The Latest in IT Security

Posts Tagged ‘sun tzu’

Be in no doubt, credibility is high for this book. Authors of “Ninja Hacking”, Thomas Wilhelm and Jason Andress, certainly have expertise in the field of computer security, with particular focus on penetration testing. They also have experience in both the academic and corporate environments. The subtitle “Unconventional penetration testing tactics and techniques” is however […]

Read more ...

The development of new technologies, in catching up with military interests and dependence on existing technology by developed countries, sets up a scenario where the cyber war, or war in cyberspace, is becoming more important. All countries aware of the risks of such dependence developed defense programs against attacks that could jeopardize critical national infrastructure. […]

Read more ...


Categories

FRIDAY, MARCH 29, 2024
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments