首页
版块
搜索
注册
|
登录
精品仓库
/
各安全大会、安全沙龙的演讲内容,安全白皮书、安全研究报告、安全免费图书、安全指南等
返回
加入收藏
举报
FeeiCN
02-25 11:14
#0
The repository contains the slides of the security conference, as well as all kids of security white paper, security research report, security free books, security guide and so on.
本仓库收录各安全大会、安全沙龙的演讲内容,以及各类安全白皮书、安全研究报告、安全免费图书、安全指南等。
qsc19-las-vegas-2.3-threat-hunting-with-qualys.pdf
qsc19-las-vegas-2.3-threat-hunting-with-qualys.pdf.md
qsc19-las-vegas-2.4-use-cases-into-abuse-cases.pdf
qsc19-las-vegas-2.4-use-cases-into-abuse-cases.pdf.md
qsc19-las-vegas-2.5-new-frontier-in-compliance.pdf
qsc19-las-vegas-2.5-new-frontier-in-compliance.pdf.md
qsc19-las-vegas-2.6-web-application-api-security.pdf
qsc19-las-vegas-2.6-web-application-api-security.pdf.md
qsc19-las-vegas-2.7-building-enterprise-it-itam-program.pdf
qsc19-las-vegas-2.7-building-enterprise-it-itam-program.pdf.md
qsc19-las-vegas-2.8-ancestry-manage-vulns-cloud-ami.pdf
qsc19-las-vegas-2.8-ancestry-manage-vulns-cloud-ami.pdf.md
qsc19-las-vegas-2.8-caterpillar-vulnerability-lifecycle.pdf
qsc19-las-vegas-2.8-caterpillar-vulnerability-lifecycle.pdf.md
qsc19-las-vegas-2.8-celestica-web-app-azure-devops.pdf
qsc19-las-vegas-2.8-celestica-web-app-azure-devops.pdf.md
qsc19-las-vegas-2.8-exl-service-risk-based-approach.pdf
qsc19-las-vegas-2.8-exl-service-risk-based-approach.pdf.md
qsc19-las-vegas-2.8-retailer-compliance-vuln-mgmt-program.pdf
qsc19-las-vegas-2.8-retailer-compliance-vuln-mgmt-program.pdf.md
qsc19-las-vegas-3-vmdr.pdf
qsc19-las-vegas-3-vmdr.pdf.md
qsc19-las-vegas-4-digital-transform-devops.pdf
qsc19-las-vegas-4-digital-transform-devops.pdf.md
qsc19-las-vegas-5-building-security-into-azure.pdf
qsc19-las-vegas-5-building-security-into-azure.pdf.md
A SIEM Engineer's Guide to Threat Modeling.pdf
A SIEM Engineer's Guide to Threat Modeling.pdf.md
Company Phishing Trip Analysis of Brand Phishing Kits and Campaigns.pdf
Company Phishing Trip Analysis of Brand Phishing Kits and Campaigns.pdf.md
Custom Application Behavioral Security Monitoring Using SIEM.pdf
Custom Application Behavioral Security Monitoring Using SIEM.pdf.md
Did You Do Your Homework Use Case-Driven SIEM Deployments.pdf
Did You Do Your Homework Use Case-Driven SIEM Deployments.pdf.md
Don't Be a SIEMingly SOAR Loser.pdf
Don't Be a SIEMingly SOAR Loser.pdf.md
Get the Basics Right!.pdf
Get the Basics Right!.pdf.md
How I Learned to Stop Worrying and Love TLS.pdf
How I Learned to Stop Worrying and Love TLS.pdf.md
Hunting with Sysmon to Unveil the Evil.pdf
Hunting with Sysmon to Unveil the Evil.pdf.md
Rapid Recognition and Response to Rogues.pdf
Rapid Recognition and Response to Rogues.pdf.md
Summit Agenda.pdf
Summit Agenda.pdf.md
Techniques to Reduce Alert Fatigue in Security Analysts.pdf
Techniques to Reduce Alert Fatigue in Security Analysts.pdf.md
That SIEM Will Hunt.pdf
That SIEM Will Hunt.pdf.md
The Right Data at the Right Time.pdf
The Right Data at the Right Time.pdf.md
Untapped Potential Getting the Most our of Your SIEM.pdf
Untapped Potential Getting the Most our of Your SIEM.pdf.md
We Need to Talk about the Elephant in the SOC.pdf
We Need to Talk about the Elephant in the SOC.pdf.md
01-2019TechWorld 技术嘉年华-智慧安全技术创新-叶晓虎.pdf
02-2019TechWorld技术嘉年华-现网威胁猎杀与追踪-吴铁军.pdf
03-2019TechWorld技术嘉年华-容器安全再思考-刘文懋.pdf
04-2019TechWorld技术嘉年华-网络安全等级保护标准体系和主要标准介绍-马力.pdf
05-2019TechWorld技术嘉年华-红蓝对抗下的服务能力提升-曹嘉pptx.pdf
