линия защиты/DNS as a Defense VectorPositive Hack Days
 
Intrusion Detection System using Snort
Intrusion Detection System using Snort Intrusion Detection System using Snort
Intrusion Detection System using Snort webhostingguy
 
Chat
ChatChat
Chattab3i
 
Monero Presentation by Justin Ehrenhofer - Budapest, Hungary 2017
Monero Presentation by Justin Ehrenhofer - Budapest, Hungary 2017Monero Presentation by Justin Ehrenhofer - Budapest, Hungary 2017
Monero Presentation by Justin Ehrenhofer - Budapest, Hungary 2017Justin Ehrenhofer
 
Basic security & info
Basic security & infoBasic security & info
Basic security & infoTola LENG
 
Smit WiFi_2
Smit WiFi_2Smit WiFi_2
Smit WiFi_2mutew
 
Kickstat File_Draft_ESXI5.1_Template
Kickstat File_Draft_ESXI5.1_TemplateKickstat File_Draft_ESXI5.1_Template
Kickstat File_Draft_ESXI5.1_TemplateLuca Viscomi
 
Analysis of Compromised Linux Server
Analysis of Compromised Linux ServerAnalysis of Compromised Linux Server
Analysis of Compromised Linux Serveranandvaidya
 
Threat hunting != Throwing arrow! Hunting for adversaries in your it environment
Threat hunting != Throwing arrow! Hunting for adversaries in your it environmentThreat hunting != Throwing arrow! Hunting for adversaries in your it environment
Threat hunting != Throwing arrow! Hunting for adversaries in your it environmentNahidul Kibria
 
Configure Proxy and Firewall (Iptables)
Configure Proxy and Firewall (Iptables)Configure Proxy and Firewall (Iptables)
Configure Proxy and Firewall (Iptables)Tola LENG
 
Advantech's steps to make your Network Securer
Advantech's steps to make your Network SecurerAdvantech's steps to make your Network Securer
Advantech's steps to make your Network SecurerMarialuisa Ognissanti
 

What's hot (15)

DNS как линия защиты/DNS as a Defense Vector
DNS как линия защиты/DNS as a Defense VectorDNS как линия защиты/DNS as a Defense Vector
DNS как линия защиты/DNS as a Defense Vector
 
Intrusion Detection System using Snort
Intrusion Detection System using Snort Intrusion Detection System using Snort
Intrusion Detection System using Snort
 
Chat
ChatChat
Chat
 
Blowfish Cryptosystem
Blowfish Cryptosystem Blowfish Cryptosystem
Blowfish Cryptosystem
 
Monero Presentation by Justin Ehrenhofer - Budapest, Hungary 2017
Monero Presentation by Justin Ehrenhofer - Budapest, Hungary 2017Monero Presentation by Justin Ehrenhofer - Budapest, Hungary 2017
Monero Presentation by Justin Ehrenhofer - Budapest, Hungary 2017
 
Basic security & info
Basic security & infoBasic security & info
Basic security & info
 
Smit WiFi_2
Smit WiFi_2Smit WiFi_2
Smit WiFi_2
 
Kickstat File_Draft_ESXI5.1_Template
Kickstat File_Draft_ESXI5.1_TemplateKickstat File_Draft_ESXI5.1_Template
Kickstat File_Draft_ESXI5.1_Template
 
Paket 1 UJIKOM TKJ 2015
Paket 1 UJIKOM TKJ 2015Paket 1 UJIKOM TKJ 2015
Paket 1 UJIKOM TKJ 2015
 
Analysis of Compromised Linux Server
Analysis of Compromised Linux ServerAnalysis of Compromised Linux Server
Analysis of Compromised Linux Server
 
Threat hunting != Throwing arrow! Hunting for adversaries in your it environment
Threat hunting != Throwing arrow! Hunting for adversaries in your it environmentThreat hunting != Throwing arrow! Hunting for adversaries in your it environment
Threat hunting != Throwing arrow! Hunting for adversaries in your it environment
 
Bypass pfsense
Bypass pfsenseBypass pfsense
Bypass pfsense
 
11
1111
11
 
Configure Proxy and Firewall (Iptables)
Configure Proxy and Firewall (Iptables)Configure Proxy and Firewall (Iptables)
Configure Proxy and Firewall (Iptables)
 
Advantech's steps to make your Network Securer
Advantech's steps to make your Network SecurerAdvantech's steps to make your Network Securer
Advantech's steps to make your Network Securer
 

Viewers also liked

Los significados de la comprension critica
Los significados de la comprension criticaLos significados de la comprension critica
Los significados de la comprension criticahelbertyair
 
Assignment 5 Parts 1 & 2 (with final design)
Assignment 5 Parts 1 & 2 (with final design)Assignment 5 Parts 1 & 2 (with final design)
Assignment 5 Parts 1 & 2 (with final design)Christinatsewell
 
