×
Upload
Login
Download free for 30 days
Submit Search
Upload
Download free for 30 days
Login
×
×
×
×
×
×
Prachi Gulihar
36 Followers
35
SlideShares
36
Followers
Following
Follow
Unblock User
Block User
35
SlideShares
36
Followers
Personal Information
Occupation
Technical writer
Industry
Technology / Software / Internet
Activity
About
Presentations
(35)
See all
Authentication service security
5 years ago
•
5297 Views
Download
Cooperative mitigation DDoS
5 years ago
•
53 Views
Download
Anomaly based PoW Defense
5 years ago
•
48 Views
Download
Master's Thesis
5 years ago
•
52 Views
Download
Policies to mitigate cyber risk
5 years ago
•
258 Views
Download
Cuckoo search
5 years ago
•
824 Views
Download
Cyberspace
5 years ago
•
1833 Views
Download
Incentive based DDoS defense
5 years ago
•
64 Views
Download
Ransomware
5 years ago
•
245 Views
Download
Data Privacy Introduction
5 years ago
•
14491 Views
Download
Data explosion
5 years ago
•
241 Views
Download
Protection models
5 years ago
•
2341 Views
Download
Survey of file protection techniques
5 years ago
•
417 Views
Download
Computation systems for protecting delimited data
5 years ago
•
321 Views
Download
Technology, policy, privacy and freedom
5 years ago
•
105 Views
Download
Information security introduction
5 years ago
•
137 Views
Download
Elementary cryptography
5 years ago
•
3167 Views
Download
Program security
5 years ago
•
17053 Views
Download
Protection in general purpose operating system
5 years ago
•
1532 Views
Download
Database security and security in networks
5 years ago
•
2160 Views
Download
Administering security
5 years ago
•
1736 Views
Download
Computer security concepts
5 years ago
•
10439 Views
Download
Control hijacking
5 years ago
•
14187 Views
Download
Exploitation techniques and fuzzing
5 years ago
•
628 Views
Download
Dealing with legacy code
5 years ago
•
277 Views
Download
Least privilege, access control, operating system security
5 years ago
•
1254 Views
Download
Basic web security model
5 years ago
•
2389 Views
Download
Web application security part 01
5 years ago
•
569 Views
Download
Web application security part 02
5 years ago
•
210 Views
Download
Network protocols and vulnerabilities
5 years ago
•
1830 Views
Download
Download
Download
Download
Download
Download
Download
Download
Download
Download
Download
Download
Download
Download
Download
Download
Download
Download
Download
Download
Download
Download
Download
Download
Download
Download
Download
Download
Download
Download
Download
Personal Information
Occupation
Technical writer
Industry
Technology / Software / Internet
×
Modal header