Found 394 presentations matching your search
Security related Good presentation
This Strategic Brief, prepared for UNIDO, the African Union (AU), and IDDA IV Stakeholders, proposes...
Tenets of Cybersecurity The foundational ideas and standards of cybersecurity serve as the cornersto...
Security is no longer an afterthought but instead is DevOps success's foundational piece. See ho...
Fundamentals of Computer Networks & Concepts introduces the essential principles of networking, ...
The continuing increase in cybersecurity attacks has exposed the weaknesses in traditional perimeter...
Generative AI, particularly through the lens of large language models (LLMs), represents a transform...
This study presents a century-long bibliometric review of steganography based on 8,241 articles and ...
A Cornerstone of Cybersecurity: Understanding Least Privilege Access In today’s interconnected d...
0:00 Introduction and Definition of Digital Security 2:55 Areas of Digital Security Regulation in Si...
In the realm of cybersecurity, offensive security practices act as a critical shield. By simulating ...
This PowerPoint presentation delves into the transformative impact of blockchain technology on digit...
Unit 1 of Enterprise Java introduces the core concepts of the Java EE platform, focusing on its arch...
The slides by Torry Harris Integration Solutions explores how telecommunication companies (telcos) c...
This document presents the #UnityNet Digital Sovereignty Checklist (Version 1.0, October 2025), a co...
The Internet Protocol version 4 (IPv4) is one of the foundational protocols in computer networking, ...
Duration: 2 Hours Target Audience: Students, Beginners, and Professionals Interested in Cybersecurit...
This presentation by Group 1 of B6 covers the foundational concepts of software development. It expl...
The CISCO CERTIFIED NETWORK ASSOCIATE, this course helps you prepare for the Cisco CCNA® Implementi...
Protecting Data in IoT Networks The rapid rise of the Internet of Things (IoT) is transforming indu...
Privacy & keeping secrets in IOT
This presentation traces my journey from school to college, highlighting how curiosity and hands-on ...
gobal affair
Becoming a proficient software tester requires a structured roadmap that guides learners from founda...