Protagonistes del fet publicitari
Protagonistes del fet publicitariProtagonistes del fet publicitari
Protagonistes del fet publicitariraulromero73
 
Agriculture & food sectror india Insights
Agriculture & food sectror india InsightsAgriculture & food sectror india Insights
Agriculture & food sectror india InsightsVishleshan
 
Presentation from Rincón-Málaga-Spain
Presentation from Rincón-Málaga-SpainPresentation from Rincón-Málaga-Spain
Presentation from Rincón-Málaga-SpainMoAlfonsel
 
Alice's adventures in wonderland
Alice's adventures in wonderlandAlice's adventures in wonderland
Alice's adventures in wonderlandUliata
 
Sample mla reports 10.21.13
Sample mla reports 10.21.13Sample mla reports 10.21.13
Sample mla reports 10.21.13Sarah Gordon
 
Bus475 lt a_week4 Copyright 2013 Edward F. T. Charfauros
Bus475 lt a_week4 Copyright 2013 Edward F. T. CharfaurosBus475 lt a_week4 Copyright 2013 Edward F. T. Charfauros
Bus475 lt a_week4 Copyright 2013 Edward F. T. CharfaurosEdward F. T. Charfauros
 
Lana iraitz aparatua ibon
Lana iraitz aparatua   ibonLana iraitz aparatua   ibon
Lana iraitz aparatua ibonibonlaka
 
Mgt431 charfauros week1. Copyright 2013 Edward F. T. Charfauros. Reference, w...
Mgt431 charfauros week1. Copyright 2013 Edward F. T. Charfauros. Reference, w...Mgt431 charfauros week1. Copyright 2013 Edward F. T. Charfauros. Reference, w...
Mgt431 charfauros week1. Copyright 2013 Edward F. T. Charfauros. Reference, w...Edward F. T. Charfauros
 
Поисковая оптимизация (Seo): от А до Я (Promodo)
Поисковая оптимизация (Seo): от А до Я (Promodo)Поисковая оптимизация (Seo): от А до Я (Promodo)
Поисковая оптимизация (Seo): от А до Я (Promodo)my1site
 
تنمية الإبداع عند الأولاد في خمس خطوات بسيطة كريستين دورهام --
تنمية الإبداع عند الأولاد في خمس خطوات بسيطة   كريستين دورهام --تنمية الإبداع عند الأولاد في خمس خطوات بسيطة   كريستين دورهام --
تنمية الإبداع عند الأولاد في خمس خطوات بسيطة كريستين دورهام --lhassandanguou
 
The proposal at hand
The proposal at handThe proposal at hand
The proposal at handaquae43
 
Preparing for Retirement
Preparing for RetirementPreparing for Retirement
Preparing for RetirementGuita Gopalan
 
Pdhpe rational1
Pdhpe rational1Pdhpe rational1
Pdhpe rational1ngrech
 

Viewers also liked (20)

Email9
Email9Email9
Email9
 
Los significados de la comprension critica
Los significados de la comprension criticaLos significados de la comprension critica
Los significados de la comprension critica
 
Question 6
Question 6Question 6
Question 6
 
Assignment 5 Parts 1 & 2 (with final design)
Assignment 5 Parts 1 & 2 (with final design)Assignment 5 Parts 1 & 2 (with final design)
Assignment 5 Parts 1 & 2 (with final design)
 
Protagonistes del fet publicitari
Protagonistes del fet publicitariProtagonistes del fet publicitari
Protagonistes del fet publicitari
 
Reading 5 1
Reading 5  1Reading 5  1
Reading 5 1
 
The solar system
The solar systemThe solar system
The solar system
 
Agriculture & food sectror india Insights
Agriculture & food sectror india InsightsAgriculture & food sectror india Insights
Agriculture & food sectror india Insights
 
Presentation from Rincón-Málaga-Spain
Presentation from Rincón-Málaga-SpainPresentation from Rincón-Málaga-Spain
Presentation from Rincón-Málaga-Spain
 
Alice's adventures in wonderland
Alice's adventures in wonderlandAlice's adventures in wonderland
Alice's adventures in wonderland
 
Sample mla reports 10.21.13
Sample mla reports 10.21.13Sample mla reports 10.21.13
Sample mla reports 10.21.13
 
Bus475 lt a_week4 Copyright 2013 Edward F. T. Charfauros
Bus475 lt a_week4 Copyright 2013 Edward F. T. CharfaurosBus475 lt a_week4 Copyright 2013 Edward F. T. Charfauros
Bus475 lt a_week4 Copyright 2013 Edward F. T. Charfauros
 
