ºÝºÝߣshows by User: nickgsuperstar / http://www.slideshare.net/images/logo.gif ºÝºÝߣshows by User: nickgsuperstar / Fri, 27 Sep 2013 17:33:50 GMT ºÝºÝߣShare feed for ºÝºÝߣshows by User: nickgsuperstar Making operations visible - devopsdays tokyo 2013 /slideshow/making-operations-visible-dev-opsdays-tokyo-2013key/26632342 makingoperationsvisible-devopsdaystokyo2013-130927173350-phpapp02
]]>

]]>
Fri, 27 Sep 2013 17:33:50 GMT /slideshow/making-operations-visible-dev-opsdays-tokyo-2013key/26632342 nickgsuperstar@slideshare.net(nickgsuperstar) Making operations visible - devopsdays tokyo 2013 nickgsuperstar <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/makingoperationsvisible-devopsdaystokyo2013-130927173350-phpapp02-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br>
Making operations visible - devopsdays tokyo 2013 from Nick Galbreath
]]>
13759 8 https://cdn.slidesharecdn.com/ss_thumbnails/makingoperationsvisible-devopsdaystokyo2013-130927173350-phpapp02-thumbnail.jpg?width=120&height=120&fit=bounds presentation White http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 1
Faster Secure Software Development with Continuous Deployment - PH Days 2013 /slideshow/fixing-security-by-fixing-development-ph-days-2013/21820733 fixingsecuritybyfixingdevelopment-phdays2013-130524025042-phpapp01
]]>

]]>
Fri, 24 May 2013 02:50:42 GMT /slideshow/fixing-security-by-fixing-development-ph-days-2013/21820733 nickgsuperstar@slideshare.net(nickgsuperstar) Faster Secure Software Development with Continuous Deployment - PH Days 2013 nickgsuperstar <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/fixingsecuritybyfixingdevelopment-phdays2013-130524025042-phpapp01-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br>
Faster Secure Software Development with Continuous Deployment - PH Days 2013 from Nick Galbreath
]]>
1459 4 https://cdn.slidesharecdn.com/ss_thumbnails/fixingsecuritybyfixingdevelopment-phdays2013-130524025042-phpapp01-thumbnail.jpg?width=120&height=120&fit=bounds presentation White http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 1
Fixing security by fixing software development /slideshow/fixing-security-by-fixing-software-development/20829210 fixingsecuritybyfixingsoftwaredevelopment-130508190442-phpapp01
Fixing Security by Fixing Software Development Using Continuous Deployment Do you have an effective release cycle? Is your process long and archaic? Long release cycle are typically based on assumptions we haven't seen since the 1980s and require very mature organizations to implement successfully. They can also disenfranchise developers from caring or even knowing about security or operational issues. Attend this session to learn more about an alternative approach to managing deployments through Continuous Deployment, otherwise known as Continuous Delivery. Find out how small, but frequent changes to the production environment can transform an organization’s development process to truly integrate security. Learn how to get started with continuous deployment and what tools and process are needed to make implementation within your organization a (security) success. ]]>

