Ten Years of Academic Writing

Education Articles & Research Papers

A long night of term paper writing and vodka.

A long night of term paper writing and vodka.

This blog is currently being moved to its own website. If you are looking for a specific article you will likely find it there. Thanks.

Authentication Functions Widely Used Today to Support Network-based User Authentication

Authentication Functions Supporting Network-bas...

Vincent Triola

There are a number of authentication and access functions that are widely used to support network-based user authentication.

Authentication Functions Supporting Network-bas...

Vincent Triola

There are a number of authentication and access functions that are widely used to support network-based user authentication.

What are network security policies?

What are network security policies?

Vincent Triola

Security policies are those rules or guidelines which guide practices and standards of activity on a network.

What are network security policies?

Vincent Triola

Security policies are those rules or guidelines which guide practices and standards of activity on a network.

NIST Framework & Need for Universal Information Assurance Standards

NIST Framework & Need for Universal Information...

Vincent Triola

The NIST Framework is the standard security framework for information assurance and cyber security. This framework is designed in a general composition in order to allow companies the ability to...

NIST Framework & Need for Universal Information...

Vincent Triola

The NIST Framework is the standard security framework for information assurance and cyber security. This framework is designed in a general composition in order to allow companies the ability to...

Tunneling in the VPN Environment

Tunneling in the VPN Environment

Vincent Triola

The virtual private network is the extension of a private network into the internet. The VPN expands the ability of user to connect and access the network across larger geographies...

Tunneling in the VPN Environment

Vincent Triola

The virtual private network is the extension of a private network into the internet. The VPN expands the ability of user to connect and access the network across larger geographies...

What types of security risks do you face when installing a Web server?

What types of security risks do you face when i...

Vincent Triola

The major risks associated with webservers and its security include the following: 1. The Web Server is designed to run over a network.

What types of security risks do you face when i...

Vincent Triola

The major risks associated with webservers and its security include the following: 1. The Web Server is designed to run over a network.

The Basics of Devising Security Policy & Network Access Control

The Basics of Devising Security Policy & Networ...

Vincent Triola

There are a large number of security policies and network security designs but general security policies areas would likely include:

The Basics of Devising Security Policy & Networ...

Vincent Triola

There are a large number of security policies and network security designs but general security policies areas would likely include: