際際滷shows by User: RubanJames1 / http://www.slideshare.net/images/logo.gif 際際滷shows by User: RubanJames1 / Mon, 16 Mar 2015 08:46:23 GMT 際際滷Share feed for 際際滷shows by User: RubanJames1 Vulnerability in libxml2 /slideshow/vulnerability-in-libxml2/45888946 vulnerabilityinlibxml2-150316084623-conversion-gate01
This paper deals with the understanding of the Vulnerability and the mitigation process.]]>

This paper deals with the understanding of the Vulnerability and the mitigation process.]]>
Mon, 16 Mar 2015 08:46:23 GMT /slideshow/vulnerability-in-libxml2/45888946 RubanJames1@slideshare.net(RubanJames1) Vulnerability in libxml2 RubanJames1 This paper deals with the understanding of the Vulnerability and the mitigation process. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/vulnerabilityinlibxml2-150316084623-conversion-gate01-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> This paper deals with the understanding of the Vulnerability and the mitigation process.
Vulnerability in libxml2 from Ruban Deventhiran
]]>
309 1 https://cdn.slidesharecdn.com/ss_thumbnails/vulnerabilityinlibxml2-150316084623-conversion-gate01-thumbnail.jpg?width=120&height=120&fit=bounds document 000000 http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Securing data at rest with encryption /slideshow/securing-data-at-rest-with-encryption/45888292 securingdataatrestwithencryption-150316083334-conversion-gate01
Most Vulnerable part of Data is Data at Rest. This paper shows how to Secure those data.]]>

Most Vulnerable part of Data is Data at Rest. This paper shows how to Secure those data.]]>
Mon, 16 Mar 2015 08:33:34 GMT /slideshow/securing-data-at-rest-with-encryption/45888292 RubanJames1@slideshare.net(RubanJames1) Securing data at rest with encryption RubanJames1 Most Vulnerable part of Data is Data at Rest. This paper shows how to Secure those data. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/securingdataatrestwithencryption-150316083334-conversion-gate01-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Most Vulnerable part of Data is Data at Rest. This paper shows how to Secure those data.
Securing data at rest with encryption from Ruban Deventhiran
]]>
621 2 https://cdn.slidesharecdn.com/ss_thumbnails/securingdataatrestwithencryption-150316083334-conversion-gate01-thumbnail.jpg?width=120&height=120&fit=bounds document 000000 http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Market study of PAAS /slideshow/market-study-of-paas-44916111/44916111 marketstudyofpaas-150220025321-conversion-gate02
This document describes us market study of Platform as a service. How adopting the PAAS would lead to the growth of the company.]]>

This document describes us market study of Platform as a service. How adopting the PAAS would lead to the growth of the company.]]>
Fri, 20 Feb 2015 02:53:21 GMT /slideshow/market-study-of-paas-44916111/44916111 RubanJames1@slideshare.net(RubanJames1) Market study of PAAS RubanJames1 This document describes us market study of Platform as a service. How adopting the PAAS would lead to the growth of the company. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/marketstudyofpaas-150220025321-conversion-gate02-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> This document describes us market study of Platform as a service. How adopting the PAAS would lead to the growth of the company.
Market study of PAAS from Ruban Deventhiran
]]>
689 3 https://cdn.slidesharecdn.com/ss_thumbnails/marketstudyofpaas-150220025321-conversion-gate02-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Hp Virtual Connect /slideshow/hp-virtual-connect/44875404 hpvirtualconnect-150219063038-conversion-gate01
101 of HP Virtual Connectm, what it is, how it works and where it fits in.]]>

101 of HP Virtual Connectm, what it is, how it works and where it fits in.]]>
Thu, 19 Feb 2015 06:30:38 GMT /slideshow/hp-virtual-connect/44875404 RubanJames1@slideshare.net(RubanJames1) Hp Virtual Connect RubanJames1 101 of HP Virtual Connectm, what it is, how it works and where it fits in. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/hpvirtualconnect-150219063038-conversion-gate01-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> 101 of HP Virtual Connectm, what it is, how it works and where it fits in.
Hp Virtual Connect from Ruban Deventhiran
]]>
954 2 https://cdn.slidesharecdn.com/ss_thumbnails/hpvirtualconnect-150219063038-conversion-gate01-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Securing the infrastructure using IDS /slideshow/security-the-infrastructureusingids/44875158 securitytheinfrastructureusingids-150219062223-conversion-gate02
Securing the Internal network/Infrastructure using Intrusion detection system (IDS) Opensource approach.]]>

Securing the Internal network/Infrastructure using Intrusion detection system (IDS) Opensource approach.]]>
Thu, 19 Feb 2015 06:22:23 GMT /slideshow/security-the-infrastructureusingids/44875158 RubanJames1@slideshare.net(RubanJames1) Securing the infrastructure using IDS RubanJames1 Securing the Internal network/Infrastructure using Intrusion detection system (IDS) Opensource approach. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/securitytheinfrastructureusingids-150219062223-conversion-gate02-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Securing the Internal network/Infrastructure using Intrusion detection system (IDS) Opensource approach.
Securing the infrastructure using IDS from Ruban Deventhiran
]]>
301 2 https://cdn.slidesharecdn.com/ss_thumbnails/securitytheinfrastructureusingids-150219062223-conversion-gate02-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
https://cdn.slidesharecdn.com/profile-photo-RubanJames1-48x48.jpg?cb=1569217618 Tech Savvy https://cdn.slidesharecdn.com/ss_thumbnails/vulnerabilityinlibxml2-150316084623-conversion-gate01-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/vulnerability-in-libxml2/45888946 Vulnerability in libxml2 https://cdn.slidesharecdn.com/ss_thumbnails/securingdataatrestwithencryption-150316083334-conversion-gate01-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/securing-data-at-rest-with-encryption/45888292 Securing data at rest ... https://cdn.slidesharecdn.com/ss_thumbnails/marketstudyofpaas-150220025321-conversion-gate02-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/market-study-of-paas-44916111/44916111 Market study of PAAS