Tuesday, May 28, 2019
Posted by manager
Reader's rate:
0
Contributed by Brian May decryption should be deployed in your enterprise environment, next generation firewalls (NGFW) must first be explained. In short a NGFW is a network appliance that packages together multiple security functions that range from firewall, IPS/IDS, URL filtering, spam... + continue reading
Friday, May 24, 2019
Posted by manager
Reader's rate:
0
Contributed by Josh Russell   In this paper I will be discussing the topic of securing databases. The importance of securing servers with databases, is that there is a lot of person or sensitive data store on it. In today’s world, almost everything is stored online. People pay bills... + continue reading
Thursday, May 23, 2019
Posted by manager
Reader's rate:
5
Contributed by Jerrette McCrimmon The computer has assisted with variations of job functions and the ability to connect devices to networks for the intent and purpose of communicating with other users. The transformation of information over networks has created a world of virtual and a social... + continue reading
Wednesday, May 22, 2019
Posted by manager
Reader's rate:
0
Contributed by Andres Castillo This paper will discuss the benefits and challenges of developing an environment of IIoT and Fog computing within a manufacturing environment. Identifying security concerns to include attack points and defending against black hats in their quest to infiltrate or... + continue reading
Tuesday, May 14, 2019
Posted by manager
Reader's rate:
0
Contributed by Chris Choyce This paper will define and analyze injection attacks and dive into why the attack surface is one of the largest available for adversaries. There are several types of injection attacks and they all involve the manipulation of code at a public available “doorway... + continue reading

Home Page

Featured Articles

Wednesday, 22/05/19 - 0 comment(s)
Contributed by Andres Castillo This paper will discuss the benefits and challenges of developing an environment of IIoT and Fog computing within a manufacturing environment. Identifying security concerns to include attack points and defending against black hats in their quest to infiltrate or introduce damaging software. We will discuss benefits... + continue reading
Tuesday, 14/05/19 - 0 comment(s)
Contributed by Chris Choyce This paper will define and analyze injection attacks and dive into why the attack surface is one of the largest available for adversaries. There are several types of injection attacks and they all involve the manipulation of code at a public available “doorway” to the data store that is threatened. The two... + continue reading

Red Tape

Wednesday, 20/02/19 - 0 comment(s)
Contributed by Subhrodip Roy Chowdhury In recent years, machine learning is revolutionizing almost every field of science due to its unique properties like adaptability, scalability and ability to... + continue reading

Cryptography

Monday, 22/05/17 - 0 comment(s)
Contributed by The following paragraphs will how show someone can make sure that a website has a digital certificate, what is a digital certificate and what are the available types, why they... + continue reading

Exploitation

Friday, 24/05/19 - 0 comment(s)
Contributed by Josh Russell   In this paper I will be discussing the topic of securing databases. The importance of securing servers with databases, is that there is a lot of person or... + continue reading

Sistema

Tuesday, 07/05/19 - 0 comment(s)
Contributed by Vinay Sawant Artificial Intelligence (AI) technology is growing at very fast rate and its use is increasing in various fields day by day. Today, Artificial Intelligence is used in... + continue reading

Et Cetera

Tuesday, 28/05/19 - 0 comment(s)
Contributed by Brian May decryption should be deployed in your enterprise environment, next generation firewalls (NGFW) must first be explained. In short a NGFW is a network appliance that packages... + continue reading

Recommended Reading

Monday, 19/03/18 - 0 comment(s)
Written by Gabriella Coleman I was personally interested in reading about Anonymous and bought this book to satisfy that urge.  It was released in 2014/2015 but an interesting read to... + continue reading