Cybersecurity Book Publishers from Spain
This post lists some publishers about cybersecurity or based in Spain. List of Cybersecurity Book Publishers from Spain Cybersecurity Book Publishers from Spain: Anaya Multimedia Official web LID Official web
This post lists some publishers about cybersecurity or based in Spain. List of Cybersecurity Book Publishers from Spain Cybersecurity Book Publishers from Spain: Anaya Multimedia Official web LID Official web
Microsoft Forms is a cloud tool offered by American company Microsoft within the Office 365 suite. This post summarizes how to create a Quiz using Microsoft Forms, as it was on June 2023. Instructions may have changed since then. Instructions…
You can use the website pastedownload.com to download videos from Spanish television channel Telemadrid.
Types of computer codes, from more computer-friendly to human-friendly: Assembly language is sometimes known as assembler language or symbolic machine code. Early computer programs were written in assembly language, as programming languages did not exist yet. Assembly language is unique…
This post lists sources that broadcast news about information security and cybersecurity. List of Cybersecurity News Webs from Spain Cybersecurity News Web from Spain: RedSeguridad Official web Revista SIC Official web Ciberseguridad TIC Official web Securtecnia Official web CyberSecurityNews.es Official…
Unix-like operating systems (OSs) are those that implements the interface and concepts originally introduced by Unix OS. This post tries to summarize the history of Unix-like OSs and explain relevant software concepts surrounding it. Software Concepts This sections reviews some…
A key concept of zero trust security is that it assess security dynamically. Zero Trust Network (ZTN) Zero Trust Architecture (ZTA) Zero Trust Network Access (ZTNA) is an IT security solution that provides secure remote access to an organization’s applications,…
Network Access Control (NAC) is a security solution that enforces policy on devices that access networks to increase network visibility and reduce risk. NAC’s posturing capability determines if a system is sufficiently secure and compliant enough to connect to a…
This post summarizes the main free and open-source (FOSS) desktop environments for Unix-like and Linux OSs. List of Linux Desktop Environments List of Linux desktop environments: The most popular are KDE Plasma and GNOME. Common Desktop Environment (CDE) Common Desktop…
This post presents some aspects related to electronic mail (email or e-mail) protocols. Email Operational Protocols POP3 Post Office Protocol 3 (POP3) is considered deprecated. IMAP Internet message access protocol (IMAP) SMTP An open relay is an insecure SMTP server…