Aggregator
Suntan, Sunglasses, Suitcases… and Devices! Indians Find It Hard to Unplug on Vacations
8 years 3 months ago
I was showing a friend around Kolkata when we noted several tourists (very evident because of their attire and photographic...
The post Suntan, Sunglasses, Suitcases… and Devices! Indians Find It Hard to Unplug on Vacations appeared first on McAfee Blog.
McAfee
子域名收集笔记
8 years 3 months ago
Avoiding the Epidemic of Hospital Hacks
8 years 3 months ago
Good security is highly dependent on hospital staff being well trained and having the discipline to follow security processes—manual and otherwise—to the letter.
Avoiding the Epidemic of Hospital Hacks
8 years 3 months ago
Good security is highly dependent on hospital staff being well trained and having the discipline to follow security processes—manual and otherwise—to the letter.
Avoiding the Epidemic of Hospital Hacks
8 years 3 months ago
Good security is highly dependent on hospital staff being well trained and having the discipline to follow security processes—manual and otherwise—to the letter.
linux-tracing-workshop-part 1
8 years 3 months ago
Terenceli
Beware of PerformanceTiming.domInteractive
8 years 3 months ago
Utkarsh Goel
网络安全技术(2)网络协议的安全性
8 years 3 months ago
计算机网络 计算机网络的概念通常可以从不同角度来理解
网络安全技术(2)网络协议的安全性
8 years 3 months ago
计算机网络 计算机网络的概念通常可以从不同角度来理解
网络安全技术(1)信息安全概述
8 years 3 months ago
信息和信息安全 信息: 信息是对事物不确定性的度量,可
网络安全技术(1)信息安全概述
8 years 3 months ago
信息和信息安全 信息: 信息是对事物不确定性的度量,可
基于行为相似性度量检测APT活动
8 years 3 months ago
KINGX
在 Runtime.getRuntime().exec(String cmd) 中执行任意shell命令的几种方法
8 years 3 months ago
在 Runtime.getRuntime().exec(String cmd) 中怎样才能执行任意shell命令呢?
在 Runtime.getRuntime().exec(String cmd) 中执行任意shell命令的几种方法
8 years 3 months ago
在 Runtime.getRuntime().exec(String cmd) 中怎样才能执行任意shell命令呢?
在 Runtime.getRuntime().exec(String cmd) 中执行任意shell命令的几种方法
8 years 3 months ago
在 Runtime.getRuntime().exec(String cmd) 中怎样才能执行任意shell命令呢?
The Good, the Bad and the Ugly: Bitcoin and Cryptocurrencies
8 years 3 months ago
F5 Labs' David Holmes writes for LinkedIn, discussing whether cryptocurrencies are a scam or a revolution.
A Framework for Resilient DNS Security: DNS Availability Drives Business
8 years 3 months ago
To establish connectivity with other users and devices, almost anything that interfaces with the internet depends on the accuracy, integrity and availability of the Domain Name System (DNS). Most online transactions and data movement are critically dependent on DNS services. As such, DNS is an important point of security enforcement and a potential point in […]
The post A Framework for Resilient DNS Security: DNS Availability Drives Business appeared first on Verisign Blog.
Michael Kaczmarek
The Startup Security Challenge: Safe in the Cloud From Day One
8 years 3 months ago
How this cloud startup met its goals for security and availability right out of the gate by setting goals, doing a risk analysis, and examining tradeoffs.
The Startup Security Challenge: Safe in the Cloud From Day One
8 years 3 months ago
How this cloud startup met its goals for security and availability right out of the gate by setting goals, doing a risk analysis, and examining tradeoffs.