SlideShare a Scribd company logo
1 of 252
Download to read offline
Andres riancho,  Advanced Web 2.0  Security
Andres riancho,  Advanced Web 2.0  Security
Andres riancho,  Advanced Web 2.0  Security
Andres riancho,  Advanced Web 2.0  Security
Andres riancho,  Advanced Web 2.0  Security
Andres riancho,  Advanced Web 2.0  Security
Andres riancho,  Advanced Web 2.0  Security
Andres riancho,  Advanced Web 2.0  Security
Andres riancho,  Advanced Web 2.0  Security
Andres riancho,  Advanced Web 2.0  Security
Andres riancho,  Advanced Web 2.0  Security
Andres riancho,  Advanced Web 2.0  Security
Andres riancho,  Advanced Web 2.0  Security
Andres riancho,  Advanced Web 2.0  Security
Andres riancho,  Advanced Web 2.0  Security
Andres riancho,  Advanced Web 2.0  Security
Andres riancho,  Advanced Web 2.0  Security
Andres riancho,  Advanced Web 2.0  Security
Andres riancho,  Advanced Web 2.0  Security
Andres riancho,  Advanced Web 2.0  Security
Andres riancho,  Advanced Web 2.0  Security
Andres riancho,  Advanced Web 2.0  Security
Andres riancho,  Advanced Web 2.0  Security
Andres riancho,  Advanced Web 2.0  Security
Andres riancho,  Advanced Web 2.0  Security
Andres riancho,  Advanced Web 2.0  Security
Andres riancho,  Advanced Web 2.0  Security
Andres riancho,  Advanced Web 2.0  Security
Andres riancho,  Advanced Web 2.0  Security
Andres riancho,  Advanced Web 2.0  Security
Andres riancho,  Advanced Web 2.0  Security
Andres riancho,  Advanced Web 2.0  Security
Andres riancho,  Advanced Web 2.0  Security
Andres riancho,  Advanced Web 2.0  Security
Andres riancho,  Advanced Web 2.0  Security
Andres riancho,  Advanced Web 2.0  Security
Andres riancho,  Advanced Web 2.0  Security
Andres riancho,  Advanced Web 2.0  Security
Andres riancho,  Advanced Web 2.0  Security
Andres riancho,  Advanced Web 2.0  Security
Andres riancho,  Advanced Web 2.0  Security
Andres riancho,  Advanced Web 2.0  Security
Andres riancho,  Advanced Web 2.0  Security
Andres riancho,  Advanced Web 2.0  Security
Andres riancho,  Advanced Web 2.0  Security
Andres riancho,  Advanced Web 2.0  Security
Andres riancho,  Advanced Web 2.0  Security
Andres riancho,  Advanced Web 2.0  Security
Andres riancho,  Advanced Web 2.0  Security
Andres riancho,  Advanced Web 2.0  Security
Andres riancho,  Advanced Web 2.0  Security
Andres riancho,  Advanced Web 2.0  Security
Andres riancho,  Advanced Web 2.0  Security
Andres riancho,  Advanced Web 2.0  Security
Andres riancho,  Advanced Web 2.0  Security
Andres riancho,  Advanced Web 2.0  Security
Andres riancho,  Advanced Web 2.0  Security
Andres riancho,  Advanced Web 2.0  Security
Andres riancho,  Advanced Web 2.0  Security
Andres riancho,  Advanced Web 2.0  Security
Andres riancho,  Advanced Web 2.0  Security
Andres riancho,  Advanced Web 2.0  Security
Andres riancho,  Advanced Web 2.0  Security
Andres riancho,  Advanced Web 2.0  Security
Andres riancho,  Advanced Web 2.0  Security
Andres riancho,  Advanced Web 2.0  Security
Andres riancho,  Advanced Web 2.0  Security
Andres riancho,  Advanced Web 2.0  Security
Andres riancho,  Advanced Web 2.0  Security
Andres riancho,  Advanced Web 2.0  Security
Andres riancho,  Advanced Web 2.0  Security
Andres riancho,  Advanced Web 2.0  Security
Andres riancho,  Advanced Web 2.0  Security
Andres riancho,  Advanced Web 2.0  Security
Andres riancho,  Advanced Web 2.0  Security
Andres riancho,  Advanced Web 2.0  Security
Andres riancho,  Advanced Web 2.0  Security
Andres riancho,  Advanced Web 2.0  Security
Andres riancho,  Advanced Web 2.0  Security
Andres riancho,  Advanced Web 2.0  Security
Andres riancho,  Advanced Web 2.0  Security
Andres riancho,  Advanced Web 2.0  Security
Andres riancho,  Advanced Web 2.0  Security
