SlideShare a Scribd company logo
  • Upload
  • Login
  • Download free for 30 days
SlideShare a Scribd company logo
  • Upload
  • Download free for 30 days
  • Login
×
×
×
×
×
×
Prachi Gulihar

Prachi Gulihar

36 Followers
35 SlideShares 36 Followers
  • Unblock User Block User
35 SlideShares 36 Followers

Personal Information
Occupation
Technical writer
Industry
Technology / Software / Internet
  • Activity
  • About

Presentations

(35)
See all

Authentication service security

5 years ago • 5297 Views

Cooperative mitigation DDoS

5 years ago • 53 Views

Anomaly based PoW Defense

5 years ago • 48 Views

Master's Thesis

5 years ago • 52 Views

Policies to mitigate cyber risk

5 years ago • 258 Views

Cuckoo search

5 years ago • 824 Views

Cyberspace

5 years ago • 1833 Views

Incentive based DDoS defense

5 years ago • 64 Views

Ransomware

5 years ago • 245 Views

Data Privacy Introduction

5 years ago • 14491 Views

Data explosion

5 years ago • 241 Views

Protection models

5 years ago • 2341 Views

Survey of file protection techniques

5 years ago • 417 Views

Computation systems for protecting delimited data

5 years ago • 321 Views

Technology, policy, privacy and freedom

5 years ago • 105 Views

Information security introduction

5 years ago • 137 Views

Elementary cryptography

5 years ago • 3167 Views

Program security

5 years ago • 17053 Views

Protection in general purpose operating system

5 years ago • 1532 Views

Database security and security in networks

5 years ago • 2160 Views

Administering security

5 years ago • 1736 Views

Computer security concepts

5 years ago • 10439 Views

Control hijacking

5 years ago • 14187 Views

Exploitation techniques and fuzzing

5 years ago • 628 Views

Dealing with legacy code

5 years ago • 277 Views

Least privilege, access control, operating system security

5 years ago • 1254 Views

Basic web security model

5 years ago • 2389 Views

Web application security part 01

5 years ago • 569 Views

Web application security part 02

5 years ago • 210 Views

Network protocols and vulnerabilities

5 years ago • 1830 Views
Personal Information
Occupation
Technical writer
Industry
Technology / Software / Internet

Modal header

  • About
  • Support
  • Terms
  • Privacy
  • Copyright
  • Cookie Preferences
  • Do not sell or share my personal information
English
Current Language: English
Español
Português
Français
Deutsch

© 2025 SlideShare from Scribd