Saturday, August 1, 2015
Posted by manager
Reader's rate:
0
Contributed by Robert Underwood SharePoint Communication Protocol Hardening will discuss the details related to sever to server communication within the SharePoint communication schema. This paper will describe the typesof protocols that SharePoint is capable to using with an emphasis on NTLM... + continue reading
Thursday, July 30, 2015
Posted by manager
Reader's rate:
0
Contributed by Harrison Christopher Forest An ever-present concern in today’s information systems is network security and data integrity. It is essential for enterprises globally to maintain a strict network policy to ensure that data breaches are mitigated by all means possible. Businesses... + continue reading
Thursday, July 30, 2015
Posted by manager
Reader's rate:
5
This book was written by Mary Ellen O'Toole, PH.D. and Alisa Bowman. Taken from her web site "Dr. O’Toole also worked the Elizabeth Smart and Natalee Holloway disappearances, the Columbine shootings and many other high profile cases. Her law enforcement career spanned 32 years, beginning in... + continue reading
Wednesday, July 29, 2015
Posted by manager
Reader's rate:
0
Contributed by Stephen Allen This paper will present the current security strategies for securing mobile data at U.S. Universities. In today’s high tech world each worker has a mobile device that can also connect to the organization's WiFi and provide a possible breach. My paper will present... + continue reading
Tuesday, July 28, 2015
Posted by manager
Reader's rate:
0
Contributed by Robert Martin This paper focuses on avoiding Social Engineering attacks through Security Education Training and Awareness (SETA). Hackers continue to exploit the weakest asset in IT security, which is the human asset. This paper will outline four Social Engineering attacks that... + continue reading

Home Page

Featured Articles

Saturday, 01/08/15 - 0 comment(s)
Contributed by Robert Underwood SharePoint Communication Protocol Hardening will discuss the details related to sever to server communication within the SharePoint communication schema. This paper will describe the typesof protocols that SharePoint is capable to using with an emphasis on NTLM communication. Within the discussion of NTLM... + continue reading
Tuesday, 28/07/15 - 0 comment(s)
Contributed by A. Michele Parrish More and more homes are getting smart appliances. They have refrigerators, toilets, garage doors, thermostats and other appliances that are connected to the Internet and can be controlled from anywhere. The problem is can they also be controlled by anyone or just the homeowners? With the proliferation of smart... + continue reading

Red Tape

459
reads
10 today
Tuesday, 28/07/15 - 0 comment(s)
Contributed by Robert Martin This paper focuses on avoiding Social Engineering attacks through Security Education Training and Awareness (SETA). Hackers continue to exploit the weakest asset in IT... + continue reading

Cryptography

Cryptography
1.074
reads
2 today
Wednesday, 08/07/15 - 0 comment(s)
Contributed by Ashish Anand and restored from the old Infosecwriters archives. “If I take a letter, lock it in a safe, hide the safe somewhere in New York, then tell you to read the letter, that’s... + continue reading

Exploitation

308
reads
4 today
Wednesday, 29/07/15 - 0 comment(s)
Contributed by Librado Santibanez A confounding computer bug called “Heartbleed” is causing major security worries across the internet. Heartbleed affects many things, including web servers,... + continue reading

Sistema

318
reads
15 today
Saturday, 01/08/15 - 0 comment(s)
Contributed by Robert Underwood SharePoint Communication Protocol Hardening will discuss the details related to sever to server communication within the SharePoint communication schema. This paper... + continue reading

Et Cetera

201
reads
1 today
Thursday, 30/07/15 - 0 comment(s)
Contributed by Harrison Christopher Forest An ever-present concern in today’s information systems is network security and data integrity. It is essential for enterprises globally to maintain a... + continue reading

Recommended Reading

162
reads
2 today
Thursday, 30/07/15 - 0 comment(s)
This book was written by Mary Ellen O'Toole, PH.D. and Alisa Bowman. Taken from her web site "Dr. O’Toole also worked the Elizabeth Smart and Natalee Holloway disappearances, the Columbine... + continue reading