Monday, May 21, 2018
Posted by manager
Reader's rate:
0
Contributed by Arthur J. Wyatt This paper attempts to cover and discuss several aspects of Intrusion Prevention Systems and Intrusion Detection Systems. This paper attempts to do this is simple and basic language. Both systems are explained and defined according to the National Institute of... + continue reading
Saturday, April 7, 2018
Posted by manager
Reader's rate:
0
COntributed by Oluwaseun Dare   Digital health applications are critical to today’s healthcare systems as it provides the ability for end users to access and use information at a rapid accelerated rate. Users for health information systems and data can include patients, doctors, nurses... + continue reading
Monday, March 26, 2018
Posted by manager
Reader's rate:
0
Contributed by Stephen Jenkins This paper will emphasize a list of recommendations for establishing an efficient information security network within the ABCD Company. Along with the provided list of recommendations an explanation on how to conform to the requirements of the Sarbanes-Oxley Act.... + continue reading
Friday, March 23, 2018
Posted by manager
Reader's rate:
0
Contributed by Billy Short Bring Your Own Device policies are becoming more common.  Information Technology teams will have to ensure that they accommodate these growing movements.  This document will help teams understand how the BYOD policy will change their network infrastructure, why... + continue reading
Tuesday, March 20, 2018
Posted by manager
Reader's rate:
0
Contributed by David Balaban One can easily find weak points and vulnerabilities virtually everywhere: our bodies are vulnerable to viruses and weak in front of the eternity, and there’s a lot of weak points in our memory and our mind. All the software solutions we create are also imperfect... + continue reading

Home Page

Featured Articles

Tuesday, 20/03/18 - 0 comment(s)
Contributed by David Balaban One can easily find weak points and vulnerabilities virtually everywhere: our bodies are vulnerable to viruses and weak in front of the eternity, and there’s a lot of weak points in our memory and our mind. All the software solutions we create are also imperfect. In this article, I will try to address matters... + continue reading
Sunday, 18/03/18 - 0 comment(s)
Contributed by David Mitchell Enterprises and companies have depended on private networks, such as private T1 access to MPLS service for their bandwidth performance. The high cost of these services has encouraged the technology industries to develop some cheaper solutions as technology evolved. The support of more demanding real-time... + continue reading

Red Tape

Monday, 26/03/18 - 0 comment(s)
Contributed by Stephen Jenkins This paper will emphasize a list of recommendations for establishing an efficient information security network within the ABCD Company. Along with the provided list of... + continue reading

Cryptography

Monday, 22/05/17 - 0 comment(s)
Contributed by The following paragraphs will how show someone can make sure that a website has a digital certificate, what is a digital certificate and what are the available types, why they... + continue reading

Exploitation

Thursday, 27/04/17 - 0 comment(s)
Contributed by David Patten Malware and viruses have been around since the early days of computers. The computer security industry has often played a game of cat and mouse with malware authors in... + continue reading

Sistema

Monday, 21/05/18 - 0 comment(s)
Contributed by Arthur J. Wyatt This paper attempts to cover and discuss several aspects of Intrusion Prevention Systems and Intrusion Detection Systems. This paper attempts to do this is simple and... + continue reading

Et Cetera

Sunday, 18/03/18 - 0 comment(s)
Contributed by Timothy Buns   Network design entails many different angles, and it should take some very careful planning when implementing a new network or configuring a redesign. In this... + continue reading

Recommended Reading

Monday, 19/03/18 - 0 comment(s)
Written by Gabriella Coleman I was personally interested in reading about Anonymous and bought this book to satisfy that urge.  It was released in 2014/2015 but an interesting read to... + continue reading