skip to main
|
skip to sidebar
No Tricks
Risk, Security, Math, Crypto
Scribd Collections
Here are the categories of documents that I am collecting at
Scribd
. There are just over 100 documents in all, mostly PDFs and a few PowerPoint presentations.
Cryptography
Data Breach
General Risk
IT Risk
Malware
Passwords
Privacy and Anonymity
Quant Reasoning
Security
Whitelisting
Written By Me
Home
Subscribe to:
Posts (Atom)
About Me
Unknown
View my complete profile
Quick Links
Home
Luke O'Connor Bio
Top Posts
Favourite Posts
Scribd Collections
The No Tricks Name
Subscribe
Posts
Atom
Posts
All Comments
Atom
All Comments
ALL POSTS
on AES and A5/1
on Passwords
on the Birthday Paradox
on Entropy
with FreeMind outlines
Search This Blog
Blog Archive
▼
2013
(3)
▼
April
(2)
Some Mindmaps Online
The 12 Bonk Rule
►
February
(1)
►
2012
(2)
►
May
(2)
►
2011
(32)
►
October
(4)
►
September
(13)
►
August
(5)
►
June
(2)
►
May
(1)
►
April
(2)
►
March
(4)
►
January
(1)
►
2010
(116)
►
December
(7)
►
October
(1)
►
September
(7)
►
August
(14)
►
June
(1)
►
May
(38)
►
April
(7)
►
March
(15)
►
February
(24)
►
January
(2)
►
2009
(111)
►
December
(9)
►
November
(26)
►
October
(3)
►
September
(6)
►
August
(3)
►
July
(3)
►
June
(13)
►
May
(9)
►
April
(11)
►
March
(9)
►
February
(5)
►
January
(14)
►
2008
(25)
►
December
(7)
►
November
(3)
►
October
(2)
►
August
(3)
►
July
(3)
►
June
(3)
►
May
(1)
►
March
(1)
►
February
(1)
►
January
(1)
►
2007
(2)
►
October
(1)
►
September
(1)
Lijit Search
Lijit Search
Labels
A5/1
(7)
AES
(9)
Analysis
(3)
Anonymity
(7)
AV
(4)
Awareness
(3)
Biometric
(2)
Birthday Paradox
(5)
Black Swan
(11)
Block Cipher
(1)
Blogging
(15)
Books
(5)
Border Search
(1)
BP
(1)
Browser
(4)
Bruce
(3)
Brute Force
(2)
Buffer Overflow
(1)
Business Insider
(1)
business models
(1)
CAPTCHA
(2)
Certificates
(1)
Charting
(2)
Choice
(1)
Chrome
(1)
CISO
(1)
cloud computing
(11)
coincidences
(2)
Cold Boot
(2)
Conficker
(4)
controls
(1)
Course
(2)
cryptography
(10)
Data
(5)
Data Breach
(4)
Data Center
(1)
Data Centric Security
(4)
DDoS
(1)
DES
(1)
DNS
(3)
DoD
(1)
education
(2)
Elliptic Curves
(1)
Email
(2)
Encrypted search
(4)
Encryption
(14)
ENISA
(3)
Entropy
(7)
Estimation
(1)
Excel
(2)
Facebook
(4)
Factoring
(3)
faraday
(2)
Fault Injection
(2)
Fibonnaci
(1)
FireFox
(1)
framework
(1)
FreeMind
(6)
FSA
(1)
FUD
(2)
Gambling
(1)
games
(1)
Google
(6)
GPS
(3)
GPU
(1)
Green IT
(1)
GSM
(3)
Half Life
(2)
Hashing
(2)
HP
(1)
Humour
(6)
IBM
(6)
ICANN
(2)
IE
(2)
IEEE
(1)
IEP
(2)
Infographic
(3)
Interesting
(4)
iPad
(1)
iPhone
(1)
ISACA
(2)
IT
(1)
IT Risk
(3)
Key Lengths
(3)
Key Management
(1)
Koobface
(1)
Language
(1)
Long Tail
(3)
Lottery
(1)
Malware
(4)
Metrics
(1)
microsoft
(5)
Mind mapping
(6)
Natural Catastrophe
(2)
New School of Information Security
(1)
NIST
(3)
NodeXL
(1)
NSA
(1)
One Way Hash Arguments
(1)
Online transactions
(1)
Open Source
(2)
OWASP
(3)
P2P
(1)
PageRank
(3)
Passwords
(28)
phishing
(1)
PKI
(2)
policy
(1)
Power Laws
(4)
PowerPoint
(2)
Predictions
(2)
Presentation
(6)
Prezi
(1)
Privacy
(5)
Probability
(4)
Project Risk
(1)
Quantitative
(2)
Quantum Computing
(2)
quantum cryptography
(1)
R Programming Language
(1)
Rainbow Tables
(4)
Random Graph Theory
(1)
Randomness
(5)
RC4
(2)
re-keying
(1)
Redundancy
(1)
renegotiation attack
(3)
Reputational Damage
(1)
Research
(1)
Retrospective
(6)
RFID
(2)
Risk Factors
(6)
Risk Management
(20)
roundup
(3)
RSA
(5)
Satellites
(2)
Scenario Driven Risk Analysis
(1)
scribd
(20)
SDL
(2)
Security
(38)
Security Management
(1)
Skype
(1)
Social Engineering
(1)
Social Media
(3)
SOX
(1)
Spam
(2)
Spreadsheet
(1)
SSD
(1)
ssl
(8)
Star Wars
(2)
statistical tests
(1)
Statistics
(2)
SUN
(1)
TED
(1)
Threat Modeling
(4)
Tipping Point
(1)
TLS
(3)
TMTO
(2)
ToR
(2)
Trends
(2)
trojan
(1)
Turing
(1)
Twitter
(7)
uncertainty
(1)
USB
(7)
VaR
(1)
VeriSign
(1)
Video
(1)
Visualization
(21)
Vulnerabilities
(2)
Weapons of Math Instruction
(1)
web 2.0
(9)
Whit Diffie
(2)
Whitelisting
(3)
whitepaper
(2)
Wikileaks
(1)
Windows
(1)
Wireless
(2)
Wisdom of Crowds
(2)
Worm
(1)
WPA
(1)
X509
(1)
YouTube
(1)
Zero Knowledge Proof
(1)