Fixing Security by Fixing Software Development Using Continuous Deployment Do you have an effective release cycle? Is your process long and archaic? Long release cycle are typically based on assumptions we haven't seen since the 1980s and require very mature organizations to implement successfully. They can also disenfranchise developers from caring or even knowing about security or operational issues. Attend this session to learn more about an alternative approach to managing deployments through Continuous Deployment, otherwise known as Continuous Delivery. Find out how small, but frequent changes to the production environment can transform an organization’s development process to truly integrate security. Learn how to get started with continuous deployment and what tools and process are needed to make implementation within your organization a (security) success. ]]>
Wed, 08 May 2013 19:04:42 GMT /slideshow/fixing-security-by-fixing-software-development/20829210 nickgsuperstar@slideshare.net(nickgsuperstar) Fixing security by fixing software development nickgsuperstar Fixing Security by Fixing Software Development Using Continuous Deployment Do you have an effective release cycle? Is your process long and archaic? Long release cycle are typically based on assumptions we haven't seen since the 1980s and require very mature organizations to implement successfully. They can also disenfranchise developers from caring or even knowing about security or operational issues. Attend this session to learn more about an alternative approach to managing deployments through Continuous Deployment, otherwise known as Continuous Delivery. Find out how small, but frequent changes to the production environment can transform an organization’s development process to truly integrate security. Learn how to get started with continuous deployment and what tools and process are needed to make implementation within your organization a (security) success. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/fixingsecuritybyfixingsoftwaredevelopment-130508190442-phpapp01-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Fixing Security by Fixing Software Development Using Continuous Deployment Do you have an effective release cycle? Is your process long and archaic? Long release cycle are typically based on assumptions we haven&#39;t seen since the 1980s and require very mature organizations to implement successfully. They can also disenfranchise developers from caring or even knowing about security or operational issues. Attend this session to learn more about an alternative approach to managing deployments through Continuous Deployment, otherwise known as Continuous Delivery. Find out how small, but frequent changes to the production environment can transform an organization’s development process to truly integrate security. Learn how to get started with continuous deployment and what tools and process are needed to make implementation within your organization a (security) success.
Fixing security by fixing software development from Nick Galbreath
]]>
5750 3 https://cdn.slidesharecdn.com/ss_thumbnails/fixingsecuritybyfixingsoftwaredevelopment-130508190442-phpapp01-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 1
DevOpsDays Austin 2013 Reading List /slideshow/dev-opsdays-austin-2013-reading-list/20796020 devopsdaysaustin2013readinglist-130508064354-phpapp02
Books mentioned by speakers at DevOpsDays Austin 2013]]>

Books mentioned by speakers at DevOpsDays Austin 2013]]>
Wed, 08 May 2013 06:43:54 GMT /slideshow/dev-opsdays-austin-2013-reading-list/20796020 nickgsuperstar@slideshare.net(nickgsuperstar) DevOpsDays Austin 2013 Reading List nickgsuperstar Books mentioned by speakers at DevOpsDays Austin 2013 <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/devopsdaysaustin2013readinglist-130508064354-phpapp02-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Books mentioned by speakers at DevOpsDays Austin 2013
DevOpsDays Austin 2013 Reading List from Nick Galbreath
]]>
1004 5 https://cdn.slidesharecdn.com/ss_thumbnails/devopsdaysaustin2013readinglist-130508064354-phpapp02-thumbnail.jpg?width=120&height=120&fit=bounds presentation White http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 1
Care and Feeding of Large Scale Graphite Installations - DevOpsDays Austin 2013 /slideshow/graphite-20302803/20302803 graphite-130501004222-phpapp02
Tip and tricks of using and scaling graphite. First presented at DevOpsDays Austin Texas 2013-05-01]]>

Tip and tricks of using and scaling graphite. First presented at DevOpsDays Austin Texas 2013-05-01]]>
Wed, 01 May 2013 00:42:22 GMT /slideshow/graphite-20302803/20302803 nickgsuperstar@slideshare.net(nickgsuperstar) Care and Feeding of Large Scale Graphite Installations - DevOpsDays Austin 2013 nickgsuperstar Tip and tricks of using and scaling graphite. First presented at DevOpsDays Austin Texas 2013-05-01 <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/graphite-130501004222-phpapp02-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Tip and tricks of using and scaling graphite. First presented at DevOpsDays Austin Texas 2013-05-01
Care and Feeding of Large Scale Graphite Installations - DevOpsDays Austin 2013 from Nick Galbreath
]]>
2462 3 https://cdn.slidesharecdn.com/ss_thumbnails/graphite-130501004222-phpapp02-thumbnail.jpg?width=120&height=120&fit=bounds presentation White http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 1
SQL-RISC: New Directions in SQLi Prevention - RSA USA 2013 /slideshow/sqlrisc-new-directions-in-sqli-prevention/16746425 rsa2013-sqlrisc-130225014750-phpapp02
What if we could reduce SQLi attacks in your application by 90%? WIth little to no changes in your application, with no new hardware or firewalls? First presentated at RSA Conference USA, 2013-02-27]]>