06-2019TechWorld技术嘉年华-Liar Game-张云海.pdf
07-2019TechWorld技术嘉年华-威胁建模之知识图谱-范敦球.pdf
08-2019TechWorld技术嘉年华-道魔博弈 责任在肩 格物致知-李东宏.pdf
中国移动杨杰:以5G商用为契机 拥抱数字化转型大潮.pdf
中国移动杨杰:以5G商用为契机 拥抱数字化转型大潮.pdf.md
任宇昕:媒体融合进入“下半场” 有三项关键升级.pdf
任宇昕:媒体融合进入“下半场” 有三项关键升级.pdf.md
倪光南院士:5G对生活、经济都会有重大变革.pdf
倪光南院士:5G对生活、经济都会有重大变革.pdf.md
李彦宏乌镇大会首提智能经济 称AI可让人获“永生”.pdf
李彦宏乌镇大会首提智能经济 称AI可让人获“永生”.pdf.md
沈向洋:微软每一个技术研发都会进行AI伦理道德评审.pdf
沈向洋:微软每一个技术研发都会进行AI伦理道德评审.pdf.md
浪潮孙丕恕数据铁笼解决隐私泄密问题 使数据可用不可见.pdf
浪潮孙丕恕数据铁笼解决隐私泄密问题 使数据可用不可见.pdf.md
腾讯汤道生:产业互联网真正目的是降本增效.pdf
腾讯汤道生:产业互联网真正目的是降本增效.pdf.md
阿里巴巴张勇谈新商业文明:让更多小草长成参天大树.pdf
阿里巴巴张勇谈新商业文明:让更多小草长成参天大树.pdf.md
阿里张建锋:工业互联网主要解决三大问题.pdf
阿里张建锋:工业互联网主要解决三大问题.pdf.md
陆奇:创新推动社会进步 技术是创新最持久的驱动力.pdf
陆奇:创新推动社会进步 技术是创新最持久的驱动力.pdf.md
高瓴张磊:产业数字化要尊重企业家精神尊重产业规律.pdf
高瓴张磊:产业数字化要尊重企业家精神尊重产业规律.pdf.md
利用外部情报平台,构建主动防御体系-天际友盟杨大路.pdf
利用外部情报平台,构建主动防御体系-天际友盟杨大路.pdf.md
利用开源威胁信息分析APT活动的实践_-360企业安全汪烈军.pdf
利用开源威胁信息分析APT活动的实践_-360企业安全汪烈军.pdf.md
国家网络空间威胁情报大数据共享开放平台建设的思考-刘宝旭.pdf
基于网络全流量及威胁情报的高级威胁检测体系建设-光大银行牟健君.pptx
威胁情报在互联网行业的应用-京东洪敬风.pdf
威胁情报在互联网行业的应用-京东洪敬风.pdf.md
威胁情报新应用-量化信息安全风险-谷安天下赵毅.pptx
威胁情报驱动的安全体系建设-360企业安全吴云坤.pdf
威胁情报驱动的安全体系建设-360企业安全吴云坤.pdf.md
提升企业威胁情报能力,推动情报共享 - 中国华电罗建东.pdf
数字经济加速下一代安全市场发展-IDC赵卫京.pptx
企业安全建设进阶-V1.3.pdf
企业安全建设进阶-V1.3.pdf.md
内网针对AD域的攻击方式和防护方法-V1.4.pdf
内网针对AD域的攻击方式和防护方法-V1.4.pdf.md
浅谈甲方视角的攻防战术选择-V1.1.pdf
5-看得见的安全-周鸿祎.pdf.md
0.1 云安全技术趋势探讨_v1.01a.pdf
0.1 云安全技术趋势探讨_v1.01a.pdf.md
0.2 Gigamon安全交付平台助力全网安全可视_EISS2019深圳站.pdf
0.2 Gigamon安全交付平台助力全网安全可视_EISS2019深圳站.pdf.md
0.3 SF安全态势感知实践(顺丰科技信息安全负责人 潘盛合).pdf
0.3 SF安全态势感知实践(顺丰科技信息安全负责人 潘盛合).pdf.md
0.4 等保2.0之身份安全管理(派拉软件CEO 谭翔).pdf
0.4 等保2.0之身份安全管理(派拉软件CEO 谭翔).pdf.md
0.5 Fortinet+Security+Fabric+V2.pdf
0.5 Fortinet+Security+Fabric+V2.pdf.md
0.6 从隐私保护建设看安全管理V2.0_EISS2019深圳站.pdf
0.6 从隐私保护建设看安全管理V2.0_EISS2019深圳站.pdf.md
0.7 20190807+CSO怎么做v1.4(安信证券安全总监 李维春).pdf
0.7 20190807+CSO怎么做v1.4(安信证券安全总监 李维春).pdf.md
下午分会场一
10个子项
1.1 EISS2019深圳站-企业安全建设实践与调查那些事 一加 分享版.pdf
1.1 EISS2019深圳站-企业安全建设实践与调查那些事 一加 分享版.pdf.md
1.2 宁盾-身份终端联合信任,构建新安全边界.pdf
1.2 宁盾-身份终端联合信任,构建新安全边界.pdf.md
1.3 Keysight-Ixia%2BInline%2B解决方案+Updated.pdf
1.3 Keysight-Ixia%2BInline%2B解决方案+Updated.pdf.md
1.4 企业数据安全实践_分享版_黄鹏华.pdf
1.4 企业数据安全实践_分享版_黄鹏华.pdf.md
1.6 数据安全治理的探索和实践-平安科技.pdf
1.6 数据安全治理的探索和实践-平安科技.pdf.md
下午分会场二
12个子项
2.1 自动化漏洞扫描系统_EISS2019深圳站-发布.pdf
2.1 自动化漏洞扫描系统_EISS2019深圳站-发布.pdf.md
2.2 漏洞管理之爬坑不完全指南-tenable-EISS2019深圳站.pdf
2.2 漏洞管理之爬坑不完全指南-tenable-EISS2019深圳站.pdf.md
2.3 下一代数据资产保护架构分享.pdf
2.3 下一代数据资产保护架构分享.pdf.md
2.5 企业业务安全建设经验分享-0816.pdf
2.5 企业业务安全建设经验分享-0816.pdf.md
2.6 业务安全与反欺诈-全链路治理V3-脱敏.pdf
2.6 业务安全与反欺诈-全链路治理V3-脱敏.pdf.md
2.7 云迁移安全实践.pdf
2.7 云迁移安全实践.pdf.md
58赶集吴圣-PPDRR安全模型在业务安全上的新思考 .pdf
58赶集吴圣-PPDRR安全模型在业务安全上的新思考 .pdf.md
vipkid冯博-业务发展与业务安全的平衡.pdf
vipkid冯博-业务发展与业务安全的平衡.pdf.md
京东吴迪-面向账号安全的黑产攻防体系建设.pdf
京东吴迪-面向账号安全的黑产攻防体系建设.pdf.md
宝宝树王利-中小互联网企业风控场景与填坑笔记.pdf
宝宝树王利-中小互联网企业风控场景与填坑笔记.pdf.md
小米刘明-搭建有效果不背锅的风控系统.pdf
小米刘明-搭建有效果不背锅的风控系统.pdf.md
新浪微博何为舟-自动化策略生成的思考与实践.pdf
新浪微博何为舟-自动化策略生成的思考与实践.pdf.md
李学庆-从0到N-企业安全建设经验篇.pdf
李学庆-从0到N-企业安全建设经验篇.pdf.md
极验张振宇-GCN在业务安全领域中的应用实践与思考.pdf
极验张振宇-GCN在业务安全领域中的应用实践与思考.pdf.md
极验王文达-业务安全的知与行.pdf
极验王文达-业务安全的知与行.pdf.md
极验闫定国-搭建切合实战的风控分析体系.pdf
极验闫定国-搭建切合实战的风控分析体系.pdf.md
极验陈博-智能反爬虫试炼之路.pdf
极验陈博-智能反爬虫试炼之路.pdf.md
滴滴钱业斐-大型互联网企业的数据安全攻与防本.pdf
滴滴钱业斐-大型互联网企业的数据安全攻与防本.pdf.md
百度安全c0rpse-业务安全红蓝对抗的思考与实践.pdf
百度安全c0rpse-业务安全红蓝对抗的思考与实践.pdf.md
轻松筹韩晋-业务安全应急响应新思考.pdf
轻松筹韩晋-业务安全应急响应新思考.pdf.md
马蜂窝李广林-中小互联网企业业务安全建设实践-分享版.pdf
马蜂窝李广林-中小互联网企业业务安全建设实践-分享版.pdf.md
