[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Granneman, 2021 - Google Patents

Working from Home: A Hacker's Perspective

Granneman, 2021

View PDF
Document ID
18330295216480019316
Author
Granneman J
Publication year
Publication venue
The Journal of Equipment Lease Financing (Online)

External Links

Snippet

The COVID 19 pandemic has impacted our professional and personal lives in many ways. Business models shifted to online services in almost every business niche, or vertical. Retail shopping, grocery delivery, and even religious services moved to online platforms …
Continue reading at www.store.leasefoundation.org (PDF) (other versions)

Similar Documents

Publication Publication Date Title
Alhenaki et al. A survey on the security of cloud computing
Friedman et al. Protecting data on mobile devices: A taxonomy of security threats to mobile computing and review of applicable defenses
Ussath et al. Advanced persistent threats: Behind the scenes
Kulkarni et al. A security aspects in cloud computing
Scott Sr et al. Rise of the machines: The dyn attack was just a practice run december 2016
Singh et al. Security attacks taxonomy on bring your own devices (BYOD) model
Chauhan Practical Network Scanning: Capture network vulnerabilities using standard tools such as Nmap and Nessus
Dees et al. Enhancing infrastructure security in real estate
Haber et al. Attack vectors
Teymourlouei et al. Effective methods to monitor IT infrastructure security for small business
West Preventing system intrusions
Vivekananth Cybersecurity risks in remote working environment and strategies to mitigate them
Blair Aligning Security Operations with the MITRE ATT&CK Framework
Granneman Working from Home: A Hacker's Perspective
Singh et al. CCNA Security 210-260 Certification Guide: Build your knowledge of network security and pass your CCNA Security exam (210-260)
Racuciu et al. Security threats and risks in cloud computing
Särökaari Phishing attacks and mitigation tactics
Sheikh CompTIA Security+ Certification Study Guide
Droppa et al. Analysis of cybersecurity in the real environment
Blancaflor et al. A comparative analysis of VPN applications and their security capabilities towards security issues
Ali et al. Spies in the Bits and Bytes: The Art of Cyber Threat Intelligence
Mohseni Network Security for Small Businesses
Reuvid The Secure Online Business Handbook: A Practical Guide to Risk Management and Business Continuity
Kılıç et al. Security Issues of Remote Work Environments and Alternative Solution Approaches
Azad Securing Citrix XenApp Server in the Enterprise