What if we could reduce SQLi attacks in your application by 90%? WIth little to no changes in your application, with no new hardware or firewalls? First presentated at RSA Conference USA, 2013-02-27]]>
Mon, 25 Feb 2013 01:47:50 GMT /slideshow/sqlrisc-new-directions-in-sqli-prevention/16746425 nickgsuperstar@slideshare.net(nickgsuperstar) SQL-RISC: New Directions in SQLi Prevention - RSA USA 2013 nickgsuperstar What if we could reduce SQLi attacks in your application by 90%? WIth little to no changes in your application, with no new hardware or firewalls? First presentated at RSA Conference USA, 2013-02-27 <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/rsa2013-sqlrisc-130225014750-phpapp02-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> What if we could reduce SQLi attacks in your application by 90%? WIth little to no changes in your application, with no new hardware or firewalls? First presentated at RSA Conference USA, 2013-02-27
SQL-RISC: New Directions in SQLi Prevention - RSA USA 2013 from Nick Galbreath
]]>
1737 6 https://cdn.slidesharecdn.com/ss_thumbnails/rsa2013-sqlrisc-130225014750-phpapp02-thumbnail.jpg?width=120&height=120&fit=bounds presentation White http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 1
Rebooting Software Development - OWASP AppSecUSA /slideshow/rebooting-software-development-owaspusa/14883192 owaspusa-20121025-reboot-121025091404-phpapp01
If we are ever going to get ahead of the whack-a-mole security vulnerability game, we, as security professionals need to start getting involved more in the development of software. Let's review the origins of the traditional software development, and what assumptions are made. Then we'll review if those assumptions still hold for modern web applications, and what problems they cause, especially for security. Continuous deployment helps address these problems and allows for faster, more secure development. It's more than just "pushing code a lot", when done correctly it can be transformative to the organization. We'll discuss what continuous deployment is, how to get started, and what components are needed to make it successful, and secure. ]]>

If we are ever going to get ahead of the whack-a-mole security vulnerability game, we, as security professionals need to start getting involved more in the development of software. Let's review the origins of the traditional software development, and what assumptions are made. Then we'll review if those assumptions still hold for modern web applications, and what problems they cause, especially for security. Continuous deployment helps address these problems and allows for faster, more secure development. It's more than just "pushing code a lot", when done correctly it can be transformative to the organization. We'll discuss what continuous deployment is, how to get started, and what components are needed to make it successful, and secure. ]]>
Thu, 25 Oct 2012 09:14:01 GMT /slideshow/rebooting-software-development-owaspusa/14883192 nickgsuperstar@slideshare.net(nickgsuperstar) Rebooting Software Development - OWASP AppSecUSA nickgsuperstar If we are ever going to get ahead of the whack-a-mole security vulnerability game, we, as security professionals need to start getting involved more in the development of software. Let's review the origins of the traditional software development, and what assumptions are made. Then we'll review if those assumptions still hold for modern web applications, and what problems they cause, especially for security. Continuous deployment helps address these problems and allows for faster, more secure development. It's more than just "pushing code a lot", when done correctly it can be transformative to the organization. We'll discuss what continuous deployment is, how to get started, and what components are needed to make it successful, and secure. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/owaspusa-20121025-reboot-121025091404-phpapp01-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> If we are ever going to get ahead of the whack-a-mole security vulnerability game, we, as security professionals need to start getting involved more in the development of software. Let&#39;s review the origins of the traditional software development, and what assumptions are made. Then we&#39;ll review if those assumptions still hold for modern web applications, and what problems they cause, especially for security. Continuous deployment helps address these problems and allows for faster, more secure development. It&#39;s more than just &quot;pushing code a lot&quot;, when done correctly it can be transformative to the organization. We&#39;ll discuss what continuous deployment is, how to get started, and what components are needed to make it successful, and secure.
Rebooting Software Development - OWASP AppSecUSA from Nick Galbreath
]]>
1547 2 https://cdn.slidesharecdn.com/ss_thumbnails/owaspusa-20121025-reboot-121025091404-phpapp01-thumbnail.jpg?width=120&height=120&fit=bounds presentation White http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 1
libinjection and sqli obfuscation, presented at OWASP NYC /slideshow/libinjection-and-sqli-obfuscation-presented-at-owsap-ny/14363910 libinjectionandsqliobfuscation-120920161008-phpapp01
SQL that isn't caught by WAFs but also isn't used (yet) by attackers! Why detecting SQLi is good, and why doing it with regular expressions is hard. And re-introducing libinjections which is a new way of detecting SQLi attacks. This is a mashup of my Black Hat USA 2012 and DEFCON 20 talks, refreshed and updated.]]>