1.议题一:网络安全人才培养-位华-20190118.pdf
1.议题一:网络安全人才培养-位华-20190118.pdf.md
10.议题十:从代码审计浅谈协议设计缺陷-20190118.pdf
10.议题十:从代码审计浅谈协议设计缺陷-20190118.pdf.md
2.议题二:无色无味-Wi-Fi各场景中的药与毒-姚威-20190118.pdf
2.议题二:无色无味-Wi-Fi各场景中的药与毒-姚威-20190118.pdf.md
3.议题三:大数据与智能革命重新定义安全服务-方伟-20190118.pdf
3.议题三:大数据与智能革命重新定义安全服务-方伟-20190118.pdf.md
4.议题四:云时代企业安全建设-云舒-20190118.pdf
4.议题四:云时代企业安全建设-云舒-20190118.pdf.md
5.议题五:构建安全、高效的新时代云数据中心-田松-20190118.pdf
5.议题五:构建安全、高效的新时代云数据中心-田松-20190118.pdf.md
6.议题六:云基础架构持续性数据保护和业务连续性-冯超-20190118.pdf
6.议题六:云基础架构持续性数据保护和业务连续性-冯超-20190118.pdf.md
7.议题七:从零信任谈起--深入剖析以人为核心的业务安全-张坤鹏-20190118.pdf
7.议题七:从零信任谈起--深入剖析以人为核心的业务安全-张坤鹏-20190118.pdf.md
8.议题八:人工智能在信息安全领域应用的前世今生未来-周奕-20190118.pdf
8.议题八:人工智能在信息安全领域应用的前世今生未来-周奕-20190118.pdf.md
9.议题九:商用密码技术在等级保护建设中的最佳实践-戚会庆-20190118.pdf
9.议题九:商用密码技术在等级保护建设中的最佳实践-戚会庆-20190118.pdf.md
Android 0day漏洞检测沙箱系统的设计与实现-v3.7(2).pdf
Android 0day漏洞检测沙箱系统的设计与实现-v3.7(2).pdf.md
Android容器和虚拟化(1).pdf
Android容器和虚拟化(1).pdf.md
RDP 从补丁到远程代码执行(1).pdf
RDP 从补丁到远程代码执行(1).pdf.md
基于云数据的司法取证技术(2).pdf
基于云数据的司法取证技术(2).pdf.md
安全研究视角看macOS平台EDR安全能力建议(1).pdf
安全研究视角看macOS平台EDR安全能力建议(1).pdf.md
工业集散控制系统的脆弱性分析(1).pdf
工业集散控制系统的脆弱性分析(1).pdf.md
新威胁对策-TSCM(1).pdf
新威胁对策-TSCM(1).pdf.md
汽车安全-有效地提取并分析汽车固件(1).pdf
汽车安全-有效地提取并分析汽车固件(1).pdf.md
潘少华-IoT中的SE芯片安全(1).pdf
潘少华-IoT中的SE芯片安全(1).pdf.md
AILPHA大数据智能安全平台 刘博20190413173233ETbvQ4.pdf
AILPHA大数据智能安全平台 刘博20190413173233ETbvQ4.pdf.md
Olympic Destroyer Westlake Conference China VITALY20190401141241ARYuvH.pdf
Olympic Destroyer Westlake Conference China VITALY20190401141241ARYuvH.pdf.md
“永恒之蓝”勒索病毒应急响应工作的经验与反思 袁明坤20190413173447SlxAPi.pdf
“永恒之蓝”勒索病毒应急响应工作的经验与反思 袁明坤20190413173447SlxAPi.pdf.md
主论坛-加快工业互联网数据安全能力建设切实护航我国制造业高质量发展-尹丽波-20190428145724GkJ2mE.pdf
主论坛-加快工业互联网数据安全能力建设切实护航我国制造业高质量发展-尹丽波-20190428145724GkJ2mE.pdf.md
主论坛-智能自适应:闭环安全最后一公里-刘博-20190428150038NWcdjU.pdf
主论坛-智能自适应:闭环安全最后一公里-刘博-20190428150038NWcdjU.pdf.md
主论坛-贯彻落实“4.19讲话”精神 为建设网络强国努力奋斗-倪光南-20190428145248ysOEDz.pdf
主论坛-贯彻落实“4.19讲话”精神 为建设网络强国努力奋斗-倪光南-20190428145248ysOEDz.pdf.md
云安全分论坛-云安全与物联网安全实践 李雨航20190428143055wknVjq.pdf
云安全分论坛-云安全与物联网安全实践 李雨航20190428143055wknVjq.pdf.md
云安全分论坛-云领数聚 安全护航 朱勇20190428143135ylJVTY.pdf
云安全分论坛-云领数聚 安全护航 朱勇20190428143135ylJVTY.pdf.md
人民的政务云 郑赳20190413173341ldeAWF.pdf
人民的政务云 郑赳20190413173341ldeAWF.pdf.md
信核数据存储和容灾系统 任永坚20190401141434qg0Ej2.pdf
信核数据存储和容灾系统 任永坚20190401141434qg0Ej2.pdf.md
威胁情报及应急响应分论坛-2018浙江省互联网网络安全态势报告 龙泉20190428142902TAz1ei.pdf
威胁情报及应急响应分论坛-2018浙江省互联网网络安全态势报告 龙泉20190428142902TAz1ei.pdf.md
威胁情报及应急响应分论坛-中国社群网络安全协作之国际化 徐原20190428142950Z2rsnq.pdf
威胁情报及应急响应分论坛-中国社群网络安全协作之国际化 徐原20190428142950Z2rsnq.pdf.md
安全的责任 范渊20190413173006iL9FPv.pdf
us-15-Wang-The-Applications-Of-Deep-Learning-On-Traffic-Identification.pdf.md
工业互联网安全分论坛-工业互联网标识解析体系安全 刘阳20190428104355YPMZHm.pdf
工业互联网安全分论坛-工业互联网标识解析体系安全 刘阳20190428104355YPMZHm.pdf.md
工业互联网安全分论坛-智能制造与网络信息安全 李成20190428105142veAdgE.pdf
工业互联网安全分论坛-智能制造与网络信息安全 李成20190428105142veAdgE.pdf.md
工业互联网安全分论坛-欲构千层塔,先筑百层基 李俊20190428105546Uk6rBX.pdf
工业互联网安全分论坛-欲构千层塔,先筑百层基 李俊20190428105546Uk6rBX.pdf.md
工业互联网安全分论坛-浅析工业互联网下的新能源电力系统发展 杨强201904281054023uYnOJ.pdf
工业互联网安全分论坛-浅析工业互联网下的新能源电力系统发展 杨强201904281054023uYnOJ.pdf.md
技术前沿安全分论坛-AI的欺骗艺术-人工智能图像攻击 唐佳莉20190428140927NbkCUz.pdf
技术前沿安全分论坛-AI的欺骗艺术-人工智能图像攻击 唐佳莉20190428140927NbkCUz.pdf.md
数字经济和智慧城市安全分论坛-城市安全运营中心AISCO平台 李贵鹏20190428141834RreN8T.pdf
数字经济和智慧城市安全分论坛-城市安全运营中心AISCO平台 李贵鹏20190428141834RreN8T.pdf.md
数字经济和智慧城市安全分论坛-政府数字化的杭州实践 齐同军20190428142021yxrFp1.pdf
