Sunday, March 10, 2019
Posted by manager
Reader's rate:
0
Contributed by Arthur Wyatt One of the most important things to consider when designing or creating a network architecture or infrastructure is what the security needs are and how best to achieve that security. When deciding the level of security needed there are several things that need to be... + continue reading
Monday, March 4, 2019
Posted by manager
Reader's rate:
0
Contributed by Mark E. Turner In the past 5 years, the Internet of Things (IoT) has exploded onto the computing world and changed markets with it.  No market has been changed more than the consumer market.  As a result, consumers have enjoyed huge improvements to their everyday lives.... + continue reading
Wednesday, February 20, 2019
Posted by manager
Reader's rate:
0
Contributed by Subhrodip Roy Chowdhury In recent years, machine learning is revolutionizing almost every field of science due to its unique properties like adaptability, scalability and ability to handle unknown challenges. It is targeted towards reducing human effort and intervention. Identity... + continue reading
Friday, December 28, 2018
Posted by manager
Reader's rate:
0
Contributed by Christopher Hovis This paper will look at how social engineers exploit human vulnerabilities through digital social engineering attacks and how those attacks can affect the confidentiality, integrity, and accessibility of information and computer systems. Social engineering attacks... + continue reading
Thursday, December 27, 2018
Posted by manager
Reader's rate:
0
Contributed by Marc Colonna Access control starts with the front door to the organization, continues with appropriate security in and outside of the data center, and finishes with good user education. Strong and competent companies will employ the appropriate security standards deemed necessary... + continue reading

Home Page

Featured Articles

Wednesday, 20/02/19 - 0 comment(s)
Contributed by Subhrodip Roy Chowdhury In recent years, machine learning is revolutionizing almost every field of science due to its unique properties like adaptability, scalability and ability to handle unknown challenges. It is targeted towards reducing human effort and intervention. Identity and Access Management (IAM) is also not an exception... + continue reading
Sunday, 25/11/18 - 0 comment(s)
Contributed by David McDaniel Information security professionals must plan for, identify, and mitigate threats originating from a myriad of sources. While these individuals and teams are required to implement numerous technological controls and protections such as firewalls, intrusion detection systems, strong password usage, and even encryption... + continue reading

Red Tape

Wednesday, 20/02/19 - 0 comment(s)
Contributed by Subhrodip Roy Chowdhury In recent years, machine learning is revolutionizing almost every field of science due to its unique properties like adaptability, scalability and ability to... + continue reading

Cryptography

Monday, 22/05/17 - 0 comment(s)
Contributed by The following paragraphs will how show someone can make sure that a website has a digital certificate, what is a digital certificate and what are the available types, why they... + continue reading

Exploitation

Tuesday, 05/06/18 - 0 comment(s)
Contributed by Timothy E. Robinson For quite some time now, I have been interested in the computer engineering. I particularly enjoyed processor design and implementation. Designing and building x86... + continue reading

Sistema

Sunday, 25/11/18 - 0 comment(s)
Contributed by David Balaban As with all other modern web browsers, Mozilla Firefox offers several features that help sending your data via the World Wide Web. By default, Firefox connects to... + continue reading

Et Cetera

Sunday, 10/03/19 - 0 comment(s)
Contributed by Arthur Wyatt One of the most important things to consider when designing or creating a network architecture or infrastructure is what the security needs are and how best to achieve... + continue reading

Recommended Reading

Monday, 19/03/18 - 0 comment(s)
Written by Gabriella Coleman I was personally interested in reading about Anonymous and bought this book to satisfy that urge.  It was released in 2014/2015 but an interesting read to... + continue reading