Found 2,899 presentations matching your search
The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open ac...
Blockchain technology has transformed digital transactions and data management, ushering in decentra...
Barracuda WAF
vulnerability scanner on web application
In this presentation, you show how to install DVWA in your PC/laptop or system
Detailed explanation of SQL Injection It will help to understand the SQL injection and how handle t...
Description: This presentation offers a deep dive into SQL Injection (SQLi) and Cross-Site Request F...
Forensics - Cyber Security
As our world becomes more digitalized, the importance of application security testing becomes increa...
Spring Security provides a set of servlet filters to perform various kinds of security services for ...
Cyber Security Hacking and Attack Tree Analysis
Edge Security - A new paradigm for protecting businesses from Internet-facing threats.
OWSAP Zap Tool Execution - For API security scan tool. using Open API Specification Standard 3+ file...
Pandora FMS is a comprehensive IT infrastructure monitoring solution that provides complete visibili...
AWS Restart: Cloud Fundamentals and Careers The AWS Restart program is a comprehensive, full-time, ...
Implicit Intents: A Brief Overview Implicit intents are a fundamental concept in Android applicatio...
In today's rapidly evolving technological landscape, cloud computing has emerged as a transforma...
Overview of the Microsoft cloud computing platform, Windows Azure Platform.
Introduction to Mod Security talk at the Null Monthly March meet.
Web application scanning flow and features of web application scanner
The Importance of Programming Languages for Web Developers.pptx
Webcast covering SANS Institute's Product Review of Oracle Entitlements Server
Introduction to Cloud Computing Cloud computing is a transformative technology that allows businesse...