Verify your email address to access all 4shared features. Confirmation letter was sent to $[p1]
Not sure about current e-mail address? Update e-mail

Prove you are not a robot
Continue in app
4shared app
Open
Ringtone app
Open

Continue in browser

My 4shared

To library
Download
Share
15 files • 4,959 KB
Sort by:A – Z
00:00
Canvas of cybersecurity.jpg
00:00
jpg
154 KB
154 KB
8 months ago
Ishdeep T.
00:00
DNS Flood Attack vs. DDoS.jpeg
00:00
jpeg
168 KB
168 KB
8 months ago
Ishdeep T.
00:00
Importance of Cloud Computing.jpeg
00:00
jpeg
206 KB
206 KB
8 months ago
Ishdeep T.
00:00
00:00
00:00
Key Functions of Security Event Logs.jpeg
00:00
jpeg
135 KB
135 KB
8 months ago
Ishdeep T.
00:00
NIST_SP_800-53_AC-2_3000px.jpg
00:00
jpg
545 KB
545 KB
5 months ago
Ishdeep T.
00:00
PCI-DSS Requirement.jpg
00:00
jpg
133 KB
133 KB
6 months ago
Ishdeep T.
00:00
Persnol Data under DPDP Act.jpeg
00:00
jpeg
160 KB
160 KB
8 months ago
Ishdeep T.
00:00
Risk-Advisory-professionals (1).jpg
00:00
jpg
792 KB
792 KB
10 months ago
Ishdeep T.
00:00
Security event logs.jpeg
00:00
jpeg
161 KB
161 KB
8 months ago
Ishdeep T.
00:00
Traditional Threats and Emerging Threats.jpg
00:00
jpg
85 KB
85 KB
9 months ago
Ishdeep T.
00:00
Sorting
A – Z
Z – A
Smallest first
Largest first
Newest first
Oldest first
Share
We Use Cookies. 4shared uses cookies and other tracking technologies to understand where our visitors are coming from and improve your browsing experience on our Website. By using our Website, you consent to our use of cookies and other tracking technologies. Change my preferences
I Agree