Academic Work
(Parts from my academic work)

Ariane V Here you will find a document analysing the chronicle of a major failure.
Security vs Business Security Management - An explanation of how security requirements can be linked to business requirements.
Policy Critique Security Management - The strengths and weaknesses of the Athena AC-01 policy.
ARP protocol Network Security - How and intruder can compromise network security by subverting the ARP protocol.
Port Scan Analysis Network Security - Threats, security vulnerabilities and counter measures associated with network security for a company using the output from a port scan.
Web Services Intoduction and Analysis of the Web Services
U M L Unified Modeling Language
Quantum Cryptography An introduction to QC and explanation of the quantum key distribution (QKD) - also, a demo application is available
UNIX security - DNS Discuss from an administration and security perspective, the role and fucntion of DNS within a UNIX network
UNIX security - JavaScript Discuss from an administration and security perspective, the role and fucntion of JavaScript within a UNIX network
MS Windows Security - Port 139 How an intruder using ONLY the TCP/139 and UDP/139 ports can break into a Windows 2000 Server that is functioning as a domain controller
MS Windows Security - DNS Discuss the role that DNS plays in a Windows 2000 native domain and its associated security implications