Skip to main content

Home/ Groups/ CSIA 459
Seth Molin

Adoption of telemedicine: from pilot state to routine delivery - 0 views

shared by Seth Molin on 01 Apr 13 - No Cached
  •  
    Article 4 from UMUC library
Seth Molin

A suggestion for future research on interface design of an internet-based telemedicine ... - 1 views

shared by Seth Molin on 01 Apr 13 - No Cached
  •  
    Article 5 from UMUC library
Dan Schulman

Kill the Password - 1 views

  •  
    An article many of us have probably read, but an important one for my paper
Dan Schulman

Password Cracking HPC - 0 views

  •  
    The powerpoint for the fore-mentioned "monster".
Dan Schulman

Distrubuted GPU Password Cracking. Univertitit van Amsterdam - 0 views

  •  
    A few of my sources are from universities in Norway or Amsterdam. Apparently password cracking is a big thing over there!
  •  
    Dan, thanks for posting. This was a good article, not that I wasn't aware of the information in it, but it was just a good reminder, and something I can use to send around for some people to read who may be using some of the obvious techniques to secure thair passwords, such as "what was your first car", lol Facebook destroyed these types of questions/answer security forms.
Trevor Pyle

Google Fiber Coming To Austin, TX? - 0 views

  •  
    Just a heads up for anyone living in Austin, TX.
Amy Harding

U.S. business groups worried by cybersecurity law aimed at China | Reuters - 0 views

  •  
    This article talks about buying technology products from China and whether the US should. The supply chain is an important part of emerging technologies. As you worked on your bibliography - did you question where the technology comes from?
Amy Harding

McConnell: Cybersecurity framework will reduce risk, but not 'fix the problem' - Fierce... - 2 views

  •  
    Interesting thoughts from DHS about the recently signed cybersecurity framework.
Amy Harding

NIST sorting comments on cybersecurity framework - FierceGovernmentIT - 7 views

  •  
    Be careful what you ask for -- NIST is now sorting through all the public comments related to the cybersecurity executive order and 185 days to get the framework publish.
Michael Austin

How a Google Headhunter's E-Mail Unraveled a Massive Net Security Hole | Threat Level |... - 0 views

  •  
    A fun read about a former Google vulnerability. Of note is the "attacker's" use of Amazon Web Services to aid in cracking certificates.
Amy Harding

Tools of the Trade: Exploit Kits - 1 views

  •  
    Here is a recent article that discusses additional exploit kits besides the Blackhole kit discussed in the video.
« First ‹ Previous 261 - 280 Next › Last »
Showing 20 items per page