首页
版块
搜索
注册
|
登录
精品仓库
/
各安全大会、安全沙龙的演讲内容,安全白皮书、安全研究报告、安全免费图书、安全指南等
返回
加入收藏
举报
FeeiCN
02-25 11:14
#0
The repository contains the slides of the security conference, as well as all kids of security white paper, security research report, security free books, security guide and so on.
本仓库收录各安全大会、安全沙龙的演讲内容,以及各类安全白皮书、安全研究报告、安全免费图书、安全指南等。
Cyber-Crime-Survey-2015.pdf.md
Cyber_Security_Breaches_Survey_2017_main_report_PUBLIC.pdf
Cyber_Security_Breaches_Survey_2017_main_report_PUBLIC.pdf.md
Cybersecurity-trends-2017-survey-report.pdf
Cybersecurity-trends-2017-survey-report.pdf.md
Cybersecurity_and_the_M_and_A_Due_Diligence_Process.pdf
Cybersecurity_and_the_M_and_A_Due_Diligence_Process.pdf.md
Cybowall Solution Overview.pdf
Cybowall Solution Overview.pdf.md
Data-Protection-Briefing-Paper-–-Full-Marketing-version-1406.pdf
Data-Protection-Briefing-Paper-–-Full-Marketing-version-1406.pdf.md
Develop-a-Successful-Data-Loss-Prevention-Strategy.pdf
Develop-a-Successful-Data-Loss-Prevention-Strategy.pdf.md
ENDPOINT PRIVILEGE MANAGER.pdf
ENDPOINT PRIVILEGE MANAGER.pdf.md
ES-4.7.4-Admin.pdf
ES-4.7.4-Admin.pdf.md
ESET_ConnectedLives-DataSummary.pdf
ESET_ConnectedLives-DataSummary.pdf.md
ESG-Research-Insight-Report-Cylance-Oct-2017.pdf
ESG-Research-Insight-Report-Cylance-Oct-2017.pdf.md
ESG-White-Paper-Bitdefender-Jun-2017.pdf
ESG-White-Paper-Bitdefender-Jun-2017.pdf.md
EY-global-information-security-survey-2016-17.pdf
EY-global-information-security-survey-2016-17.pdf.md
Endpoint-Detection-and-Response.pdf
Endpoint-Detection-and-Response.pdf.md
Endpoint-Security-Market-2017-2021-Executive-Summary.pdf
Endpoint-Security-Market-2017-2021-Executive-Summary.pdf.md
Enea_Qosmos_ixEngine_Malware_DLP_Datasheet_170608.pdf
Enea_Qosmos_ixEngine_Malware_DLP_Datasheet_170608.pdf.md
Enterprise Vulnerability Management .pdf
Enterprise Vulnerability Management .pdf.md
Enterprise-DLP-Market-2017-2021-Brochure.pdf
Enterprise-DLP-Market-2017-2021-Brochure.pdf.md
Exabeam_Security_Intelligence_Platform_DS.pdf
Exabeam_Security_Intelligence_Platform_DS.pdf.md
Exabeam_for_DLP.pdf
Exabeam_for_DLP.pdf.md
First_Step_To_Secure_Data_Whitepaper.pdf
First_Step_To_Secure_Data_Whitepaper.pdf.md
ForTheGreaterGood.pdf
ForTheGreaterGood.pdf.md
FortiGuard_Security_Services.pdf
FortiGuard_Security_Services.pdf.md
FortinetTHE 2017-Q4-FORTINET SECURITY FABRIC SECURES IOT.pdf
FortinetTHE 2017-Q4-FORTINET SECURITY FABRIC SECURES IOT.pdf.md
GISS_2016_Report_Final.pdf
GISS_2016_Report_Final.pdf.md
GTIR NTT Security NTT DATA-04252017.pdf
GTIR NTT Security NTT DATA-04252017.pdf.md
Global Cybersecurity Index (GCI) .pdf
Global Cybersecurity Index (GCI) .pdf.md