SQL that isn't caught by WAFs but also isn't used (yet) by attackers! Why detecting SQLi is good, and why doing it with regular expressions is hard. And re-introducing libinjections which is a new way of detecting SQLi attacks. This is a mashup of my Black Hat USA 2012 and DEFCON 20 talks, refreshed and updated.]]>
Thu, 20 Sep 2012 16:10:07 GMT /slideshow/libinjection-and-sqli-obfuscation-presented-at-owsap-ny/14363910 nickgsuperstar@slideshare.net(nickgsuperstar) libinjection and sqli obfuscation, presented at OWASP NYC nickgsuperstar SQL that isn't caught by WAFs but also isn't used (yet) by attackers! Why detecting SQLi is good, and why doing it with regular expressions is hard. And re-introducing libinjections which is a new way of detecting SQLi attacks. This is a mashup of my Black Hat USA 2012 and DEFCON 20 talks, refreshed and updated. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/libinjectionandsqliobfuscation-120920161008-phpapp01-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> SQL that isn&#39;t caught by WAFs but also isn&#39;t used (yet) by attackers! Why detecting SQLi is good, and why doing it with regular expressions is hard. And re-introducing libinjections which is a new way of detecting SQLi attacks. This is a mashup of my Black Hat USA 2012 and DEFCON 20 talks, refreshed and updated.
libinjection and sqli obfuscation, presented at OWASP NYC from Nick Galbreath
]]>
3038 3 https://cdn.slidesharecdn.com/ss_thumbnails/libinjectionandsqliobfuscation-120920161008-phpapp01-thumbnail.jpg?width=120&height=120&fit=bounds presentation White http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 1
libinjection: new technique in detecting SQLi attacks, iSEC Partners Open Forum /slideshow/libinjection-isecpartners/14195023 libinjection-isecpartners-120906160641-phpapp02
]]>

]]>
Thu, 06 Sep 2012 16:06:39 GMT /slideshow/libinjection-isecpartners/14195023 nickgsuperstar@slideshare.net(nickgsuperstar) libinjection: new technique in detecting SQLi attacks, iSEC Partners Open Forum nickgsuperstar <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/libinjection-isecpartners-120906160641-phpapp02-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br>
libinjection: new technique in detecting SQLi attacks, iSEC Partners Open Forum from Nick Galbreath
]]>
13756 4 https://cdn.slidesharecdn.com/ss_thumbnails/libinjection-isecpartners-120906160641-phpapp02-thumbnail.jpg?width=120&height=120&fit=bounds presentation White http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 1
Continuous Deployment - The New #1 Security Feature, from BSildesLA 2012 /slideshow/continuous-deployment-the-new-1-security-feature/13993318 bsidesla20120814-continuousdeployment-120816184859-phpapp01
First presented at Security BSidesLA, Hermosa Beach, California, August 16, 2012 Continuous deployment is characters by a small and frequent changes to production. Find out why it's my #1 security feature. It's not just about pushing fast!]]>

