Key-value Database
A key-value database or key-value store is a type of database. You can read more about databases on this post. It is part of NoSQL databases. You can read more about NoSQL databases on this post. One application of key-value…
A key-value database or key-value store is a type of database. You can read more about databases on this post. It is part of NoSQL databases. You can read more about NoSQL databases on this post. One application of key-value…
This post features websites that offer free images or pictures. List of Website offering Free Images List of free pictures: Wikimedia Commons Wikimedia Commons is a portal that shares images, sounds and videos. Wikimedia Commons is a project from the…
This post provides resources to create Information Security policies, standards, procedures and guidelines. Documenting IT Security Policy Frameworks IT Security Policy Framework Document Types IT security policy framework documents: Policy Policies would be like the constitution, while procedures are the…
This post features some libraries or game engines written in JavaScript for video games development. List of JavaScript Libraries for Video Games JavaScript Libraries for Video Games featured on this post: The most popular are GDevelop and melonJS. GDevelop It…
Function as a Service (FaaS), most commonly known as serverless architecture, is a concept of cloud computing where cloud user can work on code and run it on a server within the cloud without worrying about this server. This server…
This post summarizes characteristics of the different software licenses. It is part of the post about types of free and open-source licenses.. Choosing a License Each license is different, and they have different characteristics. There is no perfect license for…
This post features computer network authentication protocols. Do not confuse the authentication protocols with the Authentication, Authorization and Accountability (AAA) protocols like RADIUS or TACACS+. Authentication protocols works in the OSI layers 2 and 3, and AAA protocols in layer…
This post features some OT Security Communities. It is part of the main post about OT Security. List of OT Security Communities LinkedIn group “ICS OT Security IEC62443 Cyber and Physical” Official link LinkedIn group “OT Security” Official link Reddit…
The terms data privacy, information privacy, data protection refers to data related to individuals, or personal identifiable information (PII). A privacy impact assessment (PIA) has the following goals: Privacy by Design Privacy by Design (PbD) is based on the “Privacy…
Certificate of Cloud Security Knowledge (CCSK) is a certificate issued by the Cloud Security Alliance (CSA) that focuses on cloud security. CCSK is considered a good start towards the more advance ISACA’s certification CCSP. You can read more about how…