Greenbone-Security-manager.pdf
Greenbone-Security-manager.pdf.md
HITCON TALK ATM 金融攻擊事件解析 -2017.pdf
cryp-r09-block-cipher-cryptanalysis_zhu.pdf.md
HITCON TALK Fintech.pdf
HITCON TALK Fintech.pdf.md
HITCON TALK 技術解析 SWIFT Network 攻擊 -2017.pdf
HITCON TALK 技術解析 SWIFT Network 攻擊 -2017.pdf.md
Hybrid Architecture Design and Well-Architected Framework.pdf
Hybrid Architecture Design and Well-Architected Framework.pdf.md
IBM QRadar for Cloud Security.pdf
IBM QRadar for Cloud Security.pdf.md
IBM X-Force Threat Intelligence Index 2017.PDF
IBM-The security immune system.pdf
IBM-The security immune system.pdf.md
INVISIBLE END-TO-END WEB SECURITY.pdf
INVISIBLE END-TO-END WEB SECURITY.pdf.md
ISF 2017 - 36 2017 NSOC Annual Threat Report Overview.pdf
ISF 2017 - 36 2017 NSOC Annual Threat Report Overview.pdf.md
ISF-IRAM2-ES.pdf
ISF-IRAM2-ES.pdf.md
ISF.pdf
ISF.pdf.md
ISGC_WLCG_SOC_WG.pdf
ISGC_WLCG_SOC_WG.pdf.md
ISOC.pdf
ISOC.pdf.md
IT-Security-Situation-in-Germany-2016.pdf
IT-Security-Situation-in-Germany-2016.pdf.md
Imperva_DatabaseActivityMonitoring.pdf
Imperva_DatabaseActivityMonitoring.pdf.md
Incident_Response_Guide_eng.pdf
Incident_Response_Guide_eng.pdf.md
Information-Paper-Cyber-Security-2016-v4.pdf
Information-Paper-Cyber-Security-2016-v4.pdf.md
Ivanti_ES_8.5U1_Agent_InstallGuide.pdf
Ivanti_ES_8.5U1_Agent_InstallGuide.pdf.md
Kenna-Platform-Security.pdf
Kenna-Platform-Security.pdf.md
LogPoint - Radpoint Summit 2017 Breakout - HB.pdf
LogPoint - Radpoint Summit 2017 Breakout - HB.pdf.md
L’evoluzione del Security Operation Center tra Threat Detection e Incident Response & ManagementQKcDj_2017-05-07_.pdf
L’evoluzione del Security Operation Center tra Threat Detection e Incident Response & ManagementQKcDj_2017-05-07_.pdf.md
Magic-Quadrant-For-Endpoint-Protection-Platform-2017.pdf
eu-15-KA-Automating-Linux-Malware-Analysis-Using-Limon-Sandbox.pdf.md
Magic-Quadrant-for-Endpoint-Protection-Platforms-2017.pdf
Magic-Quadrant-for-Endpoint-Protection-Platforms-2017.pdf.md
Mapping AV Failures Report.pdf
Mapping AV Failures Report.pdf.md
McAfee Data Loss Prevention 11.0.0.pdf
McAfee Data Loss Prevention 11.0.0.pdf.md
MetricStream-Quick-Snapshot.pdf
MetricStream-Quick-Snapshot.pdf.md
Microsoft_Security_Intelligence_Report_Regional_Threat_Assessment_China.pdf
Microsoft_Security_Intelligence_Report_Regional_Threat_Assessment_China.pdf.md
Microsoft_Security_Intelligence_Report_Regional_Threat_Assessment_Japan.pdf
Microsoft_Security_Intelligence_Report_Regional_Threat_Assessment_Japan.pdf.md
Microsoft_Security_Intelligence_Report_Volume_20_English.pdf
Microsoft_Security_Intelligence_Report_Volume_20_English.pdf.md
NH -ISAC Daily Security Intelligence Report.pdf
