security   505115

« earlier    

Choosing A VPN
That One Privacy Guy’s – Guide to Choosing the Best VPN (for you)
security  tech  services 
3 minutes ago by sojourner
Automated-threat-handbook.pdf
OWASP
Automated Threat
Handbook
Web Applications
The
OWASP Automated Threat Handbook
provides actionable information and
resources to help defend against automated threats to web applications
security  web-based  appsec 
yesterday by pfctdayelise
The #1 reason Facebook won’t ever change – Om Malik
"Facebook is about making money by keeping us addicted to Facebook. It always has been — and that’s why all of our angst and headlines are not going to change a damn thing."
facebook  data  security 
yesterday by pacpost

« earlier    

related tags

!publish  00000  1password  2018  adf_essentials  adversarialai  ai  amazon.con  amazon  analysis  and  android  api  app  apple  appsec  article  artificialintelligence  audit  authentication  automation  awesome-list  bash  betriebsystem  bloomberg  border  cepslab18  china  chip  chromebook  cloud  commandline  computer  computer_security  conference  configuration  counterfeit  credentials  crisismanagement  crypto  css  data  database  datagovernance  db  detect  development  devnexus  docker  domestic_abuse  domestic_violence  dublinregulation  encryption  entropy  espionage  exploit  facebook  fraud  future  games  git  github  giveashit  global  gnugp  gnupg  governing  government  gpg  graphics  graphql  guide  hack  hackers  hacking  handbook  hardening  hardware  herssteller  html  icloud  identity  ids  ifttt  info  information  infosec  intel  international  ios  iptables  it  jackson  java  keylogger  laptop  lasc  law  libs  links  linux  mac  machine-learning  machinelearning  macos  maliciousai  malware  management  meltdown  microservices  microsoft  monitoring  net  network  nginx  nitrokey  openid  opensource  operations  osx  owasp  parity  passport  password  passwords  paw  payload  pdf  pentest  performance  pgp  pgpg  policy  politics  privacy  programming  property  psychology  puzzles  q1  reference  regulation  rest  rfid  room  routing  science  script  search  secret  secrets  secure  server  serverless  services  sicherheit  smartphone  sme  social  software  spectre  spyware  sqlite  ssh  ssl  standard  sysadmin  tech  technology  threat-intelligence  threat  tips  todo  token  tools  tor  toread  totp  travel  tweet  type:collection  type:guide  type:tool  usa  usb  ux  video  vulnerability  web-based  web  web_security  webapp  webdevelopment  wifi  windows  youth  yubikey  zip  安全 

Copy this bookmark:



description:


tags: