NDCSecurity 2020 April 1, 2020 to April 1, 2020, Copenhagen, Denmark
Tell us about missing data
Tell us about missing data
Title | Speakers | Summary | Topic Types |
---|---|---|---|
What you always wanted to know about Deep Learning, but were afraid to ask | Wei-meng Lee | By now, you should have heard of these buzzwords - AI, Machine Learning, and more ... | |
How Effective Teams Use Git | Victoria Almazova , Enrico Campidoglio | It's never been a better time to learn Git. With all those resources available to ... | |
The Art of Code | Dylan Beattie | Software and technology has changed every aspect of the world we live in. At one ... | |
Breaking black-box AI | Evelina Gabasova | Machine learning and artificial intelligence are becoming wide-spread and productionalized - you no longer need ... | |
OpenID Connect & OAuth 2.0 – Security Best Practices | Dominick Baier | Since its publication in RFC6749 and RFC6750, OAuth 2.0 has gotten massive traction in the ... | |
Architecture: The Stuff That's Hard to Change | Dylan Beattie | We’ve all heard of the idea of ‘software architecture’. We’ve read books about domain-driven design ... | |
TypeScript for F# zealots | Tomas Petricek | If you ever talked to a functional programmer, you know that they'll use functional ideas ... | |
Implementing OpenID Connect and OAuth 2.0 – Tips from the Trenches | Dominick Baier | There are typical architectural patterns around identity & access control for modern applications (micro services ... | |
Confusion In The Land Of The Serverless | Sam Newman | An exploration of serverless platforms, and some of the unanswered questions around themServerless computing is ... | |
The Abridged History of Application Security | Jim Manico | Application Security began in the early '60s, where plaintext password storage, no password policy, poor ... | |
Stories From The Trenches | Scott Helme | This talk will focus on and tell the story of my first big ‘hack’, during ... | |
Deep Dive on Server-Side Blazor .NET | Carl Franklin | Blazor has arrived on the server with .NET Core 3. In this demo-filled session, Carl ... | |
How to migrate an existing application to serverless | Marcia Villalba | You want to migrate your existing application to serverless and you don’t know where to ... | |
The Perimeter Has Been Shattered: Attacking and Defending Mobility and IoT on the Enterprise Network | Georgia Weidman | Mobility and the Internet of Things (IoT) have disrupted the corporate enterprise network on the ... | |
C# into the Future | Mads Torgersen | Let’s take a look at some major recent and future language features in C#. In ... | |
From the OWASP Top Ten(s) to the OWASP ASVS | Jim Manico | Some people are under the misconception that if they follow the OWASP top 10 that ... | |
Building Trust in Teams | Richard Campbell | Today businesses run on software, and the quality of that software is directly affected by ... |