First presented at Security BSidesLA, Hermosa Beach, California, August 16, 2012 Continuous deployment is characters by a small and frequent changes to production. Find out why it's my #1 security feature. It's not just about pushing fast!]]>
Thu, 16 Aug 2012 18:48:59 GMT /slideshow/continuous-deployment-the-new-1-security-feature/13993318 nickgsuperstar@slideshare.net(nickgsuperstar) Continuous Deployment - The New #1 Security Feature, from BSildesLA 2012 nickgsuperstar First presented at Security BSidesLA, Hermosa Beach, California, August 16, 2012 Continuous deployment is characters by a small and frequent changes to production. Find out why it's my #1 security feature. It's not just about pushing fast! <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/bsidesla20120814-continuousdeployment-120816184859-phpapp01-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> First presented at Security BSidesLA, Hermosa Beach, California, August 16, 2012 Continuous deployment is characters by a small and frequent changes to production. Find out why it&#39;s my #1 security feature. It&#39;s not just about pushing fast!
Continuous Deployment - The New #1 Security Feature, from BSildesLA 2012 from Nick Galbreath
]]>
1813 3 https://cdn.slidesharecdn.com/ss_thumbnails/bsidesla20120814-continuousdeployment-120816184859-phpapp01-thumbnail.jpg?width=120&height=120&fit=bounds presentation White http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 1
Time tested php with libtimemachine /slideshow/time-tested-php-with-libtimemachine/13697150 timetestedphp-120719132236-phpapp01
Dynamically adjust system time used by PHP with libtimemachine for advanced testing.]]>

Dynamically adjust system time used by PHP with libtimemachine for advanced testing.]]>
Thu, 19 Jul 2012 13:22:33 GMT /slideshow/time-tested-php-with-libtimemachine/13697150 nickgsuperstar@slideshare.net(nickgsuperstar) Time tested php with libtimemachine nickgsuperstar Dynamically adjust system time used by PHP with libtimemachine for advanced testing. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/timetestedphp-120719132236-phpapp01-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Dynamically adjust system time used by PHP with libtimemachine for advanced testing.
Time tested php with libtimemachine from Nick Galbreath
]]>
1655 4 https://cdn.slidesharecdn.com/ss_thumbnails/timetestedphp-120719132236-phpapp01-thumbnail.jpg?width=120&height=120&fit=bounds presentation White http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 1
libinjection: a C library for SQLi detection, from Black Hat USA 2012 /slideshow/libinjection-blackhatusa2012/13621872 libinjection-blackhatusa2012-120712175704-phpapp01
libinjection: a c library for SQLi detection and generation through lexical analysis of real world attacks]]>

libinjection: a c library for SQLi detection and generation through lexical analysis of real world attacks]]>
Thu, 12 Jul 2012 17:57:02 GMT /slideshow/libinjection-blackhatusa2012/13621872 nickgsuperstar@slideshare.net(nickgsuperstar) libinjection: a C library for SQLi detection, from Black Hat USA 2012 nickgsuperstar libinjection: a c library for SQLi detection and generation through lexical analysis of real world attacks <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/libinjection-blackhatusa2012-120712175704-phpapp01-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> libinjection: a c library for SQLi detection and generation through lexical analysis of real world attacks
libinjection: a C library for SQLi detection, from Black Hat USA 2012 from Nick Galbreath
]]>
2787 7 https://cdn.slidesharecdn.com/ss_thumbnails/libinjection-blackhatusa2012-120712175704-phpapp01-thumbnail.jpg?width=120&height=120&fit=bounds presentation White http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 1
New techniques in sql obfuscation, from DEFCON 20 /slideshow/new-techniques-in-sql-obfuscation/13595463 newtechniquesinsqlobfuscation-120710095604-phpapp02
New techniques in sql obfuscation or SQL never before used in SQLi. Presented at DefCon 20]]>

New techniques in sql obfuscation or SQL never before used in SQLi. Presented at DefCon 20]]>
Tue, 10 Jul 2012 09:56:02 GMT /slideshow/new-techniques-in-sql-obfuscation/13595463 nickgsuperstar@slideshare.net(nickgsuperstar) New techniques in sql obfuscation, from DEFCON 20 nickgsuperstar New techniques in sql obfuscation or SQL never before used in SQLi. Presented at DefCon 20 <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/newtechniquesinsqlobfuscation-120710095604-phpapp02-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> New techniques in sql obfuscation or SQL never before used in SQLi. Presented at DefCon 20
New techniques in sql obfuscation, from DEFCON 20 from Nick Galbreath
]]>
4321 6 https://cdn.slidesharecdn.com/ss_thumbnails/newtechniquesinsqlobfuscation-120710095604-phpapp02-thumbnail.jpg?width=120&height=120&fit=bounds presentation White http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 1
Data Driven Security, from Gartner Security Summit 2012 /slideshow/data-driven-security/13294968 etsygartnerpptjune2012-120612110150-phpapp02
]]>