数字经济和智慧城市安全分论坛-政府数字化的杭州实践 齐同军20190428142021yxrFp1.pdf.md
数字经济和智慧城市安全分论坛-智慧城市实施路径构想 陈桂秋20190428142120qmDu94.pdf
数字经济和智慧城市安全分论坛-智慧城市实施路径构想 陈桂秋20190428142120qmDu94.pdf.md
数字经济和智慧城市安全分论坛-构建安全可信的智慧城市终端体系 李华生20190428141940zS2hRg.pdf
数字经济和智慧城市安全分论坛-构建安全可信的智慧城市终端体系 李华生20190428141940zS2hRg.pdf.md
数据安全治理和个人信息保护分论坛-企业技术信息(数据)的商业秘密保护 郑海味20190428141550h3Gl5R.pdf
数据安全治理和个人信息保护分论坛-企业技术信息(数据)的商业秘密保护 郑海味20190428141550h3Gl5R.pdf.md
数据安全治理和个人信息保护分论坛-大数据交易与处理中的数据脱敏技术研究 荆继武20190428141453psyHZb.pdf
数据安全治理和个人信息保护分论坛-大数据交易与处理中的数据脱敏技术研究 荆继武20190428141453psyHZb.pdf.md
数据安全治理和个人信息保护分论坛-数据安全保障工程 林明峰20190428141623quOLPI.pdf
数据安全治理和个人信息保护分论坛-数据安全保障工程 林明峰20190428141623quOLPI.pdf.md
数据安全治理和个人信息保护分论坛-数据安全的若干误解 杜跃进20190428141714iIqFcS.pdf
数据安全治理和个人信息保护分论坛-数据安全的若干误解 杜跃进20190428141714iIqFcS.pdf.md
新技术领域的风险识别和解决方案 Francesco20190401141506Oix5Vd.pdf
新技术领域的风险识别和解决方案 Francesco20190401141506Oix5Vd.pdf.md
智慧医疗安全高峰论坛-AiLPHA大数据安全分析应用于医疗网络安全闭环的实践 杨锦峰20190428143504IiWRZl.pdf
智慧医疗安全高峰论坛-AiLPHA大数据安全分析应用于医疗网络安全闭环的实践 杨锦峰20190428143504IiWRZl.pdf.md
智慧医疗安全高峰论坛-医疗行业勒索病毒防范 李华生20190428143544on8Wqs.pdf
智慧医疗安全高峰论坛-医疗行业勒索病毒防范 李华生20190428143544on8Wqs.pdf.md
智能之源 安全之本 阚志刚201904011413253x4wHD.pdf
智能之源 安全之本 阚志刚201904011413253x4wHD.pdf.md
构建IOT终端自适应安全体系-陈彪-20190428150135fR0vFy.pdf
构建IOT终端自适应安全体系-陈彪-20190428150135fR0vFy.pdf.md
构建物联网安全共同体 阚志刚20190413173520nX1H57.pdf
构建物联网安全共同体 阚志刚20190413173520nX1H57.pdf.md
网络安全人才与道德培养分论坛-《信息安全专业规范(第二版)》 张焕国201904281424169eh807.pdf
网络安全人才与道德培养分论坛-《信息安全专业规范(第二版)》 张焕国201904281424169eh807.pdf.md
网络安全人才与道德培养分论坛-专企融合校企合作模式的信息安全专业建设 陈云志20190428142225mg3qso.pdf
网络安全人才与道德培养分论坛-专企融合校企合作模式的信息安全专业建设 陈云志20190428142225mg3qso.pdf.md
网络安全人才与道德培养分论坛-信息安全从业人员调研报告预告 王星20190428142817oNqCDi.pdf
网络安全人才与道德培养分论坛-信息安全从业人员调研报告预告 王星20190428142817oNqCDi.pdf.md
网络空间安全&拟态构造 邬江兴20190401141759Hq7ZeS.pdf
网络空间安全&拟态构造 邬江兴20190401141759Hq7ZeS.pdf.md
西湖论剑 刘博20190401141719g7tSIj.pdf
西湖论剑 刘博20190401141719g7tSIj.pdf.md
西湖论剑-新时代,新安全 范渊20190401141640q2axbF.pdf
西湖论剑-新时代,新安全 范渊20190401141640q2axbF.pdf.md
让政务充满AI-政务数据安全治理 沈贝伦20190401141837w9hZD4.pdf
让政务充满AI-政务数据安全治理 沈贝伦20190401141837w9hZD4.pdf.md
运营商网络安全分论坛-5G移动通信网络安全 彭晋20190428143319FfvSZD.pdf
运营商网络安全分论坛-5G移动通信网络安全 彭晋20190428143319FfvSZD.pdf.md
运营商网络安全分论坛-基于开源软件的网络纵深防御系统 吴志祥20190428143410KzFOBC.pdf
运营商网络安全分论坛-基于开源软件的网络纵深防御系统 吴志祥20190428143410KzFOBC.pdf.md
运营商网络安全分论坛-运营商云安全解决方案新思路 贾腾飞20190428143228RmKkTf.pdf
运营商网络安全分论坛-运营商云安全解决方案新思路 贾腾飞20190428143228RmKkTf.pdf.md
锁不住的安全 吴卓群201904131734240HFkNl.pdf
锁不住的安全 吴卓群201904131734240HFkNl.pdf.md
首席安全官(CSO)高峰论坛-2018威胁态势回顾与2019展望 董岩20190428141122Daox6A.pdf
首席安全官(CSO)高峰论坛-2018威胁态势回顾与2019展望 董岩20190428141122Daox6A.pdf.md
首席安全官(CSO)高峰论坛-平安集团企业信息安全治理与实践 陈建20190428141302pDqHjC.pdf
首席安全官(CSO)高峰论坛-平安集团企业信息安全治理与实践 陈建20190428141302pDqHjC.pdf.md
首席安全官(CSO)高峰论坛-用中医理念为企业安全把脉 龚蔚201904281413516JaXQ0.pdf
首席安全官(CSO)高峰论坛-用中医理念为企业安全把脉 龚蔚201904281413516JaXQ0.pdf.md
美团点评2019年技术年货-前端篇.pdf
美团点评2019年技术年货-前端篇.pdf.md
美团点评2019年技术年货-后台篇.pdf
美团点评2019年技术年货-后台篇.pdf.md
美团点评2019年技术年货-大数据篇.pdf
美团点评2019年技术年货-大数据篇.pdf.md
美团点评2019年技术年货-算法篇.pdf
美团点评2019年技术年货-算法篇.pdf.md
美团点评2019年技术年货.pdf
美团点评2019年技术年货.pdf.md
2020_APJ20_AIR-F02V_01_Explore-Adventures-in-the-Underland-Forensic-Techniques-against-Hackers-B1FB.pdf
2020_APJ20_AIR-F02V_01_Explore-Adventures-in-the-Underland-Forensic-Techniques-against-Hackers-B1FB.pdf.md
2020_APJ20_AIR-F03V_01_When-World-News-Matters-to-You-Operationalizing-Geopolitical-Intelligence-C49E.pdf
