Automating Security Policies, from deployment to auditing using Rudder
Loading
0 %
Key | Action |
---|---|
K or space | Play / Pause |
M | Mute / Unmute |
C | Select next subtitles |
A | Select next audio track |
V | Show slide in full page or toggle automatic source change |
left arrow | Seek 5s backward |
right arrow | Seek 5s forward |
shift + left arrow or J | Seek 10s backward |
shift + right arrow or L | Seek 10s forward |
control + left arrow | Seek 60s backward |
control + right arrow | Seek 60s forward |
shift + down arrow | Decrease volume |
shift + up arrow | Increase volume |
shift + comma | Decrease playback rate |
shift + dot or shift + semicolon | Increase playback rate |
end | Seek to end |
beginning | Seek to beginning |
You can right click on slides to open the menu
Share this media
Download links
HLS video stream
You can use an external player to play this stream (like VLC).
HLS video streamInformation on this media
Links:
Number of views:
24Creation date:
July 10, 2013Speakers:
Jonathan ClarkeLicense:
cc-by-saOther media in the channel "Technique — Sécurité"
42 viewsMozilla Persona for your domainJuly 10th, 2013
43 viewsHistory and design principles of the Belgian eID cardJuly 10th, 2013
22 viewsSAML, SSO 4 Skilled peopleJuly 10th, 2013
29 viewsSecurity@MozillaJuly 10th, 2013
52 views(Net|s)Flow: Security events detection in a universityJuly 11th, 2013
25 viewsSetting up a Secure Development Life Cycle with OWASPJuly 11th, 2013