Status Updates From Information Security: The C...

Information Security: The Complete Reference Information Security: The Complete Reference
by


Status Updates Showing 1-13 of 13

order by

Juan
Juan is on page 160 of 896
Jan 10, 2020 01:05AM Add a comment
Information Security: The Complete Reference

Juan
Juan is on page 135 of 896
Jan 08, 2020 06:15AM Add a comment
Information Security: The Complete Reference

Juan
Juan is on page 107 of 896
Jan 08, 2020 02:43AM Add a comment
Information Security: The Complete Reference

Justin
Justin is 76% done
Next up: BGP book
Feb 27, 2016 03:15PM Add a comment
Information Security: The Complete Reference

Justin
Justin is 38% done
This guy talks way too much about IRM, comparing it to DRM and talking about it in other chapters besides the entire chapter he dedicated to it.
Feb 24, 2016 08:54AM Add a comment
Information Security: The Complete Reference

Justin
Justin is 28% done
"To run within the kernel, the executable must be privileged, and this right is usually restricted to native operating system components." Wrong. Any process can access the kernel through system calls, and almost all processes do. Also, /proc filesystem entries affect kernel
Feb 19, 2016 03:41PM Add a comment
Information Security: The Complete Reference

Justin
Justin is 20% done
Still very high level. Detail reminds me of CISSP material
Feb 17, 2016 09:30AM Add a comment
Information Security: The Complete Reference

Justin
Justin is 13% done
Ethereal is wireshark and has been for MANY years
Feb 16, 2016 04:00PM Add a comment
Information Security: The Complete Reference

Brian
Brian is on page 18 of 896
Dec 25, 2014 08:16PM Add a comment
Information Security: The Complete Reference