Tuesday, September 1, 2015
Posted by manager
Reader's rate:
0
Contributed by Charles Hornat This paper outlines some of the many IT security issues I have witnessed when taking over hotel/resort IT and security. These security lapses often times leave guest information free and open for the taking, usually requiring little to no effort to obtain. In my... + continue reading
Tuesday, September 1, 2015
Posted by manager
Reader's rate:
0
Contributed by Aditya K Sood This paper delineates the anti circumventory paradox of Leeching. This matrix co-persists with the attackers and protectors. Leeching is derived from an animal Leech, that is a parasite which nourishes itself from other resources. The same case occurs when an... + continue reading
Monday, August 31, 2015
Posted by manager
Reader's rate:
0
Contributed by Michael Davis The growing world of big data presents many interrelated ethical concerns in a business environment. These concerns touch a broad spectrum of ethical concerns including the legal, moral, financial, and social impacts of ethical planning and decision making in... + continue reading
Monday, August 31, 2015
Posted by manager
Reader's rate:
0
Contributed by Mark Lewis Industrial control systems (ICS) help run a large part of our nation’s critical infrastructure and industrial processes. The compromise of ICSs can have substantial negative impacts on our nation’s security, health, environment, and economy. Although we have been using... + continue reading
Friday, August 28, 2015
Posted by manager
Reader's rate:
0
Contributed by Luke Blum The proliferation of network capable devices, collectively known as the Internet of Things, has provided the unprecedented opportunity for owners to manage and control their devices at any time and from any place. These devices are significantly different from the... + continue reading

Home Page

Featured Articles

Tuesday, 01/09/15 - 0 comment(s)
Contributed by Charles Hornat This paper outlines some of the many IT security issues I have witnessed when taking over hotel/resort IT and security. These security lapses often times leave guest information free and open for the taking, usually requiring little to no effort to obtain. In my company’s experience (over a decade) of supporting... + continue reading
Monday, 31/08/15 - 0 comment(s)
Contributed by Michael Davis The growing world of big data presents many interrelated ethical concerns in a business environment. These concerns touch a broad spectrum of ethical concerns including the legal, moral, financial, and social impacts of ethical planning and decision making in emerging situations of data analytics and privacy. As... + continue reading

Red Tape

175
reads
175 today
Tuesday, 01/09/15 - 0 comment(s)
Contributed by Akash Shrivastava In present internet computing environment one or the other form of security has become a requirement for all web applications. Importance of Confidentiality,... + continue reading

Cryptography

268
reads
74 today
Monday, 31/08/15 - 0 comment(s)
Contributed by Roberto Larcher This paper explains how it is often possible, with the simple substitution of a string, to get around a "secure" implementation based on an incorrect use of SSL.... + continue reading

Exploitation

52
reads
52 today
Tuesday, 01/09/15 - 0 comment(s)
Contributed by Aditya K Sood This paper delineates the anti circumventory paradox of Leeching. This matrix co-persists with the attackers and protectors. Leeching is derived from an animal Leech,... + continue reading

Sistema

436
reads
38 today
Thursday, 27/08/15 - 0 comment(s)
Contributed by Anoop MS The paper discusses the hardware and software security requirements in an embedded device that are involved in the transfer of secure digital data. The paper gives an... + continue reading

Et Cetera

184
reads
184 today
Tuesday, 01/09/15 - 0 comment(s)
Contributed by Charles Hornat This paper outlines some of the many IT security issues I have witnessed when taking over hotel/resort IT and security. These security lapses often times leave guest... + continue reading

Recommended Reading

939
reads
20 today
Thursday, 30/07/15 - 0 comment(s)
This book was written by Mary Ellen O'Toole, PH.D. and Alisa Bowman. Taken from her web site "Dr. O’Toole also worked the Elizabeth Smart and Natalee Holloway disappearances, the Columbine... + continue reading