A collection of awesome framework, libraries, learning tutorials, videos, webcasts, technical resources and cool stuff about General Data Protection Regulation (GDPR).
☆19Oct 27, 2023Updated 2 years ago
Alternatives and similar repositories for cybersecurity-gdpr-compliance
Users that are interested in cybersecurity-gdpr-compliance are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites…☆11Mar 25, 2023Updated 3 years ago
- A collection of cybsecurity tools, software, libraries, learning tutorials, frameworks, academic and practical resources in security.☆20Feb 29, 2024Updated 2 years ago
- A collection of awesome framework, libraries, learning tutorials, videos, webcasts, technical resources and cool stuff about iOS Security…☆25Jan 6, 2024Updated 2 years ago
- An ongoing & curated collection of awesome AuthN+Z software, libraries and frameworks, best guidelines and technical resources and cool s…☆18Dec 13, 2023Updated 2 years ago
- A collection of CS tools, software, libraries, learning tutorials, frameworks, academic and practical resources for Computer Science stu…☆19Mar 6, 2022Updated 4 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- A collection of awesome framework, libraries, documents, learning tutorials, resources about SOC 2 tools and processes.☆27Jan 30, 2022Updated 4 years ago
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites…☆21Feb 24, 2024Updated 2 years ago
- An ongoing collection of awesome software, API libraries, checlists, best guidelines and resources and most important security countermea…☆14Nov 15, 2022Updated 3 years ago
- A collection of awesome software, learning tutorials, theoretical resources, books and videos, best practices in applied cryptography.