Cybersecurity

Booting the System

In this article by William Confer and William Roberts, author of the book, Exploring SE for Android, we will learn…

9 years ago

Cross-site Request Forgery

In this article by Y.E Liang, the author of JavaScript Security, we will cover cross-site forgery. This topic is not…

10 years ago

Untangle VPN Services

This article by Abd El-Monem A. El-Bawab, the author of Untangle Network Security, covers the Untangle solution, OpenVPN. OpenVPN is…

10 years ago

Fundamentals

(For more resources related to this topic, see here.) Vulnerability Assessment and Penetration Testing Vulnerability Assessment ( VA) and Penetrating…

10 years ago

Rounding up…

(For more resources related to this topic, see here.) We have now successfully learned how to secure our users' passwords…

10 years ago

Securing vCloud Using the vCloud Networking and Security App Firewall

(For more resources related to this topic, see here.) Creating a vCloud Networking and Security App firewall rule In this…

11 years ago

General Considerations

(For more resources related to this topic, see here.) Building secure Node.js applications will require an understanding of the many…

11 years ago

Mobile and Social – the Threats You Should Know About

(For more resources related to this topic, see here.) A prediction of the future (and the lottery numbers for next…

11 years ago

vCloud Networks

(For more resources related to this topic, see here.) Basics Network Virtualization is what makes vCloud Director such an awesome…

11 years ago

Features of CloudFlare

(For more resources related to this topic, see here.) Top 5 features you need to know about Here we will…

11 years ago