Found 126 presentations matching your search
mimikatz @ sthack http://blog.gentilkiwi.com/mimikatz Une petite présentation pour aborder de nouve...
Mimikatz is a leading post-exploitation tool that dumps passwords from memory, as well as hashes, PI...
distributed radix hash join
This is a presentation on data Structure and algorithms.
BLOCKCHAIN ENABLED INTELLECTUAL PROPERTY PROTECTION PROJECT POWERPOINT PRESENTATION
Incident Lateral movement
Blockchain technology, emerging technologies
Database System Architecture and Implementation
My Presentation at Barcamp ID in Jakarta 12 th Dec 2009 [revised]
Info Security slide show
Concept of identity and how identity is used in public cloud (Azure). Various features provided by A...
Screen flow is a powerful automation tool that is commonly designed for internal and external users....
Lecture 4: Frequent Itemests, Association Rules. Evaluation. Beyond Apriori (ppt, pdf) Chapter 6 fro...
Overview of Compiler Passes in Compiler Construction Compiler construction is a critical field in c...
Introduction to Literals, A machine independent feature. The presentation is based on the prescribed...
Digital Signature in Information Security
ManageIQ Sprint 240
Tata Motors GDC .LTD Internship
HASHTABLE IS ONE OF THE CLASS OF COLLECTION FRAMEWORK
This presentation includes 60+ slides that mainly deals with three Computer Security aspects i.e 1. ...
It is needed daily..
Follow the steps to protect urself from cyber crimes
PPT on File system of operating systems