skip to main
|
skip to sidebar
No Tricks
Risk, Security, Math, Crypto
Friday, February 12, 2010
AON 2010 Political Risk Map
Here
on Scribd.
1 comment:
Anonymous said...
America affected?
Laby[
dress pants
]
September 7, 2011 at 12:14 AM
Post a Comment
Newer Post
Older Post
Home
Subscribe to:
Post Comments (Atom)
About Me
Unknown
View my complete profile
Quick Links
Home
Luke O'Connor Bio
Top Posts
Favourite Posts
Scribd Collections
The No Tricks Name
Subscribe
Posts
Atom
Posts
Comments
Atom
Comments
ALL POSTS
on AES and A5/1
on Passwords
on the Birthday Paradox
on Entropy
with FreeMind outlines
Search This Blog
Blog Archive
►
2013
(3)
►
April
(2)
►
February
(1)
►
2012
(2)
►
May
(2)
►
2011
(32)
►
October
(4)
►
September
(13)
►
August
(5)
►
June
(2)
►
May
(1)
►
April
(2)
►
March
(4)
►
January
(1)
▼
2010
(116)
►
December
(7)
►
October
(1)
►
September
(7)
►
August
(14)
►
June
(1)
►
May
(38)
►
April
(7)
►
March
(15)
▼
February
(24)
Month Summary, Feb 2010
A look back, Jan – Feb 2009
A Short Security Manifesto
USB devices back on duty for the DoD
NodeXL: Network Overview, Discovery and Exploratio...
A dissection of Koobface
Major Risks in the IT Industry
Metrics for Managing Project Risk
Simplified implementation of the Microsoft SDL
Why use SSL?
When to use Pie Charts
Lew's Law: IT expenses converge to the cost of ele...
An Anonymity computation using R
FSA Security Controls for protecting Customer Data
How to write an Information Security Policy
Six Myths in Assessing Risk
AON 2010 Political Risk Map
Another source of USB Randomness
How to Render SSL Useless
Get your Faraday Bag
Single DES and Double Yolks
The USB Password Vulnerability
Plugging the Authentication Gap in SSL
Fast computations on FPGA Clusters
►
January
(2)
►
2009
(111)
►
December
(9)
►
November
(26)
►
October
(3)
►
September
(6)
►
August
(3)
►
July
(3)
►
June
(13)
►
May
(9)
►
April
(11)
►
March
(9)
►
February
(5)
►
January
(14)
►
2008
(25)
►
December
(7)
►
November
(3)
►
October
(2)
►
August
(3)
►
July
(3)
►
June
(3)
►
May
(1)
►
March
(1)
►
February
(1)
►
January
(1)
►
2007
(2)
►
October
(1)
►
September
(1)
Lijit Search
Lijit Search
Labels
A5/1
(7)
AES
(9)
Analysis
(3)
Anonymity
(7)
AV
(4)
Awareness
(3)
Biometric
(2)
Birthday Paradox
(5)
Black Swan
(11)
Block Cipher
(1)
Blogging
(15)
Books
(5)
Border Search
(1)
BP
(1)
Browser
(4)
Bruce
(3)
Brute Force
(2)
Buffer Overflow
(1)
Business Insider
(1)
business models
(1)
CAPTCHA
(2)
Certificates
(1)
Charting
(2)
Choice
(1)
Chrome
(1)
CISO
(1)
cloud computing
(11)
coincidences
(2)
Cold Boot
(2)
Conficker
(4)
controls
(1)
Course
(2)
cryptography
(10)
Data
(5)
Data Breach
(4)
Data Center
(1)
Data Centric Security
(4)
DDoS
(1)
DES
(1)
DNS
(3)
DoD
(1)
education
(2)
Elliptic Curves
(1)
Email
(2)
Encrypted search
(4)
Encryption
(14)
ENISA
(3)
Entropy
(7)
Estimation
(1)
Excel
(2)
Facebook
(4)
Factoring
(3)
faraday
(2)
Fault Injection
(2)
Fibonnaci
(1)
FireFox
(1)
framework
(1)
FreeMind
(6)
FSA
(1)
FUD
(2)
Gambling
(1)
games
(1)
Google
(6)
GPS
(3)
GPU
(1)
Green IT
(1)
GSM
(3)
Half Life
(2)
Hashing
(2)
HP
(1)
Humour
(6)
IBM
(6)
ICANN
(2)
IE
(2)
IEEE
(1)
IEP
(2)
Infographic
(3)
Interesting
(4)
iPad
(1)
iPhone
(1)
ISACA
(2)
IT
(1)
IT Risk
(3)
Key Lengths
(3)
Key Management
(1)
Koobface
(1)
Language
(1)
Long Tail
(3)
Lottery
(1)
Malware
(4)
Metrics
(1)
microsoft
(5)
Mind mapping
(6)
Natural Catastrophe
(2)
New School of Information Security
(1)
NIST
(3)
NodeXL
(1)
NSA
(1)
One Way Hash Arguments
(1)
Online transactions
(1)
Open Source
(2)
OWASP
(3)
P2P
(1)
PageRank
(3)
Passwords
(28)
phishing
(1)
PKI
(2)
policy
(1)
Power Laws
(4)
PowerPoint
(2)
Predictions
(2)
Presentation
(6)
Prezi
(1)
Privacy
(5)
Probability
(4)
Project Risk
(1)
Quantitative
(2)
Quantum Computing
(2)
quantum cryptography
(1)
R Programming Language
(1)
Rainbow Tables
(4)
Random Graph Theory
(1)
Randomness
(5)
RC4
(2)
re-keying
(1)
Redundancy
(1)
renegotiation attack
(3)
Reputational Damage
(1)
Research
(1)
Retrospective
(6)
RFID
(2)
Risk Factors
(6)
Risk Management
(20)
roundup
(3)
RSA
(5)
Satellites
(2)
Scenario Driven Risk Analysis
(1)
scribd
(20)
SDL
(2)
Security
(38)
Security Management
(1)
Skype
(1)
Social Engineering
(1)
Social Media
(3)
SOX
(1)
Spam
(2)
Spreadsheet
(1)
SSD
(1)
ssl
(8)
Star Wars
(2)
statistical tests
(1)
Statistics
(2)
SUN
(1)
TED
(1)
Threat Modeling
(4)
Tipping Point
(1)
TLS
(3)
TMTO
(2)
ToR
(2)
Trends
(2)
trojan
(1)
Turing
(1)
Twitter
(7)
uncertainty
(1)
USB
(7)
VaR
(1)
VeriSign
(1)
Video
(1)
Visualization
(21)
Vulnerabilities
(2)
Weapons of Math Instruction
(1)
web 2.0
(9)
Whit Diffie
(2)
Whitelisting
(3)
whitepaper
(2)
Wikileaks
(1)
Windows
(1)
Wireless
(2)
Wisdom of Crowds
(2)
Worm
(1)
WPA
(1)
X509
(1)
YouTube
(1)
Zero Knowledge Proof
(1)
1 comment:
America affected?
Laby[dress pants]
Post a Comment