ECCENTRIX
Popular repositories
-
Microsoft-Defender-for-Cloud-Apps
Microsoft-Defender-for-Cloud-Apps PublicThis article is about Microsoft Defender for Cloud Apps, exploring its functionalities and practical use cases to illuminate how it fortifies cloud security.
-
Unlocking-the-Power-of-Multifactor-Authentication-Strengthening-Company-Security
Unlocking-the-Power-of-Multifactor-Authentication-Strengthening-Company-Security PublicThis writing explores how MFA works, its potential impact on companies, and strategies for successful implementation
-
Demystifying-Access-Control-Models-RBAC-MAC-and-DAC-Explained
Demystifying-Access-Control-Models-RBAC-MAC-and-DAC-Explained PublicThis writing is about differences in RBAC, MAC, and DAC security models. It helps understand the use of each in a practical case.
-
A-Comprehensive-Comparison-of-Cisco-Routing-Protocols-Making-the-Right-Choice-for-Your-Network
A-Comprehensive-Comparison-of-Cisco-Routing-Protocols-Making-the-Right-Choice-for-Your-Network PublicThis article compares Cisco's routing protocols, shedding light on their key features, practical applications, and real-world implementation scenarios.
-
Understanding-How-Cloud-Hosting-Functions
Understanding-How-Cloud-Hosting-Functions PublicThis writing explores the Cloud Hosting - a popular type of service available to customers interested in outsourcing some of their IT infrastructure.
-
The-Microsoft-Dataverse-A-Comprehensive-Guide
The-Microsoft-Dataverse-A-Comprehensive-Guide PublicThis article is about the Microsoft Dataverse. It explores practical use cases, and provides configuration insights to help you leverage its full potential.
Repositories
-
- Breaking-Encryption-Algorithms-Methods-Tools-and-Practical-Examples Public
This article delves into the methods used to break encryption, provides practical examples, and lists tools that can be used for educational or reference purposes.
- Distinctions-Between-Software-and-Service-A-Guide-to-Modern-Cloud-Services-Acquisition Public
This article pinpoints the differences between software and service, and how these relate to the contemporary methods of acquiring cloud services.
- Understanding-Backups-and-Archives-Key-Differences-and-Technologies-for-Effective-Data-Management Public
This article explores the differences between backups and archives, outlining the technologies that support these solutions.
- SQL-Injection-Attack-Understanding-the-Threat-in-Cybersecurity Public
This article aims to demystify SQL Injection, explaining what it is, how it operates, its purposes in the cybersecurity landscape, and mentioning tools that can be used to conduct such attacks.
- A-Day-in-the-Life-of-a-Chief-Information-Officer-CIO Public
Discover what a typical day of a CIO is, highlighting the tasks they execute and how they communicate with different teams to maintain the organization's security.
- Types-of-PowerApps Public
PowerApps categorizes applications into three primary types, each serving distinct purposes and offering unique advantages
- Understanding-How-Cloud-Hosting-Functions Public
This writing explores the Cloud Hosting - a popular type of service available to customers interested in outsourcing some of their IT infrastructure.
- The-Microsoft-Dataverse-A-Comprehensive-Guide Public
This article is about the Microsoft Dataverse. It explores practical use cases, and provides configuration insights to help you leverage its full potential.
- Demystifying-Access-Control-Models-RBAC-MAC-and-DAC-Explained Public
This writing is about differences in RBAC, MAC, and DAC security models. It helps understand the use of each in a practical case.
People
This organization has no public members. You must be a member to see who’s a part of this organization.
Top languages
Loading…
Most used topics
Loading…