]]>
Tue, 12 Jun 2012 11:01:49 GMT /slideshow/data-driven-security/13294968 nickgsuperstar@slideshare.net(nickgsuperstar) Data Driven Security, from Gartner Security Summit 2012 nickgsuperstar <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/etsygartnerpptjune2012-120612110150-phpapp02-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br>
Data Driven Security, from Gartner Security Summit 2012 from Nick Galbreath
]]>
4117 5 https://cdn.slidesharecdn.com/ss_thumbnails/etsygartnerpptjune2012-120612110150-phpapp02-thumbnail.jpg?width=120&height=120&fit=bounds presentation White http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 1
ºÝºÝߣ show font sampler, black on white /slideshow/slide-show-font-sampler-black-on-white/13089372 slideshowfontsamplerbow-120526184832-phpapp01
How do fonts look when uploaded onto slideshare when the presentation is of various sides? How does it look on a washed-out projector? For plain text? For computer-code? This presentation provides a number of sans-serif and monospace fonts to help answer these questions.]]>

How do fonts look when uploaded onto slideshare when the presentation is of various sides? How does it look on a washed-out projector? For plain text? For computer-code? This presentation provides a number of sans-serif and monospace fonts to help answer these questions.]]>
Sat, 26 May 2012 18:48:29 GMT /slideshow/slide-show-font-sampler-black-on-white/13089372 nickgsuperstar@slideshare.net(nickgsuperstar) ºÝºÝߣ show font sampler, black on white nickgsuperstar How do fonts look when uploaded onto slideshare when the presentation is of various sides? How does it look on a washed-out projector? For plain text? For computer-code? This presentation provides a number of sans-serif and monospace fonts to help answer these questions. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/slideshowfontsamplerbow-120526184832-phpapp01-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> How do fonts look when uploaded onto slideshare when the presentation is of various sides? How does it look on a washed-out projector? For plain text? For computer-code? This presentation provides a number of sans-serif and monospace fonts to help answer these questions.
ºÝºÝߣ show font sampler, black on white from Nick Galbreath
]]>
1291 3 https://cdn.slidesharecdn.com/ss_thumbnails/slideshowfontsamplerbow-120526184832-phpapp01-thumbnail.jpg?width=120&height=120&fit=bounds presentation White http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 1
Fraud Engineering, from Merchant Risk Council Annual Meeting 2012 /slideshow/fraud-engineering/12791464 mrc2012generalconf-120503155011-phpapp02
MRC ]]>

MRC ]]>
Thu, 03 May 2012 15:50:10 GMT /slideshow/fraud-engineering/12791464 nickgsuperstar@slideshare.net(nickgsuperstar) Fraud Engineering, from Merchant Risk Council Annual Meeting 2012 nickgsuperstar MRC <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/mrc2012generalconf-120503155011-phpapp02-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> MRC
Fraud Engineering, from Merchant Risk Council Annual Meeting 2012 from Nick Galbreath
]]>
2076 3 https://cdn.slidesharecdn.com/ss_thumbnails/mrc2012generalconf-120503155011-phpapp02-thumbnail.jpg?width=120&height=120&fit=bounds presentation White http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 1
Rate Limiting at Scale, from SANS AppSec Las Vegas 2012 /slideshow/rate-limits-at-scale-sans-appsec-las-vegas/12763954 ratelimitssansappseclasvegas2012-120501182340-phpapp02
Rate Limits at Scale SANS AppSec Las Vegas. Rate Limit Everything All the time using a quantized time system with Memcache or Redis. Use this protect resources or discover anomalies. ]]>