NH -ISAC Daily Security Intelligence Report.pdf.md
NetsparkerProductBrochure.pdf
NetsparkerProductBrochure.pdf.md
Network Security Monitoring Basics for Beginners.pdf
Network Security Monitoring Basics for Beginners.pdf.md
PineApp_Mail_Secure_integration_with_Office_365.pdf
PineApp_Mail_Secure_integration_with_Office_365.pdf.md
Police_Radpoint2017.pdf
Police_Radpoint2017.pdf.md
Protect Against Data Breaches Radpoint November 2017.pdf
Protect Against Data Breaches Radpoint November 2017.pdf.md
Radpoint Customer Summit - Aperture Presentation.pdf
Radpoint Customer Summit - Aperture Presentation.pdf.md
Ransomware-Hard to Stop for Enterprises Highly Profitable for Criminals.pdf
Ransomware-Hard to Stop for Enterprises Highly Profitable for Criminals.pdf.md
Rapid7-InsightVM-and-InsightIDR-Integrate-to-Drive-60-Time-Savings-and-Ease-Compliance-for-Energie-Suedbayern.pdf
Rapid7-InsightVM-and-InsightIDR-Integrate-to-Drive-60-Time-Savings-and-Ease-Compliance-for-Energie-Suedbayern.pdf.md
Rapid7-Transforming Data Into Answers.pdf
Rapid7-Transforming Data Into Answers.pdf.md
SANS-2017-security-operations-center-survey-analyst-report.pdf
SANS-2017-security-operations-center-survey-analyst-report.pdf.md
SB_DDoSAttackProtection_EN.pdf
SB_DDoSAttackProtection_EN.pdf.md
SECURITY_20170118_ENISA WP2016 1-1 1 Good Practices on the Security and Resilience of smar....pdf
SECURITY_20170118_ENISA WP2016 1-1 1 Good Practices on the Security and Resilience of smar....pdf.md
SS_DNS_Datasheet_DNSOverview.pdf
SS_DNS_Datasheet_DNSOverview.pdf.md
Saviynt-Solution-Overview-v3.0-2.pdf
Saviynt-Solution-Overview-v3.0-2.pdf.md
SecondWrite-product-sheet-v4.pdf
SecondWrite-product-sheet-v4.pdf.md
Secure Content Delivery Using Amazon CloudFront.pdf
Secure Content Delivery Using Amazon CloudFront.pdf.md
Security - Intelligence Agency 2017.pdf
Security - Intelligence Agency 2017.pdf.md
Security Operations Center - Analyst Guide SIEM Technology, Use Cases and Practices.pdf
Security Operations Center - Analyst Guide SIEM Technology, Use Cases and Practices.pdf.md
Security_Intelligence_Report_Infographic_EN_US.pdf
Security_Intelligence_Report_Infographic_EN_US.pdf.md
Security_Intelligence_Report_Volume_22.pdf
Security_Intelligence_Report_Volume_22.pdf.md
Session4.pdf
Session4.pdf.md
SoGP-2016.pdf
SoGP-2016.pdf.md
State_of_Cybersecurity_in_APAC_-_Small_Businesses__Big_Threats.PDF
Steganography and Data Loss Prevention.pdf
Steganography and Data Loss Prevention.pdf.md
TRAPS A DVANCED E NDPOINT P ROTECTION.pdf
TRAPS A DVANCED E NDPOINT P ROTECTION.pdf.md
Taking Stock Estimating Vulnerability Rediscovery.pdf
