Expand/collapse navigation
Home
News
Contact Us
Cloud Computing
Cloud Presentation
Databases
Database Security 2021
SQL Injection Attacks
Access Controls
Software Design
Software Design Continued...!
App/Sys Develop
Release/Deploy
Agile Development
Encryption
Cryptography
Business Planning
Env/Phys Security
Cell Phone Networks
CDMA Network
GSM Network
The Great Sims Heist
LC and G Regs
LC and G Regs - Continued....!
Risk Mngmt
Risk Mngmt...Continued
Viruses/Hacking
SolarWinds
DDOS Attacks
Buffer Overflow
Wireless Hacking P1
Wireless Hacking P2
Stuxnet Virus
Conflicker Virus
Hacking BotNets
Home
News
Contact Us
Cloud Computing
Databases
Access Controls
Software Design
Business Planning
Env/Phys Security
Cell Phone Networks
LC and G Regs
Risk Mngmt
Viruses/Hacking
SolarWinds
DDOS Attacks
Buffer Overflow
Wireless Hacking P1
Wireless Hacking P2
Stuxnet Virus
Conflicker Virus
Hacking BotNets
Wireless Hacking Part 2
Wireless Hacking Part 2 - Click on Link to Download
Wireless_Hacking_Part_2.pptx
Microsoft Power Point presentation [1.3 MB]
SolarWinds
DDOS Attacks
Buffer Overflow
Wireless Hacking P1
Wireless Hacking P2
Stuxnet Virus
Conflicker Virus
Hacking BotNets
Lance West
DigiBrains@msn.com
Cyber-Security
Information Assurance training
IT Risk Analysis
BIA/BCP Development
Software Security
Databases