Rate Limits at Scale SANS AppSec Las Vegas. Rate Limit Everything All the time using a quantized time system with Memcache or Redis. Use this protect resources or discover anomalies. ]]>
Tue, 01 May 2012 18:23:37 GMT /slideshow/rate-limits-at-scale-sans-appsec-las-vegas/12763954 nickgsuperstar@slideshare.net(nickgsuperstar) Rate Limiting at Scale, from SANS AppSec Las Vegas 2012 nickgsuperstar Rate Limits at Scale SANS AppSec Las Vegas. Rate Limit Everything All the time using a quantized time system with Memcache or Redis. Use this protect resources or discover anomalies. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/ratelimitssansappseclasvegas2012-120501182340-phpapp02-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Rate Limits at Scale SANS AppSec Las Vegas. Rate Limit Everything All the time using a quantized time system with Memcache or Redis. Use this protect resources or discover anomalies.
Rate Limiting at Scale, from SANS AppSec Las Vegas 2012 from Nick Galbreath
]]>
1357 66 https://cdn.slidesharecdn.com/ss_thumbnails/ratelimitssansappseclasvegas2012-120501182340-phpapp02-thumbnail.jpg?width=120&height=120&fit=bounds presentation White http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 1
DevOpsSec: Appling DevOps Principles to Security, DevOpsDays Austin 2012 /slideshow/devopssec-apply-devops-principles-to-security/12516606 devopdaysaustin2012-120412114853-phpapp02
From DevOpsDays Austin 2012. Video: http://www.ustream.tv/recorded/21568549 ]]>

From DevOpsDays Austin 2012. Video: http://www.ustream.tv/recorded/21568549 ]]>
Thu, 12 Apr 2012 11:48:51 GMT /slideshow/devopssec-apply-devops-principles-to-security/12516606 nickgsuperstar@slideshare.net(nickgsuperstar) DevOpsSec: Appling DevOps Principles to Security, DevOpsDays Austin 2012 nickgsuperstar From DevOpsDays Austin 2012. Video: http://www.ustream.tv/recorded/21568549 <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/devopdaysaustin2012-120412114853-phpapp02-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> From DevOpsDays Austin 2012. Video: http://www.ustream.tv/recorded/21568549
DevOpsSec: Appling DevOps Principles to Security, DevOpsDays Austin 2012 from Nick Galbreath
]]>
9255 15 https://cdn.slidesharecdn.com/ss_thumbnails/devopdaysaustin2012-120412114853-phpapp02-thumbnail.jpg?width=120&height=120&fit=bounds presentation White http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 1
https://cdn.slidesharecdn.com/profile-photo-nickgsuperstar-48x48.jpg?cb=1652200814 Nick Galbreath is co-founder and CTO of Signal Sciences, a Los Angeles-based company that empowers organizations to protect their web applications. Over the last 20 years, Nick has held leadership positions in number of e-commerce and social media companies, including IPONWEB, Etsy, Right Media, UPromise, Friendster, and Open Market, and has consulted for many more. He has spoken at numerous public and privates conferences on the intersection of software engineering, devops, and security. He is the author of "Cryptography for Internet and Database Applications" (Wiley), and was awarded a number of patents in the area of social networking. He holds a master's degree in mathematics f... www.signalsciences.com https://cdn.slidesharecdn.com/ss_thumbnails/makingoperationsvisible-devopsdaystokyo2013-130927173350-phpapp02-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/making-operations-visible-dev-opsdays-tokyo-2013key/26632342 Making operations visi... https://cdn.slidesharecdn.com/ss_thumbnails/fixingsecuritybyfixingdevelopment-phdays2013-130524025042-phpapp01-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/fixing-security-by-fixing-development-ph-days-2013/21820733 Faster Secure Software... https://cdn.slidesharecdn.com/ss_thumbnails/fixingsecuritybyfixingsoftwaredevelopment-130508190442-phpapp01-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/fixing-security-by-fixing-software-development/20829210 Fixing security by fix...