Source: OWASP Bucharest AppSec Conference 2017
OWASP Bucharest team is happy to announce the OWASP Bucharest AppSec Conference 2017 a three days Security and Hacking Conference with additional training days dedicated to the application security. It will take place 11th through 13th of October, 2017 – Bucharest, Romania. With 11th and 12th being training only days, 13th of October is the day of the conference!
The stated objective of the OWASP’s Bucharest AppSec Conference is to “raise awareness about application security and to bring high-quality security content provided by renowned professionals in the European region.”
Registration is free and all materials are available under a free and open software license.
Who Should Attend?
- Application Developers
- Application Testers and Quality Assurance
- Application Project Management and Staff
- Chief Information Officers, Chief Information Security Officers, Chief Technology Officers, Deputies, Associates and Staff
- Chief Financial Officers, Auditors, and Staff Responsible for IT Security Oversight and Compliance
- Security Managers and Staff
- Executives, Managers, and Staff Responsible for IT Security Governance
- IT Professionals interested in improving IT Security
- Anyone interested in learning about or promoting Web Application Security
Further information about the talks is available here. Registration is FREE so you just need to book your seat using this link, print your ticket and present it at the entrance.
Check out the training opportunities here and be advised as the number of available seats is limited!
Spoilers: Adobe Romania’s , Cristian OPINCARU will be delivering an awesome talk on “Protecting against credential stuffing attacks” and Cristina NICA, Andreea CUTLACAI & Daniela ENE organized a very interesting panel discussion on Women in AppSec!
Source: Artificial Intelligence Wikipedia
“Artificial intelligence (AI, also machine intelligence, MI) is intelligence exhibited by machines, rather than humans or other animals (natural intelligence, NI). In computer science, the field of AI research defines itself as the study of “intelligent agents”: any device that perceives its environment and takes actions that maximize its chance of success at some goal. Colloquially, the term “artificial intelligence” is applied when a machine mimics “cognitive” functions that humans associate with other human minds, such as “learning” and “problem solving”.” Read more…
Source: Quantum Computing Wikipedia
“Quantum computing studies theoretical computation systems (quantum computers) that make direct use of quantum-mechanical phenomena, such as superposition and entanglement, to perform operations on data. Quantum computers are different from binary digital electronic computers based on transistors. Whereas common digital computing requires that the data be encoded into binary digits (bits), each of which is always in one of two definite states (0 or 1), quantum computation uses quantum bits, which can be in superpositions of states. A quantum Turing machine is a theoretical model of such a computer, and is also known as the universal quantum computer. The field of quantum computing was initiated by the work of Paul Benioff and Yuri Manin in 1980, Richard Feynman in 1982, and David Deutsch in 1985. A quantum computer with spins as quantum bits was also formulated for use as a quantum spacetime in 1968. Read more…
Authors: Gabriel PETRICA, Ionut – Daniel BARBU, Sabina – Daniela AXINTE, Cristian PASCARIU
Published: ADVANCED TOPICS IN ELECTRICAL ENGINEERING – ATEE 2017
“FTA (Fault Tree Analysis) is one of the most used methods for reliability analysis and to quantify the risks associated with the failures of systems. This method performs analysis of the combination of events that can lead to a critical system failure (called Top Event of the designed Fault Tree) and allows calculating the probability of failure. In this paper, has been built the Fault Tree for a Web server considering failures that may occur at hardware level (the basic components for the considered computer system). After realizing the Fault Tree, were made two types of analysis: qualitative (which led to the identification of minimal cut sets) and quantitative (this allowed the calculation of the probability of occurrence of the considered critical event – <<Web server not operational>>.” Read more…
Source: ADVANCED TOPICS IN ELECTRICAL ENGINEERING – ATEE 2017