Skip to main content
Advanced Search
Search Terms
Content Type

Exact Matches
Tag Searches
Date Options
Updated after
Updated before
Created after
Created before

Search Results

84 total results found

Introduction & Concepts

CISSP Study Guide 8: Software Development Security

What's New in Domain 8? 8.2 Identify and Apply Security Controls in Software Development Ecosystems Programming Concepts: Programming languages Libraries Tool sets Integrated Development Environment (IDE) Runtime Code repositories Continuous Int...

Database Concepts and Threats

CISSP Study Guide 8: Software Development Security

RDBMS Architecture Tables (relations): Comprises multiple attributes or fields. Each attribute corresponds to a column in the table. Rows (records/tuples): A singular data record in a table. Each row, representing a specific item data, holds varying data but...

Machine Learning and Artificial Intelligence

CISSP Study Guide 8: Software Development Security

Introduction to Machine Learning Machine Learning Techniques Focus on algorithmically discovering knowledge from datasets. Aids in deriving insights and patterns from vast data. Expert Systems Comprises two main components: Knowledge Base: Conta...

Software Development Concepts

CISSP Study Guide 8: Software Development Security

SDLC Phase Steps Phase Name Description Mnemonic ⬇️ Requirements and Analysis In this phase, the needs of potential users are understood and analyzed to produce a requirements specification. Real ⬇️ Design This phase involves creating...

Software Security and Threats

CISSP Study Guide 8: Software Development Security

Change, Configuration, and Testing Change and Configuration Management Provides an organized framework. Enables cost/benefit analysis. Request Control - Enables users to request modifications. Change Control - Used to recreate and analyze situations...

Systems Security Concepts

CISSP Study Guide 8: Software Development Security

Protection Rings: Protection rings structure privilege levels in a hierarchical manner, typically visualized as concentric rings. The innermost ring (Ring 0) has the most privileges, and as you move outward, privileges decrease. Ring 0 (Kernel Mode): The...

Types of Attacks

CISSP Study Guide 3.1 Cryptography

In the realm of cybersecurity, we often encounter various types of attacks. We'll dig deeper into each of these attacks, providing a detailed breakdown of their mechanisms. But for now, let's look at the most comprehensive attacks, and explore other complex at...

Types of Law

CISSP Study Guide 1: Security and Risk Management

Type of Law Standard Description Criminal Law Beyond a reasonable doubt Contains prohibitions against actions like murder, assault, and robbery. Can lead to jailtime.  Civil Law Preponderance of evidence Addresses contractual disputes...

Identity, Access Management

CISSP Study Guide 5: Identity and Access Management

Key Term Description Examples Subject Active participant that requests access. Users, processes, organizations. Object Passive participant that responds to an access request. Files, printers, users, processes, orgs. Access Relat...

Exam 2

CISSP Study Guide Practice Exams

1, add if you have time 10. The separation of network infrastructure from the control layer, combined with the ability to centrally program a network design in a vendor-neutral, standards-based implementation, is an example of what important concept? A.   ...

GitLab: Migrate YH CE to BM EE

Technical Writing Applications

Overview This guide covers migrating a GitLab instance from Yunohost to a standalone server, including: Data migration from Yunohost User migration from LDAP to local authentication Upgrade from Community Edition (CE) to Enterprise Edition (EE) 1. Create and...

PVE: NVIDIA GPU Passthrough

Technical Writing Homelab: Fully Managed Server

This guide walks you through creating a Linux VM in Proxmox (with GPU pass-through or related capabilities) and installing the NVIDIA driver on both Arch Linux and Debian (Bookworm). 1. Proxmox VM Configuration Locate and edit the VM configuration file: /et...

PVE: Custom VLANs

Technical Writing Homelab: Fully Managed Server

This guide presents two methods for setting up VLANs in Proxmox and configuring a UniFi switch to work with them. Prerequisites Proxmox VE installed Root access to the Proxmox host UniFi Network Controller access Network interface(s) available for configurati...

PBS: Backup Strategy

Technical Writing Homelab: Fully Managed Server

3-2-1 Backup Setup In this example, we are backing up a ZFS pool RAID 1 consisting of two 2TB Samsung 990 EVO PRO SSDs. The goal is to implement the 3-2-1 backup strategy: three copies of your data on two different media, with one copy offsite. This setup is d...

1: 声母: "J Q X" and "Zh Ch Sh"

Mandarin Classes

声母 (shēngmǔ): "J Q X" and "Zh Ch Sh" Tones in Mandarin Each syllable in Mandarin has a tone, which can completely change its meaning: Tone Mark Example Different Meanings 1st (High) ā mā 妈 (mother) 2nd (Rising) á má 麻 (hemp) 3rd (Low-dipping) ǎ mǎ 马...

2: 韵母: i, u, ü

Mandarin Classes

Basic Finals and Common Phrases Final Description Tips i Similar to "ee" Keep tongue high and forward u Like "oo" Round lips ü Like German "ü" Say "ee" and round lips Note: ü is sometimes written as u with dots (ü) or as 'v' in some texts Importa...

3. Pronouns and Their Forms

Mandarin Classes

Pronouns and Their Forms Base With 们 (Plural) With 的 (Possession) Notes 我 (wǒ) - I/me 我们 (wǒmen) - we/us 我的 (wǒ de) - my/mine 你 (nǐ) - you 你们 (nǐmen) - you all 你的 (nǐ de) - your/yours 他 (tā) - he 他们 (tāmen) - they 他的 (tā de) - his 她 (tā) - she ...

4. Family Members & "是" (To Be)

Mandarin Classes

New Vocabulary Character Pinyin Literal Character Meaning English Usage 是 shì be am/is/are 弟弟 dìdi younger + younger younger brother 哥哥 gēge older + older older brother 谁 shéi who who 绿 lǜ green green 吕 lǚ (surname) surname Lü Possessive Ph...

5. Key Grammar Elements

Mandarin Classes

Character Pinyin Function Usage 是 shì to be Links subject with identity/description 的 de possessive marker Shows ownership/relationship 叫 jiào to be called/named Used specifically for names Family Relationships & Introductions Chinese Pinyin L...

GitLab Pages: Cloudflared

Technical Writing Applications

Below is a minimal example of how to configure a self-hosted GitLab instance to serve GitLab Pages behind Cloudflared. This guide walks through: Setting the GitLab Pages config on your self-hosted instance.   Creating a Cloudflared configuration to route traf...