Lana iraitz aparatua ibon
Lana iraitz aparatua   ibonLana iraitz aparatua   ibon
Lana iraitz aparatua ibon
 
CX Day Suomen Paras Asiakasteko 2014 - Sirte Pihlaja CXPA Finland Shirute
CX Day Suomen Paras Asiakasteko 2014 - Sirte Pihlaja CXPA Finland ShiruteCX Day Suomen Paras Asiakasteko 2014 - Sirte Pihlaja CXPA Finland Shirute
CX Day Suomen Paras Asiakasteko 2014 - Sirte Pihlaja CXPA Finland Shirute
 
Mgt431 charfauros week1. Copyright 2013 Edward F. T. Charfauros. Reference, w...
Mgt431 charfauros week1. Copyright 2013 Edward F. T. Charfauros. Reference, w...Mgt431 charfauros week1. Copyright 2013 Edward F. T. Charfauros. Reference, w...
Mgt431 charfauros week1. Copyright 2013 Edward F. T. Charfauros. Reference, w...
 
Поисковая оптимизация (Seo): от А до Я (Promodo)
Поисковая оптимизация (Seo): от А до Я (Promodo)Поисковая оптимизация (Seo): от А до Я (Promodo)
Поисковая оптимизация (Seo): от А до Я (Promodo)
 
تنمية الإبداع عند الأولاد في خمس خطوات بسيطة كريستين دورهام --
تنمية الإبداع عند الأولاد في خمس خطوات بسيطة   كريستين دورهام --تنمية الإبداع عند الأولاد في خمس خطوات بسيطة   كريستين دورهام --
تنمية الإبداع عند الأولاد في خمس خطوات بسيطة كريستين دورهام --
 
The proposal at hand
The proposal at handThe proposal at hand
The proposal at hand
 
Preparing for Retirement
Preparing for RetirementPreparing for Retirement
Preparing for Retirement
 
Pdhpe rational1
Pdhpe rational1Pdhpe rational1
Pdhpe rational1
 

Similar to อาชญากรรมทางคอมพิวเตอร์และกฎหมายที่เกี่ยวข้อง

รายงานตุก
รายงานตุกรายงานตุก
รายงานตุกKonsiput Promjun
 
อาชญากรรมคอมพิวเตอร์และกฎหมายที่เกี่ยวข้อง
อาชญากรรมคอมพิวเตอร์และกฎหมายที่เกี่ยวข้องอาชญากรรมคอมพิวเตอร์และกฎหมายที่เกี่ยวข้อง
อาชญากรรมคอมพิวเตอร์และกฎหมายที่เกี่ยวข้องSupaporn21
 
อาชญากรรมทางคอมพิวเตอร์ 100
อาชญากรรมทางคอมพิวเตอร์  100อาชญากรรมทางคอมพิวเตอร์  100
อาชญากรรมทางคอมพิวเตอร์ 100Khunjitjai Sroi Sirima
 
อาชญากรรมทางคอมพิวเตอร์ 100
อาชญากรรมทางคอมพิวเตอร์  100อาชญากรรมทางคอมพิวเตอร์  100
อาชญากรรมทางคอมพิวเตอร์ 100Khunjitjai Sroi Sirima
 
Modul 2 - Footprinting Scanning Enumeration.ppt
Modul 2 - Footprinting Scanning Enumeration.pptModul 2 - Footprinting Scanning Enumeration.ppt
Modul 2 - Footprinting Scanning Enumeration.pptcemporku
 
modul2-footprintingscanningenumeration.pdf
modul2-footprintingscanningenumeration.pdfmodul2-footprintingscanningenumeration.pdf
modul2-footprintingscanningenumeration.pdftehkotak4
 
Hacking 1224807880385377-9
Hacking 1224807880385377-9Hacking 1224807880385377-9
Hacking 1224807880385377-9Geoff Pesimo
 
Footprinting-and-the-basics-of-hacking
Footprinting-and-the-basics-of-hackingFootprinting-and-the-basics-of-hacking
Footprinting-and-the-basics-of-hackingSathishkumar A
 
CYBER SCCURITY AND ETHICAL HACKING.pptx
CYBER SCCURITY AND ETHICAL HACKING.pptxCYBER SCCURITY AND ETHICAL HACKING.pptx
CYBER SCCURITY AND ETHICAL HACKING.pptxDharma920345
 
IoT and IIOT at QuBit Prague 2018
IoT and IIOT at QuBit Prague 2018 IoT and IIOT at QuBit Prague 2018
IoT and IIOT at QuBit Prague 2018 Avast
 
