项目作者: FeeiCN

项目描述 :
大安全各领域各公司各会议分享的PPT
高级语言:
项目地址: git://github.com/FeeiCN/Security-PPT.git
创建时间: 2018-10-31T13:53:41Z
项目社区:https://github.com/FeeiCN/Security-PPT

开源协议:

关键词:
ppt security security-ppt

下载


Security PPT

博观而约取,厚积而薄发。
别裁伪体亲风雅,转益多师是汝师。

The repository contains the slides of the security conference, as well as all kids of security white paper, security research report, security free books, security guide and so on.

本仓库收录各安全大会、安全沙龙的演讲内容,以及各类安全白皮书、安全研究报告、安全免费图书、安全指南等。

Amount/统计

  • 599 directories, 8844 slides

Download/下载

  • Clone repository git clone https://github.com/FeeiCN/Security-PPT.git or Clone special directory
  • Or you can download zip https://github.com/FeeiCN/Security-PPT/archive/refs/heads/master.zip

Search/搜索

Each slide PDF file will automatically generate a .txt text file with the same name.

If you’re interested in a particular topic (like sdl), then you can search for sdl using the GitHub search in the repository to find all the relevant slides.

Search keywords can be of the following types:

  • Conference, like KCONHITBMOSECCSSSSCNSCISCTENSECHACKPWNUCONGEEKPWNHITCONFITEISS.
  • Topic, like SDLSOCSIEM.
  • Speaker, like Feei
  • Enterprise, like Google, Amazon, Microsoft and so on.
  • And so on.

每一个PPT的PDF文件都将会自动生成一个同名的.txt文件。

如果你对某个主题(比如sdl)感兴趣,那么你可以通过GitHub搜索功能,在本仓库中搜索sdl,即可找到所有相关的PPT。

你可以搜索以下类型关键词

  • 会议名称,比如KCONHITBMOSECCSSSSCNSCISCTENSECHACKPWNUCONGEEKPWNHITCONFITEISS等等。
  • 演讲主题,比如白皮书研究报告SDLSOCSIEMWAFIDSIPSWAFRASPSRCHONEYPOT云安全大数据安全区块链安全App安全Web安全二进制安全数据安全主机安全威胁情报安全运营等等。
  • 演讲者,比如Feei等等。
  • 企业名,比如谷歌微软阿里巴巴阿里云蚂蚁金服腾讯京东唯品会美丽联合顶象邦盛同盾岂安瑞数绑绑安全SYNOPSYS绿盟天融信华为360深信服、、H3C启明星辰绿盟思科等等。
  • 等等

All data collected from the internet, if you DO NOT want to display your files, please contact feei#feei.cn to delete them.

