Skip to content
  • Home
  • Reading
    • The Epic Short Story
    • The Helltorch
    • Fiction
    • Book Reviews
    • Social Commentary
    • Novels & Poetry
      • Vincent Triola's Novels
      • Novelettes & Novellas
      • Vincent Triola's Poetry
    • Ten Years of Academic Writing
    • Publications
  • About Me
    • Me
    • Bios
    • Haunts
  • Subscribe
    Vincent Triola
    • Home
    • Reading
      • The Epic Short Story
      • The Helltorch
      • Fiction
      • Book Reviews
      • Social Commentary
      • Novels & Poetry
        • Vincent Triola's Novels
        • Novelettes & Novellas
        • Vincent Triola's Poetry
      • Ten Years of Academic Writing
      • Publications
    • About Me
      • Me
      • Bios
      • Haunts
    • Subscribe

    Item added to your cart

    Ten Years of Academic Writing

    Data Link Layer Attacks

    Data Link Layer Attacks

    March 2021
    Vincent Triola

    The data link layer, layer 2, forms the second layer of Open Systems Interconnection model (OSI) of computer networking, which is comprised of seven-layers.

    Sony Network Security Analysis

    Sony Network Security Analysis

    March 2021
    Vincent Triola

    In 2014, Sony experienced a network security breach which resulted in the release of thousands of emails, company communications, and other sensitive data (Pagliery, 2015). For a company as large...

    The CIA Security Triad isn’t solely about balancing network security.

    The CIA Security Triad isn’t solely about balancing network security.

    February 2021
    Vincent Triola

    One might think that CIA is a balance of elements that allow for maximization of user ability and security. This might be true but this balancing act is really an...

    • 1
    • 2
    • 3

    I'll never sell your info.

    Be sure to check your email for confirmation.

    Subscribe to Vincent Triola

      © 2022, Vincent Triola
      • Choosing a selection results in a full page refresh.