SlideShare ist ein Scribd-Unternehmen logo
1 von 45
Core Intel
Krzysztof Adamski, Krzysztof Żmij
On the bank secret service
Are security breaches common?
https://www.gov.uk/government/uploads/system/uploads/attachment_data/file/4
32412/bis-15-302-information_security_breaches_survey_2015-full-report.pdf
Carbanak
3
https://securelist.com/blog/research/68732/the-great-bank-robbery-the-carbanak-apt/
Core Intel is a part of ING Cyber Crime Resilience Programme
to structurally improve the capabilities for the cybercrime
• prevention
• detection and the
• response
CoreIntel
4
• Measures against e-banking fraud, DDoS and Advanced Persistent Threats (APTs).
• Threat intelligence allow to respond to, or even prevent, a cybercrime attack
• (This kind of intelligence is available via internal and external parties and includes both
open and closed communities)
• Monitoring, detection and response to “spear phishing”
• Detection/mitigation of infected ING systems’
• Baselining network traffic/anomaly detection
• Response to incidents (knowledge, tools, IT environment)
• Automated feeds, automated analysis and historical data analysis
The reasoning
5
The world is not enough
So the challenge is…
Market leaders Benelux
Growth markets
Commercial Banking
Challengers
Most of our data is within Europe
8
Market leaders Benelux
Growth markets
Commercial Banking
Challengers
but we operate globally
9
Expect the unexpected to collect all the data
10
• What kind of data do we need?
• Where is our data located?
• How we can potentially capture it?
• What are the legal implications?
So there is a challenge to capture „all” the data
11
Core Intel architecture
So what you would like to see is…
Photo credit: edgarpierce via Foter.com / CC BY
…In fact it is slightly more complicated
All has its own purpose. Let’s see in details.
15
Photo credit: https://www.pexels.com/photo/dslr-camera-equipments-147462/
Local data collector
16
But tell how to capture that data
17
https://observer.viavisolutions.com/includes/popups/taps/tap-vs-span.php
Broker settings:
Replication factor >= 3
min.insync.replicas = 2
unclean.leader.election.enable = false
replica.lag.time.max.ms
Producer settings:
acks = all
retries = Integer.MAX_VALUE
max.block.ms = Long.MAX_VALUE
block.on.buffer.full = true
To have data in order
max.in.flight.requests.per.connection = 1
Kafka producer configuration (as we don’t like losing data)
18
Central data collector
19
Time is crucial here
20
Photo credit: Cargo Cult via Foter.com / CC BY
But your business data more, so proceed with caution
21
Photo credit: https://www.pexels.com/photo/white-caution-cone-on-keyboard-211151/
• Network bandwidth control
• quota.consumer.default
• quota.producer.default
Kafka mirror maker configuration
22
Secure data:
listeners=SSL://host.name:port
ssl.client.auth=required
ssl.keystore.location
ssl.keystore.password
ssl.key.password
ssl.truststore.location
ssl.truststore.password
Kafka mirror maker configuration
23
Secure
data in
transit
Streaming data
24
spark.yarn.maxAppAttempts
spark.yarn.am.attemptFailuresValidityInterval
spark.yarn.max.executor.failures
spark.yarn.executor.failuresValidityInterval
spark.task.maxFailures
spark.hadoop.fs.hdfs.impl.disable.cache
spark.streaming.backpressure.enabled=true
spark.streaming.kafka.maxRatePerPartition
Spark on yarn streaming configuration
25
In memory data grid
26
val rddFromMap = sc.fromHazelcastMap("map-name-to-be-loaded")
Let’s find something in these logs
27
Photo credit: https://www.flickr.com/photos/65363769@N08/12726065645/in/pool-555784@N20/
Matching
28
Tornado - a Python web framework and asynchronous
networking library - http://www.tornadoweb.org/
MessagePack – binary transport format
http://msgpack.org/
• Automatically & continually match network logs <->threat intel
• When new threat intel arrives, against full history network logs
• When new network logs arrive, against full history threat intel
• Alerts are shown in a hit dashboard
• Dashboard is a web-based interfaces that provide flexible charts, querying, aggregation
and browsing
• Quality/relevance of an alert is subject to the quality of IoC feeds and completeness of
internal log data.
Hit, alerts and dashboards
29
Be smart with your tooling
30
Photo credit https://www.flickr.com/photos/12749546@N07/
and leverage e.g. elasticsearch templates
31
Data mapping:
- doc_value
- fielddata
- fields
Cluster settings to check:
gateway.recover_after_nodes
gateway.recover_after_master_nodes
gateway.recover_after_data_nodes
indices.recovery.max_bytes_per_sec
indices.breaker.total.limit
indices.breaker.fielddata.limit
Elasticsearch configuration
32
For those who know how to use heavy equipment
33
Photo credit: News Collection & Public Distribution @techpearce2 via Foter.com / CC BY
Long data storage - HDFS
34
Kafka offset management
35
Core Intel allows users to perform advanced analytics on network logs using a set of
powerful tools
• Spark API to write code to process large data sets on a cluster
• perform complex aggregations to collect interesting statistics
• run large scale clustering algorithms with Spark’s MLLib
• run graph analyses on network logs using Spark’s GraphX
• transform and extract data for use in another system (which are better for specific analytics or
visualization purposes)
• Kafka, co you can write own Consumers and Producers to work with your data
• to perform streaming analysis on your data
• to implement your own alerting logic
• Toolset
• Programming languages: Scala, Java, Python
• IDE’s: Eclipse / Scala IDE, IPython Notebook and R Studio
Advanced analytics
36
How do we schedule the jobs
37
How to keep everything under control
38
Photo credit: https://www.flickr.com/photos/martijn141
Monitoring crucial points in your data pipeline
39
Something for smart guys
40
Photo credit: https://www.flickr.com/photos/jdhancock/5173498203/
Plenty of data to analyze
41
Upcoming challenges on the operations side
42
Shaken, not stirred?
43
44
Follow us to stay a step ahead
ING.com
YouTube.com/ING
SlideShare.net/ING@ING_News LinkedIn.com/company/ING
Flickr.com/INGGroupFacebook.com/ING

