[ 3 / biz / cgl / ck / diy / fa / ic / jp / lit / sci / vr / vt ] [ index / top / reports ] [ become a patron ] [ status ]
2023-11: Warosu is now out of extended maintenance.

/biz/ - Business & Finance

Search:


View post   

>> No.12105490 [View]
File: 151 KB, 1780x1001, csw-co1n-3.jpg [View same] [iqdb] [saucenao] [google]
12105490

>>12105483

>>12105481

I'm posting the most important thread on this board right now. It's not my fault you all haven't caught up yet.

>> No.11780072 [View]
File: 151 KB, 1780x1001, 1517479608839.jpg [View same] [iqdb] [saucenao] [google]
11780072

>>11780060

The early days we had poker nodes in Bitcoin. We had merchant databases in Bitcoin. All of this has been stripped. It shouldn't be in the main core protocol. Wallets need to be developed independently. Why? Because that's how they compete.

We don't want one, we want a world-using Bitcoin. That's simple. We want it secure. And we want it able to be used between many people.

Replaceable transactions versus replace by fee. Replace by fee is the biggest piece of shit every created [audience applause]. And I'm to say that very nicely because that's not actually what I feel about it, but I've been told that I'm not allowed to say my true feelings, so I'll put it lightly that it's complete utter shit.

Replaceable transaction: when you hadn't broadcast something to the network and you were negotiating a payment channel, that was valid. Why? Because you're negotiating. When you send it to a miner and you allow a miner to start playing with it, zero confirmation doesn't work.

Risk is not perfect. Every system---every one---is probabilistic. There is no single system ever created that is not probabilistic in security.

>> No.10921906 [View]
File: 151 KB, 1780x1001, IMG_20180629_115547.jpg [View same] [iqdb] [saucenao] [google]
10921906

I have a few books and another is on the way for 2012. Firstly, I have to plug the first in the Syngress Series of books on IT Audit. This is a comprehensive compliance hand governance handbook with EVERYTHING (from the high level to the hands on for the expert) to get you started in IT compliance and systems security. The main book is "IT REGULATORY AND STANDARDS COMPLIANCE HANDBOOK". This is the first in a series I have planned and more will follow in time. There will be electronic updates to this book over time to maintain it to a current level over time.

I will be working on co-authoring a book on CIP (Critical Infrastructure Protection) - but more on this later.

I co-authored a few chapters of Check Point NGX R65 Security Administration (ISBN: 9781597492454)

I authored the Forensic Chapter of Mobile Malware Attacks and Defense.

Also, the ISC2 CISSP-ISSMP Handbook is available now. I am the author of the chapter on "Law, Investigation, Forensics and Ethics".

Training and Courseware
I am mentoring two SANS courses in addition to my role at CSU.
First, I have the (SEC504) Security 504: Hacker Techniques, Exploits & Incident Handling course. Click and see more on this topic.
Next, there is the (FOR508) Forensics 508: Advanced Computer Forensic Analysis and Incident Response course.
Both of these courses are well warranted and will provide you with a great start in this field. Click and have a read.

Navigation
View posts[+24][+48][+96]