2020_APJ20_AIR-F05V_01_Through-the-Eyes-of-the-Adversary-How-to-Build-a-Threat-Intel-Program-FEE5.pdf
us-15-Ossmann-The-NSA-Playset-A-Year-Of-Toys-And-Tools.pdf.md
2020_APJ20_AIR-F06V_01_Intelligence-Sharing-for-Critical-Infrastructure-Resiliency-69F2.pdf
Debian GNULinux安全合规之路-杨旭.pdf.md
2020_APJ20_AIR-F08V_01_Countering-Persistent-Threat-Actors-in-APAC-and-Globally-C97A.pdf
2020_APJ20_AIR-F09V_01_Threat-Hunting-Demystified-0B7E.pdf
mitreattckcon2019telltalltaleslerudtitania-191114201627.pdf.md
2020_APJ20_CMI-W02V_01_2020-Security-Vision-Managing-Digital-Risk-in-the-Era-of-IoT-8085.pdf
bac-f02-nation-state-exploitation-of-cryptocurrencies.pdf.md
2020_APJ20_CMI-W03V_01_Small-Cells-and-Smaller-Devices-Using-5G-to-Solve-IoT-Device-Security-2961.pdf
2020_APJ20_CMI-W05V_01_A-Simplified-and-Practical-Approach-to-Pursuing-a-Zero-Trust-Architecture-46B3.pdf
2020_APJ20_CMI-W06V_01_Jigsaw-Puzzle-Attack-A-New-Attack-Method-for-Platform-APP-E0E6.pdf
刘熙君-数据安全合规实践.pdf.md
2020_APJ20_CMI-W08V_01_Cloud-Safeguarding-View-from-Cloud-Providers-7DDF.pdf
2020_APJ20_DSOD-W03V_Creating-a-Culture-That-Thrives-with-Disruption-B3FC.pdf
2020_APJ20_DSOD-W03V_Creating-a-Culture-That-Thrives-with-Disruption-B3FC.pdf.md
2020_APJ20_DSOD-W05V_Implementing Critical Cybersecurity Controls in a DevOps Environment-F2E9.pdf
2020_APJ20_DSOD-W05V_Implementing Critical Cybersecurity Controls in a DevOps Environment-F2E9.pdf.md
2020_APJ20_DSOD-W06V_The-Four-Horsemen-of-DevSecOps-E7A6.pdf
2020_APJ20_DSOD-W06V_The-Four-Horsemen-of-DevSecOps-E7A6.pdf.md
2020_APJ20_DSOD-W08V_Protecting-Businesses-from-Breaches-Simple-Lessons-Still-Unlearned-FB54.pdf
2020_APJ20_DSOD-W08V_Protecting-Businesses-from-Breaches-Simple-Lessons-Still-Unlearned-FB54.pdf.md
2020_APJ20_DSOD-W09V_DevSecOps-with-IoT-Is-it-a-myth-C217.pdf
2020_APJ20_DSOD-W09V_DevSecOps-with-IoT-Is-it-a-myth-C217.pdf.md
2020_APJ20_DSOD-W10V_Continuous-Security-by-Design-F5E4.pdf
2020_APJ20_DSOD-W10V_Continuous-Security-by-Design-F5E4.pdf.md
2020_APJ20_DSOD-W11V_Your-Application-is-Mostly-Written-By-Strangers (1)-53E9.pdf
2020_APJ20_DSOD-W11V_Your-Application-is-Mostly-Written-By-Strangers (1)-53E9.pdf.md
2020_APJ20_EFT-R02V_Recent-Trends-in-Information-Operations-and-Predictions-for-2020-ACF9.pdf
2020_APJ20_EFT-R02V_Recent-Trends-in-Information-Operations-and-Predictions-for-2020-ACF9.pdf.md
2020_APJ20_EFT-R03V_01_Two-Weeks-with-a-Russian-Ransomware-Cell-DB49.pdf
cryp-t07-id-based-and-predicate-encryption_mukherjee.pdf.md
2020_APJ20_EFT-R05V_01_Security-Basics-Burn-It-All-and-Start-Over-4E8F.pdf
2020_APJ20_EFT-R05V_01_Security-Basics-Burn-It-All-and-Start-Over-4E8F.pdf.md
2020_APJ20_EFT-R06V_01_Cyberespionage-Targeted-Attacks-Abusing-Third-Party-Cloud-Services-A5DC.pdf
hta-t10r-threats_of_greatest_consequence_heading_into_2016.pdf.md
2020_APJ20_EFT-R08V_01_It-Hurt-Itself-in-Confusion-No-Distribute-Scanners-and-Stealthy-Malware-039E.pdf
2020_APJ20_EFT-R08V_01_It-Hurt-Itself-in-Confusion-No-Distribute-Scanners-and-Stealthy-Malware-039E.pdf.md
2020_APJ20_GPS-F02V_01_The-Wolves-Among-Us-A-Tale-of-APT’s-Thievery-6DDD.pdf
2020_APJ20_IDP-F08V_01_Breaking-Bad-(Passwords)-A9DE.pdf.md
2020_APJ20_GPS-F05V_01_Drone-Penetration-Testing-and-Vulnerability-Analysis-Framework-44FB.pdf
2020_APJ20_GPS-F06V_01_Hack-Your-Cybersecurity-Career-Your-Role-in-the-Ecosystem-DDC1.pdf
2020_APJ20_GPS-F08V_01_Detectio-as-Code-Detection-Development-Using-CICD-A894.pdf
