際際滷shows by User: jassics / http://www.slideshare.net/images/logo.gif 際際滷shows by User: jassics / Wed, 28 Aug 2024 17:07:05 GMT 際際滷Share feed for 際際滷shows by User: jassics Presentation on Cloud Security 101 - 2024 /slideshow/presentation-on-cloud-security-101-2024/271391215 cloud-security-101-2024-240828170705-d67833fc
presentation on cloud security basics that explains what is cloud, what are the important topics one should learn in cloud security with learning resources and examples.]]>

presentation on cloud security basics that explains what is cloud, what are the important topics one should learn in cloud security with learning resources and examples.]]>
Wed, 28 Aug 2024 17:07:05 GMT /slideshow/presentation-on-cloud-security-101-2024/271391215 jassics@slideshare.net(jassics) Presentation on Cloud Security 101 - 2024 jassics presentation on cloud security basics that explains what is cloud, what are the important topics one should learn in cloud security with learning resources and examples. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/cloud-security-101-2024-240828170705-d67833fc-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> presentation on cloud security basics that explains what is cloud, what are the important topics one should learn in cloud security with learning resources and examples.
Presentation on Cloud Security 101 - 2024 from Sanjeev Kumar Jaiswal
]]>
363 0 https://cdn.slidesharecdn.com/ss_thumbnails/cloud-security-101-2024-240828170705-d67833fc-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Threat Modeling Basics with Examples /slideshow/threat-modeling-basics-with-examples/251769051 threat-modeling-hands-on-220512110148-b48ad6f0
Threat Modeling Basics with examples that explain what is threat modeling, why to use threat modeling, when to use threat modeling, and the advantages of using threat modeling. Types of Threat Modeling.]]>

Threat Modeling Basics with examples that explain what is threat modeling, why to use threat modeling, when to use threat modeling, and the advantages of using threat modeling. Types of Threat Modeling.]]>
Thu, 12 May 2022 11:01:48 GMT /slideshow/threat-modeling-basics-with-examples/251769051 jassics@slideshare.net(jassics) Threat Modeling Basics with Examples jassics Threat Modeling Basics with examples that explain what is threat modeling, why to use threat modeling, when to use threat modeling, and the advantages of using threat modeling. Types of Threat Modeling. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/threat-modeling-hands-on-220512110148-b48ad6f0-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Threat Modeling Basics with examples that explain what is threat modeling, why to use threat modeling, when to use threat modeling, and the advantages of using threat modeling. Types of Threat Modeling.
Threat Modeling Basics with Examples from Sanjeev Kumar Jaiswal
]]>
979 0 https://cdn.slidesharecdn.com/ss_thumbnails/threat-modeling-hands-on-220512110148-b48ad6f0-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Cloud Security 101 /slideshow/cloud-security-101/251768673 cloud-security-101-220512101107-5c27a541
This presentation is the basics of Cloud Security. It explains all the basic concepts that you would need to start the cloud security journey with some examples.]]>

This presentation is the basics of Cloud Security. It explains all the basic concepts that you would need to start the cloud security journey with some examples.]]>
Thu, 12 May 2022 10:11:07 GMT /slideshow/cloud-security-101/251768673 jassics@slideshare.net(jassics) Cloud Security 101 jassics This presentation is the basics of Cloud Security. It explains all the basic concepts that you would need to start the cloud security journey with some examples. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/cloud-security-101-220512101107-5c27a541-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> This presentation is the basics of Cloud Security. It explains all the basic concepts that you would need to start the cloud security journey with some examples.
Cloud Security 101 from Sanjeev Kumar Jaiswal
]]>
94 0 https://cdn.slidesharecdn.com/ss_thumbnails/cloud-security-101-220512101107-5c27a541-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Penetration Testing AWS /slideshow/penetration-testing-aws/251768672 pentesting-aws-v2-220512101057-dda95b89
How to test your AWS environment from a security point of view. It explains common security issues with AWS and how to pentest for AWS Security issues.]]>