Weitere ähnliche Inhalte

Andere mochten auch

Cartilla retie
Cartilla retieCartilla retie
Cartilla retieLuz Angela
 
Anexo general del retie vigente actualizado a 2015
Anexo general del retie vigente actualizado a 2015 Anexo general del retie vigente actualizado a 2015
Anexo general del retie vigente actualizado a 2015 Luz Angela
 
Prevenção de Perdas e Danos
Prevenção de Perdas e Danos Prevenção de Perdas e Danos
Prevenção de Perdas e Danos Anderson Stoll
 
NJ Future Redevelopment Forum 2017 Evans
NJ Future Redevelopment Forum 2017 EvansNJ Future Redevelopment Forum 2017 Evans
NJ Future Redevelopment Forum 2017 EvansNew Jersey Future
 
NJ Future Redevelopment Forum 2017 Goldberg
NJ Future Redevelopment Forum 2017 GoldbergNJ Future Redevelopment Forum 2017 Goldberg
NJ Future Redevelopment Forum 2017 GoldbergNew Jersey Future
 
NJ Future Redevelopment Forum 2017 Hughes
NJ Future Redevelopment Forum 2017 HughesNJ Future Redevelopment Forum 2017 Hughes
NJ Future Redevelopment Forum 2017 HughesNew Jersey Future
 
Nano technology 7 smnr report
Nano technology 7 smnr reportNano technology 7 smnr report
Nano technology 7 smnr reportRameez Raja
 
01- Conociendo el Aula Virtual (Profesores)
01- Conociendo el Aula Virtual (Profesores)01- Conociendo el Aula Virtual (Profesores)
01- Conociendo el Aula Virtual (Profesores)siulollitsac
 
Producto interno bruto (pib)
Producto interno bruto (pib)Producto interno bruto (pib)
Producto interno bruto (pib)karina140598
 
Portfolio 2016 français
Portfolio 2016 françaisPortfolio 2016 français
Portfolio 2016 françaisCarlos Paz
 
