Kerberos Authentication Protocol

Kerberos Authentication Protocol

August 26, 2014

We have already discussed about Cryptography in ‘Understanding Cryptography’, ‘Classic Cryptographic Algorithms’ and ‘Cryptography and the Scytale Cipher’. In this post we will explore more [more…]

How to engage stakeholders in a project?

How to engage stakeholders in a project?

August 22, 2014

Love them or hate them, you need to engage with your stakeholders to run a project. It’s the stakeholders who [more…]

Social Engineering – Exploiting the Mind

Social Engineering – Exploiting the Mind

“Dear Friend, I am stranded here and need to get back to our country. I [more…]

Role of an Ethical Hacker – What exactly does an Ethical Hacker do?

Role of an Ethical Hacker – What exactly does an Ethical Hacker do?

As serious security professionals, we almost give “similar security talk” to other business teams in [more…]

Why Businesses Need Ethical Hackers?

Why Businesses Need Ethical Hackers?

Jay Bavisi, President and Co-founder of the EC Council says, “We need Ethical Hackers more [more…]

Ethical Hacking – An Overview

Ethical Hacking – An Overview

It is a great era to survive in, where technology has been utilized to the [more…]

How to Study for CFA Level Exams

How to Study for CFA Level Exams

August 25, 2014

As a student, I was told there are several ways of studying for a particular topic. With so many courses available through Simplilearn the best [more…]

Kerberos Authentication Protocol

Kerberos Authentication Protocol

We have already discussed about Cryptography in ‘Understanding Cryptography’, ‘Classic Cryptographic Algorithms’ and ‘Cryptography and [more…]

Latest Trends in SAP Technology

Latest Trends in SAP Technology

SAP solutions have now become an indispensable part of every industry sector in this volatile [more…]


You might also likeclose