Thursday, August 27, 2015
Posted by manager
Reader's rate:
0
Contributed by Anoop MS The paper discusses the hardware and software security requirements in an embedded device that are involved in the transfer of secure digital data. The paper gives an overview on the security processes like encryption/decryption, key agreement, digital signatures and... + continue reading
Thursday, August 27, 2015
Posted by manager
Reader's rate:
0
Contributed by Andre Derek Protas This paper is meant to serve as an introductory guide to the basic security and server hardening functions present in AIX. Many of the features and functions shown throughout this guide are applicable to AIX 4.3 and above, but are more directed toward AIX 5.2.... + continue reading
Wednesday, August 26, 2015
Posted by manager
Reader's rate:
0
Contributed by Marlicia Pollard For this term paper I will be discussing the subject of Intrusion detection. I will be going in depth as to what steps one could take to prevent intrusions on their network and what different signs to look for if they think that an intrusion has occurred. There... + continue reading
Wednesday, August 26, 2015
Posted by manager
Reader's rate:
0
Contributed by Jonathan Fortune In the last 25 years the K-12 public education system in the United States has seen a dramatic shift in its use of technology in the classroom. Both school districts and individual schools are increasingly faced with the decision about what kind of technology will... + continue reading
Monday, August 24, 2015
Posted by manager
Reader's rate:
0
Contributed by Velma Edwards Cloud computing is the hottest topic in Technology these days. Many businesses have started outsourcing there IT to the cloud because of the benefits that cloud offers. Cloud computing has given a business a new way to effectively improved business processes with... + continue reading

Home Page

Featured Articles

Wednesday, 19/08/15 - 0 comment(s)
Contributed by Raj Chandel (www.hackingarticles.in) Footprinting is the technique of gathering information about computer systems and the entities they belong to. This document is in PDF format. To view it click here. + continue reading
Monday, 17/08/15 - 0 comment(s)
Contributed by Jillena Locklear The field of information technology (IT) has grown extensively in the past few decades. This growth can be attributed to the advancement of technology and the impact that new technology has had on consumerism. Technology has developed a new avenue for societal consumers. The World Wide Web (Internet) alone has... + continue reading

Red Tape

121
reads
52 today
Thursday, 27/08/15 - 0 comment(s)
Contributed by Andre Derek Protas This paper is meant to serve as an introductory guide to the basic security and server hardening functions present in AIX. Many of the features and functions... + continue reading

Cryptography

296
reads
12 today
Friday, 21/08/15 - 0 comment(s)
Contributed by Rob Hornbuckle Providers of encryption software do not protect against side channel attacks, leaving organizations vulnerable to exploitation. For those companies who have a... + continue reading

Exploitation

327
reads
2 today
Monday, 24/08/15 - 0 comment(s)
Contributed by Bryan Sullivan More and more, developers are becoming aware of the threats posed by malicious code, and SQL injection in particular, and by leaving code vulnerable to such attacks.... + continue reading

Sistema

266
reads
55 today
Thursday, 27/08/15 - 0 comment(s)
Contributed by Anoop MS The paper discusses the hardware and software security requirements in an embedded device that are involved in the transfer of secure digital data. The paper gives an... + continue reading

Et Cetera

559
reads
13 today
Wednesday, 19/08/15 - 0 comment(s)
Contributed by Thomas Stroud The purpose of this paper is to propose a new method for verifying the identities of vendors in electronic transaction processing as it relates to consumer confidence... + continue reading

Recommended Reading

869
reads
3 today
Thursday, 30/07/15 - 0 comment(s)
This book was written by Mary Ellen O'Toole, PH.D. and Alisa Bowman. Taken from her web site "Dr. O’Toole also worked the Elizabeth Smart and Natalee Holloway disappearances, the Columbine... + continue reading