Acompanamiento pedagogico (1)
Acompanamiento pedagogico (1)Acompanamiento pedagogico (1)
Acompanamiento pedagogico (1)ramiro cantoran
 
04-Añadir juegos educativos (Profesores)
04-Añadir juegos educativos (Profesores)04-Añadir juegos educativos (Profesores)
04-Añadir juegos educativos (Profesores)siulollitsac
 
Cable and Pipe Sealing by TLC
Cable and Pipe Sealing by TLCCable and Pipe Sealing by TLC
Cable and Pipe Sealing by TLCgrkarf
 

Andere mochten auch (20)

Cartilla retie
Cartilla retieCartilla retie
Cartilla retie
 
Anexo general del retie vigente actualizado a 2015
Anexo general del retie vigente actualizado a 2015 Anexo general del retie vigente actualizado a 2015
Anexo general del retie vigente actualizado a 2015
 
Prevenção de Perdas e Danos
Prevenção de Perdas e Danos Prevenção de Perdas e Danos
Prevenção de Perdas e Danos
 
Diagnostico matematica 3°
Diagnostico matematica 3°Diagnostico matematica 3°
Diagnostico matematica 3°
 
NJ Future Redevelopment Forum 2017 Evans
NJ Future Redevelopment Forum 2017 EvansNJ Future Redevelopment Forum 2017 Evans
NJ Future Redevelopment Forum 2017 Evans
 
NJ Future Redevelopment Forum 2017 Goldberg
NJ Future Redevelopment Forum 2017 GoldbergNJ Future Redevelopment Forum 2017 Goldberg
NJ Future Redevelopment Forum 2017 Goldberg
 
NJ Future Redevelopment Forum 2017 Hughes
NJ Future Redevelopment Forum 2017 HughesNJ Future Redevelopment Forum 2017 Hughes
NJ Future Redevelopment Forum 2017 Hughes
 
Ingles 1
Ingles 1Ingles 1
Ingles 1
 
Nano technology 7 smnr report
Nano technology 7 smnr reportNano technology 7 smnr report
Nano technology 7 smnr report
 
01- Conociendo el Aula Virtual (Profesores)
01- Conociendo el Aula Virtual (Profesores)01- Conociendo el Aula Virtual (Profesores)
01- Conociendo el Aula Virtual (Profesores)
 
Producto interno bruto (pib)
Producto interno bruto (pib)Producto interno bruto (pib)
Producto interno bruto (pib)
 
San Valentín 2017 Gonminiot
San Valentín 2017   GonminiotSan Valentín 2017   Gonminiot
San Valentín 2017 Gonminiot
 
DEE baby resume
DEE baby resumeDEE baby resume
DEE baby resume
 
Portfolio 2016 français
Portfolio 2016 françaisPortfolio 2016 français
Portfolio 2016 français
 
Acompanamiento pedagogico (1)
Acompanamiento pedagogico (1)Acompanamiento pedagogico (1)
Acompanamiento pedagogico (1)
 
urttyo_banerjee
urttyo_banerjeeurttyo_banerjee
urttyo_banerjee
 
04-Añadir juegos educativos (Profesores)
04-Añadir juegos educativos (Profesores)04-Añadir juegos educativos (Profesores)
04-Añadir juegos educativos (Profesores)
 
Resume_Sanket
Resume_SanketResume_Sanket
Resume_Sanket
 
Edward atencio
Edward atencioEdward atencio
Edward atencio
 
Cable and Pipe Sealing by TLC
Cable and Pipe Sealing by TLCCable and Pipe Sealing by TLC
Cable and Pipe Sealing by TLC
 

Ähnlich wie Core intel

Achieving Real-time Ingestion and Analysis of Security Events through Kafka a...
Achieving Real-time Ingestion and Analysis of Security Events through Kafka a...Achieving Real-time Ingestion and Analysis of Security Events through Kafka a...
Achieving Real-time Ingestion and Analysis of Security Events through Kafka a...Kevin Mao
 
Accelerating Cyber Threat Detection With GPU
Accelerating Cyber Threat Detection With GPUAccelerating Cyber Threat Detection With GPU
Accelerating Cyber Threat Detection With GPUJoshua Patterson
 
