Links
- https://www.postgresql.org/message-id/46279257.6000102%40kaigai.gr.jp
- https://prabhnair.in/unseen-topics-of-cissp-you-must-know/
- https://riskbasedauthentication.org/
- https://en.wikipedia.org/wiki/Stream_Control_Transmission_Protocol
- https://en.wikipedia.org/wiki/Diameter_(protocol)
- https://www.iana.org/assignments/service-names-port-numbers/service-names-port-numbers.xhtml
- https://www.kentik.com/kentipedia/what-is-synthetic-transaction-monitoring/
- https://www.kaspersky.com/blog/vulnerability-disclosure-ethics/35581/
- https://www.first.org/global/sigs/ethics/
- https://learn.microsoft.com/en-us/purview/ediscovery
- https://www.sciencedirect.com/topics/computer-science/vulnerability-window
- https://av-test.org/en/
- https://ofac.treasury.gov/media/912981/download?inline
- https://en.wikipedia.org/wiki/Bit-flipping_attack
- https://en.wikipedia.org/wiki/Two-person_rule
- https://medium.com/partisia-blockchain/mpc-fhe-dp-zkp-tee-and-where-partisia-blockchain-fits-in-c8e051d053f7
- https://en.wikipedia.org/wiki/Homomorphic_encryption
- https://www.justice.gov/d9/criminal-ccips/legacy/2015/01/14/ssmanual2009_002.pdf
- https://www.kingston.com/en/usb-flash-drives/encrypted
- https://www.ibm.com/think/x-force/patch-tuesday-exploit-wednesday-pwning-windows-ancillary-function-driver-winsock