所有信息收集自互联网,如有侵权,请联系feei@feei.cn删除。


阿里巴巴移动安全技术实践_1649665516029.pdf
阿里云大数据安全实践_1649665514978.pdf
阿里云安全白皮书4.0_1649665515394.pdf
金融企业安全运营建设之路_1649665513389.pdf
金融数据安全治理模型与实践_1649665514401.pdf
钉钉安全白皮书v2.0_1649665514737.pdf
薅羊毛产业报告_1649665507031.pdf
虚拟环境与大数据环境下的数据安全过渡_1649665512422.pdf
网络安全实施框架指南_1649665503980.pdf
网络安全框架_1649665505484.pdf
网络空间靶场技术研究_1649665505682.pdf
美联WAF架构演变之路_1649665505831.pdf
细数安卓APP那些远程攻击漏洞_1649665502554.pdf
研发安全的持续运营_1649665501668.pdf
纪舒瀚-从防御到检测的企业安全之路_1649665502144.pdf
知道创宇区块链安全风险白皮书_1649665500953.pdf
物联网安全指南_1649665499735.pdf
爱奇艺业务安全风控体系的建设实践_1649665498176.pdf
新一代SOC研究报告_1649665496914.pdf
浅析安全威胁发展与情报态势感知技术_1649665497156.pdf
海关数据安全治理实践_1649665497446.pdf
数据梳理和审计技术解析_1649665495046.pdf
新一代SOC研究报告(17-08-C2-ZN)-1_1649665496527.pdf
数据安全能力实施指南-1_1649665494055.pdf
数据安全控制有效性检验_1649665477981.pdf
数据安全治理技术支撑框架_1649665493276.pdf
数据安全治理白皮书-水印版_1649665493619.pdf
数据安全与隐私保护合规评估_1649665476818.pdf
数据安全实施指南介绍_1649665477306.pdf
打造由情报分析驱动的ISOC_1649665475831.pdf
数据保护伞-大数据平台的分类分级、脱敏与审计工具_1649665476337.pdf
威胁情报的发展展望_1649665475076.pdf
微众银行的安全运营实践_1649665475484.pdf
大数据营销及数据安全 _1649665473934.pdf
天擎V6.3主打PPT-2_1649665474414.pdf
大数据安全标准及平台防护体系_1649665473032.pdf
大数据安全白皮书_1649665473509.pdf
基于虚拟安全团队的S-SDLC在跨国团队的实践_1649665471836.pdf
大数据安全基础课件_1649665472474.pdf
基于威胁情报的安全智能化_1649665470857.pdf
基于威胁情报的数据分析和自动决策_1649665471323.pdf
唯品会产品安全技术实践_1649665470197.pdf
唯品会企业安全开发生命周期2.0_1649665470526.pdf
信息安全国家标准目录-2017_1649665468882.pdf
全球银行业受黑客组织攻击分析报告_1649665469133.pdf
华为数据安全管理实践_1649665469593.pdf
企业业务安全开发实践_1649665468235.pdf
企业信息安全框架V5.0白皮书_1649665468613.pdf
京东云安全白皮书_1649665467221.pdf
从IOC命中到安全分析的催化剂_1649665467511.pdf
从信息到情报,从溯源到协同_1649665467780.pdf
中国互联网地下产业链分析白皮书_1649665465840.pdf
为什么唯品会能够100%使用安全开发流程_1649665466514.pdf
云计算标准体系介绍3.0版本_1649665466786.pdf
us-17-Giuliano-Lies-And-Damn-Lies-Getting-Past-The-Hype-Of-Endpoint-Security-Solutions_1649665465062.pdf
us-17-Grange-Digital-Vengeance-Exploiting-The-Most-Notorious-C&C-Toolkits-wp_1649665465353.pdf
us-17-Fratantonio-Cloak-And-Dagger-From-Two-Permissions-To-Complete-Control-Of-The-UI-Feedback-Loop_1649665464039.pdf
us-17-Gil-Web-Cache-Deception-Attack-wp_1649665464351.pdf
us-17-Gil-Web-Cache-Deception-Attack_1649665464651.pdf
us-17-Evdokimov-Intel-AMT-Stealth-Breakthrough_1649665463118.pdf
us-17-Feng-Many-Birds-One-Stone-Exploiting-A-Single-SQLite-Vulnerability-Across-Multiple-Software_1649665463499.pdf
us-17-Fratantonio-Cloak-And-Dagger-From-Two-Permissions-To-Complete-Control-Of-The-UI-Feedback-Loop-wp_1649665463846.pdf
us-17-Etemadieh-Hacking-Hardware-With-A-$10-SD-Card-Reader_1649665461469.pdf
us-17-Evdokimov-Intel-AMT-Stealth-Breakthrough-wp_1649665462616.pdf
us-17-Eissa-Network-Automation-Isn't-Your-Safe-Haven-Protocol-Analysis-And-Vulnerabilities-Of-Autonomic-Network_1649665459699.pdf
us-17-Etemadieh-Hacking-Hardware-With-A-$10-SD-Card-Reader-wp_1649665460356.pdf
us-17-Domas-Breaking-The-x86-ISA_1649665458539.pdf
