Abstract
The purpose of this exercise was to create an experimental environment by which penetration testing could be...
Abstract Teaching information security defense can be a hot topic. Talking about penetration testing is different than...
ABSTRACT With an ever increasing number of threats to network environments, it has become important for information...
Sugata Mitra from India using a window in a wall tests with extensive rigor the idea of...
After a great start we have seen one set back. The zucchini has died. We are not...
This is an interesting if dry discussion on the current state of higher education and how liberal...
Sometimes a book comes along that just by the title you have to read. In a rather...
This book as part of the movement that doesn’t appear to have gotten off the ground is...
This book is a work of fiction looking at the special operations forces working in Northern Vietnam,...
I don’t get invited to cool conferences to speak. I don’t live in Washington D.C. More importantly...
So, first thing is what do we mean by operationalize? This is a big word for the...
The author Ronald Krutz takes the reader through the various elements of cyber security as it is...
Reconnaissance is often considered synonymous with footprinting of systems. The idea is to get as much knowledge...
“Cyberpower and National Security” edited by Fraklin D. Kramer, Stuart H. Starr, and Larry K. Wentz is...