Granneman, 2021 - Google Patents
Working from Home: A Hacker's PerspectiveGranneman, 2021
View PDF- Document ID
- 18330295216480019316
- Author
- Granneman J
- Publication year
- Publication venue
- The Journal of Equipment Lease Financing (Online)
External Links
Snippet
The COVID 19 pandemic has impacted our professional and personal lives in many ways. Business models shifted to online services in almost every business niche, or vertical. Retail shopping, grocery delivery, and even religious services moved to online platforms …
- 238000000034 method 0 abstract description 9
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Alhenaki et al. | A survey on the security of cloud computing | |
Friedman et al. | Protecting data on mobile devices: A taxonomy of security threats to mobile computing and review of applicable defenses | |
Ussath et al. | Advanced persistent threats: Behind the scenes | |
Kulkarni et al. | A security aspects in cloud computing | |
Scott Sr et al. | Rise of the machines: The dyn attack was just a practice run december 2016 | |
Singh et al. | Security attacks taxonomy on bring your own devices (BYOD) model | |
Chauhan | Practical Network Scanning: Capture network vulnerabilities using standard tools such as Nmap and Nessus | |
Dees et al. | Enhancing infrastructure security in real estate | |
Haber et al. | Attack vectors | |
Teymourlouei et al. | Effective methods to monitor IT infrastructure security for small business | |
West | Preventing system intrusions | |
Vivekananth | Cybersecurity risks in remote working environment and strategies to mitigate them | |
Blair | Aligning Security Operations with the MITRE ATT&CK Framework | |
Granneman | Working from Home: A Hacker's Perspective | |
Singh et al. | CCNA Security 210-260 Certification Guide: Build your knowledge of network security and pass your CCNA Security exam (210-260) | |
Racuciu et al. | Security threats and risks in cloud computing | |
Särökaari | Phishing attacks and mitigation tactics | |
Sheikh | CompTIA Security+ Certification Study Guide | |
Droppa et al. | Analysis of cybersecurity in the real environment | |
Blancaflor et al. | A comparative analysis of VPN applications and their security capabilities towards security issues | |
Ali et al. | Spies in the Bits and Bytes: The Art of Cyber Threat Intelligence | |
Mohseni | Network Security for Small Businesses | |
Reuvid | The Secure Online Business Handbook: A Practical Guide to Risk Management and Business Continuity | |
Kılıç et al. | Security Issues of Remote Work Environments and Alternative Solution Approaches | |
Azad | Securing Citrix XenApp Server in the Enterprise |