Courses from 1000+ universities
Two years after its first major layoff round, Coursera announces another, impacting 10% of its workforce.
600 Free Google Certifications
Computer Science
Data Analysis
Computer Networking
Medicine and the Arts: Humanising Healthcare
Exploring Play: The Importance of Play in Everyday Life
Songwriting: Writing the Lyrics
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore a wide range of free and certified Memory online courses. Find the best Memory training programs and enhance your skills today!
Exploración de la arquitectura iranà como expresión cultural colectiva, reflejando valores filosóficos y artÃsticos profundos que van más allá de la mera construcción de edificios.
Explore the power of collective memory in shaping identity through poetry and prose. Lebo Mashile, an influential South African writer, delivers a compelling talk on the importance of shared experiences and cultural heritage.
Explore different memory types for ChatGPT chatbots using LangChain, including buffer, summary, window, and vectorstore memory. Learn implementation techniques for coherent conversations.
Explore memory forensics in cloud environments using virtual machine introspection. Learn techniques for trustworthy data collection without system interference, ideal for digital forensics in virtualized settings.
Explore intra-process memory protection techniques for ARM and X86 architectures using ELF ABI. Learn about ELFbac system implementation, policy enforcement, and practical applications in software security.
Exploiting uninitialized memory in 64-bit IE to bypass ASLR, CFG, and EPM sandbox. Techniques for remote code execution and privilege escalation on Windows 8.1 demonstrated through Pwn2Own contest example.
Unveils a resilient API deobfuscation technique using memory access analysis, overcoming limitations of pattern-based approaches to identify runtime-obfuscated API calls in malware and obfuscated code.
Explore kernel memory disclosure detection using x86 emulation and taint tracking. Learn about buffer overflows, memory corruption, and user-mode client interactions in kernel-mode systems.
Explore mainframe hacking techniques, from network protocols to buffer overflows, and learn to exploit z/OS vulnerabilities for critical system access.
Explore jemalloc memory allocator's architecture, attack vectors, and novel exploitation techniques, focusing on Mozilla Firefox's heap and its security implications.
Innovative approach to discovering kernel vulnerabilities using CPU-level instrumentation and memory access pattern analysis. Introduces "Bochspwn" project, which identified numerous Windows kernel vulnerabilities.
Explore the power of storytelling and audio to relive memories, create immersive experiences, and foster a more meaningful, reflective life. Discover how weaving intimacy with our past can lead to personal growth and deeper connections.
Explore advanced exploitation techniques and control-flow integrity mechanisms. Learn about Return-Oriented Programming, its countermeasures, and how to bypass emerging CFI solutions.
Explore innovative attack vectors on real-time, in-memory platforms, blending web and database vulnerabilities. Learn about new SQL injection techniques, server-side JavaScript exploits, and R-based attacks in SAP HANA.
Explore Flash memory reverse engineering techniques, including direct interaction, reprogramming, and file system analysis. Learn to handle meta information, deal with bad blocks, and leverage journaling file systems for deeper insights.
Get personalized course recommendations, track subjects and courses with reminders, and more.