Sample PPT Format.pptx E-commerce website for login
Sample PPT Format.pptx E-commerce website for loginSample PPT Format.pptx E-commerce website for login
Sample PPT Format.pptx E-commerce website for loginnaveendurga557
 
1-160730050929.pptx dynamic hash table info
1-160730050929.pptx dynamic hash table info1-160730050929.pptx dynamic hash table info
1-160730050929.pptx dynamic hash table infoMdjunaidAli3
 
Detecting Hacks: Anomaly Detection on Networking Data
Detecting Hacks: Anomaly Detection on Networking DataDetecting Hacks: Anomaly Detection on Networking Data
Detecting Hacks: Anomaly Detection on Networking DataJames Sirota
 
Automated prevention of ransomware with machine learning and gpos
Automated prevention of ransomware with machine learning and gposAutomated prevention of ransomware with machine learning and gpos
Automated prevention of ransomware with machine learning and gposPriyanka Aash
 
SPO2-T11_Automated-Prevention-of-Ransomware-with-Machine-Learning-and-GPOs
SPO2-T11_Automated-Prevention-of-Ransomware-with-Machine-Learning-and-GPOsSPO2-T11_Automated-Prevention-of-Ransomware-with-Machine-Learning-and-GPOs
SPO2-T11_Automated-Prevention-of-Ransomware-with-Machine-Learning-and-GPOsRod Soto
 
Event Driven Architecture with a RESTful Microservices Architecture (Kyle Ben...
Event Driven Architecture with a RESTful Microservices Architecture (Kyle Ben...Event Driven Architecture with a RESTful Microservices Architecture (Kyle Ben...
Event Driven Architecture with a RESTful Microservices Architecture (Kyle Ben...confluent
 
Architecting and Tuning IIB/eXtreme Scale for Maximum Performance and Reliabi...
Architecting and Tuning IIB/eXtreme Scale for Maximum Performance and Reliabi...Architecting and Tuning IIB/eXtreme Scale for Maximum Performance and Reliabi...
Architecting and Tuning IIB/eXtreme Scale for Maximum Performance and Reliabi...Prolifics
 
Detecting Hacks: Anomaly Detection on Networking Data
Detecting Hacks: Anomaly Detection on Networking DataDetecting Hacks: Anomaly Detection on Networking Data
Detecting Hacks: Anomaly Detection on Networking DataDataWorks Summit
 
Industrial Control System Network Cyber Security Monitoring Solution (SCAB)
Industrial Control System Network Cyber Security Monitoring Solution (SCAB)Industrial Control System Network Cyber Security Monitoring Solution (SCAB)
Industrial Control System Network Cyber Security Monitoring Solution (SCAB)Enrique Martin
 
Mris network architecture proposal r1
Mris network architecture proposal r1Mris network architecture proposal r1
Mris network architecture proposal r1Craig Burma
 
Using Eclipse and Lua for the Internet of Things - JAX2013
Using Eclipse and Lua for the Internet of Things - JAX2013Using Eclipse and Lua for the Internet of Things - JAX2013
Using Eclipse and Lua for the Internet of Things - JAX2013Benjamin Cabé
 
Splunk App for Stream
Splunk App for StreamSplunk App for Stream
Splunk App for StreamSplunk
 
IEEE 2014 DOTNET DATA MINING PROJECTS Trusted db a-trusted-hardware-based-dat...
IEEE 2014 DOTNET DATA MINING PROJECTS Trusted db a-trusted-hardware-based-dat...IEEE 2014 DOTNET DATA MINING PROJECTS Trusted db a-trusted-hardware-based-dat...
IEEE 2014 DOTNET DATA MINING PROJECTS Trusted db a-trusted-hardware-based-dat...IEEEMEMTECHSTUDENTPROJECTS
 
