Yet Another Bookmarks Service
Viewing stevetao's Bookmarks
Understanding the CIA Triad: Confidentiality, Integrity, and Availability » NetworkUstad
[https://networkustad.com/2026/01/21/understanding-the-cia-triad-confidentiality-integrity-and-availability/] -
-
public:
stevetao
All Free Dumps
[https://www.allfreedumps.com/] -
-
public:
stevetao
Publications | CSRC
[https://csrc.nist.gov/publications] -
-
public:
stevetao
อย่าโอนก่อนเด็ดขาด! ระวัง 6 กลโกงยอดฮิตจากมิจฉาชีพออนไลน์ | เดลินิวส์
[https://www.dailynews.co.th/news/4765954/] -
-
public:
stevetao
'ตำรวจไซเบอร์' เตือนภัย 4 เว็บไซต์อันตราย ใช้กลอุบายพูดคุยเชิงชู้สาว ก่อนชวนให้เทรดหุ้น | เดลินิวส์
[https://www.dailynews.co.th/news/4490345/] -
-
public:
stevetao
Packet Builder for Network Engineer - Colasoft
[https://www.colasoft.com/packet_builder/] -
-
public:
stevetao
Security Engineering - A Guide to Building Dependable Distributed Systems
[https://www.cl.cam.ac.uk/archive/rja14/book.html] -
-
public:
stevetao
Cyber Security Body of Knowledge (CyBOK) - NCSC.GOV.UK
[https://www.ncsc.gov.uk/section/education-skills/cybok] -
-
public:
stevetao
Online Bachelor’s Degree in Cyber Security | EC-Council University
[https://www.eccu.edu/online-cyber-security-degrees/bachelor-of-science-in-cyber-security/] -
-
public:
stevetao
10 Useful Digital Forensics Software in 2025
[https://www.salvationdata.com/knowledge/digital-forensics-software/] -
-
public:
stevetao
Top 7 Computer Forensics Tools for Digital Evidence Collection | Infosec
[https://www.infosecinstitute.com/resources/digital-forensics/7-best-computer-forensics-tools/] -
-
public:
stevetao
Wordlists in Cybersecurity: RockYou 2024 Includes 10 Billion Stolen Passwords
[https://www.packetlabs.net/posts/wordlists-in-cybersecurity-rockyou-2024-includes-10-billion-stolen-passwords/] -
-
public:
stevetao
encryption - Should we sign-then-encrypt, or encrypt-then-sign? - Cryptography Stack Exchange
[https://crypto.stackexchange.com/questions/5458/should-we-sign-then-encrypt-or-encrypt-then-sign] -
-
public:
stevetao
Examples of Defense in Depth: The Stealth Cybersecurity Essential | Learning Tree
[https://www.learningtree.com/blog/defense-in-depth-the-stealth-cybersecurity-essential/] -
-
public:
stevetao
Great “Defense-in-Depth“ InfoGraphic
[https://blog.knowbe4.com/great-defense-in-depth-infographic] -
-
public:
stevetao
Defense-in-Depth - Essential Guide to Election Security
[https://essentialguide.docs.cisecurity.org/en/latest/bp/defense_in_depth.html] -
-
public:
stevetao
12 วิธีการสร้างและวิเคราะห์ Threat Modeling
[https://www.cyfence.com/article/12-way-to-build-threat-modeling/] -
-
public:
stevetao
Biometric security jargon: CER, EER, FRR, FAR
[https://www.johndcook.com/blog/2018/10/31/biometric-security-error/] -
-
public:
stevetao
Threat Modeling: 12 Available Methods
[https://insights.sei.cmu.edu/blog/threat-modeling-12-available-methods/] -
-
public:
stevetao
What is Cyber Threat Modeling | Importance of Threat Modeling | EC-Council
[https://www.eccouncil.org/threat-modeling/] -
-
public:
stevetao
Types of Security Controls - InfosecTrain
[https://www.infosectrain.com/blog/types-of-security-controls/] -
-
public:
stevetao
SABSA Executive Summary - The SABSA Institute
[https://sabsa.org/sabsa-executive-summary/] -
-
public:
stevetao
SIFT Workstation | SANS Institute
[https://www.sans.org/tools/sift-workstation/] -
-
public:
stevetao
Malware Analysis: Tips & Tricks Poster | SANS DFIR
[https://www.sans.org/posters/malware-analysis-tips-tricks-poster/] -
-
public:
stevetao
How You Can Start Learning Malware Analysis | SANS Institute
[https://www.sans.org/blog/how-you-can-start-learning-malware-analysis/] -
-
public:
stevetao
Navigating the Layers of the Internet: Unveiling the Surface, Deep, and Dark Web
[https://www.insightindia.com/articles/navigating-the-layers-of-the-internet-unveiling-the-surface-deep-and-dark-web-9jt312xq.html] -
-
public:
stevetao
Windows 11 Time Rules
[https://www.khyrenz.com/post/windows-11-time-rules] -
-
public:
stevetao
NTFS Timestamp changes on Windows 10 · Senturean
[https://www.senturean.com/posts/19_04_22_win10_ntfs_time_rules/] -
-
public:
stevetao
Government of Sikkim, India
[https://sikkim.gov.in/g20content/index] -
-
public:
stevetao
Phishing vs Pharming. How to protect yourself from online scams?
