Tuesday, May 31, 2016
Posted by manager
Reader's rate:
5
Contributed by Riya Shah and Manisha Valera The amount of digital data generated is growing by the day and so is the need to protect sensitive content from being published on the Internet. This paper talks about studies in the field of content-based detection of both personal sensitive... + continue reading
Monday, May 16, 2016
Posted by manager
Reader's rate:
0
Contributed by Jeff Dixon It’s well known that technology changes and creates new and increasing demands at an incredible pace. There have been few dramatic changes in how networks are designed over the years, however, that is quickly changing with the advent of Software Defined Networking (SDN... + continue reading
Wednesday, May 4, 2016
Posted by manager
Reader's rate:
5
Contributed by Billy Short This document was created for the implementation of best practices in enterprise network management. Specifically, best practices in security are emphasized. Best practices in an enterprise network are used by Network Administrators and Information Technology... + continue reading
Wednesday, May 4, 2016
Posted by manager
Reader's rate:
0
Contributed by Leonard M. Pickering Android is a mobile Operating System (OS) developed by Google based on the Linux kernel. The OS was initially developed by Android, Inc. with the backing of Google in 2005. After three years of development, the first Android based mobile phone was available... + continue reading
Friday, April 22, 2016
Posted by manager
Reader's rate:
5
Contributed by Robert Underwood Managing cyber security vulnerabilities in a large network is a big challenge where the implementation of cyber security techniques can create network slowdowns that negatively impact customers and the delivery of service. The challenge of managing cyber security... + continue reading

Home Page

Featured Articles

Tuesday, 31/05/16 - 0 comment(s)
Contributed by Riya Shah and Manisha Valera The amount of digital data generated is growing by the day and so is the need to protect sensitive content from being published on the Internet. This paper talks about studies in the field of content-based detection of both personal sensitive information like name, birth date, medical records and... + continue reading
Monday, 11/04/16 - 0 comment(s)
Contributed by Mazin Ahmed In this post, I will be talking about an interesting bug that affects Google Blogger. This security bug has been left undiscovered since almost 2007. The bug allows an attacker to trick the victim into revealing his email address using UI-Redressing techniques. This document is in PDF format. To view it click here. + continue reading

Red Tape

1.211
reads
12 today
Monday, 11/04/16 - 0 comment(s)
Contributed by David Mitchell Over the past years there have been targeted data breaches that affected many large corporation and even the federal government. Target store and Office of Personnel... + continue reading

Cryptography

2.296
reads
8 today
Monday, 11/01/16 - 0 comment(s)
Contributed by M. Orumiehchi Fastflex is a fast and flexible stream cipher that is designed for hardware and software environments. In this article, we point out that the keystream generated from... + continue reading

Exploitation

1.347
reads
9 today
Monday, 11/04/16 - 0 comment(s)
Contributed by Mazin Ahmed In this post, I will be talking about an interesting bug that affects Google Blogger. This security bug has been left undiscovered since almost 2007. The bug allows an... + continue reading

Sistema

945
reads
18 today
Wednesday, 04/05/16 - 0 comment(s)
Contributed by Leonard M. Pickering Android is a mobile Operating System (OS) developed by Google based on the Linux kernel. The OS was initially developed by Android, Inc. with the backing of... + continue reading

Et Cetera

231
reads
231 today
Tuesday, 31/05/16 - 0 comment(s)
Contributed by Riya Shah and Manisha Valera The amount of digital data generated is growing by the day and so is the need to protect sensitive content from being published on the Internet. This... + continue reading

Recommended Reading

2.963
reads
15 today
Wednesday, 21/10/15 - 0 comment(s)
Contributed by Tarek "...With every technology there are unintended consequences. And in the case of computer technology, the unintended consequence was that inherently bad people could use the... + continue reading