Taking Stock Estimating Vulnerability Rediscovery.pdf.md
Telstra_Cyber_Security_Report_2017_-_Whitepaper.pdf
Telstra_Cyber_Security_Report_2017_-_Whitepaper.pdf.md
The Analytic Process and Cyber Incident Attribution.pdf
The Analytic Process and Cyber Incident Attribution.pdf.md
The Cybersecurity Campaign Playbook.pdf
The Cybersecurity Campaign Playbook.pdf.md
The Tao of Network Security Monitoring.pdf
The Tao of Network Security Monitoring.pdf.md
VERINT Cyber Intelligence .pdf
WP-GDPR-Compliance-and-Its-Impact-on-Security-and-Data-Protection-Programs.pdf
WP-GDPR-Compliance-and-Its-Impact-on-Security-and-Data-Protection-Programs.pdf.md
WP2016 2-3 1 Cyber Hygiene.pdf
WP2016 2-3 1 Cyber Hygiene.pdf.md
WP2016 3-2 6 Data Controllers Risk.pdf
WP2016 3-2 6 Data Controllers Risk.pdf.md
WSF-4_White-Paper.pdf
WSF-4_White-Paper.pdf.md
Wrike_Security_Overview.pdf
Wrike_Security_Overview.pdf.md
Zscaler Web Security.pdf
Zscaler Web Security.pdf.md
advanced-endpoint-protection.pdf
advanced-endpoint-protection.pdf.md
avc_cor_2017_en.pdf
avc_cor_2017_en.pdf.md
b_ESA_Admin_Guide_chapter_010001.pdf
b_ESA_Admin_Guide_chapter_010001.pdf.md
brochure_forcepoint_email_security_en.pdf
brochure_forcepoint_email_security_en.pdf.md
compare-endpoint-security.pdf
compare-endpoint-security.pdf.md
cyber-report-healthcare.pdf
cyber-report-healthcare.pdf.md
cyber-threat-intelligence-130617.pdf
cyber-threat-intelligence-130617.pdf.md
cyberroad_survey.pdf
cyberroad_survey.pdf.md
datacentrix_security_operations_centre_offering_072017.pdf
datacentrix_security_operations_centre_offering_072017.pdf.md
dell-data-guardian-datasheet.pdf
dell-data-guardian-datasheet.pdf.md
ds-workspaces-data-loss-prevention.pdf
ds-workspaces-data-loss-prevention.pdf.md
endpoint-protection-14-en.pdf
endpoint-protection-14-en.pdf.md
enterprise-threat-protector-product-brief.pdf
enterprise-threat-protector-product-brief.pdf.md
fireeye-ex-series.pdf
fireeye-ex-series.pdf.md
h12220-ds-rsa-data-loss-prevention-endpoint.pdf
ha-it-security-2017-study-ebook.pdf
ha-it-security-2017-study-ebook.pdf.md
haalbaarheidsonderzoek-security-operations-center.pdf
haalbaarheidsonderzoek-security-operations-center.pdf.md
hong-ps-and-gs-ruxcon2017.pdf
hong-ps-and-gs-ruxcon2017.pdf.md
ibm-qradar-datasheet.pdf
ibm-qradar-datasheet.pdf.md
istr-22-2017-en.pdf
istr-22-2017-en.pdf.md
itlbul2017-05.pdf
itlbul2017-05.pdf.md
its-security-operations-policy.pdf
its-security-operations-policy.pdf.md
kaspersky-endpoint-security-for-business-datasheet.pdf
kaspersky-endpoint-security-for-business-datasheet.pdf.md
kasperskylabedrbuyersguide-171031073218.pdf
kasperskylabedrbuyersguide-171031073218.pdf.md
