DOCUMENT RESOURCES FOR EVERYONE
Documents tagged
Business Mark E.S. Bernard Cyber Security Defense-In-Depth based on ISO 27001 and ITIL

1.*** THIS DOCUMENT IS CLASSIFIED FOR PUBLIC ACCESS ***Compiled by; Mark E.S. Bernard, ISO 27001 Lead Auditor,CISSP, CISM, SABSA-F2, CISA, CRISC, CGEIT2. • Introduction•…

Education four

1. Network Protocols 2.  The OSI model is a layered framework for the design of network systems that allows communication between all types of data systems. The OSI model…

Documents Huawei Cloud Computing Data Center Security Solution for Petroleum Industry

Data centers play an important role in IT-based development and IT applications in the oil and gas industry. Operational systems used in oil and gas companies, including…

Documents By Adam Barth, Joel Weinberger and Dawn Song. Current JavaScript Security Model Cross-Origin...

Cross-Origin JavaScript Capability Leaks: Detection, Exploitation and Defense Cross-Origin JavaScript Capability Leaks: Detection, Exploitation and Defense By Adam Barth,…