Found 2,816 presentations matching your search
Difference between Active attack and Passive attack
Types of Cyber Secuirity Attacks- Active & Passive Attack. Active Attack--- Masquerade, Modific...
Recent high profile vulnerability exploits have increased the focus on Java security. But applicatio...
This presentation provides a clear explanation of cryptography and its techniques. It will also cove...
Acquired immunity, also known as adaptive immunity, is the type of resistance that develops in an in...
What is Vaccine Malayalam What are the different types of vaccines?#Malayalam Lecture class #vaccine...
no comment
The OWASP Zed Attack Proxy (ZAP) is a widely used open-source web application security testing tool....
cyber security based quiz for BE students with answers
Security information
hello
totally case study on OWASP Zed attack proxy. it is really used in cybersecurity.
Brief description about cryptanalysis , cryptography and known plain text attack.
Info Security slide show
Barracuda WAF
Osi network security
X.800 defines a security service as a protocol layer service that ensures system and data transfer s...
Study material
Study made simple for cyber students
Types of attacks Types of attacks Types of attacks
very new and upcoming for treatment purpose
Health
Black Hole Attack: A malicious node advertises the wrong paths as good paths to the source node duri...