In this session we will examine the most effective and dangerous attacks to the cloud, infrastructures, source code, scripts, protocols, configurations and more, no holds barred. We will see how
In this session we will examine the most effective and dangerous attacks to the cloud, infrastructures, source code, scripts, protocols, configurations and more, no holds barred. We will see how
“Ever wondered how Wolfenstein managed to render almost convincing 3D worlds in the 90s? In this session, you’ll learn about ray casting, the fun hack that’ll let you build a
“Assets are everywhere and describing can be difficult. In this session, we will talk about the different types of assets, how you would leverage them in different use cases and
“With .NET Core 3 and .NET 5 a new set of tools and libraries are available to analyze dumps and live processes. During this session we will first see the
With the latest Update of former called Project Service Automation and now referred as Project Operations, Microsoft opens new gates on their platform for Project Management. How does that brings