How to test your AWS environment from a security point of view. It explains common security issues with AWS and how to pentest for AWS Security issues.]]>
Thu, 12 May 2022 10:10:56 GMT /slideshow/penetration-testing-aws/251768672 jassics@slideshare.net(jassics) Penetration Testing AWS jassics How to test your AWS environment from a security point of view. It explains common security issues with AWS and how to pentest for AWS Security issues. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/pentesting-aws-v2-220512101057-dda95b89-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> How to test your AWS environment from a security point of view. It explains common security issues with AWS and how to pentest for AWS Security issues.
Penetration Testing AWS from Sanjeev Kumar Jaiswal
]]>
449 0 https://cdn.slidesharecdn.com/ss_thumbnails/pentesting-aws-v2-220512101057-dda95b89-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Cybersecurity Roadmap for Beginners /slideshow/cybersecurity-roadmap-for-beginners/251768551 cybersecurity-roadmap-for-beginners-v2-220512095407-b092d510
Which career, what skills to excel in cybersecurity. Check this out. You will learn what covers cybersecurity, what are the various job domains, and what skills you should learn. I have share books, videos, and other cybersecurity suggestions as well.]]>

Which career, what skills to excel in cybersecurity. Check this out. You will learn what covers cybersecurity, what are the various job domains, and what skills you should learn. I have share books, videos, and other cybersecurity suggestions as well.]]>
Thu, 12 May 2022 09:54:07 GMT /slideshow/cybersecurity-roadmap-for-beginners/251768551 jassics@slideshare.net(jassics) Cybersecurity Roadmap for Beginners jassics Which career, what skills to excel in cybersecurity. Check this out. You will learn what covers cybersecurity, what are the various job domains, and what skills you should learn. I have share books, videos, and other cybersecurity suggestions as well. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/cybersecurity-roadmap-for-beginners-v2-220512095407-b092d510-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Which career, what skills to excel in cybersecurity. Check this out. You will learn what covers cybersecurity, what are the various job domains, and what skills you should learn. I have share books, videos, and other cybersecurity suggestions as well.
Cybersecurity Roadmap for Beginners from Sanjeev Kumar Jaiswal
]]>
3805 0 https://cdn.slidesharecdn.com/ss_thumbnails/cybersecurity-roadmap-for-beginners-v2-220512095407-b092d510-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
How to build career in Cybersecurity /slideshow/how-to-build-career-in-cybersecurity-251768548/251768548 how-to-build-career-in-cybersecurity-220512095359-755f5bc9
How to build a career in cybersecurity. Be it Application Security, Cloud Security, DevSecOps, Penetration Testing what you need to learn and how to prepare yourself for better interview in cybersecurity domain.]]>

How to build a career in cybersecurity. Be it Application Security, Cloud Security, DevSecOps, Penetration Testing what you need to learn and how to prepare yourself for better interview in cybersecurity domain.]]>
Thu, 12 May 2022 09:53:59 GMT /slideshow/how-to-build-career-in-cybersecurity-251768548/251768548 jassics@slideshare.net(jassics) How to build career in Cybersecurity jassics How to build a career in cybersecurity. Be it Application Security, Cloud Security, DevSecOps, Penetration Testing what you need to learn and how to prepare yourself for better interview in cybersecurity domain. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/how-to-build-career-in-cybersecurity-220512095359-755f5bc9-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> How to build a career in cybersecurity. Be it Application Security, Cloud Security, DevSecOps, Penetration Testing what you need to learn and how to prepare yourself for better interview in cybersecurity domain.
How to build career in Cybersecurity from Sanjeev Kumar Jaiswal
]]>
59 0 https://cdn.slidesharecdn.com/ss_thumbnails/how-to-build-career-in-cybersecurity-220512095359-755f5bc9-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Social Engineering Basics /slideshow/social-engineering-basics-251768547/251768547 social-engineering-basics-220512095358-bc4bc6e8
beware of social engineering basics]]>

