Saturday, August 1, 2015
Posted by manager
Reader's rate:
0
Contributed by Robert Underwood SharePoint Communication Protocol Hardening will discuss the details related to sever to server communication within the SharePoint communication schema. This paper will describe the typesof protocols that SharePoint is capable to using with an emphasis on NTLM... + continue reading
Thursday, July 30, 2015
Posted by manager
Reader's rate:
0
Contributed by Harrison Christopher Forest An ever-present concern in today’s information systems is network security and data integrity. It is essential for enterprises globally to maintain a strict network policy to ensure that data breaches are mitigated by all means possible. Businesses... + continue reading
Thursday, July 30, 2015
Posted by manager
Reader's rate:
5
This book was written by Mary Ellen O'Toole, PH.D. and Alisa Bowman. Taken from her web site "Dr. O’Toole also worked the Elizabeth Smart and Natalee Holloway disappearances, the Columbine shootings and many other high profile cases. Her law enforcement career spanned 32 years, beginning in... + continue reading
Wednesday, July 29, 2015
Posted by manager
Reader's rate:
0
Contributed by Stephen Allen This paper will present the current security strategies for securing mobile data at U.S. Universities. In today’s high tech world each worker has a mobile device that can also connect to the organization's WiFi and provide a possible breach. My paper will present... + continue reading
Tuesday, July 28, 2015
Posted by manager
Reader's rate:
0
Contributed by Robert Martin This paper focuses on avoiding Social Engineering attacks through Security Education Training and Awareness (SETA). Hackers continue to exploit the weakest asset in IT security, which is the human asset. This paper will outline four Social Engineering attacks that... + continue reading

Home Page

Featured Articles

Saturday, 01/08/15 - 0 comment(s)
Contributed by Robert Underwood SharePoint Communication Protocol Hardening will discuss the details related to sever to server communication within the SharePoint communication schema. This paper will describe the typesof protocols that SharePoint is capable to using with an emphasis on NTLM communication. Within the discussion of NTLM... + continue reading
Tuesday, 28/07/15 - 0 comment(s)
Contributed by A. Michele Parrish More and more homes are getting smart appliances. They have refrigerators, toilets, garage doors, thermostats and other appliances that are connected to the Internet and can be controlled from anywhere. The problem is can they also be controlled by anyone or just the homeowners? With the proliferation of smart... + continue reading

Red Tape

536
reads
35 today
Tuesday, 28/07/15 - 0 comment(s)
Contributed by Robert Martin This paper focuses on avoiding Social Engineering attacks through Security Education Training and Awareness (SETA). Hackers continue to exploit the weakest asset in IT... + continue reading

Cryptography

Cryptography
1.108
reads
20 today
Wednesday, 08/07/15 - 0 comment(s)
Contributed by Ashish Anand and restored from the old Infosecwriters archives. “If I take a letter, lock it in a safe, hide the safe somewhere in New York, then tell you to read the letter, that’s... + continue reading

Exploitation

232
reads
232 today
Monday, 03/08/15 - 0 comment(s)
Contributed by Aelphaeis Mangarae and restored from the Infosecwriters archives This paper is a sequel to my “Learn Information Gathering By Example”. This paper will go through looking for... + continue reading

Sistema

348
reads
14 today
Saturday, 01/08/15 - 0 comment(s)
Contributed by Robert Underwood SharePoint Communication Protocol Hardening will discuss the details related to sever to server communication within the SharePoint communication schema. This paper... + continue reading

Et Cetera

234
reads
26 today
Thursday, 30/07/15 - 0 comment(s)
Contributed by Harrison Christopher Forest An ever-present concern in today’s information systems is network security and data integrity. It is essential for enterprises globally to maintain a... + continue reading

Recommended Reading

202
reads
25 today
Thursday, 30/07/15 - 0 comment(s)
This book was written by Mary Ellen O'Toole, PH.D. and Alisa Bowman. Taken from her web site "Dr. O’Toole also worked the Elizabeth Smart and Natalee Holloway disappearances, the Columbine... + continue reading