lr-security-intelligence-platform-datasheet.pdf
lr-security-intelligence-platform-datasheet.pdf.md
netskope-thomas_hedstrommer-TU.pdf
netskope-thomas_hedstrommer-TU.pdf.md
pets11.pdf
pets11.pdf.md
pwc-gsiss-2016-canadian-insights-2015-11-en.pdf
pwc-strengthening-digital-society-against-cyber-shocks.pdf
pwc-strengthening-digital-society-against-cyber-shocks.pdf.md
salesforce_security_impl_guide.pdf
salesforce_security_impl_guide.pdf.md
secops-on-demand.pdf
secops-on-demand.pdf.md
soc3_amazon_web_services.pdf
soc3_amazon_web_services.pdf.md
sophos-data-loss-prevention-sdk-dsna.pdf
sophos-data-loss-prevention-sdk-dsna.pdf.md
state-of-cybersecurity_res_eng_0316.pdf
state-of-cybersecurity_res_eng_0316.pdf.md
state-of-software-security-volume-7-veracode-report.pdf
state-of-software-security-volume-7-veracode-report.pdf.md
symantec-dlp-recommended-practices.pdf
symantec-dlp-recommended-practices.pdf.md
symmetry-09-00164.pdf
symmetry-09-00164.pdf.md
vsoc_portal_user_guide.pdf
vsoc_portal_user_guide.pdf.md
vsphere-esxi-vcenter-server-651-security-guide.pdf
vsphere-esxi-vcenter-server-651-security-guide.pdf.md
台灣資安人才培育現況.pdf
台灣資安人才培育現況.pdf.md
為何企業在AWS雲端部署業務更安全.pdf
為何企業在AWS雲端部署業務更安全.pdf.md
趋势科技-打造安全的物聯網.pdf
趋势科技-打造安全的物聯網.pdf.md
金融行业对NGSOC的认知和需求.docx
DT时代的安全建设实践分享.pdf
DT时代的安全建设实践分享.pdf.md
业务安全风险控制实践.pdf
业务安全风险控制实践.pdf.md
人工智能在WAF中的应用.pdf
人工智能在WAF中的应用.pdf.md
企业安全监控建设-.pdf
企业安全监控建设-.pdf.md
数据场景与加密算法选择.pdf
数据场景与加密算法选择.pdf.md
日志与攻击行为分析.pdf
日志与攻击行为分析.pdf.md
RECON-BRX-2018-Breaking-state-of-the-art-binary-code-obfuscation.pdf
RECON-BRX-2018-Breaking-state-of-the-art-binary-code-obfuscation.pdf.md
RECON-BRX-2018-DIY-ARM-Debugger-for-Wi-Fi-Chips.pdf
RECON-BRX-2018-DIY-ARM-Debugger-for-Wi-Fi-Chips.pdf.md
RECON-BRX-2018-Decompiler-internals-microcode.pdf
RECON-BRX-2018-Decompiler-internals-microcode.pdf.md
RECON-BRX-2018-Dissecting-QNX.pdf
RECON-BRX-2018-Dissecting-QNX.pdf.md
RECON-BRX-2018-Hacking-Toshiba-Laptops.pdf
RECON-BRX-2018-Hacking-Toshiba-Laptops.pdf.md
RECON-BRX-2018-Linux-Vulnerabilities_Windows-Exploits--Escalating-Privileges-with-WSL.pdf
RECON-BRX-2018-Linux-Vulnerabilities_Windows-Exploits--Escalating-Privileges-with-WSL.pdf.md
RECON-BRX-2018-Mess-with-the-best-die-like-the-rest_(mode).pdf
RECON-BRX-2018-Mess-with-the-best-die-like-the-rest_(mode).pdf.md
RECON-BRX-2018-Reverse-Engineering-Windows-Defender-s-JavaScript-Engine.pdf
RECON-BRX-2018-Reverse-Engineering-Windows-Defender-s-JavaScript-Engine.pdf.md
RECON-BRX-2018-Reversing-IoT-Xiaomi-ecosystem.pdf
RECON-BRX-2018-Reversing-IoT-Xiaomi-ecosystem.pdf.md
RECON-BRX-2018-Robin-Hood-vs-Cisco-ASA-AnyConnect.pdf
RECON-BRX-2018-Robin-Hood-vs-Cisco-ASA-AnyConnect.pdf.md