Andres riancho,  Advanced Web 2.0  Security
Andres riancho,  Advanced Web 2.0  Security
Andres riancho,  Advanced Web 2.0  Security
Andres riancho,  Advanced Web 2.0  Security
Andres riancho,  Advanced Web 2.0  Security
Andres riancho,  Advanced Web 2.0  Security
Andres riancho,  Advanced Web 2.0  Security
Andres riancho,  Advanced Web 2.0  Security
Andres riancho,  Advanced Web 2.0  Security
Andres riancho,  Advanced Web 2.0  Security
Andres riancho,  Advanced Web 2.0  Security
Andres riancho,  Advanced Web 2.0  Security
Andres riancho,  Advanced Web 2.0  Security
Andres riancho,  Advanced Web 2.0  Security
Andres riancho,  Advanced Web 2.0  Security
Andres riancho,  Advanced Web 2.0  Security
Andres riancho,  Advanced Web 2.0  Security
Andres riancho,  Advanced Web 2.0  Security
Andres riancho,  Advanced Web 2.0  Security
Andres riancho,  Advanced Web 2.0  Security
Andres riancho,  Advanced Web 2.0  Security
Andres riancho,  Advanced Web 2.0  Security
Andres riancho,  Advanced Web 2.0  Security
Andres riancho,  Advanced Web 2.0  Security
Andres riancho,  Advanced Web 2.0  Security
Andres riancho,  Advanced Web 2.0  Security
Andres riancho,  Advanced Web 2.0  Security
Andres riancho,  Advanced Web 2.0  Security
Andres riancho,  Advanced Web 2.0  Security
Andres riancho,  Advanced Web 2.0  Security
Andres riancho,  Advanced Web 2.0  Security
Andres riancho,  Advanced Web 2.0  Security
Andres riancho,  Advanced Web 2.0  Security
Andres riancho,  Advanced Web 2.0  Security
Andres riancho,  Advanced Web 2.0  Security
Andres riancho,  Advanced Web 2.0  Security
Andres riancho,  Advanced Web 2.0  Security
Andres riancho,  Advanced Web 2.0  Security
Andres riancho,  Advanced Web 2.0  Security
Andres riancho,  Advanced Web 2.0  Security
Andres riancho,  Advanced Web 2.0  Security
Andres riancho,  Advanced Web 2.0  Security
Andres riancho,  Advanced Web 2.0  Security
Andres riancho,  Advanced Web 2.0  Security
Andres riancho,  Advanced Web 2.0  Security
Andres riancho,  Advanced Web 2.0  Security
Andres riancho,  Advanced Web 2.0  Security
Andres riancho,  Advanced Web 2.0  Security
Andres riancho,  Advanced Web 2.0  Security
Andres riancho,  Advanced Web 2.0  Security
Andres riancho,  Advanced Web 2.0  Security
Andres riancho,  Advanced Web 2.0  Security
Andres riancho,  Advanced Web 2.0  Security
Andres riancho,  Advanced Web 2.0  Security
Andres riancho,  Advanced Web 2.0  Security
Andres riancho,  Advanced Web 2.0  Security
Andres riancho,  Advanced Web 2.0  Security
Andres riancho,  Advanced Web 2.0  Security
Andres riancho,  Advanced Web 2.0  Security
Andres riancho,  Advanced Web 2.0  Security
Andres riancho,  Advanced Web 2.0  Security
Andres riancho,  Advanced Web 2.0  Security
Andres riancho,  Advanced Web 2.0  Security
Andres riancho,  Advanced Web 2.0  Security
Andres riancho,  Advanced Web 2.0  Security
Andres riancho,  Advanced Web 2.0  Security
Andres riancho,  Advanced Web 2.0  Security
Andres riancho,  Advanced Web 2.0  Security
Andres riancho,  Advanced Web 2.0  Security
Andres riancho,  Advanced Web 2.0  Security
Andres riancho,  Advanced Web 2.0  Security
Andres riancho,  Advanced Web 2.0  Security
Andres riancho,  Advanced Web 2.0  Security
Andres riancho,  Advanced Web 2.0  Security
Andres riancho,  Advanced Web 2.0  Security
Andres riancho,  Advanced Web 2.0  Security
Andres riancho,  Advanced Web 2.0  Security
Andres riancho,  Advanced Web 2.0  Security
Andres riancho,  Advanced Web 2.0  Security
Andres riancho,  Advanced Web 2.0  Security
Andres riancho,  Advanced Web 2.0  Security
Andres riancho,  Advanced Web 2.0  Security
Andres riancho,  Advanced Web 2.0  Security
Andres riancho,  Advanced Web 2.0  Security
Andres riancho,  Advanced Web 2.0  Security