2014 IEEE DOTNET DATA MINING PROJECT Trusteddb a-trusted-hardware-based-datab...
2014 IEEE DOTNET DATA MINING PROJECT Trusteddb a-trusted-hardware-based-datab...2014 IEEE DOTNET DATA MINING PROJECT Trusteddb a-trusted-hardware-based-datab...
2014 IEEE DOTNET DATA MINING PROJECT Trusteddb a-trusted-hardware-based-datab...IEEEMEMTECHSTUDENTSPROJECTS
 

Ähnlich wie Core intel (20)

Shaping a Digital Vision
Shaping a Digital VisionShaping a Digital Vision
Shaping a Digital Vision
 
IoT meets Big Data
IoT meets Big DataIoT meets Big Data
IoT meets Big Data
 
Achieving Real-time Ingestion and Analysis of Security Events through Kafka a...
Achieving Real-time Ingestion and Analysis of Security Events through Kafka a...Achieving Real-time Ingestion and Analysis of Security Events through Kafka a...
Achieving Real-time Ingestion and Analysis of Security Events through Kafka a...
 
Accelerating Cyber Threat Detection With GPU
Accelerating Cyber Threat Detection With GPUAccelerating Cyber Threat Detection With GPU
Accelerating Cyber Threat Detection With GPU
 
Sample PPT Format.pptx E-commerce website for login
Sample PPT Format.pptx E-commerce website for loginSample PPT Format.pptx E-commerce website for login
Sample PPT Format.pptx E-commerce website for login
 
1-160730050929.pptx dynamic hash table info
1-160730050929.pptx dynamic hash table info1-160730050929.pptx dynamic hash table info
1-160730050929.pptx dynamic hash table info
 
Detecting Hacks: Anomaly Detection on Networking Data
Detecting Hacks: Anomaly Detection on Networking DataDetecting Hacks: Anomaly Detection on Networking Data
Detecting Hacks: Anomaly Detection on Networking Data
 
Automated prevention of ransomware with machine learning and gpos
Automated prevention of ransomware with machine learning and gposAutomated prevention of ransomware with machine learning and gpos
Automated prevention of ransomware with machine learning and gpos
 
SPO2-T11_Automated-Prevention-of-Ransomware-with-Machine-Learning-and-GPOs
SPO2-T11_Automated-Prevention-of-Ransomware-with-Machine-Learning-and-GPOsSPO2-T11_Automated-Prevention-of-Ransomware-with-Machine-Learning-and-GPOs
SPO2-T11_Automated-Prevention-of-Ransomware-with-Machine-Learning-and-GPOs
 
Cisco project ideas
Cisco   project ideasCisco   project ideas
Cisco project ideas
 
Event Driven Architecture with a RESTful Microservices Architecture (Kyle Ben...
Event Driven Architecture with a RESTful Microservices Architecture (Kyle Ben...Event Driven Architecture with a RESTful Microservices Architecture (Kyle Ben...
Event Driven Architecture with a RESTful Microservices Architecture (Kyle Ben...
 
Architecting and Tuning IIB/eXtreme Scale for Maximum Performance and Reliabi...
Architecting and Tuning IIB/eXtreme Scale for Maximum Performance and Reliabi...Architecting and Tuning IIB/eXtreme Scale for Maximum Performance and Reliabi...
Architecting and Tuning IIB/eXtreme Scale for Maximum Performance and Reliabi...
 
Sideband_SB_020316
Sideband_SB_020316Sideband_SB_020316
Sideband_SB_020316
 
Detecting Hacks: Anomaly Detection on Networking Data
Detecting Hacks: Anomaly Detection on Networking DataDetecting Hacks: Anomaly Detection on Networking Data
Detecting Hacks: Anomaly Detection on Networking Data
 
Industrial Control System Network Cyber Security Monitoring Solution (SCAB)
Industrial Control System Network Cyber Security Monitoring Solution (SCAB)Industrial Control System Network Cyber Security Monitoring Solution (SCAB)
Industrial Control System Network Cyber Security Monitoring Solution (SCAB)
 
Mris network architecture proposal r1
Mris network architecture proposal r1Mris network architecture proposal r1
Mris network architecture proposal r1
 