2020_APJ20_GPS-F09V_01_Inside-the-Mind-of-a-Hacker-How-a-Light-Bulb-Almost-Stopped-Christmas-DDF7.pdf
2020_APJ20_GPS-F09V_01_Inside-the-Mind-of-a-Hacker-How-a-Light-Bulb-Almost-Stopped-Christmas-DDF7.pdf.md
2020_APJ20_GPS1-F02V_01_Taking-Control-of-Cyber-Supply-Chain-Security-0886.pdf
2020_APJ20_GPS1-F02V_01_Taking-Control-of-Cyber-Supply-Chain-Security-0886.pdf.md
2020_APJ20_GPS1-F03V_01_Can-Policing-Prevent-Cybercrime-7B3D.pdf
2020_APJ20_GPS1-F03V_01_Can-Policing-Prevent-Cybercrime-7B3D.pdf.md
2020_APJ20_HUM-R02V_01_The-New-CISO-What-Got-You-Here-Won’t-Get-You-There-C07A.pdf
2020_APJ20_HUM-R02V_01_The-New-CISO-What-Got-You-Here-Won’t-Get-You-There-C07A.pdf.md
2020_APJ20_HUM-R03V_01_Social-Cybersecurity-Social-Influence-and-Design-in-End-User-Cybersecurity-ED0B.pdf
2020_APJ20_HUM-R03V_01_Social-Cybersecurity-Social-Influence-and-Design-in-End-User-Cybersecurity-ED0B.pdf.md
2020_APJ20_HUM-R05V_01_Beyond-Penetration-Testing-Developing-a-Defensive-Cyber-Workforce-779D.pdf
ICS Attack Concepts and Demonstrations, Tim Conway, Jeff Shearer.pdf.md
2020_APJ20_HUM-R06V_01_Hackers-Going-to-Hack-F4D5.pdf
2020_APJ20_HUM-R06V_01_Hackers-Going-to-Hack-F4D5.pdf.md
2020_APJ20_HUM-R08V_01_Getting-Engagement-in-the-Midst-of-Chaos-B3AB.pdf
2020_APJ20_HUM-R09V_01_Walk-Through-of-Business-Email-Compromise-Human-Factors-or-Human-Failures-AFFF.pdf
2020_USA20_KEY-W01S_01_Hacking-Exposed-Global-Threat-Brief.pdf.md
2020_APJ20_IDP-F02V_01_Privacy-Fundamentally-Right-Standards-Fundamental-Requirement-EDE6.pdf
2020_APJ20_IDP-F03V_01_PKI-Well-Revised-Common-Mistakes-Which-Lead-to-Huge-Compromise-of-Identity-3C7F.pdf
2020_APJ20_IDP-F05V_01_Build-Privacy-into-Your-Products-and-Gain-User-Trust-30BA.pdf
2020_APJ20_IDP-F06V_01_Authentication-and-Beyond-Using-FIDO-and-Push-Notifications-B4DA.pdf
cryp-t06-public-key-encryption_suvradip.pdf.md
2020_APJ20_IDP-F08V_01_Breaking-Bad-(Passwords)-A9DE.pdf
2020_APJ20_IDP-F09V_01_The-Accountability-Game-Streamlining-Data-Privacy-across-APAC-and-the-Globe-617C.pdf
2020_APJ20_IDP-F09V_01_The-Accountability-Game-Streamlining-Data-Privacy-across-APAC-and-the-Globe-617C.pdf.md
2020_APJ20_RMG-R02V_01_Does-Artificial-Intelligence-Need-a-General-Counsel-5685.pdf
2020_APJ20_RMG-R03V_01_3rd-Party-Cyber-Risk-Mitigation-by-Using-ISO-Standards-13C8.pdf
2020_APJ20_RMG-R05V_01_Reality-Under-Attack-Just-How-Serious-Is-the-Deep-Fake-Threat-99F7.pdf
2020_APJ20_RMG-R06V_01_Third-Party-Risk-Management-Preventing-the-Next-Stuxnet-3DE2.pdf
08-am-01 清华大学-诸葛建伟 世界黑客技术大赛之初体验.pdf.md
2020_APJ20_RMG-R08V_01_Securing-Your-M&A-Activity-with-Cybersecurity-Due-Diligence-9A99.pdf
2020_APJ20_RMG-R09V_01_How-to-Tell-the-Right-Cyber-Story-to-Executives-and-Board-Members-A4E2.pdf
2020_APJ20_RMG-R09V_01_How-to-Tell-the-Right-Cyber-Story-to-Executives-and-Board-Members-A4E2.pdf.md
2020_APJ20_SAO-F03V_01_Forced-Digital-Transformation-and-the-Realities-to-ICSOT-Cybersecurity-2459.pdf
2020_APJ20_SAO-F03V_01_Forced-Digital-Transformation-and-the-Realities-to-ICSOT-Cybersecurity-2459.pdf.md
2020_APJ20_SAO-W02V_01_Privilege-Escalation-and-Whitelisting-Bypass-with-Proxy-DLLs-697B.pdf
2020_APJ20_SAO-W03V_01_You-See-Honey-I-See-Beehive-Developing-Honey-Networks-8EC2.pdf
2020_APJ20_SAO-W03V_01_You-See-Honey-I-See-Beehive-Developing-Honey-Networks-8EC2.pdf.md
2020_APJ20_SAO-W05V_01_Building-Cybersecurity-as-a-Shared-Service-C9E5.pdf
