Skip to main content
/
CSIA 459
/
Contents contributed and discussions participated by glenn_g
Contents contributed and discussions participated by
glenn_g
Simple
Middle
Filter:
All
|
Bookmarks
|
Topics
1
More
Cyberstroke
- 1 views
ezproxy.umuc.edu/login
Annotated
Bibliography
shared by
glenn_g
on 31 Mar 13
-
No Cached
glenn_g
on 31 Mar 13
Describese the efforts to create cyberweapons and some good descriptions of some that are in development
Describese the efforts to create cyberweapons and some good descriptions of some that are in development
...
Cancel
...
Cancel
1
More
Surge of Cybersecurity Beuracracies Sparks Lucrative Opertunities
- 1 views
ezproxy.umuc.edu/login
Annotated
Bibliography
shared by
glenn_g
on 31 Mar 13
-
No Cached
glenn_g
on 31 Mar 13
How we can make buckets of money due to the changing cybersecurity environment and the tools we will have to develop and be proficient with. Good stuff about the DHS in cybersecurity here
How we can make buckets of money due to the changing cybersecurity environment and the tools we will have to develop and be proficient with. Good stuff about the DHS in cybersecurity here
...
Cancel
...
Cancel
1
More
First Strike
- 0 views
ezproxy.umuc.edu/login
Annotated
Bibliography
shared by
glenn_g
on 31 Mar 13
-
No Cached
glenn_g
on 31 Mar 13
The US shift from defense to offense and the development of 'cyberweapons'
The US shift from defense to offense and the development of 'cyberweapons'
...
Cancel
...
Cancel
1
More
Cloud computing in Cyberwarfare
- 0 views
ezproxy.umuc.edu/login
bibliography
annotated
shared by
glenn_g
on 31 Mar 13
-
No Cached
glenn_g
on 31 Mar 13
If you want to know about cloud computing or the Flame virus, you need to read this article
If you want to know about cloud computing or the Flame virus, you need to read this article
...
Cancel
...
Cancel
1
More
Terrorists use smartphone technology to create invisible networks
- 1 views
ezproxy.umuc.edu/login
annotated
bibliography
smart
phone
shared by
glenn_g
on 31 Mar 13
-
No Cached
glenn_g
on 31 Mar 13
Part of my cyberwarfare paper
Part of my cyberwarfare paper
...
Cancel
...
Cancel
1
More
Thinking Putty defeats Fingerprint Scanners!
- 1 views
www.puttyworld.com/thinputdeffi.html
Assignment
shared by
glenn_g
on 24 Mar 13
-
Cached
glenn_g
on 24 Mar 13
Just a heads up on why I don't like biometric Authentication. It gets worse when used for Identification. I'll try to find a link
Just a heads up on why I don't like biometric Authentication. It gets worse when used for Identification. I'll try to find a link
...
Cancel
...
Cancel
1
-
6
of
6
Showing
20
▼
items per page
20
50
100
glenn_g