Skip to main content
/
CSIA 459
/
Contents contributed and discussions participated by Trevor Pyle
Contents contributed and discussions participated by
Trevor Pyle
Simple
Middle
Filter:
All
|
Bookmarks
|
Topics
Big Data, Trying to Build Better Workers
- 2 views
www.nytimes.com/...g-to-build-better-workers.html
shared by
Trevor Pyle
on 22 Apr 13
-
No Cached
Trevor Pyle
on 22 Apr 13
Interesting article from the NY Times on how some companies are utilizing big data in the work environment.
Interesting article from the NY Times on how some companies are utilizing big data in the work environment.
...
Cancel
...
Cancel
Local police grapple with abilities to respond to cybercrimes and cyberthreats
- 2 views
www.washingtonpost.com/...2-bd52-614156372695_story.html
shared by
Trevor Pyle
on 15 Apr 13
-
No Cached
Trevor Pyle
on 15 Apr 13
Article from the Washington Post about law enforcement's struggle to respond to "smaller" cybercrimes.
Article from the Washington Post about law enforcement's struggle to respond to "smaller" cybercrimes.
...
Cancel
...
Cancel
Google Fiber Coming To Austin, TX?
- 0 views
news.cnet.com/...-google-fiber-coming-to-austin
shared by
Trevor Pyle
on 08 Apr 13
-
No Cached
Trevor Pyle
on 08 Apr 13
Just a heads up for anyone living in Austin, TX.
Just a heads up for anyone living in Austin, TX.
...
Cancel
...
Cancel
The limits of privacy in automated profiling and data mining
- 0 views
www.sciencedirect.com.ezproxy.umuc.edu/...S0267364910001767
shared by
Trevor Pyle
on 01 Apr 13
-
No Cached
Trevor Pyle
on 01 Apr 13
Source for my annotated bibliography.
Source for my annotated bibliography.
...
Cancel
...
Cancel
Big Data: Issues and Challenges Moving Forward
- 0 views
origin-www.computer.org.ezproxy.umuc.edu/...4892a995.pdf
shared by
Trevor Pyle
on 01 Apr 13
-
No Cached
Trevor Pyle
on 01 Apr 13
Source for my annotated bibliography.
Source for my annotated bibliography.
...
Cancel
...
Cancel
Web Analytics for Security Informatics
- 0 views
arxiv.org/1212.6810
shared by
Trevor Pyle
on 01 Apr 13
-
No Cached
Trevor Pyle
on 01 Apr 13
Source for my annotated bibliography.
Source for my annotated bibliography.
...
Cancel
...
Cancel
Risk-Based Systems Security Engineering: Stopping Attacks with Intention
- 0 views
origin-www.computer.org.ezproxy.umuc.edu/...j6059.pdf
shared by
Trevor Pyle
on 01 Apr 13
-
No Cached
Trevor Pyle
on 01 Apr 13
Source for my annotated bibliography.
Source for my annotated bibliography.
...
Cancel
...
Cancel
Security Analytics and Measurements
- 0 views
origin-www.computer.org.ezproxy.umuc.edu/...msp2012030005.pdf
shared by
Trevor Pyle
on 01 Apr 13
-
No Cached
Trevor Pyle
on 01 Apr 13
Source for my annotated bibliography. I focused on the Cyber Adversaries and Game Theory article.
Source for my annotated bibliography. I focused on the Cyber Adversaries and Game Theory article.
...
Cancel
...
Cancel
Cyber War Over Spam Slows Access for Internet Users | PBS NewsHour | March 27, 2013
- 2 views
www.pbs.org/...cyberattacks_03-27.html
shared by
Trevor Pyle
on 28 Mar 13
-
No Cached
Trevor Pyle
on 28 Mar 13
PBS Newshour video on the clash between Spamhaus and Cyberbunker.
PBS Newshour video on the clash between Spamhaus and Cyberbunker.
...
Cancel
...
Cancel
Logic Bomb Set Off South Korea Cyberattack
- 1 views
www.wired.com/...logic-bomb-south-korea-attack
shared by
Trevor Pyle
on 24 Mar 13
-
No Cached
Trevor Pyle
on 24 Mar 13
The recent cyberattack against South Korean media organizations and financial institutions was initiated by a logic bomb.
The recent cyberattack against South Korean media organizations and financial institutions was initiated by a logic bomb.
...
Cancel
...
Cancel
Apple's Password-Reset Security Breach
- 1 views
gizmodo.com/...d+reset-security-breach-worked
shared by
Trevor Pyle
on 24 Mar 13
-
No Cached
Trevor Pyle
on 24 Mar 13
Apple has fully implemented multifactor authentication, but not without some security issues for their users. Since Apple has fixed the flaws, the article covers the steps in the vulnerability.
Apple has fully implemented multifactor authentication, but not without some security issues for their users. Since Apple has fixed the flaws, the article covers the steps in the vulnerability.
...
Cancel
...
Cancel
1
-
11
of
11
Showing
20
▼
items per page
20
50
100
Trevor Pyle