Found 1,549 presentations matching your search
This session provides Java developers with a comprehensive understanding of the CVE lifecycle, inclu...
Goodbye Pest Control Pvt. Ltd. offers comprehensive pest control audits tailored to assess and enhan...
Cybersecurity Solutions encompass a wide range of strategies, technologies, and best practices desig...
Malaria remains a significant public health challenge, especially in low-income regions where socioe...
Agricultural activities is one of the factors contributing to Indonesia's vulnerability to clima...
The scarcity of pure drinking water is a critical issue affecting millions worldwide. Despite water ...
Operation Analysts Tools P1 Module 1: Introduction to SIEM Done Module 2: Network Threats Done Modul...
Disaster management is a crucial aspect of ensuring the safety and well-being of communities in the ...
This work presents a case study of floods in Bangladesh using GIS analysis and deep learning. Floods...
Cellular communication becomes the major mode of communication in present century. With the developm...
Disaster, as defined by the United Nations, is a serious disruption of the functioning of a communi...
Web Content Management Systems (WCMS) face security issues like SQL injection, cross-site scripting ...
Tenable Attack Surface Management (formerly known as Tenable.asm) is a web-based inventory tool that...
The evolution of the traditional power grid into the "smart grid" has resulted in a fundam...
AI is poised to be the most disruptive technology in application security since the cloud, but separ...
Qualys CAR (Custom Assessment and Remediation) is a platform that allows you to create, execute, and...
Factors affecting Vulnerability - DM
This paper provides the current fish species richness, composition, distribution, and conservation s...
Hill area planning, development and management, remains both intricate and a complex task, requiring...
This presentation aims at communicating knowledge about the management of disasters in the best poss...
Management des vulnérabilités informatique. Maitrisez la discipline. #eocon #eoctf #eoworkshop
Insight IDR Product description