Andres riancho,  Advanced Web 2.0  Security
Andres riancho,  Advanced Web 2.0  Security
Andres riancho,  Advanced Web 2.0  Security
Andres riancho,  Advanced Web 2.0  Security
Andres riancho,  Advanced Web 2.0  Security
Andres riancho,  Advanced Web 2.0  Security
Andres riancho,  Advanced Web 2.0  Security
Andres riancho,  Advanced Web 2.0  Security
Andres riancho,  Advanced Web 2.0  Security
Andres riancho,  Advanced Web 2.0  Security
Andres riancho,  Advanced Web 2.0  Security
Andres riancho,  Advanced Web 2.0  Security
Andres riancho,  Advanced Web 2.0  Security
Andres riancho,  Advanced Web 2.0  Security
Andres riancho,  Advanced Web 2.0  Security
Andres riancho,  Advanced Web 2.0  Security
Andres riancho,  Advanced Web 2.0  Security
Andres riancho,  Advanced Web 2.0  Security
Andres riancho,  Advanced Web 2.0  Security
Andres riancho,  Advanced Web 2.0  Security
Andres riancho,  Advanced Web 2.0  Security
Andres riancho,  Advanced Web 2.0  Security
Andres riancho,  Advanced Web 2.0  Security
Andres riancho,  Advanced Web 2.0  Security
Andres riancho,  Advanced Web 2.0  Security
Andres riancho,  Advanced Web 2.0  Security
Andres riancho,  Advanced Web 2.0  Security
Andres riancho,  Advanced Web 2.0  Security
Andres riancho,  Advanced Web 2.0  Security
Andres riancho,  Advanced Web 2.0  Security
Andres riancho,  Advanced Web 2.0  Security
Andres riancho,  Advanced Web 2.0  Security
Andres riancho,  Advanced Web 2.0  Security
Andres riancho,  Advanced Web 2.0  Security
Andres riancho,  Advanced Web 2.0  Security
Andres riancho,  Advanced Web 2.0  Security
Andres riancho,  Advanced Web 2.0  Security
Andres riancho,  Advanced Web 2.0  Security
Andres riancho,  Advanced Web 2.0  Security
Andres riancho,  Advanced Web 2.0  Security
Andres riancho,  Advanced Web 2.0  Security
Andres riancho,  Advanced Web 2.0  Security
Andres riancho,  Advanced Web 2.0  Security
Andres riancho,  Advanced Web 2.0  Security
Andres riancho,  Advanced Web 2.0  Security
Andres riancho,  Advanced Web 2.0  Security
Andres riancho,  Advanced Web 2.0  Security
Andres riancho,  Advanced Web 2.0  Security
Andres riancho,  Advanced Web 2.0  Security
Andres riancho,  Advanced Web 2.0  Security
Andres riancho,  Advanced Web 2.0  Security
Andres riancho,  Advanced Web 2.0  Security
Andres riancho,  Advanced Web 2.0  Security
Andres riancho,  Advanced Web 2.0  Security
Andres riancho,  Advanced Web 2.0  Security
Andres riancho,  Advanced Web 2.0  Security
Andres riancho,  Advanced Web 2.0  Security
Andres riancho,  Advanced Web 2.0  Security
Andres riancho,  Advanced Web 2.0  Security
Andres riancho,  Advanced Web 2.0  Security
Andres riancho,  Advanced Web 2.0  Security
Andres riancho,  Advanced Web 2.0  Security
Andres riancho,  Advanced Web 2.0  Security
Andres riancho,  Advanced Web 2.0  Security
Andres riancho,  Advanced Web 2.0  Security
Andres riancho,  Advanced Web 2.0  Security
Andres riancho,  Advanced Web 2.0  Security
Andres riancho,  Advanced Web 2.0  Security
Andres riancho,  Advanced Web 2.0  Security
Andres riancho,  Advanced Web 2.0  Security
Andres riancho,  Advanced Web 2.0  Security
Andres riancho,  Advanced Web 2.0  Security
Andres riancho,  Advanced Web 2.0  Security
Andres riancho,  Advanced Web 2.0  Security
Andres riancho,  Advanced Web 2.0  Security
Andres riancho,  Advanced Web 2.0  Security
Andres riancho,  Advanced Web 2.0  Security
Andres riancho,  Advanced Web 2.0  Security
Andres riancho,  Advanced Web 2.0  Security
Andres riancho,  Advanced Web 2.0  Security
Andres riancho,  Advanced Web 2.0  Security
Andres riancho,  Advanced Web 2.0  Security
Andres riancho,  Advanced Web 2.0  Security
Andres riancho,  Advanced Web 2.0  Security

