Skip to content
  • Home
  • About

Adventures in the programming jungle

Adrian Citu's Blog

WordPress.com

2012 in review

30 December, 201231 December, 2012Adrian Citu

The WordPress.com stats helper prepared a 2012 annual report for this blog.

Click here to see the report.

UncategorizedAnnual report, WordPress, WordPress.com

Social

  • View citu_adrian’s profile on Twitter
  • View cituadrian’s profile on LinkedIn
  • View adriancitu’s profile on GitHub

Today Top Posts & Pages

  • How to run Cisco ASDM as a Java Web Start application
  • A Java implementation of CSRF mitigation using "double submit cookie" pattern
  • (My) CISSP Notes - Information Security Governance and Risk Management
  • (My) CEH cheat sheet
  • (My) CISSP Notes - Cryptography
  • Containers landscape: seen through OCI and CNCF standards lens
  • How to use an external JavaScript file in a BIRT report
  • (My) CISSP Notes - Physical Security
  • (My) CISSP Notes - Access control
  • Generating Excel files with Apache POI - Removed Feature: Format from /xl/styles.xml part (Styles)

Categories

Tags Cloud

Abuse Cases Access Control Access Control Models Agile Software Development AOP Apache ZooKeeper AspectJ Assembly language BackTrack Bell-LaPadula Big Data Book Review BruCON BruCON 2015 BruCON 2016 Buffer overflow Certification Certified Information Systems Security Professional CISSP C language Clark-Wilson Computer Forensics Computer security Containers Cross Site Request Forgery CSRF CSSLP DFF Digital Forensic Framework Docker ElasticSearch GCC GDB Hacking Intrusion Detection System Investigation numerique It Forensics Java K8S Kerberos Keystore Kubernetes Linux Malware Maven NASM OWASP OWASP Application Security Verification Standard OWASP Security Knowledge Framework OWASP SKF Pare-feu applicatif Penetration test Pentest Programming Python Risk Management SCEA SDLC Secure Development Lifecycle Secure operating system and software architecture Security Shellcode SOAP Spiral Model SQL injection SSL Stack buffer overflow STRIDE Threat Modeling Transport Layer Security Volatility waf Waterfall Model Web Application Firewall XSS
CSSLP Logo
Cissp Logo
SCEA Logo
Create a website or blog at WordPress.com
  • Follow Following
    • Adventures in the programming jungle
    • Join 94 other followers
    • Already have a WordPress.com account? Log in now.
    • Adventures in the programming jungle
    • Customize
    • Follow Following
    • Sign up
    • Log in
    • Report this content
    • View site in Reader
    • Manage subscriptions
    • Collapse this bar