2017/07/125 [Lynn Langit] Bioinformatics Data Pipelines built by CSIRO on AWS - 암 유전체 정보 수집 Bioinformatics Data Pipelines built by CSIRO on AWS from Lynn Langit 2017. 7. 12. [Stanley Choi] 구글 빅쿼리로 데이터 웨어하우스 구축하기 Data Warehousing with Google BigQuery from Stanley Choi 2017. 7. 12. [김승주] Hack-Proof Drone, What is it? - Weapons Systems and Cyber Security Hack-Proof Drone, What is it? - Weapons Systems and Cyber Security - from Seungjoo Kim 2017. 7. 12. [US-CERT: Bulletin(SB17-191)] 2017년 7월 3일까지 발표된 보안 취약점 The vulnerabilities are based on the CVE vulnerability naming standard and are organized according to severity, determined by the Common Vulnerability Scoring System (CVSS) standard. The division of high, medium, and low severities correspond to the following scores: High - Vulnerabilities will be labeled High severity if they have a CVSS base score of 7.0 - 10.0 Medium - Vulnerabilities will be.. 2017. 7. 12. 이전 1 2 다음