Skip to main content

Home/ CSIA 459/ Contents contributed and discussions participated by glenn_g

Contents contributed and discussions participated by glenn_g

1More

Cyberstroke - 1 views

  •  
    Describese the efforts to create cyberweapons and some good descriptions of some that are in development
1More

Surge of Cybersecurity Beuracracies Sparks Lucrative Opertunities - 1 views

  •  
    How we can make buckets of money due to the changing cybersecurity environment and the tools we will have to develop and be proficient with. Good stuff about the DHS in cybersecurity here
1More

First Strike - 0 views

  •  
    The US shift from defense to offense and the development of 'cyberweapons'
1More

Cloud computing in Cyberwarfare - 0 views

  •  
    If you want to know about cloud computing or the Flame virus, you need to read this article
1More

Terrorists use smartphone technology to create invisible networks - 1 views

  •  
    Part of my cyberwarfare paper
1More

Thinking Putty defeats Fingerprint Scanners! - 1 views

  •  
    Just a heads up on why I don't like biometric Authentication. It gets worse when used for Identification. I'll try to find a link
1 - 6 of 6
Showing 20 items per page