Registered since September 28th, 2017
Has a total of 3394 bookmarks.
Showing top Tags within 4 bookmarks
Tag selected: assessment.
Saved by uncleflo on January 6th, 2019.
In 2000, the International Standards Organization adopted ISO Standard 12233: Photography -- Electronic still-picture cameras - Resolution measurements for the measurement of camera resolution. This standard is protected by copyright, but the design of the associated test chart seems not to be protected; its description has been available on the Web in an Excel spreadsheet. I have semi-manually converted this to an Adobe Illustrator file which is displayed here. In 2014 and again in 2017, the ISO revised the standard and the chart below was replaced by several new ones. Those new charts are not available here. In principle, you should be able to print this chart and perform resolution tests on your camera. The reality isn't that simple; there are lots of subtleties having to do with focus distance, quality and contrast of your printer, evenness of illumination, surface reflections, etc.
print raster spreadsheet pixel reproduce resolution imaging squares illustrator computational outline optical cheap precision expect compliance chart measurement measuring properly file camera perform assessment standard resource howto test testing photographer performance analysis distortion revise focus
Saved by uncleflo on June 30th, 2017.
The Certified Ethical Hacker course through CyberSecurity Academy will help you to stop hackers by learning to think like one. This class immerses students in an interactive environment where they will scan, test, hack, and secure their own systems. CEH candidates will learn how intruders escalate privileges and what steps can be taken to secure a system. Also covered will be Intrusion Detection, Policy Creation, Social Engineering, DDoS Attacks, Buffer Overflows and Virus Creation. All students will leave the class with a detailed plan on conducting vulnerability assessments and penetration tests.
Saved by uncleflo on June 27th, 2017.
Someone has found a potential security issue with your technology. What happens next? Making certain this discovery leads to a positive outcome for everyone involved is crucial. Replacing an antiquated security@ mailbox with the HackerOne platform brings order and control to an otherwise chaotic process. Do you have a vulnerability disclosure policy? How is it implemented? Leverage our platform to ensure that your team has control over the entire process, from initial validation, internal escalation, communication with the hacker, and the timing and messaging surrounding any coordinated disclosure. A consistent coordination process eliminates the opportunity for miscommunication and ensures positive outcomes. Gain unparalleled insight into your security posture with metrics gleaned from around-the-clock security assessments. Monitor your program's stats in real time to effortlessly stay on top of response time, stale issues, pending disclosures, and more. Your Security Development Lifecycle (SDL) will thank you.
security hacking hacker discover replace process income vulnerability crucial discovery issue potential bounty reward finance money platform hire coordination find code site leverage assessment lifecycle disclosure question technical administration
Saved by uncleflo on November 22nd, 2011.
We all have different habits, good and bad, in the way that we learn. For example, you may find yourself copying things out when reading rather than summarising and writing notes in your own words. We also have different preferences for the ways that we learn best. For example, some people find it much easier to understand a concept if they discuss it, whilst others find it easier to understand if they are able to see a diagram that explains the concept. Understanding your learning approaches and preferences is very important if you are going to help yourself to learn better.
No further bookmarks found.