ICT Conference 2018 - fifth conference
Registration for Participants
THIRD ICT SECURITY CONFERENCE
IT Audit, Risks, Security
Internet Security Threat Report
Cyber Security And Cyber Crime
Enhancing Security of Electronic Payments - Decision IQ
Security in Smart metering - Smart Grid
Cloud Based NFC Mobile Payments - Security Risks and Protection Measures
How to Protect Confidential Information?
Implementation of „SSL for ado.net“ for Encryption of the Data in Transit in the Corporate Network
Linux, Open Source and Security
Anatomy of a Social Engineering Attack
Endpoint Protection, New Technologies That Are Replacing/Complementing Traditional Antivirus
App Centric Computing - Impact on Your IT
Tor Network - How to Achieve Anonymity?
Microsoft Advanced Threat Analytics
Creating WiFi NSA station
The Safety of Cryptography
The Problem of Protecting Security of Persons and Property in Light of Development of Internet of Things
Ph.D. Zoran Jovanovic
Ph.D. Zoran Cica
Ph.D. Zarko Stanisavljevic
Ph.D. Dragan Djurdjevic
What Code Come In Must Come Out - Threats at iOS and Android Applications
Hacking Attacks - The Power of IPv6 Driven Malware
Second ICT Security Conference
Viktor Varga - Saga
Zakljucak konferencije 2015
Halcom i svecano otvaranje
First ICT Security Conference
FOURTH ICT SECURITY CONFERENCE
ICT Security 2016
ICT SECURITY CONFERENCE 2016
- NEW SECURITY LEVEL -
Please, help us to be better,
answer a few questions (English or Serbian) and
download the presentations
What do you think about lectures?
What do you think about workshops?
What would you want to see on the next ICT Security Conference?
I would like to subscribe to the ICT Security newsletter Service. My email address may be used by conference organiser - CEIB the purpose of sending me information on conferences and tranings or products of possible interest to me.
I Agree with Terms & Conditions.
Proudly powered by