RSAC2019PPT

上传者: 41912434 | 上传时间: 2021-08-05 15:04:47 | 文件大小: 193.05MB | 文件类型: ZIP
RSAC2019PPT,RSA 官方大会资源集合, RSA2019安全大会演讲PPT

文件下载

资源详情

[{"title":"( 49 个子文件 193.05MB ) RSAC2019PPT","children":[{"title":"bac-t08-mechanical-backdoors-in-cold-war-encryption-machines.pdf <span style='color:#111;'> 5.76MB </span>","children":null,"spread":false},{"title":"bac-t08r-mechanical-backdoors-in-cold-war-encryption-machines.pdf <span style='color:#111;'> 5.76MB </span>","children":null,"spread":false},{"title":"asd-f02-devsecops-for-the-rest-of-us.pdf <span style='color:#111;'> 1.07MB </span>","children":null,"spread":false},{"title":"cryp-r02-mac-and-authenticated-encryption_sasaki.pdf <span style='color:#111;'> 1.04MB </span>","children":null,"spread":false},{"title":"air-t07-att_ck-in-practice-a-primer-to-improve-your-cyber-defense.pdf <span style='color:#111;'> 4.90MB </span>","children":null,"spread":false},{"title":"csv-f02-democratizing-cloud-security-journey-to-secure-the-public-cloudl.pdf <span style='color:#111;'> 43.12MB </span>","children":null,"spread":false},{"title":"csv-w02r-protecting-the-cloud-with-the-power-of-cloud.pdf <span style='color:#111;'> 4.09MB </span>","children":null,"spread":false},{"title":"bac-t07-blockchainification-of-cyber-supply-chain-risk-hype-vs-hope-final.pdf <span style='color:#111;'> 3.61MB </span>","children":null,"spread":false},{"title":"csv-w03-securing-cloud-native-applications-at-scale.pdf <span style='color:#111;'> 2.10MB </span>","children":null,"spread":false},{"title":"csv-w10-treating-cloud-specific-threats-with-automatic-remediation.pdf <span style='color:#111;'> 5.06MB </span>","children":null,"spread":false},{"title":"cryp-f02-secure-computation_zhao.pdf <span style='color:#111;'> 1.44MB </span>","children":null,"spread":false},{"title":"csv-t09-security-at-the-speed-of-devops-a-reality-check.pdf <span style='color:#111;'> 5.16MB </span>","children":null,"spread":false},{"title":"bac-w02-automated-fault-analysis-of-block-cipher-implementations.pdf <span style='color:#111;'> 2.55MB </span>","children":null,"spread":false},{"title":"asd-f01-threat-modeling-in-2019.pdf <span style='color:#111;'> 26.08MB </span>","children":null,"spread":false},{"title":"cryp-t07-id-based-and-predicate-encryption_mukherjee.pdf <span style='color:#111;'> 1.74MB </span>","children":null,"spread":false},{"title":"csv-r11-the-advantage-of-ignoring-the-long-tail-of-security-a-product-view.pdf <span style='color:#111;'> 908.75KB </span>","children":null,"spread":false},{"title":"asd-w10-practical-approaches-to-cloud-native-security.pdf <span style='color:#111;'> 5.26MB </span>","children":null,"spread":false},{"title":"cryp-r03-side-channel-and-leakage-resilience_david.pdf <span style='color:#111;'> 1.26MB </span>","children":null,"spread":false},{"title":"bac-w03-demystifying-quantum-computers-final.pdf <span style='color:#111;'> 1.14MB </span>","children":null,"spread":false},{"title":"cryp-w03-foundation_wood.pdf <span style='color:#111;'> 1.48MB </span>","children":null,"spread":false},{"title":"cryp-f02-secure-computation_schabhueser.pdf <span style='color:#111;'> 1.19MB </span>","children":null,"spread":false},{"title":"air-f01-use-model-to-deconstruct-threats-detect-intrusion-by-statistical-learning.pdf <span style='color:#111;'> 2.46MB </span>","children":null,"spread":false},{"title":"cryp-r09-block-cipher-cryptanalysis_ito.pdf <span style='color:#111;'> 1.49MB </span>","children":null,"spread":false},{"title":"csv-f03-secure-innovation-in-public-cloud-myth-or-reality.pdf <span style='color:#111;'> 3.60MB </span>","children":null,"spread":false},{"title":"asd-w02-will-your-application-be-secure-enough-when-robots-produce-code-for-you.pdf <span style='color:#111;'> 3.27MB </span>","children":null,"spread":false},{"title":"bac-t09-cryptojacking-what_s-in-your-environment-final.pdf <span style='color:#111;'> 5.52MB </span>","children":null,"spread":false},{"title":"csfp-w03-building-a-defensible-cyberspace-2025.pdf <span style='color:#111;'> 319.22KB </span>","children":null,"spread":false},{"title":"csfp-w03-building-a-defensible-cyberspace-2025_handout.pdf <span style='color:#111;'> 810.29KB </span>","children":null,"spread":false},{"title":"csfp-w10-cybersecurity-futures-2025.pdf <span style='color:#111;'> 5.65MB </span>","children":null,"spread":false},{"title":"cryp-t07-id-based-and-predicate-encryption_blazy.pdf <span style='color:#111;'> 1.42MB </span>","children":null,"spread":false},{"title":"csv-w02-protecting-the-cloud-with-the-power-of-cloud.pdf <span style='color:#111;'> 4.09MB </span>","children":null,"spread":false},{"title":"cryp-w12-post-quantum-cryptography_eskandarian.pdf <span style='color:#111;'> 646.97KB </span>","children":null,"spread":false},{"title":"bac-r11-how-bad-incentives-led-to-crypto-mining-malware-and-what-to-do-about-it.pdf <span style='color:#111;'> 6.17MB </span>","children":null,"spread":false},{"title":"csv-r02-kubernetes-runtime-security-what-happens-if-a-container-goes-bad.pdf <span style='color:#111;'> 2.81MB </span>","children":null,"spread":false},{"title":"air-r02-how-cti-can-play-a-key-role-to-get-security-on-board.pdf <span style='color:#111;'> 3.16MB </span>","children":null,"spread":false},{"title":"cryp-t08-homomorphic-encryption_izabach_ne.pdf <span style='color:#111;'> 827.77KB </span>","children":null,"spread":false},{"title":"csv-w12-red-team-view-gaps-in-the-serverless-application-attack-surface.pdf <span style='color:#111;'> 2.27MB </span>","children":null,"spread":false},{"title":"csv-f01-securely-deploying-micro-services-containers-and-serverless-paas_web-apps.pdf <span style='color:#111;'> 5.28MB </span>","children":null,"spread":false},{"title":"cryp-t09-functional-encryption_razvan1.pdf <span style='color:#111;'> 1.36MB </span>","children":null,"spread":false},{"title":"csv-t06-building-a-leading-cloud-security-program.pdf <span style='color:#111;'> 315.85KB </span>","children":null,"spread":false},{"title":"air-r11-incident-response-beyond-enterprise-it_final.pdf <span style='color:#111;'> 1.16MB </span>","children":null,"spread":false},{"title":"csfp-w12-you_ve-predicted-the-future-now-what-pulling-the-right-security-levers.pdf <span style='color:#111;'> 4.66MB </span>","children":null,"spread":false},{"title":"asd-r02-container-security-at-the-speed-of-cicd.pdf <span style='color:#111;'> 2.34MB </span>","children":null,"spread":false},{"title":"csfp-w05-how-to-eliminate-a-major-vulnerability-in-the-cybersecurity-workforce.pdf <span style='color:#111;'> 14.82MB </span>","children":null,"spread":false},{"title":"bac-r09-using-high-entropy-encryption-for-enterprise-collaboration-final.pdf <span style='color:#111;'> 848.42KB </span>","children":null,"spread":false},{"title":"cryp-t09-functional_encryption_razvan2.pdf <span style='color:#111;'> 1.95MB </span>","children":null,"spread":false},{"title":"cryp-w03-foundation_auerbach.pdf <span style='color:#111;'> 1.14MB </span>","children":null,"spread":false},{"title":"cryp-r11-block-cipher-design-and-evaluation_hu.pdf <span style='color:#111;'> 1.59MB </span>","children":null,"spread":false},{"title":"asd-r03-stop-that-release-theres-a-vulnerability.pdf <span style='color:#111;'> 1.60MB </span>","children":null,"spread":false}],"spread":true}]

评论信息

免责申明

【只为小站】的资源来自网友分享,仅供学习研究,请务必在下载后24小时内给予删除,不得用于其他任何用途,否则后果自负。基于互联网的特殊性,【只为小站】 无法对用户传输的作品、信息、内容的权属或合法性、合规性、真实性、科学性、完整权、有效性等进行实质审查;无论 【只为小站】 经营者是否已进行审查,用户均应自行承担因其传输的作品、信息、内容而可能或已经产生的侵权或权属纠纷等法律责任。
本站所有资源不代表本站的观点或立场,基于网友分享,根据中国法律《信息网络传播权保护条例》第二十二条之规定,若资源存在侵权或相关问题请联系本站客服人员,zhiweidada#qq.com,请把#换成@,本站将给予最大的支持与配合,做到及时反馈和处理。关于更多版权及免责申明参见 版权及免责申明