Monday, August 22, 2016
Posted by manager
Reader's rate:
0
Contributed by LoyCurtis Smith Despite efforts to extend IPv4 addressing with the introduction of private IP addressing, network address translation (one private IP to one public IP conversion), and port address translation (many private IPs to one public IP conversion), the world is still en... + continue reading
Tuesday, August 16, 2016
Posted by manager
Reader's rate:
5
Contributed by L. Taron Mattocks Technology pervades all aspects of our society. The statement appears fairly innocuous but we tend to stereotype technology to high level mainframes and enterprise structures. The reality of the statement is that many computers are no different from the consumer... + continue reading
Tuesday, August 9, 2016
Posted by manager
Reader's rate:
0
Contributed by Lamaris Davis The responsibility of risk management in healthcare systems falls on multiple individuals within any given organization. It’s well known that most hospitals and healthcare systems do not have a completely practicable risk management system that spans across an entire... + continue reading
Monday, August 8, 2016
Posted by manager
Reader's rate:
0
Contributed by Bill Clark This paper discusses what Incident Response (IR) Planning is, what Industrial Control Systems (ICS) are, and how IR Planning pertains to ICS security. IR Planning is the process of preparing for any type of adverse event, also known as an incident, which can cause a... + continue reading
Monday, August 8, 2016
Posted by manager
Reader's rate:
0
Contributed by Billy Short During my studies here at East Carolina University, I have studied and read about many different t types of emerging technologies. For this writing, I will be focusing on fog computing. Before this report, I had only heard of fog computing mentioned occasionally during... + continue reading

Home Page

Featured Articles

Monday, 08/08/16 - 0 comment(s)
Contributed by Bill Clark This paper discusses what Incident Response (IR) Planning is, what Industrial Control Systems (ICS) are, and how IR Planning pertains to ICS security. IR Planning is the process of preparing for any type of adverse event, also known as an incident, which can cause a process degradation or failure in a system. A... + continue reading
Wednesday, 20/07/16 - 0 comment(s)
Contributed by David W. Mitchell Federal government’s broad powers to act for public safety and national security are limited by the First Amendment and Fourth Amendment. The 9/11 attack have open the doors on warrantless surveillance programs. The mass collection of sensitive information has been challenged by many as an invasion of privacy.... + continue reading

Red Tape

Tuesday, 09/08/16 - 0 comment(s)
Contributed by Lamaris Davis The responsibility of risk management in healthcare systems falls on multiple individuals within any given organization. It’s well known that most hospitals and... + continue reading

Cryptography

Monday, 22/08/16 - 0 comment(s)
Contributed by Aelphaeis Mangarae Steganography is the practice of hiding private or sensitive information within something that appears to be nothing out of the usual. Steganography is often... + continue reading

Exploitation

Monday, 22/08/16 - 0 comment(s)
Contributed by Shynlie Simmons This paper focuses on hacking techniques of web applications and how the implementation of security through programming can keep intruders from wreaking havoc on... + continue reading

Sistema

Monday, 22/08/16 - 0 comment(s)
Contributed by Daniel G. James You have probably heard someone make the statement, “once it is has been deleted it is gone forever!” This statement is simply just not true. Deleted files can... + continue reading

Et Cetera

Monday, 22/08/16 - 0 comment(s)
Contributed by LoyCurtis Smith Despite efforts to extend IPv4 addressing with the introduction of private IP addressing, network address translation (one private IP to one public IP conversion),... + continue reading

Recommended Reading

Wednesday, 21/10/15 - 0 comment(s)
Contributed by Tarek "...With every technology there are unintended consequences. And in the case of computer technology, the unintended consequence was that inherently bad people could use the... + continue reading