-
David Lanter wrote a new post on the site Introduction to Ethical Hacking 9 years, 11 months ago
Armstrong, T. (2003), “Netcat – The TCP/IP Swiss Army Knife”, Information Security Reading Room, SANS Institute. Based on Nmap’s optimized and tested passive and active scanning libraries, Ncat is a powerfu […]
-
Adam Alalouf wrote a new post on the site Information Systems in Organizations 9 years, 11 months ago
Dedicated to distilling the world’s data, information and knowledge into beautiful, interesting and, above all, useful visualizations, infographics and diagrams.
Source: Million Lines of Code | Information is Beautiful -
Adam Alalouf wrote a new post on the site Information Systems in Organizations 9 years, 11 months ago
We’re bananas for survey monkeys!
Go here to complete a course content survey. This is a way to gauge your interest level in course content. Please answer the questions honestly and thoughtfully. You must […] -
Steven E. Sclarow, AIA's profile was updated 9 years, 11 months ago
-
Adam Alalouf wrote a new post on the site Information Systems in Organizations 9 years, 11 months ago
-
David Lanter wrote a new post on the site Introduction to Ethical Hacking 9 years, 11 months ago
King, T. (2007). “Packet Sniffing In a Switched Environment”, SANS Institute InforSec Reading Room. The article introduces packet sniffing as largely a within network (“internal”) threat to unencrypted and poorl […]
-
Steven E. Sclarow, AIA's profile was updated 9 years, 11 months ago
-
Steven E. Sclarow, AIA changed their profile picture 9 years, 11 months ago
-
David Lanter wrote a new post on the site Introduction to Ethical Hacking 9 years, 11 months ago
McGreevy, J.P. (2002). “Footprinting: What Is it, Who Should Do It, and Why?”, SANS Institute Information Security Reading Room, Sans Institute. In planning an attack, the author instructs that “Footprinting” […]
-
Adam Alalouf wrote a new post on the site Information Systems in Organizations 9 years, 11 months ago
This is an excellent demonstration of entity relationship diagrams. I strongly encourage all of you to pay close attention to this video as there will be several questions about ERD on the midterm exam.
A […]
-
David Lanter wrote a new post on the site Introduction to Ethical Hacking 9 years, 11 months ago
Week Four Reading: Mitchel, J. (2002). Proactive Vulnerability Assessments with Nessus, SANS Institute. Once setup and configured, Nessus is a powerful tool for applying signatures for detecting known […]
-
Adam Alalouf wrote a new post on the site Information Systems in Organizations 9 years, 11 months ago
The Berne Convention is mentioned in the article you read, “Ethical Issues in Electronic Information Systems.” Make sure you understand the core of this agreement.
Source: Berne Convention – Wikipedia, the free […] -
Adam Alalouf wrote a new post on the site Information Systems in Organizations 9 years, 11 months ago
A short video outlining SAP’s product and service offerings. Pay close attention to the products included in SAP Business Suite.
-
Adam Alalouf wrote a new post on the site Information Systems in Organizations 9 years, 11 months ago
-
Adam Alalouf wrote a new post on the site Information Systems in Organizations 9 years, 11 months ago
-
Adam Alalouf wrote a new post on the site Information Systems in Organizations 9 years, 11 months ago
How to Submit your Learn IT! #1 Deliverable Electronically
Please make a note of the following procedure for electronically submitting your Learn IT! #1 Assignment. All you have to do is email your final […] -
David Lanter wrote a new post on the site Introduction to Ethical Hacking 9 years, 11 months ago
Using Open Source Reconnaissance Tools for Business Partner Vulnerability Assessment (Young, S., 2014) . This article began with a warning about the legal risks of assessing the vulnerabilities of websites and […]
-
Adam Alalouf wrote a new post on the site Information Systems in Organizations 9 years, 12 months ago
This is from the required readings. Systems Architecture is a broad and sophisticated subject. Read the articles assigned and come to class prepared to discuss systems analysis, systems architecture, and the […]
-
Adam Alalouf wrote a new post on the site Information Systems in Organizations 9 years, 12 months ago
-
David Lanter wrote a new post on the site Introduction to Ethical Hacking 10 years ago
My takeaway from Chapter 2 – Enterprise Data Center Topology: It seems that a good network architecture structurally decomposes incoming and outgoing traffic into n-tier functional service areas (i.e. client […]
- Load More