- Présentations
- Documents
- Infographies
How AlphaGo Works
Shane (Seungwhan) Moon
•
il y a 8 ans
Introduction to Functional Programming with Scala
pramode_ce
•
il y a 11 ans
Advanced Functional Programming in Scala
Patrick Nicolas
•
il y a 10 ans
Startup Metrics (Ignite Velocity)
Dave McClure
•
il y a 15 ans
Growth Hacking
Mattan Griffel
•
il y a 11 ans
Big Data Analytics with Hadoop
Philippe Julio
•
il y a 14 ans
Matrix and Tensor Tools for Computer Vision
ActiveEon
•
il y a 9 ans
Tensor Decomposition and its Applications
Keisuke OTAKI
•
il y a 12 ans
tensor-decomposition
Kenta Oono
•
il y a 11 ans
Presentation on fraud prevention, detection & control
Dominic Sroda Korkoryi
•
il y a 12 ans
ACFE Presentation on Analytics for Fraud Detection and Mitigation
Scott Mongeau
•
il y a 10 ans
CloudFlare vs Incapsula vs ModSecurity
Zero Science Lab
•
il y a 11 ans
Hyperscan - Mohammad Abdul Awal
harryvanhaaren
•
il y a 8 ans
Data-Driven Threat Intelligence: Useful Methods and Measurements for Handling Indicators
Alex Pinto
•
il y a 8 ans
Cryptanalysis of the Engima - 44CON 2012
44CON
•
il y a 11 ans
44CON 2014 - GreedyBTS: Hacking Adventures in GSM, Hacker Fantastic
44CON
•
il y a 9 ans
IoT Attack Surfaces -- DEFCON 2015
Daniel Miessler
•
il y a 8 ans
DDoS Attacks
Jignesh Patel
•
il y a 17 ans
Real Time Operating System Concepts
Sanjiv Malik
•
il y a 15 ans