RECON-BRX-2018-Starcraft-Emulating-a-buffer-overflow-for-fun-and-profit.pdf
RECON-BRX-2018-Starcraft-Emulating-a-buffer-overflow-for-fun-and-profit.pdf.md
RECON-BRX-2018-Subverting-your-server-through-its-BMC-the-HPE-iLO4-case.pdf
RECON-BRX-2018-Subverting-your-server-through-its-BMC-the-HPE-iLO4-case.pdf.md
RECON-BRX-2018-Visiting-The-Snake-Nest.pdf
RECON-BRX-2018-Visiting-The-Snake-Nest.pdf.md
Splunk产品性能概述-王羽嘉.pdf
Splunk产品性能概述-王羽嘉.pdf.md
使用Splunk分析Devops的生命周期-宋菲娅.pdf
使用Splunk分析Devops的生命周期-宋菲娅.pdf.md
在ITOps中应用Splunk机器学习-王月.pdf
在ITOps中应用Splunk机器学习-王月.pdf.md
安全忍者系列之:学好SPL,告别安全攻击 --郁美霜.pdf
安全忍者系列之:学好SPL,告别安全攻击 --郁美霜.pdf.md
搜索性能改进-周舟.pdf
搜索性能改进-周舟.pdf.md
Splunk7.0-new-feature-FeiyaSong.pdf
Splunk7.0-new-feature-FeiyaSong.pdf.md
仪表盘与可视化.pdf
仪表盘与可视化.pdf.md
轻松玩转SPL.pdf
轻松玩转SPL.pdf.md
ATT&CKing the Status Quo Threat-Based Adversary Emulation with MITRE ATT&CK.pdf
ATT&CKing the Status Quo Threat-Based Adversary Emulation with MITRE ATT&CK.pdf.md
Cyber Threat Hunting in the Middle East.pdf
Cyber Threat Hunting in the Middle East.pdf.md
Differentiating Evil from Benign in the Normally Abnormal World of InfoSec.pdf
Differentiating Evil from Benign in the Normally Abnormal World of InfoSec.pdf.md
Forecast- Sunny, Clear Skies, and 100% Detection .pdf
Forecast- Sunny, Clear Skies, and 100% Detection .pdf.md
How to Submit a Threat Profile to MITRE ATT&CK.pdf
How to Submit a Threat Profile to MITRE ATT&CK.pdf.md
Hunting Webshells- Tracking TwoFace.pdf
Hunting Webshells- Tracking TwoFace.pdf.md
Hunting for Lateral Movement Using Windows Event Log.pdf
Hunting for Lateral Movement Using Windows Event Log.pdf.md
Launching Threat Hunting From Almost Nothing.pdf
Launching Threat Hunting From Almost Nothing.pdf.md
Lean Hunting.pdf
Lean Hunting.pdf.md
Lunch & Learn Panel- The Future of Incident Response.pdf
Lunch & Learn Panel- The Future of Incident Response.pdf.md
Quantify Your Hunt-- Not Your Parents' Red Team.pdf
Quantify Your Hunt-- Not Your Parents' Red Team.pdf.md
Summit Agenda.pdf
Summit Agenda.pdf.md
The Fastest Way to Hunt Windows Endpoints.pdf
The Fastest Way to Hunt Windows Endpoints.pdf.md
Threat Hunting Using Live Box Forensics.pdf
Threat Hunting Using Live Box Forensics.pdf.md
Threat Hunting in Your Supply Chain.pdf
Threat Hunting in Your Supply Chain.pdf.md
Threat Hunting or Threat Farming- Finding the Balance in Security Automation.pdf
Threat Hunting or Threat Farming- Finding the Balance in Security Automation.pdf.md
Uncovering and Visualizing Malicious Infrastructure.pdf
Uncovering and Visualizing Malicious Infrastructure.pdf.md
Viewing the Nodes in the Noise- Leveraging Data Science to Discover Persistent Threat.pdf