beware of social engineering basics]]>
Thu, 12 May 2022 09:53:58 GMT /slideshow/social-engineering-basics-251768547/251768547 jassics@slideshare.net(jassics) Social Engineering Basics jassics beware of social engineering basics <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/social-engineering-basics-220512095358-bc4bc6e8-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> beware of social engineering basics
Social Engineering Basics from Sanjeev Kumar Jaiswal
]]>
110 0 https://cdn.slidesharecdn.com/ss_thumbnails/social-engineering-basics-220512095358-bc4bc6e8-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Python3 (boto3) for aws /slideshow/python-sdkboto3-for-aws/230283015 pythonsdkboto3foraws-200315133534
This ppt deals with basics of AWS CLI, Python3(boto3) an AWS SDK and Various Examples of what you can achieve with boto3. ]]>

This ppt deals with basics of AWS CLI, Python3(boto3) an AWS SDK and Various Examples of what you can achieve with boto3. ]]>
Sun, 15 Mar 2020 13:35:34 GMT /slideshow/python-sdkboto3-for-aws/230283015 jassics@slideshare.net(jassics) Python3 (boto3) for aws jassics This ppt deals with basics of AWS CLI, Python3(boto3) an AWS SDK and Various Examples of what you can achieve with boto3. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/pythonsdkboto3foraws-200315133534-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> This ppt deals with basics of AWS CLI, Python3(boto3) an AWS SDK and Various Examples of what you can achieve with boto3.
Python3 (boto3) for aws from Sanjeev Kumar Jaiswal
]]>
980 0 https://cdn.slidesharecdn.com/ss_thumbnails/pythonsdkboto3foraws-200315133534-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Python for web security - beginner /slideshow/python-for-web-security-beginner/205796798 pythonforwebsecurity-v1-191214145200
It was presented in #NullHyd on 14th Dec, 2019 with 4 hours hands-on session. All code has been shared in github repo as well: https://github.com/jassics/python-for-cybersecurity]]>

It was presented in #NullHyd on 14th Dec, 2019 with 4 hours hands-on session. All code has been shared in github repo as well: https://github.com/jassics/python-for-cybersecurity]]>
Sat, 14 Dec 2019 14:52:00 GMT /slideshow/python-for-web-security-beginner/205796798 jassics@slideshare.net(jassics) Python for web security - beginner jassics It was presented in #NullHyd on 14th Dec, 2019 with 4 hours hands-on session. All code has been shared in github repo as well: https://github.com/jassics/python-for-cybersecurity <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/pythonforwebsecurity-v1-191214145200-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> It was presented in #NullHyd on 14th Dec, 2019 with 4 hours hands-on session. All code has been shared in github repo as well: https://github.com/jassics/python-for-cybersecurity
Python for web security - beginner from Sanjeev Kumar Jaiswal
]]>
148 2 https://cdn.slidesharecdn.com/ss_thumbnails/pythonforwebsecurity-v1-191214145200-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Regular expression for everyone /slideshow/regular-expression-for-everyone/55620395 regularexpressionforeveryone-151129113603-lva1-app6891
This presentation covers all the possible basics related to Regular Expression (RegEx) and we have used Perl programming to explain all those practical examples from real world. This presentation is useful for engineering students and IT professionals like web developer, system admin, web security etc. ]]>

