Thursday, May 14, 2015
Posted by manager
Reader's rate:
0
Contributed by Sameer Thadani. We live in a world with a new arena for committing crimes, the Cyber arena. The Internet that’s composed of multiple connected computer networks has become the grounds of battle. As corporations and governments agencies focus on creating a strong defense in the... + continue reading
Wednesday, May 13, 2015
Posted by manager
Reader's rate:
0
Contributed by Patrick Murray This paper will focus on the current growing threat of terrorist organizations as it applies to network security threats. There are many ways that common traditional cyber-attacks could be applied by these organizations that would result in devastating results.... + continue reading
Wednesday, May 13, 2015
Posted by manager
Reader's rate:
0
Contributed by Jeffery Hammonds This research study will examine how large scale data mining may negatively affect privacy as it helps solve national and international sex trafficking crimes. The data mining tool researched here is the Memex Project; created, implemented, and managed by the... + continue reading
Wednesday, May 13, 2015
Posted by manager
Reader's rate:
0
Contributed by Paola Stone Martinez. The design of a Storage Area Networks is a very complex process. There are different factors that have to be considered before setting it up. The engineers have to consider what the expectations from the users are and which topology could be more adequate for... + continue reading
Wednesday, May 13, 2015
Posted by manager
Reader's rate:
0
This contribution comes from Rahul Ravella. IPv6 has almost become a requirement for industries as well as end users. With the exhaustion of all the IPv4 addresses and the growth of number of devices the need has finally come. This paper will talk about the advantages of IPv6, its features... + continue reading

Home Page

Featured Articles

Thursday, 14/05/15 - 0 comment(s)
Contributed by Sameer Thadani. We live in a world with a new arena for committing crimes, the Cyber arena. The Internet that’s composed of multiple connected computer networks has become the grounds of battle. As corporations and governments agencies focus on creating a strong defense in the battle, adversaries focus on becoming quieter and... + continue reading
Wednesday, 13/05/15 - 0 comment(s)
Contributed by Patrick Murray This paper will focus on the current growing threat of terrorist organizations as it applies to network security threats. There are many ways that common traditional cyber-attacks could be applied by these organizations that would result in devastating results. These include simple mass DDOS attacks on government... + continue reading

Red Tape

182
reads
6 today
Wednesday, 13/05/15 - 0 comment(s)
Contributed by Jeffery Hammonds This research study will examine how large scale data mining may negatively affect privacy as it helps solve national and international sex trafficking crimes. The... + continue reading

Cryptography

212
reads
16 today
Sunday, 17/05/15 - 0 comment(s)
Contributed from Anoop MS The data transferred from one system to another over public network can be protected by the method of encryption. On encryption the data is encrypted/scrambled by any... + continue reading

Exploitation

327
reads
20 today
Thursday, 14/05/15 - 0 comment(s)
Contributed by Debasis Mohanty Google is world’s most popular and powerful search engine which has the ability to accept pre-defined commands as input and produce unbelievable results. This... + continue reading

Sistema

90
reads
5 today
Thursday, 14/05/15 - 0 comment(s)
Contributed by Eddie Sutton The systematic and methodical Footprinting of an organization enables attackers to create a complete profile of an organization’s security posture. By using a... + continue reading

Et Cetera

232
reads
22 today
Thursday, 14/05/15 - 0 comment(s)
Contributed by Codey Disney In an age where the internet has become an essential and dependent part of everyday life, information and data is constantly being added at an almost inconceivably fast... + continue reading