| 1. | | An MVC Primer (danielmiessler.com) |
| 1 point by danielmiessler on Oct 18, 2015 | past |
|
| 2. | | A Blockchain Primer (danielmiessler.com) |
| 1 point by danielmiessler on Oct 15, 2015 | past |
|
| 3. | | A Collection of Technical Primers (danielmiessler.com) |
| 2 points by danielmiessler on Oct 14, 2015 | past |
|
| 4. | | The Real Internet of Things (danielmiessler.com) |
| 2 points by danielmiessler on Oct 8, 2015 | past |
|
| 5. | | A tmux Tutorial and Primer (danielmiessler.com) |
| 3 points by danielmiessler on Oct 6, 2015 | past |
|
| 6. | | Visual Analytics and Threat Intelligence with Raffael Marty [video] (darkreading.com) |
| 1 point by danielmiessler on Oct 1, 2015 | past |
|
| 7. | | Continuous Delivery versus Continuous Deployment (oreilly.com) |
| 1 point by danielmiessler on Oct 1, 2015 | past |
|
| 8. | | To Master Vim, Use It Like Language (danielmiessler.com) |
| 250 points by danielmiessler on Oct 1, 2015 | past | 119 comments |
|
| 9. | | Derbycon 2015 Videos (irongeek.com) |
| 1 point by danielmiessler on Oct 1, 2015 | past |
|
| 10. | | To Master Vim, Use It Like Language (danielmiessler.com) |
| 11 points by danielmiessler on Oct 1, 2015 | past |
|
| 11. | | A vim Tutorial and Primer (danielmiessler.com) |
| 3 points by danielmiessler on Sept 28, 2015 | past |
|
| 12. | | Git History is Forever (brooksgarrett.com) |
| 1 point by danielmiessler on Sept 11, 2015 | past |
|
| 13. | | The 3 Principles of Secure Design Maturity (danielmiessler.com) |
| 1 point by danielmiessler on Sept 10, 2015 | past |
|
| 14. | | The Coming Need for Electromagnetic Spectrum Security (ESS) (danielmiessler.com) |
| 1 point by danielmiessler on Sept 9, 2015 | past |
|
| 15. | | The Difference Between a Vulnerability Assessment and a Penetration Test (danielmiessler.com) |
| 1 point by danielmiessler on Sept 8, 2015 | past |
|
| 16. | | Saying Goodbye to Google Services (danielmiessler.com) |
| 25 points by danielmiessler on Sept 6, 2015 | past | 4 comments |
|
| 17. | | Collection of Less Commonly Used Unix Commands (danielmiessler.com) |
| 4 points by danielmiessler on Sept 6, 2015 | past |
|
| 18. | | The Problem with Security Conference Training (danielmiessler.com) |
| 2 points by danielmiessler on Sept 5, 2015 | past |
|
| 19. | | How Insurance Will Consume Information Security (danielmiessler.com) |
| 2 points by danielmiessler on Sept 4, 2015 | past |
|
| 20. | | What the U.S. Should Do with Edward Snowden (danielmiessler.com) |
| 1 point by danielmiessler on July 9, 2015 | past | 2 comments |
|
| 21. | | Flattening organizations (oreilly.com) |
| 2 points by danielmiessler on July 8, 2015 | past |
|
| 22. | | Real-time analytics within the transaction (oreilly.com) |
| 1 point by danielmiessler on July 7, 2015 | past |
|
| 23. | | On Curation and Quality (danielmiessler.com) |
| 1 point by danielmiessler on July 7, 2015 | past |
|
| 24. | | The crazy economics of inflight Wi-Fi (fortune.com) |
| 1 point by danielmiessler on July 7, 2015 | past |
|
| 25. | | Unpacking technical jargon in machine learning (oreilly.com) |
| 1 point by danielmiessler on July 7, 2015 | past |
|
| 26. | | Locust – A modern load testing framework (locust.io) |
| 127 points by danielmiessler on July 1, 2015 | past | 21 comments |
|
| 27. | | Stop Being Proud of Complexity (danielmiessler.com) |
| 2 points by danielmiessler on June 30, 2015 | past |
|
| 28. | | The Art of Testing Less Without Sacrificing Quality (acolyer.org) |
| 8 points by danielmiessler on June 26, 2015 | past |
|
| 29. | | If You're Not Profiling, You're Not Doing Security (danielmiessler.com) |
| 2 points by danielmiessler on June 26, 2015 | past |
|
| 30. | | A tcpdump Primer with Examples (danielmiessler.com) |
| 2 points by danielmiessler on June 25, 2015 | past |
|
|
| More |