More Related Content

More from Positive Hack Days

Автоматизация построения правил для Approof
Автоматизация построения правил для ApproofАвтоматизация построения правил для Approof
Автоматизация построения правил для ApproofPositive Hack Days
 
Мастер-класс «Трущобы Application Security»
Мастер-класс «Трущобы Application Security»Мастер-класс «Трущобы Application Security»
Мастер-класс «Трущобы Application Security»Positive Hack Days
 
Формальные методы защиты приложений
Формальные методы защиты приложенийФормальные методы защиты приложений
Формальные методы защиты приложенийPositive Hack Days
 
Эвристические методы защиты приложений
Эвристические методы защиты приложенийЭвристические методы защиты приложений
Эвристические методы защиты приложенийPositive Hack Days
 
Теоретические основы Application Security
Теоретические основы Application SecurityТеоретические основы Application Security
Теоретические основы Application SecurityPositive Hack Days
 
От экспериментального программирования к промышленному: путь длиной в 10 лет
От экспериментального программирования к промышленному: путь длиной в 10 летОт экспериментального программирования к промышленному: путь длиной в 10 лет
От экспериментального программирования к промышленному: путь длиной в 10 летPositive Hack Days
 
Уязвимое Android-приложение: N проверенных способов наступить на грабли
Уязвимое Android-приложение: N проверенных способов наступить на граблиУязвимое Android-приложение: N проверенных способов наступить на грабли
Уязвимое Android-приложение: N проверенных способов наступить на граблиPositive Hack Days
 
Требования по безопасности в архитектуре ПО
Требования по безопасности в архитектуре ПОТребования по безопасности в архитектуре ПО
Требования по безопасности в архитектуре ПОPositive Hack Days
 
Формальная верификация кода на языке Си
Формальная верификация кода на языке СиФормальная верификация кода на языке Си
Формальная верификация кода на языке СиPositive Hack Days
 
Механизмы предотвращения атак в ASP.NET Core
Механизмы предотвращения атак в ASP.NET CoreМеханизмы предотвращения атак в ASP.NET Core
Механизмы предотвращения атак в ASP.NET CorePositive Hack Days
 
SOC для КИИ: израильский опыт
SOC для КИИ: израильский опытSOC для КИИ: израильский опыт
SOC для КИИ: израильский опытPositive Hack Days
 
Honeywell Industrial Cyber Security Lab & Services Center
Honeywell Industrial Cyber Security Lab & Services CenterHoneywell Industrial Cyber Security Lab & Services Center
Honeywell Industrial Cyber Security Lab & Services CenterPositive Hack Days
 
Credential stuffing и брутфорс-атаки
Credential stuffing и брутфорс-атакиCredential stuffing и брутфорс-атаки
Credential stuffing и брутфорс-атакиPositive Hack Days
 
Практический опыт защиты финансовых транзакций клиентов Банка
Практический опыт защиты финансовых транзакций клиентов БанкаПрактический опыт защиты финансовых транзакций клиентов Банка
Практический опыт защиты финансовых транзакций клиентов БанкаPositive Hack Days
 
Решение SafeTouch — доверенный экран для безопасного подтверждения банковских...
Решение SafeTouch — доверенный экран для безопасного подтверждения банковских...Решение SafeTouch — доверенный экран для безопасного подтверждения банковских...
Решение SafeTouch — доверенный экран для безопасного подтверждения банковских...Positive Hack Days
 
Эффективный контроль сотрудников
Эффективный контроль сотрудниковЭффективный контроль сотрудников
Эффективный контроль сотрудниковPositive Hack Days
 
Подход к обеспечению безопасности IoT в Enterprise
Подход к обеспечению безопасности IoT в EnterpriseПодход к обеспечению безопасности IoT в Enterprise
Подход к обеспечению безопасности IoT в EnterprisePositive Hack Days
 
