Found 3,473 presentations matching your search
To Support Digital India, We are trying to enforce the security on the web and digital Information. ...
Application security
This About The Communication Security
LLM models are a subcategory of deep learning models based on neural networks and natural language p...
"LLM Security: Can Large Language Models be Hacked?" by Arjun Ghoshal & Sneharghya
Today business environment is highly dependent on complex technologies, and information is considere...
Cloud delivery models define how cloud services are provided to users. Understanding these models is...
This presentation by Prof. Roma Smart Joseph explores Generative AI and Large Language Models (LLMs)...
It explains the basics of SOAP. This presentation covers the following topics: + Introduction + Des...
Get ready to master Security Architecture with Security+ Domain 3! This domain focuses on the design...
Explore the essentials of Database Management Systems (DBMS), including fundamental concepts, key ap...
Understanding the cloud computing stack Introduction Key characteristics At Glance Standardization, ...
Attribute-Based Access Control (ABAC) An advanced technique for controlling access to resources bas...
In 2025, cybercriminals weaponized AI to automate adaptive attacks, from smart malware to deepfakes....
In both blockchain and generative AI, a solid mathematical background is essential for understanding...
A Computer Vision course equips learners with skills to develop AI models for image and video analys...
Key highlights from the framework: ✔ Core security principles: Confidentiality, Integrity, Availa...
Civil Engineers can get geotechnical analysis software from PLAXIS. To meet the demands of your proj...
Cloud has changed the way we use computing and can yield significant economic, collaborative and eff...
Unleash the power of AI to create next-level defenses. This session explores how generative AI, espe...
This paper explains how hybrid crypto exchanges combine the strengths of centralized and decentraliz...
In today's world, data is generated at a very rapid speed and final destination of such data is ...
Attribute-Based Access Control: Fine-Grained Security Management Attribute-based access control (AB...
Step into the future of data intelligence with Doobs Data’s 2025 Cloud Based Analytics Solutions ...