-
Tymofiy Rabchuk's profile was updated 8 years, 10 months ago
-
Jeta Gjana wrote a new post on the site Introduction to Ethical Hacking 8 years, 10 months ago
Week 3 Reading Summary Takeaways:
In the world of hacking, attackers start with reconnaissance process which has the objective to collect intelligence about the target. This is often accomplished through port […]
-
Noah Gottlieb's profile was updated 8 years, 10 months ago
-
Quy A Le changed their profile picture 8 years, 10 months ago
-
Quy A Le's profile was updated 8 years, 10 months ago
-
Vincent Furlong's profile was updated 9 years, 4 months ago
-
Jeta Gjana changed their profile picture 9 years, 6 months ago
-
Vincent Furlong's profile was updated 9 years, 7 months ago
-
Celynna Flor Zoleta changed their profile picture 9 years, 10 months ago
-
Jeta Gjana wrote a new post on the site Jeta Gjana 13 years, 5 months ago
One of the major ways to expand my horizon is through traveling. I love learning about new cultures; so far I have achieved my goal through traveling to various European countries. I have been back several times to my native country, Albania. During Fall 2010, I had the opportunity to study abroad in Rome and […]
-
Jeta Gjana and are now friends 14 years, 3 months ago
-
Jeta Gjana and are now friends 14 years, 4 months ago
-
Jeta Gjana commented on the post, Weekly Question #8: Complete by November 2, 2017, on the site 14 years, 4 months ago
Jeta Gjana commented on the blog post Extra Credit – Chapter 6 – The Traditional Approach to Requirements %s
The view of how the system responds to an event is modeled and implemented is different for the two approaches. The traditional approach views the system as a collection of processes. These processes interact with data entities and accept…