Skip to main content
Graph
Search
fr
en
Login
Search
All
Categories
Concepts
Courses
Lectures
MOOCs
People
Practice
Publications
Startups
Units
Show all results for
Home
Lecture
The Concept of Fog Computing in IoT
Graph Chatbot
Related lectures (31)
Previous
Page 1 of 4
Next
Data, big data, clouds and IoT
Explores data representation, databases, cloud computing, and challenges in the cloud environment.
Challenges in IoT Era
Covers IoT security challenges, cyber-physical attacks, and global attack surfaces.
Cybersecurity Ecosystem: Non-Profit Impact
Explores data breaches in non-profits, incident response plans, legal requirements, cybersecurity strategies, and challenges faced by organizations.
Cybersecurity: Threat Modeling and Solutions
Explores cybersecurity fundamentals, threat modeling, real-world case studies, and digital forensics procedures.
Zero Days Vulnerability: Security Breaches on Personal Devices
Explores zero days vulnerability, ethical hacking, cyber attacks, and defense strategies against cyber threats.
Conditional Access II
Covers conditional access, encryption, decryption, authentication, and advanced encryption standards, exploring identity-based encryption, biometrics, and attribute-based encryption.
Data Protection and Cybersecurity Essentials
Explores data breaches, cyber attacks, legal requirements, incident response, communication strategies, cybersecurity skills gap, and Swiss government activities.
Sustainable IT Strategies: Forum SI 2024
Discusses sustainable IT practices and strategies presented at the Forum SI 2024 at EPFL.
IT Security Challenges
Explores IT security challenges, Object Storage systems, website management transition, network security deployment, and project portfolio management at EPFL.
Information Security: Communication, Calculation, Threats
Explores information security in communication, calculation, and digital threats, emphasizing data protection and access control.