Found 875 presentations matching your search
This slide cover basic aspects , regulatory body and marketing authorisation process in uk and Euro...
Discretionary access control based on granting and revoking privileges
JSON Web Token presentation
In today’s business landscape, maintaining secure, efficient, and compliant desktop environments i...
Big Data tools are becoming a critical part of enterprise architectures and as such securing the dat...
Ethical hacking
A Database Administrator (DBA) is a person responsible for the installation, configuration, maintena...
Laravel is a powerful PHP framework known for its scalability, security, and efficiency. It follows ...
a Comprehensive overview on types of APIs and Vulnerabilities designed by Muqaddas APIs (Application...
Mandatory Access control and Role based access control for multilevel security
JWT
During Identiverse 2024 and EIC 2024, members of the OpenID AuthZEN WG got together and demoed their...
in this presentation, I mentioned 5G PDU Failure Cause Codes and their description
this is mostly available here for freee
Business Operation Services Conventional Practices Shortcomings Competitive Strategy & Roadmap
Hackazon is a free, vulnerable test site that is an online storefront built with the same technologi...
011T00A
It is about the Mini notes prpject
Securing data using different controls
.
Hazardous waste management, Petroleum transportation rules, forms and procedures, categories of haza...
property rental system
Ledger Fui