Friday, August 28, 2015
Posted by manager
Reader's rate:
0
Contributed by Luke Blum The proliferation of network capable devices, collectively known as the Internet of Things, has provided the unprecedented opportunity for owners to manage and control their devices at any time and from any place. These devices are significantly different from the... + continue reading
Thursday, August 27, 2015
Posted by manager
Reader's rate:
0
Contributed by Anoop MS The paper discusses the hardware and software security requirements in an embedded device that are involved in the transfer of secure digital data. The paper gives an overview on the security processes like encryption/decryption, key agreement, digital signatures and... + continue reading
Thursday, August 27, 2015
Posted by manager
Reader's rate:
0
Contributed by Andre Derek Protas This paper is meant to serve as an introductory guide to the basic security and server hardening functions present in AIX. Many of the features and functions shown throughout this guide are applicable to AIX 4.3 and above, but are more directed toward AIX 5.2.... + continue reading
Wednesday, August 26, 2015
Posted by manager
Reader's rate:
0
Contributed by Marlicia Pollard For this term paper I will be discussing the subject of Intrusion detection. I will be going in depth as to what steps one could take to prevent intrusions on their network and what different signs to look for if they think that an intrusion has occurred. There... + continue reading
Wednesday, August 26, 2015
Posted by manager
Reader's rate:
0
Contributed by Jonathan Fortune In the last 25 years the K-12 public education system in the United States has seen a dramatic shift in its use of technology in the classroom. Both school districts and individual schools are increasingly faced with the decision about what kind of technology will... + continue reading

Home Page

Featured Articles

Friday, 28/08/15 - 0 comment(s)
Contributed by Luke Blum The proliferation of network capable devices, collectively known as the Internet of Things, has provided the unprecedented opportunity for owners to manage and control their devices at any time and from any place. These devices are significantly different from the traditional computing devices that most people are... + continue reading
Wednesday, 19/08/15 - 0 comment(s)
Contributed by Raj Chandel (www.hackingarticles.in) Footprinting is the technique of gathering information about computer systems and the entities they belong to. This document is in PDF format. To view it click here. + continue reading

Red Tape

169
reads
6 today
Thursday, 27/08/15 - 0 comment(s)
Contributed by Andre Derek Protas This paper is meant to serve as an introductory guide to the basic security and server hardening functions present in AIX. Many of the features and functions... + continue reading

Cryptography

446
reads
46 today
Friday, 21/08/15 - 0 comment(s)
Contributed by Rob Hornbuckle Providers of encryption software do not protect against side channel attacks, leaving organizations vulnerable to exploitation. For those companies who have a... + continue reading

Exploitation

287
reads
8 today
Friday, 28/08/15 - 0 comment(s)
Contributed by Corsaire and Stephen de Vries In order to achieve business goals, organisations frequently have to develop bespoke application solutions or customise commercial off-the-shelf (COTS... + continue reading

Sistema

334
reads
12 today
Thursday, 27/08/15 - 0 comment(s)
Contributed by Anoop MS The paper discusses the hardware and software security requirements in an embedded device that are involved in the transfer of secure digital data. The paper gives an... + continue reading

Et Cetera

275
reads
12 today
Friday, 28/08/15 - 0 comment(s)
Contributed by Luke Blum The proliferation of network capable devices, collectively known as the Internet of Things, has provided the unprecedented opportunity for owners to manage and control... + continue reading

Recommended Reading

910
reads
2 today
Thursday, 30/07/15 - 0 comment(s)
This book was written by Mary Ellen O'Toole, PH.D. and Alisa Bowman. Taken from her web site "Dr. O’Toole also worked the Elizabeth Smart and Natalee Holloway disappearances, the Columbine... + continue reading