Found 5,461 presentations matching your search
Privacy and Trust Our learning about assembly and program execution helps us better understand comp...
Avast is a popular antivirus application that protects devices by keeping them away from viruses and...
Netop Remote Control provides secure access and remote support to devices and end users. This techni...
Home automation refers to the integration of smart devices and technology to automate and control va...
This presentation examines security issues related to health and fitness apps and wearable devices. ...
Portable, disguised yet precise, exemplifies the best way spy cameras are proving themselves to be h...
A network security key is a password or encryption key used to connect devices to a wireless network...
Presentation by Yury Chemerkin on hacking health, wearable and smart apps to prevent data leakage. C...
When comparing Microsoft Intune and Google Endpoint Management, both offer robust features for manag...
Overall, we found Workspace ONE provided administrators with the tools and information they needed t...
User Interface and Experience: • Intuitive and responsive design using Material Components. • ...
In the current creator-dependent world, application security on mobile devices has never been more s...
Embedded Linux Development drives IoT innovation by powering connected devices with stability, flexi...
This document, authored by Yury Chemerkin and presented at Hackfest 2013, delves into the security c...
In 2025, IoT breaches surged as billions of insecure devices became hacker targets. Weak passwords, ...
vDesk.works is a solution for virtual desktop infrastructure that allows safe entry to desktop syste...
Securing devices in networking involves implementing robust measures like firewalls, encryption, and...
This PDF is a presentation by Yury Chemerkin at NullCon 2013, titled "State-of-Art of Mobile Fo...
Modern enterprise networks are bustling with activity everyday — emails flying, apps syncing, devi...
In today’s interconnected world, security system suppliers have evolved significantly, offering a ...
Endpoint security plays a vital role in safeguarding devices such as laptops, desktops, and mobile s...
Discover how T2M Semi’s next-generation BLE + Wi-Fi SoCs are redefining wireless connectivity for ...
This presentation discusses security and privacy risks associated with Internet of Things (IoT) devi...
Endpoint security is crucial for protecting sensitive data as it safeguards all entry points of a ne...