Using Eclipse and Lua for the Internet of Things - JAX2013
Using Eclipse and Lua for the Internet of Things - JAX2013Using Eclipse and Lua for the Internet of Things - JAX2013
Using Eclipse and Lua for the Internet of Things - JAX2013
 
Splunk App for Stream
Splunk App for StreamSplunk App for Stream
Splunk App for Stream
 
IEEE 2014 DOTNET DATA MINING PROJECTS Trusted db a-trusted-hardware-based-dat...
IEEE 2014 DOTNET DATA MINING PROJECTS Trusted db a-trusted-hardware-based-dat...IEEE 2014 DOTNET DATA MINING PROJECTS Trusted db a-trusted-hardware-based-dat...
IEEE 2014 DOTNET DATA MINING PROJECTS Trusted db a-trusted-hardware-based-dat...
 
2014 IEEE DOTNET DATA MINING PROJECT Trusteddb a-trusted-hardware-based-datab...
2014 IEEE DOTNET DATA MINING PROJECT Trusteddb a-trusted-hardware-based-datab...2014 IEEE DOTNET DATA MINING PROJECT Trusteddb a-trusted-hardware-based-datab...
2014 IEEE DOTNET DATA MINING PROJECT Trusteddb a-trusted-hardware-based-datab...
 

Kürzlich hochgeladen

Machine learning classification ppt.ppt
Machine learning classification  ppt.pptMachine learning classification  ppt.ppt
Machine learning classification ppt.pptamreenkhanum0307
 
GA4 Without Cookies [Measure Camp AMS]
GA4 Without Cookies [Measure Camp AMS]GA4 Without Cookies [Measure Camp AMS]
GA4 Without Cookies [Measure Camp AMS]📊 Markus Baersch
 
Biometric Authentication: The Evolution, Applications, Benefits and Challenge...
Biometric Authentication: The Evolution, Applications, Benefits and Challenge...Biometric Authentication: The Evolution, Applications, Benefits and Challenge...
Biometric Authentication: The Evolution, Applications, Benefits and Challenge...GQ Research
 
ASML's Taxonomy Adventure by Daniel Canter
ASML's Taxonomy Adventure by Daniel CanterASML's Taxonomy Adventure by Daniel Canter
ASML's Taxonomy Adventure by Daniel Cantervoginip
 
Data Factory in Microsoft Fabric (MsBIP #82)
Data Factory in Microsoft Fabric (MsBIP #82)Data Factory in Microsoft Fabric (MsBIP #82)
Data Factory in Microsoft Fabric (MsBIP #82)Cathrine Wilhelmsen
 
Call Girls In Dwarka 9654467111 Escorts Service
Call Girls In Dwarka 9654467111 Escorts ServiceCall Girls In Dwarka 9654467111 Escorts Service
Call Girls In Dwarka 9654467111 Escorts ServiceSapana Sha
 
From idea to production in a day – Leveraging Azure ML and Streamlit to build...
From idea to production in a day – Leveraging Azure ML and Streamlit to build...From idea to production in a day – Leveraging Azure ML and Streamlit to build...
From idea to production in a day – Leveraging Azure ML and Streamlit to build...Florian Roscheck
 
Student Profile Sample report on improving academic performance by uniting gr...
Student Profile Sample report on improving academic performance by uniting gr...Student Profile Sample report on improving academic performance by uniting gr...
Student Profile Sample report on improving academic performance by uniting gr...Seán Kennedy
 
NO1 Certified Black Magic Specialist Expert Amil baba in Lahore Islamabad Raw...
NO1 Certified Black Magic Specialist Expert Amil baba in Lahore Islamabad Raw...NO1 Certified Black Magic Specialist Expert Amil baba in Lahore Islamabad Raw...
NO1 Certified Black Magic Specialist Expert Amil baba in Lahore Islamabad Raw...Amil Baba Dawood bangali
 
RadioAdProWritingCinderellabyButleri.pdf
RadioAdProWritingCinderellabyButleri.pdfRadioAdProWritingCinderellabyButleri.pdf
RadioAdProWritingCinderellabyButleri.pdfgstagge
 