DDoS-атаки в 2016–2017: переворот
DDoS-атаки в 2016–2017: переворотDDoS-атаки в 2016–2017: переворот
DDoS-атаки в 2016–2017: переворотPositive Hack Days
 
Эволюция безопасности: от охранников к нейронным сетям
Эволюция безопасности: от охранников к нейронным сетямЭволюция безопасности: от охранников к нейронным сетям
Эволюция безопасности: от охранников к нейронным сетямPositive Hack Days
 

More from Positive Hack Days (20)

Автоматизация построения правил для Approof
Автоматизация построения правил для ApproofАвтоматизация построения правил для Approof
Автоматизация построения правил для Approof
 
Мастер-класс «Трущобы Application Security»
Мастер-класс «Трущобы Application Security»Мастер-класс «Трущобы Application Security»
Мастер-класс «Трущобы Application Security»
 
Формальные методы защиты приложений
Формальные методы защиты приложенийФормальные методы защиты приложений
Формальные методы защиты приложений
 
Эвристические методы защиты приложений
Эвристические методы защиты приложенийЭвристические методы защиты приложений
Эвристические методы защиты приложений
 
Теоретические основы Application Security
Теоретические основы Application SecurityТеоретические основы Application Security
Теоретические основы Application Security
 
От экспериментального программирования к промышленному: путь длиной в 10 лет
От экспериментального программирования к промышленному: путь длиной в 10 летОт экспериментального программирования к промышленному: путь длиной в 10 лет
От экспериментального программирования к промышленному: путь длиной в 10 лет
 
Уязвимое Android-приложение: N проверенных способов наступить на грабли
Уязвимое Android-приложение: N проверенных способов наступить на граблиУязвимое Android-приложение: N проверенных способов наступить на грабли
Уязвимое Android-приложение: N проверенных способов наступить на грабли
 
Требования по безопасности в архитектуре ПО
Требования по безопасности в архитектуре ПОТребования по безопасности в архитектуре ПО
Требования по безопасности в архитектуре ПО
 
Формальная верификация кода на языке Си
Формальная верификация кода на языке СиФормальная верификация кода на языке Си
Формальная верификация кода на языке Си
 
Механизмы предотвращения атак в ASP.NET Core
Механизмы предотвращения атак в ASP.NET CoreМеханизмы предотвращения атак в ASP.NET Core
Механизмы предотвращения атак в ASP.NET Core
 
SOC для КИИ: израильский опыт
SOC для КИИ: израильский опытSOC для КИИ: израильский опыт
SOC для КИИ: израильский опыт
 
Honeywell Industrial Cyber Security Lab & Services Center
Honeywell Industrial Cyber Security Lab & Services CenterHoneywell Industrial Cyber Security Lab & Services Center
Honeywell Industrial Cyber Security Lab & Services Center
 
Credential stuffing и брутфорс-атаки
Credential stuffing и брутфорс-атакиCredential stuffing и брутфорс-атаки
Credential stuffing и брутфорс-атаки
 
Доклад SiteSecure
Доклад SiteSecureДоклад SiteSecure
Доклад SiteSecure
 
Практический опыт защиты финансовых транзакций клиентов Банка
Практический опыт защиты финансовых транзакций клиентов БанкаПрактический опыт защиты финансовых транзакций клиентов Банка
Практический опыт защиты финансовых транзакций клиентов Банка
 
Решение SafeTouch — доверенный экран для безопасного подтверждения банковских...
Решение SafeTouch — доверенный экран для безопасного подтверждения банковских...Решение SafeTouch — доверенный экран для безопасного подтверждения банковских...
Решение SafeTouch — доверенный экран для безопасного подтверждения банковских...
 
Эффективный контроль сотрудников
Эффективный контроль сотрудниковЭффективный контроль сотрудников
Эффективный контроль сотрудников
 
Подход к обеспечению безопасности IoT в Enterprise
Подход к обеспечению безопасности IoT в EnterpriseПодход к обеспечению безопасности IoT в Enterprise
Подход к обеспечению безопасности IoT в Enterprise
 
DDoS-атаки в 2016–2017: переворот
DDoS-атаки в 2016–2017: переворотDDoS-атаки в 2016–2017: переворот
DDoS-атаки в 2016–2017: переворот
 
Эволюция безопасности: от охранников к нейронным сетям
Эволюция безопасности: от охранников к нейронным сетямЭволюция безопасности: от охранников к нейронным сетям
Эволюция безопасности: от охранников к нейронным сетям
 

Recently uploaded

New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demoHarshalMandlekar2
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 

Recently uploaded (20)

New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx