Cyber Security and the Internet of Things
We’re living in a world that’s more connected than we once ever thought possible. Even 10 years ago, the idea of our household appliances...
Scraping the Web with Python – Quick Start
In this article we're going to acquire intelligence data from a variety of sources. We might interview people. We might steal files from a...
OAuth 2.0 – Gaining Consent
In this article by Charles Bihis, the author of the book, Mastering OAuth 2.0, discusses the topic of gaining consent in OAuth 2.0.
OAuth 2.0...
Securing OpenStack Networking
In this article by Fabio Alessandro Locati, author of the book OpenStack Cloud Security, you will learn about the importance of firewall, IDS, and...
SysAdmin & Security – Salary & Skills Video
What do Sys Admins and Security specialists need to get the best salary they can get in the world today? What skills are companies...
The biggest Sysadmin and Security salary and skills survey of 2015
See the highlights from our comprehensive Skill Up IT industry salary reports, with data from over 20,000 IT professionals. Read on to discover which skills...
Security in Microsoft Azure
In this article, we highlight some security points of interest, according to the ones explained in the book Microsoft Azure Security, by Roberto Freato.
Microsoft Azure...
Puppet and OS Security Tools
In this article by Jason Slagle, author of the book Learning Puppet Security, covers using Puppet to manage SELinux and auditd. We learned a...
iOS Security Overview
In this article by Allister Banks and Charles S. Edge, the authors of the book, Learning iOS Security, we will go through an overview of...
Booting the System
In this article by William Confer and William Roberts, author of the book, Exploring SE for Android, we will learn once we have an...