Advanced Machine Learning for Business Professionals
Advanced Machine Learning for Business ProfessionalsAdvanced Machine Learning for Business Professionals
Advanced Machine Learning for Business ProfessionalsVICTOR MAESTRE RAMIREZ
 
While-For-loop in python used in college
While-For-loop in python used in collegeWhile-For-loop in python used in college
While-For-loop in python used in collegessuser7a7cd61
 
Predictive Analysis for Loan Default Presentation : Data Analysis Project PPT
Predictive Analysis for Loan Default  Presentation : Data Analysis Project PPTPredictive Analysis for Loan Default  Presentation : Data Analysis Project PPT
Predictive Analysis for Loan Default Presentation : Data Analysis Project PPTBoston Institute of Analytics
 
Indian Call Girls in Abu Dhabi O5286O24O8 Call Girls in Abu Dhabi By Independ...
Indian Call Girls in Abu Dhabi O5286O24O8 Call Girls in Abu Dhabi By Independ...Indian Call Girls in Abu Dhabi O5286O24O8 Call Girls in Abu Dhabi By Independ...
Indian Call Girls in Abu Dhabi O5286O24O8 Call Girls in Abu Dhabi By Independ...dajasot375
 
2006_GasProcessing_HB (1).pdf HYDROCARBON PROCESSING
2006_GasProcessing_HB (1).pdf HYDROCARBON PROCESSING2006_GasProcessing_HB (1).pdf HYDROCARBON PROCESSING
2006_GasProcessing_HB (1).pdf HYDROCARBON PROCESSINGmarianagonzalez07
 
20240419 - Measurecamp Amsterdam - SAM.pdf
20240419 - Measurecamp Amsterdam - SAM.pdf20240419 - Measurecamp Amsterdam - SAM.pdf
20240419 - Measurecamp Amsterdam - SAM.pdfHuman37
 
DBA Basics: Getting Started with Performance Tuning.pdf
DBA Basics: Getting Started with Performance Tuning.pdfDBA Basics: Getting Started with Performance Tuning.pdf
DBA Basics: Getting Started with Performance Tuning.pdfJohn Sterrett
 
INTERNSHIP ON PURBASHA COMPOSITE TEX LTD
INTERNSHIP ON PURBASHA COMPOSITE TEX LTDINTERNSHIP ON PURBASHA COMPOSITE TEX LTD
INTERNSHIP ON PURBASHA COMPOSITE TEX LTDRafezzaman
 
办理学位证中佛罗里达大学毕业证,UCF成绩单原版一比一
办理学位证中佛罗里达大学毕业证,UCF成绩单原版一比一办理学位证中佛罗里达大学毕业证,UCF成绩单原版一比一
办理学位证中佛罗里达大学毕业证,UCF成绩单原版一比一F sss
 

Kürzlich hochgeladen (20)

Call Girls in Saket 99530🔝 56974 Escort Service
Call Girls in Saket 99530🔝 56974 Escort ServiceCall Girls in Saket 99530🔝 56974 Escort Service
Call Girls in Saket 99530🔝 56974 Escort Service
 
Machine learning classification ppt.ppt
Machine learning classification  ppt.pptMachine learning classification  ppt.ppt
Machine learning classification ppt.ppt
 
GA4 Without Cookies [Measure Camp AMS]
GA4 Without Cookies [Measure Camp AMS]GA4 Without Cookies [Measure Camp AMS]
GA4 Without Cookies [Measure Camp AMS]
 
Biometric Authentication: The Evolution, Applications, Benefits and Challenge...
Biometric Authentication: The Evolution, Applications, Benefits and Challenge...Biometric Authentication: The Evolution, Applications, Benefits and Challenge...
Biometric Authentication: The Evolution, Applications, Benefits and Challenge...
 
