Showing 17149–17160 of 18767 results
Troy Hunt
Learn about the Ubiquity security breach, how phone data should be protected and more.
Trust and Security with Google Cloud
As organizations move their data and applications to the cloud, they must address new security challenges. The Trust and Security with Google Cloud course explores the basics of cloud security, the value of Google Cloud's multilayered approach to infrastructure security, and how Google earns and maintains customer trust in the cloud. Part of the Cloud Digital Leader learning path, this course aims to help individuals grow in their role and build the future of their business.
Trust and Security with Google Cloud
Learn about trust and security best practices for managing data and applications in Google Cloud environments.
Trust as the Foundation of DevOps
Observing many teams at several occasions, Dirk noticed that trust can be seen as the foundation of DevOps. Giving examples and concrete actions, this talk shows you how to foster trust in your team and tries to explain the science behind trust.
Trust Building and Resilience Development
Learn how to build trust and resilience within your workplace in this course.
Try Azure Cosmos DB for NoSQL
Learn how to use the Azure Cosmos DB for NoSQL to create an account, and then use the account to create Cosmos DB resources.
TsinghuaX: Principles of Electric Circuits | 电路原理
Electricity is everywhere. Learn about real world applications of electric circuits and the techniques for analyzing and designing circuits. The process of human civilization is almost the process of studying and utilizing electricity. Circuits are direct tools for using electricity to serve human beings. This course on Circuit Principles teaches you the basic methods of analyzing and designing circuits.
Tuberculosis (TB): Diagnosis, Treatment, Control Strategies
This Free Online Course Includes: 1.5-3 Hours of Learning CPD Accreditation Final Assessment
TUGrazX: Introduction to Software Side Channels and Mitigations
Side channels exist in the real world, but they also exist in computers and can be exploited directly from software. This is a substantial computer security problem today, that we need to learn about to be able to stop attacks. In this course, you will learn and practice basic software-based side channels and understand the thought process to utilize a side channel. You will then learn how to mitigate or avoid side channels in software.
TUGrazX: Physical and Advanced Side-Channel Attacks
Software-based and physical side-channel attacks have similar techniques. But physical attacks can observe properties and side effects that are usually not visible on the software layer. Thus, they are often considered the most dangerous side-channel attacks. In this course, we learn both about physical side-channel attacks but also about more advanced software-based side channels using prefetching and branch prediction. You will work with these attacks and understand how to mitigate them.
TUGrazX: Physical and Advanced Side-Channel Attacks
Software-based and physical side-channel attacks have similar techniques. But physical attacks can observe properties and side effects that are usually not visible on the software layer. Thus, they are often considered the most dangerous side-channel attacks. In this course, we learn both about physical side-channel attacks but also about more advanced software-based side channels using prefetching and branch prediction. You will work with these attacks and understand how to mitigate them.
TUGrazX: Physical and Advanced Side-Channel Attacks
Software-based and physical side-channel attacks have similar techniques. But physical attacks can observe properties and side effects that are usually not visible on the software layer. Thus, they are often considered the most dangerous side-channel attacks. In this course, we learn both about physical side-channel attacks but also about more advanced software-based side channels using prefetching and branch prediction. You will work with these attacks and understand how to mitigate them.