Category - Technology

Total count: 348
iTEC Applications and Widgets
Activities and tools and widgets
Created on 14 August, 2013by adiltugyan
Time: 00:04:30
Slides: 9
Views: 119 | Comments: 0 | Favorited: 0 | Rating: 0
Mecanismo
Mecanismo
Created on 02 August, 2013by Tomix78
Time: 00:06:30
Slides: 9
Views: 102 | Comments: 0 | Favorited: 0 | Rating: 0
Created on 01 August, 2013by dsbfable
Time: 00:03:30
Slides: 21
Views: 110 | Comments: 0 | Favorited: 0 | Rating: 0
Mobile Magic Marketing
Presentation of mobile ppt and magic video together... like magic!
Created on 01 June, 2013by jbronson211
Time: 00:05:06
Slides: 23
Views: 108 | Comments: 0 | Favorited: 0 | Rating: 0
Cybermenaces - 21/05/2013 - Mot des Sponsors
Cyber espionnage, fuite d'information, vol et destruction de données, manipulation, e- reputation : quelles sont les menaces ? Comment opèrent les att...
Created on 26 May, 2013by IlEstUneFois
Time: 00:27:11
Slides: 35
Views: 282 | Comments: 0 | Favorited: 0 | Rating: 0
Cybermenaces - 21/05/2013 - Table-Ronde 2
Cyber espionnage, fuite d'information, vol et destruction de données, manipulation, e- reputation : quelles sont les menaces ? Comment opèrent les att...
Created on 26 May, 2013by IlEstUneFois
Time: 01:04:20
Slides: 10
Views: 199 | Comments: 0 | Favorited: 0 | Rating: 0
Cybermenaces - 21/05/2013 - Table-Ronde 1
Cyber espionnage, fuite d'information, vol et destruction de données, manipulation, e- reputation : quelles sont les menaces ? Comment opèrent les att...
Created on 26 May, 2013by IlEstUneFois
Time: 01:22:01
Slides: 44
Views: 253 | Comments: 0 | Favorited: 0 | Rating: 0
Cybermenaces - 21/05/2013 - David Naccache
Cyber espionnage, fuite d'information, vol et destruction de données, manipulation, e- reputation : quelles sont les menaces ? Comment opèrent les att...
Created on 26 May, 2013by IlEstUneFois
Time: 01:10:14
Slides: 95
Views: 474 | Comments: 0 | Favorited: 0 | Rating: 0
Cybermenaces - 21/05/2013 - Ouverture
Cyber espionnage, fuite d'information, vol et destruction de données, manipulation, e- reputation : quelles sont les menaces ? Comment opèrent les att...
Created on 26 May, 2013by IlEstUneFois
Time: 00:18:11
Slides: 1
Views: 252 | Comments: 0 | Favorited: 0 | Rating: 0
ee
ee
Created on 23 May, 2013by ronypapa
Time: 00:00:20
Slides: 2
Views: 85 | Comments: 0 | Favorited: 0 | Rating: 0

Clear Trace