ASML's Taxonomy Adventure by Daniel Canter
ASML's Taxonomy Adventure by Daniel CanterASML's Taxonomy Adventure by Daniel Canter
ASML's Taxonomy Adventure by Daniel Canter
 
Data Factory in Microsoft Fabric (MsBIP #82)
Data Factory in Microsoft Fabric (MsBIP #82)Data Factory in Microsoft Fabric (MsBIP #82)
Data Factory in Microsoft Fabric (MsBIP #82)
 
Call Girls In Dwarka 9654467111 Escorts Service
Call Girls In Dwarka 9654467111 Escorts ServiceCall Girls In Dwarka 9654467111 Escorts Service
Call Girls In Dwarka 9654467111 Escorts Service
 
From idea to production in a day – Leveraging Azure ML and Streamlit to build...
From idea to production in a day – Leveraging Azure ML and Streamlit to build...From idea to production in a day – Leveraging Azure ML and Streamlit to build...
From idea to production in a day – Leveraging Azure ML and Streamlit to build...
 
Student Profile Sample report on improving academic performance by uniting gr...
Student Profile Sample report on improving academic performance by uniting gr...Student Profile Sample report on improving academic performance by uniting gr...
Student Profile Sample report on improving academic performance by uniting gr...
 
NO1 Certified Black Magic Specialist Expert Amil baba in Lahore Islamabad Raw...
NO1 Certified Black Magic Specialist Expert Amil baba in Lahore Islamabad Raw...NO1 Certified Black Magic Specialist Expert Amil baba in Lahore Islamabad Raw...
NO1 Certified Black Magic Specialist Expert Amil baba in Lahore Islamabad Raw...
 
RadioAdProWritingCinderellabyButleri.pdf
RadioAdProWritingCinderellabyButleri.pdfRadioAdProWritingCinderellabyButleri.pdf
RadioAdProWritingCinderellabyButleri.pdf
 
Advanced Machine Learning for Business Professionals
Advanced Machine Learning for Business ProfessionalsAdvanced Machine Learning for Business Professionals
Advanced Machine Learning for Business Professionals
 
While-For-loop in python used in college
While-For-loop in python used in collegeWhile-For-loop in python used in college
While-For-loop in python used in college
 
Predictive Analysis for Loan Default Presentation : Data Analysis Project PPT
Predictive Analysis for Loan Default  Presentation : Data Analysis Project PPTPredictive Analysis for Loan Default  Presentation : Data Analysis Project PPT
Predictive Analysis for Loan Default Presentation : Data Analysis Project PPT
 
Indian Call Girls in Abu Dhabi O5286O24O8 Call Girls in Abu Dhabi By Independ...
Indian Call Girls in Abu Dhabi O5286O24O8 Call Girls in Abu Dhabi By Independ...Indian Call Girls in Abu Dhabi O5286O24O8 Call Girls in Abu Dhabi By Independ...
Indian Call Girls in Abu Dhabi O5286O24O8 Call Girls in Abu Dhabi By Independ...
 
2006_GasProcessing_HB (1).pdf HYDROCARBON PROCESSING
2006_GasProcessing_HB (1).pdf HYDROCARBON PROCESSING2006_GasProcessing_HB (1).pdf HYDROCARBON PROCESSING
2006_GasProcessing_HB (1).pdf HYDROCARBON PROCESSING
 
20240419 - Measurecamp Amsterdam - SAM.pdf
20240419 - Measurecamp Amsterdam - SAM.pdf20240419 - Measurecamp Amsterdam - SAM.pdf
20240419 - Measurecamp Amsterdam - SAM.pdf
 
DBA Basics: Getting Started with Performance Tuning.pdf
DBA Basics: Getting Started with Performance Tuning.pdfDBA Basics: Getting Started with Performance Tuning.pdf
DBA Basics: Getting Started with Performance Tuning.pdf
 
INTERNSHIP ON PURBASHA COMPOSITE TEX LTD
INTERNSHIP ON PURBASHA COMPOSITE TEX LTDINTERNSHIP ON PURBASHA COMPOSITE TEX LTD
INTERNSHIP ON PURBASHA COMPOSITE TEX LTD
 
办理学位证中佛罗里达大学毕业证,UCF成绩单原版一比一
办理学位证中佛罗里达大学毕业证,UCF成绩单原版一比一办理学位证中佛罗里达大学毕业证,UCF成绩单原版一比一
办理学位证中佛罗里达大学毕业证,UCF成绩单原版一比一
 

Core intel