Tag it

IT Security Models

This post features abstract IT security models. List of IT Security Models IT security models featured on this post: Belle-LaPadula Belle-LaPadula focuses on confidentiality. Biba Biba model focuses on integrity rather than confidentiality. Clark-Wilson Model Graham-Denim Model HRU Model Harrison-Ruzzo-Ullman…

Web Analytics Tools

This post features web analytic tools. A heatmap is a data visualization tool that helps businesses understand how particular pages on their website are performing. List of Web Analytics Tools List of web analytics tools featured on this post: Google…

Internet of Things

Internet of Things (IoT) considers devices connected to other devices, instead the classic view of human users behind the computers. Type of devices connected to a gateway: IoT Protocols IoT protocols featured on this post: MQTT MQTT (now an orphan…

IT Change Management

Change Management is part of Service management, according to ITIL. IT Change Management Description Change management is responsible for controlling the lifecycle of all changes to IT infrastructure and services, ensuring that they are properly evaluated, authorized, prioritized, planned, tested,…

IT Service Management

This post discusses about IT service management (ITSM) under an IT context. IT Service Management Standards IT service management standards featured on this post: ITIL ITIL is a set of detailed practices for IT service management (ITSM) that focuses on…

Computer Network Devices

This post is about computer network devices. Endpoints An endpoint is a physical devices, such as a server, PC, workstation or smartphone, that connect to and exchange information with a computer network. A virtual desktop infrastructure (VDI) virtualizes an endpoint…

Sorting Algorithms

This post features popular sorting algorithms. List of Sorting Algorithms Sorting algorithms featured on this post: Insertion Sort Its complexity is O(n²). Bubble Sort Its complexity is O(n²). Cocktail Shaker Sort Cocktail shaker sort is a variation to bubble sort.…

IT Monitoring Applications

This post features monitoring tools of IT. List of IT Monitoring Applications List of monitoring tools: Prometheus Prometheus is FOSS, under an Apache 2 license. Prometheus at Wikipedia Prometheus source code repository Nagios Core Nagios Core is developed by Ethan…

Linux Endpoint Security

This post talks about endpoint security on Linux OS. Linux Endpoint Hardening Tools Lynis Lynis is free and open source software (FOSS) tool to audit Unix-like OSs. It is developed by Dutch company CISOfy. Lynis official website Lynis code repository…

Voice over IP

Voice over IP (VoIP) is a multilayer protocol that encapsulates in a tunnel audio video into IP packets to support voice calls an multimedia collaboration. VoIP is an alternative to the traditional public switched telephone network (PSTN). VoIP Protocols VoIP…