Viewing the Nodes in the Noise- Leveraging Data Science to Discover Persistent Threat.pdf.md
Who Done It-- Gaining Visibility and Accountability in the Cloud.pdf
Who Done It-- Gaining Visibility and Accountability in the Cloud.pdf.md
IFAA三年发展,助力移动金融支付安全-姚青予.pdf
PCI DSS合规和网络信息安全体系建设-魏克.pdf
PCI DSS合规和网络信息安全体系建设-魏克.pdf.md
中国银联手机POS产品介绍-郭伟.pdf
中国银联手机POS产品介绍-郭伟.pdf.md
加密邮件在移动金融安全上的应用-王高华.pdf
加密邮件在移动金融安全上的应用-王高华.pdf.md
商用密码在金融安全中的应用和测评-李大为.pdf
商用密码在金融安全中的应用和测评-李大为.pdf.md
基于AI的移动金融用户身份认证系统分析-马小龙.pdf
基于AI的移动金融用户身份认证系统分析-马小龙.pdf.md
支付标记化技术-为移动支付加把锁-徐圣贵.pdf
支付标记化技术-为移动支付加把锁-徐圣贵.pdf.md
金融风控下的终端应用风险监控-赵千里.pdf
金融风控下的终端应用风险监控-赵千里.pdf.md
2018年度网络等级测评项目抽查问题分析及解决办法.pdf
2018年度网络等级测评项目抽查问题分析及解决办法.pdf.md
以攻助防,积极防御.pdf
以攻助防,积极防御.pdf.md
体系大会-大数据.pdf
体系大会-大数据.pdf.md
工业控制系统等保测评实践.pdf
工业控制系统等保测评实践.pdf.md
浙江东安-交互式应用安全测试在等级测评中的实践.pdf
浙江东安-交互式应用安全测试在等级测评中的实践.pdf.md
渗透测试与等级保护测评指标体系对应关系研究.pdf
渗透测试与等级保护测评指标体系对应关系研究.pdf.md
等保测评中高危风险判例与安全分析探讨.pdf
等保测评中高危风险判例与安全分析探讨.pdf.md
等级测评与密码应用安全性评估-深圳网安.pdf
等级测评与密码应用安全性评估-深圳网安.pdf.md
网络安全等级保护基本要求解读.pdf
网络安全等级保护基本要求解读.pdf.md
网络安全等级保护测评要求.pdf
网络安全等级保护测评要求.pdf.md
2018年美团点评技术年货(上).pdf
2018年美团点评技术年货(上).pdf.md
2018年美团点评技术年货(下).pdf
2018年美团点评技术年货(下).pdf.md
2018年美团点评技术年货(中).pdf
2018年美团点评技术年货(中).pdf.md
2018年美团点评技术年货(合).pdf
2018年美团点评技术年货(合).pdf.md
10_Detecting_Dictionary_Domain_Generation_Algorithms.pdf
10_Detecting_Dictionary_Domain_Generation_Algorithms.pdf.md
11_Information_Sharing_in_Taiwan_and_Intelligence_Add-on_from_Globe.pdf
11_Information_Sharing_in_Taiwan_and_Intelligence_Add-on_from_Globe.pdf.md
1_Cyber_Resilience_for_Development.pdf
1_Cyber_Resilience_for_Development.pdf.md
2_Findings_and_Expectations_from_cooperative_works_with_ASEAN_Member_States.pdf
2_Findings_and_Expectations_from_cooperative_works_with_ASEAN_Member_States.pdf.md
3_Cross_Border_Collaboration_Through_OIC-CERT_In_Securing_The_Cyber_Space.pdf
3_Cross_Border_Collaboration_Through_OIC-CERT_In_Securing_The_Cyber_Space.pdf.md
4_A_Journey_from_Remembering_to_Creating.pdf
4_A_Journey_from_Remembering_to_Creating.pdf.md
5_Hybrid_Cyber_Exercise_The_Indonesian_Case_Study.pdf
5_Hybrid_Cyber_Exercise_The_Indonesian_Case_Study.pdf.md
6_Internet_of_Things_Security_Landscape.pdf
6_Internet_of_Things_Security_Landscape.pdf.md
7_The_Awareness_and_Countermeasures_against_IoT_threat_on_the_rise.pdf
7_The_Awareness_and_Countermeasures_against_IoT_threat_on_the_rise.pdf.md
8_Maliclicious_Activity_Detection_and_Analysis_using_Machine_Learning.pdf
8_Maliclicious_Activity_Detection_and_Analysis_using_Machine_Learning.pdf.md
9_Dark_Corners_of_Windows_Registry_Analysis.pdf
9_Dark_Corners_of_Windows_Registry_Analysis.pdf.md
1、薛锋-网络安全走向云化.pdf
