2 bugs on the UMS (Muhammadiyah University of Surakarta) website | #poc videos

Kenma

2 bugs on the UMS (Muhammadiyah University of Surakarta) website | #poc videos

10 months ago - 2:45

Mastering JavaScript Object Identification Techniques

blogize

Mastering JavaScript Object Identification Techniques

11 months ago - 1:23

Fujitsu LP Solution: Data & Video Analytics to Maximize Retail Profits

Fujitsu

Fujitsu LP Solution: Data & Video Analytics to Maximize Retail Profits

5 hours ago - 2:19

5 LIES about becoming a Data Analyst (avoid these)

Rohan Adus

5 LIES about becoming a Data Analyst (avoid these)

15 hours ago - 8:36

Sensitive data exposure | OWASP TOP 10 | Explain in Hindi | Forensic Tech

Forensic Tech

Sensitive data exposure | OWASP TOP 10 | Explain in Hindi | Forensic Tech

4 years ago - 21:18

Data Profiling and Metadata Comparison

Datagaps

Data Profiling and Metadata Comparison

11 hours ago - 6:03

Ordinal Regression Demystified = Proportional Odds = Ordered Logit = Cumulative Link (Part 1)

yuzaR Data Science

Ordinal Regression Demystified = Proportional Odds = Ordered Logit = Cumulative Link (Part 1)

23 hours ago - 20:15

Sensitive Data Exposure | Review Jurnal Internasional

Muhammad Syahroni

Sensitive Data Exposure | Review Jurnal Internasional

4 years ago - 9:29

7 Steps To Improve Your Process With Data Insights with A.I. Insights from Prometheus Group!

ARC Advisory Group

7 Steps To Improve Your Process With Data Insights with A.I. Insights from Prometheus Group!

6 hours ago - 0:58

Secure Sensitive Data with On-Demand Classification

Peter Rising MVP

Secure Sensitive Data with On-Demand Classification

1 day ago - 0:37

How Can We Protect Our Personal Data From Being Leaked?|Spn News|Mian Arslan|

SPN News

How Can We Protect Our Personal Data From Being Leaked?|Spn News|Mian Arslan|

8 hours ago - 7:00

Heading towards a Hyperconnected Future with Limitless Potential and Unseen Risks

VARINDIA

Heading towards a Hyperconnected Future with Limitless Potential and Unseen Risks

7 hours ago - 7:12

Protecting against the Top 10 most critical API security risks

UBIKA

Protecting against the Top 10 most critical API security risks

5 years ago - 37:45

Health Data Needs a System | Ritesh Bawri | Breatheagain

Breathe Again

Health Data Needs a System | Ritesh Bawri | Breatheagain

4 days ago - 0:57

Protégez vous contre le Top 10 des menaces les plus critiques liées aux APIs

UBIKA

Protégez vous contre le Top 10 des menaces les plus critiques liées aux APIs

5 years ago - 55:14