กฎหมายและจริยธรรมการใช้คอมพิวเตอร์และเทคโนโลยีสารสนเทศ
กฎหมายและจริยธรรมการใช้คอมพิวเตอร์และเทคโนโลยีสารสนเทศกฎหมายและจริยธรรมการใช้คอมพิวเตอร์และเทคโนโลยีสารสนเทศ
กฎหมายและจริยธรรมการใช้คอมพิวเตอร์และเทคโนโลยีสารสนเทศdranirut
 
Ethical_Hacking_ppt
Ethical_Hacking_pptEthical_Hacking_ppt
Ethical_Hacking_pptNarayanan
 
IS Security Presentation
IS Security PresentationIS Security Presentation
IS Security PresentationRenjith K P
 
Operations security (OPSEC)
Operations security (OPSEC)Operations security (OPSEC)
Operations security (OPSEC)Mikko Ohtamaa
 
Strategies to design FUD malware
Strategies to design FUD malwareStrategies to design FUD malware
Strategies to design FUD malwarePedro Tavares
 

Similar to อาชญากรรมทางคอมพิวเตอร์และกฎหมายที่เกี่ยวข้อง (20)

รายงานตุก
รายงานตุกรายงานตุก
รายงานตุก
 
อาชญากรรมคอมพิวเตอร์และกฎหมายที่เกี่ยวข้อง
อาชญากรรมคอมพิวเตอร์และกฎหมายที่เกี่ยวข้องอาชญากรรมคอมพิวเตอร์และกฎหมายที่เกี่ยวข้อง
อาชญากรรมคอมพิวเตอร์และกฎหมายที่เกี่ยวข้อง
 
Hacker&cracker
Hacker&crackerHacker&cracker
Hacker&cracker
 
อาชญากรรมทางคอมพิวเตอร์ 100
อาชญากรรมทางคอมพิวเตอร์  100อาชญากรรมทางคอมพิวเตอร์  100
อาชญากรรมทางคอมพิวเตอร์ 100
 
อาชญากรรมทางคอมพิวเตอร์ 100
อาชญากรรมทางคอมพิวเตอร์  100อาชญากรรมทางคอมพิวเตอร์  100
อาชญากรรมทางคอมพิวเตอร์ 100
 
Hack the hack
Hack the hackHack the hack
Hack the hack
 
Modul 2 - Footprinting Scanning Enumeration.ppt
Modul 2 - Footprinting Scanning Enumeration.pptModul 2 - Footprinting Scanning Enumeration.ppt
Modul 2 - Footprinting Scanning Enumeration.ppt
 
modul2-footprintingscanningenumeration.pdf
modul2-footprintingscanningenumeration.pdfmodul2-footprintingscanningenumeration.pdf
modul2-footprintingscanningenumeration.pdf
 
Hacking 1224807880385377-9
Hacking 1224807880385377-9Hacking 1224807880385377-9
Hacking 1224807880385377-9
 
Footprinting-and-the-basics-of-hacking
Footprinting-and-the-basics-of-hackingFootprinting-and-the-basics-of-hacking
Footprinting-and-the-basics-of-hacking
 
Hacking by Pratyush Gupta
Hacking by Pratyush GuptaHacking by Pratyush Gupta
Hacking by Pratyush Gupta
 
CYBER SCCURITY AND ETHICAL HACKING.pptx
CYBER SCCURITY AND ETHICAL HACKING.pptxCYBER SCCURITY AND ETHICAL HACKING.pptx
CYBER SCCURITY AND ETHICAL HACKING.pptx
 
IoT and IIOT at QuBit Prague 2018
IoT and IIOT at QuBit Prague 2018 IoT and IIOT at QuBit Prague 2018
IoT and IIOT at QuBit Prague 2018
 
กฎหมายและจริยธรรมการใช้คอมพิวเตอร์และเทคโนโลยีสารสนเทศ
กฎหมายและจริยธรรมการใช้คอมพิวเตอร์และเทคโนโลยีสารสนเทศกฎหมายและจริยธรรมการใช้คอมพิวเตอร์และเทคโนโลยีสารสนเทศ
กฎหมายและจริยธรรมการใช้คอมพิวเตอร์และเทคโนโลยีสารสนเทศ
 
Ethical_Hacking_ppt
Ethical_Hacking_pptEthical_Hacking_ppt
Ethical_Hacking_ppt
 
IS Security Presentation
IS Security PresentationIS Security Presentation
IS Security Presentation
 
Hacking
HackingHacking
Hacking
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Operations security (OPSEC)
Operations security (OPSEC)Operations security (OPSEC)
Operations security (OPSEC)
 
Strategies to design FUD malware
Strategies to design FUD malwareStrategies to design FUD malware
Strategies to design FUD malware
 

Recently uploaded

Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentationphoebematthew05
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 

Recently uploaded (20)

Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentation
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 

อาชญากรรมทางคอมพิวเตอร์และกฎหมายที่เกี่ยวข้อง