-
Tymofiy Rabchuk's profile was updated 9 years, 2 months ago
-
Jeta Gjana wrote a new post on the site Introduction to Ethical Hacking 9 years, 2 months ago
Week 3 Reading Summary Takeaways:
In the world of hacking, attackers start with reconnaissance process which has the objective to collect intelligence about the target. This is often accomplished through port […]
-
Noah Gottlieb's profile was updated 9 years, 2 months ago
-
Quy A Le changed their profile picture 9 years, 2 months ago
-
Quy A Le's profile was updated 9 years, 2 months ago
-
Vincent Furlong's profile was updated 9 years, 7 months ago
-
Jeta Gjana changed their profile picture 9 years, 9 months ago
-
Vincent Furlong's profile was updated 9 years, 11 months ago
-
Celynna Flor Zoleta changed their profile picture 10 years, 1 month ago
-
Jeta Gjana wrote a new post on the site Jeta Gjana 13 years, 9 months ago
One of the major ways to expand my horizon is through traveling. I love learning about new cultures; so far I have achieved my goal through traveling to various European countries. I have been back several times to my native country, Albania. During Fall 2010, I had the opportunity to study abroad in Rome and […]
-
Jeta Gjana and are now friends 14 years, 7 months ago
-
Jeta Gjana and are now friends 14 years, 8 months ago
-
Jeta Gjana commented on the post, Weekly Question #8: Complete by November 2, 2017, on the site 14 years, 8 months ago
Jeta Gjana commented on the blog post Extra Credit – Chapter 6 – The Traditional Approach to Requirements %s
The view of how the system responds to an event is modeled and implemented is different for the two approaches. The traditional approach views the system as a collection of processes. These processes interact with data entities and accept…