CIS Control 1: Inventory and Control of Enterprise Assets A step-by-step guide for implementing Governance, Risk & Compliance audits for 13 minute read
Case-study – Target Data Breach 2013 Hackers gained access to more than 40 million credit and debit card information 6 minute read
Buffer Overflow – Stack overflow – C Programming Lab Project Congratulations, you have mitigated the overflow! 2 minute read
C Program to Compare the Two Strings Write a program to compare two strings by passing them to a function 1 minute read
CIS Control 1: Inventory and Control of Enterprise Assets A step-by-step guide for implementing Governance, Risk & Compliance audits for byJake AdebayoMay 22, 2023
Case-study – Target Data Breach 2013 Hackers gained access to more than 40 million credit and debit card information byJake AdebayoOctober 24, 2022
Buffer Overflow – Stack overflow – C Programming Lab Project Congratulations, you have mitigated the overflow! byJake AdebayoFebruary 24, 2020
C Program to Compare the Two Strings Write a program to compare two strings by passing them to a function byJake AdebayoFebruary 23, 2020
3 Penetration TestingOctober 24, 2022 Case-study – Target Data Breach 2013 Hackers gained access to more than 40 million credit and debit card information byJake Adebayo