This presentation covers all the possible basics related to Regular Expression (RegEx) and we have used Perl programming to explain all those practical examples from real world. This presentation is useful for engineering students and IT professionals like web developer, system admin, web security etc. ]]>
Sun, 29 Nov 2015 11:36:03 GMT /slideshow/regular-expression-for-everyone/55620395 jassics@slideshare.net(jassics) Regular expression for everyone jassics This presentation covers all the possible basics related to Regular Expression (RegEx) and we have used Perl programming to explain all those practical examples from real world. This presentation is useful for engineering students and IT professionals like web developer, system admin, web security etc. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/regularexpressionforeveryone-151129113603-lva1-app6891-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> This presentation covers all the possible basics related to Regular Expression (RegEx) and we have used Perl programming to explain all those practical examples from real world. This presentation is useful for engineering students and IT professionals like web developer, system admin, web security etc.
Regular expression for everyone from Sanjeev Kumar Jaiswal
]]>
658 5 https://cdn.slidesharecdn.com/ss_thumbnails/regularexpressionforeveryone-151129113603-lva1-app6891-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Perl basics for Pentesters /jassics/minimal-perl-basics-for-pentesters minimalperlbasicsforpentesters-150221075638-conversion-gate01
This presentation is for those students and IT professionals who have basic programming knowledge and want to learn Perl basics for Pentesting. We have explained minimal Perl basics which a pentester should know to write,read,modify Perl scripts for Pentesting like data type, comparison operator, loop controls, minimal CPAN modules related to web and networking, perl scripts in Kali and some demo]]>

This presentation is for those students and IT professionals who have basic programming knowledge and want to learn Perl basics for Pentesting. We have explained minimal Perl basics which a pentester should know to write,read,modify Perl scripts for Pentesting like data type, comparison operator, loop controls, minimal CPAN modules related to web and networking, perl scripts in Kali and some demo]]>
Sat, 21 Feb 2015 07:56:38 GMT /jassics/minimal-perl-basics-for-pentesters jassics@slideshare.net(jassics) Perl basics for Pentesters jassics This presentation is for those students and IT professionals who have basic programming knowledge and want to learn Perl basics for Pentesting. We have explained minimal Perl basics which a pentester should know to write,read,modify Perl scripts for Pentesting like data type, comparison operator, loop controls, minimal CPAN modules related to web and networking, perl scripts in Kali and some demo <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/minimalperlbasicsforpentesters-150221075638-conversion-gate01-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> This presentation is for those students and IT professionals who have basic programming knowledge and want to learn Perl basics for Pentesting. We have explained minimal Perl basics which a pentester should know to write,read,modify Perl scripts for Pentesting like data type, comparison operator, loop controls, minimal CPAN modules related to web and networking, perl scripts in Kali and some demo
Perl basics for Pentesters from Sanjeev Kumar Jaiswal
]]>
1014 3 https://cdn.slidesharecdn.com/ss_thumbnails/minimalperlbasicsforpentesters-150221075638-conversion-gate01-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Introduction to Mobile adhoc-network /slideshow/mobile-adhocnetwork/28880883 mobile-adhoc-network-131204062427-phpapp01
]]>

]]>
Wed, 04 Dec 2013 06:24:27 GMT /slideshow/mobile-adhocnetwork/28880883 jassics@slideshare.net(jassics) Introduction to Mobile adhoc-network jassics <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/mobile-adhoc-network-131204062427-phpapp01-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br>
Introduction to Mobile adhoc-network from Sanjeev Kumar Jaiswal
]]>
2370 2 https://cdn.slidesharecdn.com/ss_thumbnails/mobile-adhoc-network-131204062427-phpapp01-thumbnail.jpg?width=120&height=120&fit=bounds document Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Web intelligence-future of next generation web /slideshow/web-intelligence-28706972/28706972 webintelligence-131128063558-phpapp01
Web intelligence is the area of study and research of the application of artificial intelligence and information technology on the web in order to create the next generation of products, services and frameworks based on the internet. This presentation was presented by Nijil Y from SEO, CUSAT]]>