[https://wisdomplexus.com/blogs/phishing-vs-pharming/] -
-
public:
stevetao
Explaining the Difference Between Phishing and Pharming - Cybersecurity Solutions | Email & Network Security
[https://abusix.com/blog/phishing-pharming-differences/] -
-
public:
stevetao
GitHub - irobust/AdvancePenTest: Advance Penetration Test Hands-On
[https://github.com/irobust/AdvancePenTest] -
-
public:
stevetao
Introduction - OWASP Cheat Sheet Series
[https://cheatsheetseries.owasp.org/] -
-
public:
stevetao
BuiltWith Technology Lookup
[https://builtwith.com/] -
-
public:
stevetao
OWASP IoT Security Verification Standard | OWASP Foundation
[https://owasp.org/www-project-iot-security-verification-standard/] -
-
public:
stevetao
OWASP MASVS - OWASP Mobile Application Security
[https://mas.owasp.org/MASVS/] -
-
public:
stevetao
OWASP Application Security Verification Standard (ASVS) | OWASP Foundation
[https://owasp.org/www-project-application-security-verification-standard/] -
-
public:
stevetao
ATT&CK® Navigator
[https://mitre-attack.github.io/attack-navigator/] -
-
public:
stevetao
D3FEND Matrix | MITRE D3FEND™
[https://d3fend.mitre.org/] -
-
public:
stevetao
MITRE ATT&CK®
[https://attack.mitre.org/] -
-
public:
stevetao
The Penetration Testing Execution Standard
[http://www.pentest-standard.org/index.php/Main_Page] -
-
public:
stevetao
OWASP Web Security Testing Guide | OWASP Foundation
[https://owasp.org/www-project-web-security-testing-guide/] -
-
public:
stevetao
VirusTotal
[https://www.virustotal.com/gui/] -
-
public:
stevetao
CIC Honeynet
[https://www.honeynetproject.com/] -
-
public:
stevetao
OWASP Web Security Testing Guide | OWASP Foundation
[https://owasp.org/www-project-web-security-testing-guide/] -
-
public:
stevetao
INE Security - INE Security
[https://security.ine.com/] -
-
public:
stevetao
Exploit Database - Exploits for Penetration Testers, Researchers, and Ethical Hackers
[https://www.exploit-db.com/] -
-
public:
stevetao
Security Certification Roadmap - Paul Jerimy Media
[https://pauljerimy.com/security-certification-roadmap/] -
-
public:
stevetao
3S กับโครงการ OAP Award | วิฑูรย์ สิมะโชคดี
[https://www.bangkokbiznews.com/health/labour/1066692] -
-
public:
stevetao
กรอบการทำงานของ 22 หน่วยงานภายใต้กระทรวงเกษตรและสหกรณ์ ขับเคลื่อนร่วมกัน “3S” คือ “Safety“ ความปลอดภัยของอาหาร “Security“ ความมั่นคง มั่งคั่ง ของภาคการเกษตรและอาหาร และ “Sustainability“ ความยั่งยืนของภาคการเกษตร วันที่ 30 กันยายน 2563 การเกษตรต่างประเทศ
[https://www.moac.go.th/foreignagri-news-preview-422791792930] -
-
public:
stevetao
Viewing 1 - 50, 50 links out of 142 links, page: 1
Follow Tags
Manage