us-17-Domas-Breaking-The-x86-Instruction-Set-wp_1649665459350.pdf
us-17-Dods-Infecting-The-Enterprise-Abusing-Office365-Powershell-For-Covert-C2_1649665457360.pdf
us-17-Continella-ShieldFS-The-Last-Word-In-Ransomware-Resilient-Filesystems_1649665456071.pdf
us-17-Cohen-Game-Of-Chromes-Owning-The-Web-With-Zombie-Chrome-Extensions-wp_1649665454970.pdf
us-17-Coltel-WSUSpendu-Use-WSUS-To-Hang-Its-Clients-wp_1649665455124.pdf
us-17-Coltel-WSUSpendu-Use-WSUS-To-Hang-Its-Clients_1649665455473.pdf
us-17-Continella-ShieldFS-The-Last-Word-In-Ransomware-Resilient-Filesystems-wp_1649665455896.pdf
us-17-Cherny-Well-That-Escalated-Quickly-How-Abusing-The-Docker-API-Led-To-Remote-Code-Execution-Same-Origin-Bypass-And-Persistence_1649665453563.pdf
us-17-Cherny-Well-That-Escalated-Quickly-How-Abusing-The-Docker-API-Led-To-Remote-Code-Execution-Same-Origin-Bypass-And-Persistence_wp_1649665454105.pdf
us-17-Chui-Evilsploit-A-Universal-Hardware-Hacking-Toolkit-wp_1649665454434.pdf
us-17-Cohen-Game-Of-Chromes-Owning-The-Web-With-Zombie-Chrome-Extensions-wp (1)_1649665454761.pdf
us-17-Carettoni-Electronegativity-A-Study-Of-Electron-Security_1649665452608.pdf
us-17-Carettoni-Electronegativity-A-Study-Of-Electron-Security-wp_1649665452254.pdf
us-17-Burnett-Ichthyology-Phishing-As-A-Science-wp_1649665450813.pdf
us-17-Burnett-Ichthyology-Phishing-As-A-Science_1649665451342.pdf
us-17-Carettoni-Electronegativity-A-Study-Of-Electron-Security-wp (1)_1649665451841.pdf
us-17-Brandstetter-insecurity-In-Building-Automation-How-To-Create-Dark-Buildings-With-Light-Speed-wp_1649665449976.pdf
us-17-Brandstetter-insecurity-In-Building-Automation-How-To-Create-Dark-Buildings-With-Light-Speed_1649665450377.pdf
us-17-Bohannon-Revoke-Obfuscation-PowerShell-Obfuscation-Detection-And Evasion-Using-Science_1649665448755.pdf
us-17-Borgaonkar-New-Adventures-In-Spying-3G-And-4G-Users-Locate-Track-And-Monitor_1649665449519.pdf
us-17-Bohannon-Revoke-Obfuscation-PowerShell-Obfuscation-Detection-And Evasion-Using-Science-wp_1649665448219.pdf
us-17-Beery-The-Industrial-Revolution-Of-Lateral-Movement_1649665446925.pdf
us-17-Bianco-Go-To-Hunt-Then-Sleep_1649665447649.pdf
us-17-Aumasson-Automated-Testing-Of-Crypto-Software-Using-Differential-Fuzzing_1649665446216.pdf
us-17-Anderson-Bot-Vs-Bot-Evading-Machine-Learning-Malware-Detection-wp_1649665445076.pdf
us-17-Anderson-Bot-Vs-Bot-Evading-Machine-Learning-Malware-Detection_1649665445586.pdf
us-17-Ablon-Zero-Days-Thousands-Of-Nights-The-Life-And-Times-Of-Zero-Day-Vulnerabilities-And-Their-Exploits_1649665444072.pdf
us-17-Alva-So-You-Want-To-Market-Your-Security-Product_1649665444566.pdf
hadoop安全架构_1649665442818.pdf
us-17-Ablon-Bug-Collisions-Meet-Government-Vulnerability-Disclosure-Zero-Days-Thousands-Of-Nights-RAND_1649665443400.pdf
get来的漏洞-呆子不开口_1649665441134.pdf
alisec-mobile-security-潘爱民_1649665440122.pdf
Web应用安全权威指南_1649665438644.pdf