Web intelligence is the area of study and research of the application of artificial intelligence and information technology on the web in order to create the next generation of products, services and frameworks based on the internet. This presentation was presented by Nijil Y from SEO, CUSAT]]>
Thu, 28 Nov 2013 06:35:58 GMT /slideshow/web-intelligence-28706972/28706972 jassics@slideshare.net(jassics) Web intelligence-future of next generation web jassics Web intelligence is the area of study and research of the application of artificial intelligence and information technology on the web in order to create the next generation of products, services and frameworks based on the internet. This presentation was presented by Nijil Y from SEO, CUSAT <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/webintelligence-131128063558-phpapp01-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Web intelligence is the area of study and research of the application of artificial intelligence and information technology on the web in order to create the next generation of products, services and frameworks based on the internet. This presentation was presented by Nijil Y from SEO, CUSAT
Web intelligence-future of next generation web from Sanjeev Kumar Jaiswal
]]>
16170 2 https://cdn.slidesharecdn.com/ss_thumbnails/webintelligence-131128063558-phpapp01-thumbnail.jpg?width=120&height=120&fit=bounds document Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Presentation on Graphical password-technology to make system more secured /slideshow/graphical-password-28566987/28566987 graphicalpassword-131123234253-phpapp02
A graphical password is an authentication system that works by having the user select from images, in a specific order, presented in a graphical user interface (GUI). Graphical passwords may offer better security than text-based passwords because many people, in an attempt to memorize text-based passwords, use plain words]]>

A graphical password is an authentication system that works by having the user select from images, in a specific order, presented in a graphical user interface (GUI). Graphical passwords may offer better security than text-based passwords because many people, in an attempt to memorize text-based passwords, use plain words]]>
Sat, 23 Nov 2013 23:42:53 GMT /slideshow/graphical-password-28566987/28566987 jassics@slideshare.net(jassics) Presentation on Graphical password-technology to make system more secured jassics A graphical password is an authentication system that works by having the user select from images, in a specific order, presented in a graphical user interface (GUI). Graphical passwords may offer better security than text-based passwords because many people, in an attempt to memorize text-based passwords, use plain words <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/graphicalpassword-131123234253-phpapp02-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> A graphical password is an authentication system that works by having the user select from images, in a specific order, presented in a graphical user interface (GUI). Graphical passwords may offer better security than text-based passwords because many people, in an attempt to memorize text-based passwords, use plain words
Presentation on Graphical password-technology to make system more secured from Sanjeev Kumar Jaiswal
]]>
3828 2 https://cdn.slidesharecdn.com/ss_thumbnails/graphicalpassword-131123234253-phpapp02-thumbnail.jpg?width=120&height=120&fit=bounds document Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Basics of GnuPG (gpg) command in linux /slideshow/basics-of-gnu-pg-gpg-command-in-linux/28196245 basicsofgnupggpgcommandinlinux-131113060746-phpapp01
GnuPG, popularly knowns as gpg is an alternative to PGP module and mainly used for encryption and decryption of keys while sending mail or data. This presentation shows various useful gpg commands that you can use in day-to-day life.]]>

GnuPG, popularly knowns as gpg is an alternative to PGP module and mainly used for encryption and decryption of keys while sending mail or data. This presentation shows various useful gpg commands that you can use in day-to-day life.]]>
Wed, 13 Nov 2013 06:07:46 GMT /slideshow/basics-of-gnu-pg-gpg-command-in-linux/28196245 jassics@slideshare.net(jassics) Basics of GnuPG (gpg) command in linux jassics GnuPG, popularly knowns as gpg is an alternative to PGP module and mainly used for encryption and decryption of keys while sending mail or data. This presentation shows various useful gpg commands that you can use in day-to-day life. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/basicsofgnupggpgcommandinlinux-131113060746-phpapp01-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> GnuPG, popularly knowns as gpg is an alternative to PGP module and mainly used for encryption and decryption of keys while sending mail or data. This presentation shows various useful gpg commands that you can use in day-to-day life.
Basics of GnuPG (gpg) command in linux from Sanjeev Kumar Jaiswal
]]>
3868 2 https://cdn.slidesharecdn.com/ss_thumbnails/basicsofgnupggpgcommandinlinux-131113060746-phpapp01-thumbnail.jpg?width=120&height=120&fit=bounds document White http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Presentation on Instant page speed optimization /slideshow/instant-page-speed-optimization/27564968 instantpagespeedoptimization-131025065549-phpapp01
This presentation is just the showcase for the book that I authored with PACKT publication. This presentation shows what all tiips/techniques we have covered to make our website more optimized for faster response using existing tools, codes and methods.]]>