1、薛锋-网络安全走向云化.pdf.md
2、陈建-第三方供应商信息安全风险管理实践-CTIC-V2.0.pdf
2、陈建-第三方供应商信息安全风险管理实践-CTIC-V2.0.pdf.md
3、董祎铖-威胁情报赋能态势感知建设-分享V1.pdf
2020_APJ20_IDP-F05V_01_Build-Privacy-into-Your-Products-and-Gain-User-Trust-30BA.pdf.md
4朱建平-等级保护基本要求V2.0解读.pdf
4朱建平-等级保护基本要求V2.0解读.pdf.md
5赵林林-重保的对抗、检测、溯源.pdf
5赵林林-重保的对抗、检测、溯源.pdf.md
6王宇-应急响应视角下的安全建设诉求 .pdf
6王宇-应急响应视角下的安全建设诉求 .pdf.md
7兴华-基于Sysmon的企业级威胁检测与响应闭环.pdf
7兴华-基于Sysmon的企业级威胁检测与响应闭环.pdf.md
8王任飞-谈谈如何建设体系化的安全运营中心(SOC)-CTIC-王任飞.pdf
8王任飞-谈谈如何建设体系化的安全运营中心(SOC)-CTIC-王任飞.pdf.md
9潘盛和-威胁情报的实践应用-可下载版.pdf
9潘盛和-威胁情报的实践应用-可下载版.pdf.md
何勇亮-等保2.0下企业信息安全防护体系建设.pdf
何勇亮-等保2.0下企业信息安全防护体系建设.pdf.md
何斌第-等保2.0的实践之旅.pdf
何斌第-等保2.0的实践之旅.pdf.md
张志鹏-人工与智能,助力新等保.pdf
张志鹏-人工与智能,助力新等保.pdf.md
张晓鹏-构筑等保2.0级的信息系统安全体系.pdf
张晓鹏-构筑等保2.0级的信息系统安全体系.pdf.md
洪跃腾-网络安全等级保护2.0标准合规之路(网安检测).pdf
洪跃腾-网络安全等级保护2.0标准合规之路(网安检测).pdf.md
郝轶-深信服等级保护2.0的实践思考.pdf
郝轶-深信服等级保护2.0的实践思考.pdf.md
锐少-等保专场PPT-等保实践13载.pdf
锐少-等保专场PPT-等保实践13载.pdf.md
韩云-等保专场网络安全等级保护在移动安全中的应用.pdf
韩云-等保专场网络安全等级保护在移动安全中的应用.pdf.md
马蔚彦-构建等保2.0时代的主动防御.pdf
马蔚彦-构建等保2.0时代的主动防御.pdf.md
07 Tony Scott World Bank.pdf
07 Tony Scott World Bank.pdf.md
130 Barbara Marchiori_Borderless Cyber.pdf
130 Barbara Marchiori_Borderless Cyber.pdf.md
Automation-Panel.pdf
Automation-Panel.pdf.md
BC info share.pdf
BC info share.pdf.md
Borderless Cyber - Better Identity Coalition 10.3.18.pdf
Borderless Cyber - Better Identity Coalition 10.3.18.pdf.md
Borderless Cyber ICIT Talk-10.50.pdf
Borderless Cyber ICIT Talk-10.50.pdf.md
GHANA'S CYBERSECURITY DEVELOPMENT_Albert Antwi-Boasiako_BC forum USA 2018.pdf
GHANA'S CYBERSECURITY DEVELOPMENT_Albert Antwi-Boasiako_BC forum USA 2018.pdf.md
John-Moran.pdf
John-Moran.pdf.md
Malcolm-Hawkins.pdf
Malcolm-Hawkins.pdf.md
Melanie-Ensign(2).pdf
Melanie-Ensign(2).pdf.md
OpenC24JCAUS_final_10_2_18.pdf
OpenC24JCAUS_final_10_2_18.pdf.md
prisma-access-cloud-managed-admin.pdf
prisma-access-cloud-managed-admin.pdf.md
prisma-cloud-admin.pdf
prisma-cloud-admin.pdf.md
prisma-cloud-rql-reference.pdf
prisma-cloud-rql-reference.pdf.md
prisma-saas-admin.pdf
prisma-saas-admin.pdf.md
qsc19-las-vegas-1-security-crossroads.pdf
qsc19-las-vegas-1-security-crossroads.pdf.md
qsc19-las-vegas-2-evolution-qualys-platform.pdf
qsc19-las-vegas-2-evolution-qualys-platform.pdf.md
qsc19-las-vegas-2.1-road-ahead-451research.pdf
qsc19-las-vegas-2.1-road-ahead-451research.pdf.md
qsc19-las-vegas-2.2-devops-lessons-learned.pdf
qsc19-las-vegas-2.2-devops-lessons-learned.pdf.md
首页
上页
8
下页
共31页
FeeiCN/Security-PPT
各安全大会、安全沙龙的演讲内容,安全白皮书、安全研究报告、安全免费图书、安全指南等
GitHub下载
点赞
回复
回帖
支持markdown部分语法
?

[
文字
](
链接
)
```
多行代码
```
`
单行代码
`
**
加粗
**
*
斜体
*
###
标题
>
引用
1.
有序列表
-
无序列表
!-
单选投票选项
!--
多选投票选项
上传附件
提交
X