Kenma
2 bugs on the UMS (Muhammadiyah University of Surakarta) website | #poc videos
10 months ago - 2:45
blogize
Mastering JavaScript Object Identification Techniques
11 months ago - 1:23
Fujitsu
Fujitsu LP Solution: Data & Video Analytics to Maximize Retail Profits
5 hours ago - 2:19
Rohan Adus
5 LIES about becoming a Data Analyst (avoid these)
15 hours ago - 8:36
Forensic Tech
Sensitive data exposure | OWASP TOP 10 | Explain in Hindi | Forensic Tech
4 years ago - 21:18
Datagaps
Data Profiling and Metadata Comparison
11 hours ago - 6:03
yuzaR Data Science
Ordinal Regression Demystified = Proportional Odds = Ordered Logit = Cumulative Link (Part 1)
23 hours ago - 20:15
Muhammad Syahroni
Sensitive Data Exposure | Review Jurnal Internasional
4 years ago - 9:29
ARC Advisory Group
7 Steps To Improve Your Process With Data Insights with A.I. Insights from Prometheus Group!
6 hours ago - 0:58
Peter Rising MVP
Secure Sensitive Data with On-Demand Classification
1 day ago - 0:37
SPN News
How Can We Protect Our Personal Data From Being Leaked?|Spn News|Mian Arslan|
8 hours ago - 7:00
VARINDIA
Heading towards a Hyperconnected Future with Limitless Potential and Unseen Risks
7 hours ago - 7:12
UBIKA
Protecting against the Top 10 most critical API security risks
5 years ago - 37:45
Breathe Again
Health Data Needs a System | Ritesh Bawri | Breatheagain
4 days ago - 0:57
UBIKA
Protégez vous contre le Top 10 des menaces les plus critiques liées aux APIs
5 years ago - 55:14