This presentation is just the showcase for the book that I authored with PACKT publication. This presentation shows what all tiips/techniques we have covered to make our website more optimized for faster response using existing tools, codes and methods.]]>
Fri, 25 Oct 2013 06:55:49 GMT /slideshow/instant-page-speed-optimization/27564968 jassics@slideshare.net(jassics) Presentation on Instant page speed optimization jassics This presentation is just the showcase for the book that I authored with PACKT publication. This presentation shows what all tiips/techniques we have covered to make our website more optimized for faster response using existing tools, codes and methods. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/instantpagespeedoptimization-131025065549-phpapp01-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> This presentation is just the showcase for the book that I authored with PACKT publication. This presentation shows what all tiips/techniques we have covered to make our website more optimized for faster response using existing tools, codes and methods.
Presentation on Instant page speed optimization from Sanjeev Kumar Jaiswal
]]>
5561 3 https://cdn.slidesharecdn.com/ss_thumbnails/instantpagespeedoptimization-131025065549-phpapp01-thumbnail.jpg?width=120&height=120&fit=bounds presentation White http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Basics of JSON (JavaScript Object Notation) with examples /jassics/minimal-json-that-web-developers-should-know minimal-20json-20that-20web-20developers-20should-20know-131021001540-phpapp02
This presentation deals with every possible topics under JSON (JavaScript Object Notation) which every web developers should know. It is presented by Rajasekhar who works at United Online as a Web Developer ]]>

This presentation deals with every possible topics under JSON (JavaScript Object Notation) which every web developers should know. It is presented by Rajasekhar who works at United Online as a Web Developer ]]>
Mon, 21 Oct 2013 00:15:40 GMT /jassics/minimal-json-that-web-developers-should-know jassics@slideshare.net(jassics) Basics of JSON (JavaScript Object Notation) with examples jassics This presentation deals with every possible topics under JSON (JavaScript Object Notation) which every web developers should know. It is presented by Rajasekhar who works at United Online as a Web Developer <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/minimal-20json-20that-20web-20developers-20should-20know-131021001540-phpapp02-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> This presentation deals with every possible topics under JSON (JavaScript Object Notation) which every web developers should know. It is presented by Rajasekhar who works at United Online as a Web Developer
Basics of JSON (JavaScript Object Notation) with examples from Sanjeev Kumar Jaiswal
]]>
7113 2 https://cdn.slidesharecdn.com/ss_thumbnails/minimal-20json-20that-20web-20developers-20should-20know-131021001540-phpapp02-thumbnail.jpg?width=120&height=120&fit=bounds document White http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Basics of Normalization with Examples /jassics/basics-of-normalization-with-examples normalizationresolved-121017051523-phpapp02
It basically deals with following questions: what is normalization? What are the different types of normalization? what is the need of normalization? What are the problems we can face if we proceed without normalization? What are the advantages of normalization?]]>

It basically deals with following questions: what is normalization? What are the different types of normalization? what is the need of normalization? What are the problems we can face if we proceed without normalization? What are the advantages of normalization?]]>
Wed, 17 Oct 2012 05:15:22 GMT /jassics/basics-of-normalization-with-examples jassics@slideshare.net(jassics) Basics of Normalization with Examples jassics It basically deals with following questions: what is normalization? What are the different types of normalization? what is the need of normalization? What are the problems we can face if we proceed without normalization? What are the advantages of normalization? <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/normalizationresolved-121017051523-phpapp02-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> It basically deals with following questions: what is normalization? What are the different types of normalization? what is the need of normalization? What are the problems we can face if we proceed without normalization? What are the advantages of normalization?
Basics of Normalization with Examples from Sanjeev Kumar Jaiswal
]]>
82471 6 https://cdn.slidesharecdn.com/ss_thumbnails/normalizationresolved-121017051523-phpapp02-thumbnail.jpg?width=120&height=120&fit=bounds document Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
[Tips] how to use google search efficiently /slideshow/tips-how-to-use-google-search-efficiently/14728731 tipshowtousegooglesearchefficiently-121015014407-phpapp01
This article can be considered a white paper on How to use Google Search Engine efficiently with minimal effort. We have tried to explain all basic terms and tips to use various hidden features of Google Search Engine with possible screenshots. Author: Sanjeev Kumar Jaiswal from Alien Coders Team http://www.aliencoders.com ]]>

This article can be considered a white paper on How to use Google Search Engine efficiently with minimal effort. We have tried to explain all basic terms and tips to use various hidden features of Google Search Engine with possible screenshots. Author: Sanjeev Kumar Jaiswal from Alien Coders Team http://www.aliencoders.com ]]>
Mon, 15 Oct 2012 01:44:05 GMT /slideshow/tips-how-to-use-google-search-efficiently/14728731 jassics@slideshare.net(jassics) [Tips] how to use google search efficiently jassics This article can be considered a white paper on How to use Google Search Engine efficiently with minimal effort. We have tried to explain all basic terms and tips to use various hidden features of Google Search Engine with possible screenshots. Author: Sanjeev Kumar Jaiswal from Alien Coders Team http://www.aliencoders.com <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/tipshowtousegooglesearchefficiently-121015014407-phpapp01-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> This article can be considered a white paper on How to use Google Search Engine efficiently with minimal effort. We have tried to explain all basic terms and tips to use various hidden features of Google Search Engine with possible screenshots. Author: Sanjeev Kumar Jaiswal from Alien Coders Team http://www.aliencoders.com
[Tips] how to use google search efficiently from Sanjeev Kumar Jaiswal
]]>
3199 2 https://cdn.slidesharecdn.com/ss_thumbnails/tipshowtousegooglesearchefficiently-121015014407-phpapp01-thumbnail.jpg?width=120&height=120&fit=bounds document 000000 http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
White paper on Spool space in teradata /slideshow/white-paper-on-spool-space-in-teradata/13667657 spoolspaceinteradata-120717074041-phpapp02
This White Paper on Spool Space in Teradata was presented by Nazir Iqbal at Wipro where he works at present. TERADATA Spool Space is unused Perm Space that it used for running queries.]]>

This White Paper on Spool Space in Teradata was presented by Nazir Iqbal at Wipro where he works at present. TERADATA Spool Space is unused Perm Space that it used for running queries.]]>
Tue, 17 Jul 2012 07:40:39 GMT /slideshow/white-paper-on-spool-space-in-teradata/13667657 jassics@slideshare.net(jassics) White paper on Spool space in teradata jassics This White Paper on Spool Space in Teradata was presented by Nazir Iqbal at Wipro where he works at present. TERADATA Spool Space is unused Perm Space that it used for running queries. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/spoolspaceinteradata-120717074041-phpapp02-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> This White Paper on Spool Space in Teradata was presented by Nazir Iqbal at Wipro where he works at present. TERADATA Spool Space is unused Perm Space that it used for running queries.
White paper on Spool space in teradata from Sanjeev Kumar Jaiswal
]]>
3966 4 https://cdn.slidesharecdn.com/ss_thumbnails/spoolspaceinteradata-120717074041-phpapp02-thumbnail.jpg?width=120&height=120&fit=bounds document Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
https://cdn.slidesharecdn.com/profile-photo-jassics-48x48.jpg?cb=1724863905 website development, programming, web security, Perl, Linux, Networking www.aliencoders.org/ https://cdn.slidesharecdn.com/ss_thumbnails/cloud-security-101-2024-240828170705-d67833fc-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/presentation-on-cloud-security-101-2024/271391215 Presentation on Cloud ... https://cdn.slidesharecdn.com/ss_thumbnails/threat-modeling-hands-on-220512110148-b48ad6f0-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/threat-modeling-basics-with-examples/251769051 Threat Modeling Basics... https://cdn.slidesharecdn.com/ss_thumbnails/cloud-security-101-220512101107-5c27a541-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/cloud-security-101/251768673 Cloud Security 101