© 2023 Hashnode
#book-review
This article is the third of my book review series. I'm trying to provide you with the best lessons from this reading. If you've missed the first two parts, please find them there : Part one. Part t…
This article is the second of my book review series. Part one is here. This second part will focus on the next best lessons learned. Next best lessons learned The bus factor This one is widely known :…
Michael Hale Ligh, Andrew Case, Jamie Levy, AAron Walters, "The Art of Memory Forensics: Detecting Malware and Threats in Windows, Linux, and Mac Memory 1st Edition", Wiley, 2014 Introduction In this …
Background I wrote this as the final report for CS 427 at UIUC which I took as part of the Master of Computer Science program. This review is based on the 20th Anniversary Edition. The essay format fo…
Networking is an essential skill for any professional, in any industry. As an introvert, the word "networking" is intimidating, mostly because I am not familiar with the how-tos of networking. This we…
You've heard the adage: "Don't start what you can't finish." But what about the flip side? What about finishing what we start? Having a system for finishing tasks is just as important as starting them…