2020_APJ20_SAO-W06V_01_Getting-the-Security-and-Flexibility-Balance-Right-in-a-COVID-19-World-F05F.pdf
2020_APJ20_SAO-W08V_01_How-Protocol-Gateways-May-Introduce-More-Problems-than-They-Solve-96DF.pdf
2020_APJ20_SAO-W09V_01_Get-the-Freaking-Basics-Right!-157B.pdf
2020_APJ20_SPS-W02V_01_Security-Outgunned-Measuring-Software-Defined-Attack-Surface-4C6D.pdf
2020_APJ20_SPS-W03V_01_The-AppSec-Error-Loop-How-We-Can-Stop-Repeating-Common-Security-Mistakes-C745.pdf
2020_APJ20_SPS-W03V_01_The-AppSec-Error-Loop-How-We-Can-Stop-Repeating-Common-Security-Mistakes-C745.pdf.md
2020_APJ20_SPS-W05V_01_Effective-Software-Supply-Chain-Monitoring-42CB.pdf
2020_APJ20_SPS-W06V_01_Building-Safety-Security-and-Resilience-through-Chaos-FB83.pdf
2020_APJ20_SPS-W06V_01_Building-Safety-Security-and-Resilience-through-Chaos-FB83.pdf.md
2020_APJ20_SPS-W08V_01_A-New-Fuzzing-Method-Driven-by-Payload’s-Integrity-Focus-on-Logic-Bugs-610B.pdf
万涛-众声喧哗之没牙的老虎这些年.pdf.md
2020_APJ20_SPS-W09V_01_Don’t-Worry-Be-API-Addressing-AppSec’s-Newest-Challenge-541E.pdf
4. OneTrust Vendorpedia Overview Datasheet-B050.pdf
4. OneTrust Vendorpedia Overview Datasheet-B050.pdf.md
5. OneTrust Vendorpedia Cyber Risk Exchange Datasheet-B80C.pdf
5. OneTrust Vendorpedia Cyber Risk Exchange Datasheet-B80C.pdf.md
6. OneTrust Vendorpedia Assessments + Due Diligence Datasheet-77C5.pdf
6. OneTrust Vendorpedia Assessments + Due Diligence Datasheet-77C5.pdf.md
7. OneTrust Vendorpedia Chasing Services Datasheet-ED50.pdf
7. OneTrust Vendorpedia Chasing Services Datasheet-ED50.pdf.md
8. OneTrust Vendorpedia + Tier 1 Cyber Case Study-439B.pdf
8. OneTrust Vendorpedia + Tier 1 Cyber Case Study-439B.pdf.md
Architects Guide Cybersecurity-2FD8.pdf
Architects Guide Cybersecurity-2FD8.pdf.md
CPOMag_Data Protection and Privacy Officer Priorities 2020-BC01.pdf
CPOMag_Data Protection and Privacy Officer Priorities 2020-BC01.pdf.md
Cloud4C - Whitepaper on Zero Trust-V04-1394.pdf
Cloud4C - Whitepaper on Zero Trust-V04-1394.pdf.md
Cloud4C Brochure Digital-38B6.pdf
Cloud4C Brochure Digital-38B6.pdf.md
ComputerWeekly_TechTarget-SOC-A4-5BAD.pdf
ComputerWeekly_TechTarget-SOC-A4-5BAD.pdf.md
Cybsecurity Landscape during Covid19 times_Understanding its Evolution-0F49.pdf
Cybsecurity Landscape during Covid19 times_Understanding its Evolution-0F49.pdf.md
Flexi-Pass Flyer-Customer-APAC-023D.pdf
Flexi-Pass Flyer-Customer-APAC-023D.pdf.md
ISMG_CyberTheory-CISO-Report-2019-Q4-D32A.pdf
ISMG_CyberTheory-CISO-Report-2019-Q4-D32A.pdf.md
Infographic_Psychology of Passwords, 10 Reasons Why Hackers Love Employees-89BC.pdf
Infographic_Psychology of Passwords, 10 Reasons Why Hackers Love Employees-89BC.pdf.md
Infographic_TheRisk of Not Managing Identity (3)-A27A.pdf
Infographic_TheRisk of Not Managing Identity (3)-A27A.pdf.md
Infographic_Why SMBs Need SSO and Password Management-A598.pdf
Infographic_Why SMBs Need SSO and Password Management-A598.pdf.md
NextLevelDevSecOps_RSA_digital-8CE2.pdf
NextLevelDevSecOps_RSA_digital-8CE2.pdf.md
Private Cloud for a Global Premier Bank_Cloud4C (1)-F151.pdf
Private Cloud for a Global Premier Bank_Cloud4C (1)-F151.pdf.md
RSAC 2020 APJ Agenda-406F.pdf
RSAC 2020 APJ Agenda-406F.pdf.md
RSAC 2020 APJ Leaderboard Rules 7-12-3736.pdf
RSAC 2020 APJ Leaderboard Rules 7-12-3736.pdf.md
Return_To_Business_As_Unusual-2020-White-Paper-2D71.pdf
Return_To_Business_As_Unusual-2020-White-Paper-2D71.pdf.md
Up in the Cloud White Paper_Hybrid & Multi Cloud (Final)-2F5E.pdf
