Engenharia de Dados com Airflow Jefferson Kozak

Subscribers:
5,970
Published on ● Video Link: https://www.youtube.com/watch?v=DEkpPHJ4Bn0



Duration: 36:51
0 views
0


ROADSEC 2019 Palestras Hacking conference
#hacking, #hackers, #infosec, #opsec, #IT, #security




Other Videos By All Hacking Cons


2024-02-14Hands On Of Practical Malware Analysis A cilada do Java exe Cléber Soares
2024-02-14Iniciando no Bug Bounty com ajuda dos eventos de Capture The Flag Manoel Abreu Netto
2024-02-14A importância de modelagem de ameaças para Continuous Application Security Rafael Lachi
2024-02-14All Your Bugs Are Belong To Us Everton Michels
2024-02-14Bitcoin, Blockchain e seus reflexos no contexto jurídico Izildo Souza
2024-02-14Casos de Insucesso em Segurança da Informação Jairo Willian
2024-02-14Compartilhamento de ameaças cibernéticas Bruno Guerreiro Diniz
2024-02-14Democratizando Blockchain Liliane Tie
2024-02-14Dicas para monitorar e manter aplicações saudáveis Jacqueline Lima
2024-02-14Do Pentest ao Bug Bounty Dicas e Truques para começar Ariel Garcia
2024-02-14Engenharia de Dados com Airflow Jefferson Kozak
2024-02-14Erradicando a Miséria na África com Tecnologia Espacial Ciswal dos Santos
2024-02-14Eu sou um Ciborgue Biohacking Gabriel Bergel
2024-02-14filetroles Proativos para proteger seu código e implementações Max Soler
2024-02-14Física Fundamental e Tecnologias Quânticas no Rio de Janeiro Thiago Guerreiro
2024-02-13Panel When the facts go offline information blackouts during internet shutdowns
2024-02-13Patrik Hiselius Telia Company's intervention on transparency reporting
2024-02-13Press Briefing New government, old tactics laws abused to throttle online expression in Malaysia
2024-02-13Press Briefing What’s happening in India’s online space Combatting an epidemic of censorship
2024-02-13Protecting digital civic space the role of technology in supporting democracy
2024-02-13RightsCon after dark performance with Rebeca Lane



Tags:
data
hacker
security
computer
cyber
internet
technology
hacking
attack
digital
virus
information
hack
online
crime
password
code
web
concept
thief
protection
network
scam
fraud
malware
secure
identity
criminal
phishing
software
access
safety
theft
system
firewall
communication
business
privacy
binary
account
spy
programmer
program
spyware
hacked
hacking conference
conference
learn
how to
2022
2021
cybersecurity
owned
break in
google
securing
exploit
exploitation
recon
social engineering