- Présentations
- Documents
- Infographies
Military Robots
nsapre
•
il y a 15 ans
Hacking Fundamentals - Jen Johnson , Miria Grunick
amiable_indian
•
il y a 17 ans
ETel2007: The Black Bag Security Review (VoIP Security)
Dan York
•
il y a 17 ans
Social Media Measurement
Kelsey Ruger
•
il y a 16 ans
The Future Of Social Networks
Charlene Li
•
il y a 16 ans
Windows Server 2008 R2 Overview
Alexander Schek
•
il y a 15 ans
Conversation by Design
David Armano
•
il y a 16 ans
Social network websites: best practices from leading services
Fabernovel
•
il y a 16 ans
Viral Strategies Buzz Marketing
Emakina
•
il y a 16 ans
Network Topology
Norhisham Mohamad Nordin
•
il y a 16 ans
Wi-fi Hacking
Paul Gillingwater, MBA
•
il y a 14 ans
Introduction To Information Security
belsis
•
il y a 16 ans
The Cloud's Hidden Lock-in: Network Latency
Tom Croucher
•
il y a 14 ans
Enterprise Information Architecture: Because users don't care about your org chart
Louis Rosenfeld
•
il y a 17 ans
Real World Web Standards
gleddy
•
il y a 15 ans
Designers Risk Assessment
David Cant - CMIOSH
•
il y a 14 ans
Social Media Monitoring Tools - An Overview
Stefan Betzold
•
il y a 14 ans
Introduction to Algorithms
Venkatesh Iyer
•
il y a 17 ans
Security Management Practices
amiable_indian
•
il y a 17 ans
What Itil V3 Doesn’T Say About Organisational Structure
Patrick Keogh
•
il y a 15 ans