Up in the Cloud White Paper_Hybrid & Multi Cloud (Final)-2F5E.pdf.md
Whitepaper_Buyer's Guide to Identity-D619.pdf
Whitepaper_Buyer's Guide to Identity-D619.pdf.md
asoc-drive-by-download-D0C5.pdf
asoc-drive-by-download-D0C5.pdf.md
boosting-operational-effectiveness-with-intelligent-orchestration-5A58.pdf
boosting-operational-effectiveness-with-intelligent-orchestration-5A58.pdf.md
business-driven-omni-channel-fraud-management-9EE0.pdf
business-driven-omni-channel-fraud-management-9EE0.pdf.md
cybersecurity-strategic-outsourcing-is-a-necessity-C342.pdf
cybersecurity-strategic-outsourcing-is-a-necessity-C342.pdf.md
five-ways-to-transform-access-and-secure-the-digital-enterprise-BCE6.pdf
five-ways-to-transform-access-and-secure-the-digital-enterprise-BCE6.pdf.md
it-and-security-risk-management-2BF0.pdf
it-and-security-risk-management-2BF0.pdf.md
privacy_risks_to_individuals_in_the_wake_of_covid19-C053.pdf
privacy_risks_to_individuals_in_the_wake_of_covid19-C053.pdf.md
rsa-fraudaction-cyber-intelligence-F335.pdf
rsa-fraudaction-cyber-intelligence-F335.pdf.md
rsa-fraudaction-intelligence-todays-cybercrime-landscape-4D6A.pdf
rsa-fraudaction-intelligence-todays-cybercrime-landscape-4D6A.pdf.md
rsa-iot-security-monitor-DE89.pdf
rsa-iot-security-monitor-DE89.pdf.md
securing-cloud-applications-three-ways-mfa-can-help-655A.pdf
securing-cloud-applications-three-ways-mfa-can-help-655A.pdf.md
the-power-of-analytics-in-digital-risk-management-D39A.pdf
the-power-of-analytics-in-digital-risk-management-D39A.pdf.md
yubikey-for-rsa-securid-access-9B74.pdf
yubikey-for-rsa-securid-access-9B74.pdf.md
Building a Pipeline for Secure Virtual Machines in AWS, Shaun McCullough.pdf
Building a Pipeline for Secure Virtual Machines in AWS, Shaun McCullough.pdf.md
Cloud Breaches - Case Studies, Best Practices, and Pitfalls - Dylan Marcoux, Christopher Romano.pdf
Cloud Breaches - Case Studies, Best Practices, and Pitfalls - Dylan Marcoux, Christopher Romano.pdf.md
Cloud Security Posture Management from Security Hygiene to Incident Response, Yuri Diogenes, Jess Huber, Ricardo Bruno.pdf
Cloud Security Posture Management from Security Hygiene to Incident Response, Yuri Diogenes, Jess Huber, Ricardo Bruno.pdf.md
Cloud Security to Go, Ken Hartman.pdf
Cloud Security to Go, Ken Hartman.pdf.md
Cover Your SaaS - Practical SaaS Security Tips, Ben Johnson.pdf
Cover Your SaaS - Practical SaaS Security Tips, Ben Johnson.pdf.md
Doing Cloud in China, Kenneth G. Hartman.pdf
Doing Cloud in China, Kenneth G. Hartman.pdf.md
Don't Just Lift and Shift - Why Traditional Controls Don't Always Apply to the Cloud and What You Can Do About It, Steve Turner.pdf
Don't Just Lift and Shift - Why Traditional Controls Don't Always Apply to the Cloud and What You Can Do About It, Steve Turner.pdf.md
Keynote - Lessons Learned from Cloud Security Incidents Past and Present, Dave Shackleford.pdf
Keynote - Lessons Learned from Cloud Security Incidents Past and Present, Dave Shackleford.pdf.md
Keynote - Securing Cloud Deployments - A Red Team Perspective, Matt Burrough.pdf
Keynote - Securing Cloud Deployments - A Red Team Perspective, Matt Burrough.pdf.md
首页
上页
9
下页
共31页
FeeiCN/Security-PPT
各安全大会、安全沙龙的演讲内容,安全白皮书、安全研究报告、安全免费图书、安全指南等
GitHub下载
点赞
回复
回帖
支持markdown部分语法
?

[
文字
](
链接
)
```
多行代码
```
`
单行代码
`
**
加粗
**
*
斜体
*
###
标题
>
引用
1.
有序列表
-
无序列表
!-
单选投票选项
!--
多选投票选项
上传附件
提交
X