Found 30 repositories(showing 30)
Enna1
Study notes about LLVM. LLVM 学习笔记. Licensed under CC BY-NC-SA 4.0
R3zdrake
CCSP study resources, notes, exam material.
BecomingCyber
📘 Study guide and self-assessment portfolio for the ISC2 Certified in Cybersecurity (CC) exam. Includes notes, diagrams, practice questions, quizzes, and a structured study plan.
sumanbhattarai
This repository contains concise notes and key concepts for preparing for the ISC2 Certified in Cybersecurity (CC) exam. The notes cover essential topics, security principles, and practices, designed to help you study effectively for the certification.
Amrt1n3zm
Browser Security Handbook Written and maintained by Michal Zalewski <lcamtuf@google.com>. Copyright 2008, 2009 Google Inc, rights reserved. Released under terms and conditions of the CC-3.0-BY license. Table of Contents → Part 1: Basic concepts behind web browsers → Part 2: Standard browser security features → Part 3: Experimental and legacy security mechanisms Introduction Hello, and welcome to the Browser Security Handbook! This document is meant to provide web application developers, browser engineers, and information security researchers with a one-stop reference to key security properties of contemporary web browsers. Insufficient understanding of these often poorly-documented characteristics is a major contributing factor to the prevalence of several classes of security vulnerabilities. Although all browsers implement roughly the same set of baseline features, there is relatively little standardization - or conformance to standards - when it comes to many of the less apparent implementation details. Furthermore, vendors routinely introduce proprietary tweaks or improvements that may interfere with existing features in non-obvious ways, and seldom provide a detailed discussion of potential problems. The current version of this document is based on the following versions of web browsers: | Browser | Version | Test date | Usage* | Notes | |:--------------------------------------------|:--------------------------------------------|:----------------------------------------------|:------------------------------------------------------|:------------------------------------------| | Microsoft Internet Explorer 6 | 6.0.2900.5512 | Feb 2, 2009 | 16% | | | Microsoft Internet Explorer 7 | 7.0.5730.11 | Dec 11, 2008 | 11% | | | Microsoft Internet Explorer 8 | 8.0.6001.18702 | Sep 7, 2010 | 28% | | | Mozilla Firefox 2 | 2.0.0.18 | Nov 28, 2008 | 1% | | | Mozilla Firefox 3 | 3.6.8 | Sep 7, 2010 | 22% | | | Apple Safari | 4.0 | Jun 10, 2009 | 5% | | | Opera | 9.62 | Nov 18, 2008 | 2% | | | Google Chrome | 7.0.503.0 | Sep 7, 2010 | 8% | | | Android embedded browser | SDK 1.5 R3 | Oct 3, 2009 | n/a | | * Approximate browser usage data based on public Net Applications estimates for August 2010. Disclaimers and typographical conventions Please note that although we tried to make this document as accurate as possible, some errors might have slipped through. Use this document only as an initial reference, and independently verify any characteristics you wish to depend upon. Test cases for properties featured in this document are freely available for download. The document attempts to capture the risks and security considerations present for general populace of users accessing the web with default browser settings in place. Although occasionally noted, the degree of flexibility offered through non-standard settings is by itself not a subject of this comparative study. Through the document, red color is used to bring attention to browser properties that seem particularly tricky or unexpected, and need to be carefully accounted for in server-side implementations. Whenever status quo appears to bear no significant security consequences and is well-understood, but a particular browser implementation takes additional steps to protect application developers, we use green color to denote this, likewise. Rest assured, neither of these color codes implies that a particular browser is less or more secure than its counterparts. Acknowledgments Browser Security Handbook would not be possible without the ideas and assistance from the following contributors: Filipe Almeida Brian Eaton Chris Evans Drew Hintz Nick Kralevich Marko Martin Tavis Ormandy Wladimir Palant David Ross Marius Schilder Parisa Tabriz Julien Tinnes Berend-Jan Wever Mike Wiacek The document builds on top of previous security research by Adam Barth, Collin Jackson, Amit Klein, Jesse Ruderman, and many other security experts who painstakingly dissected browser internals for the past few years.
cpy2024
Reference solutions and additional notes for exercises in Measure and Probability by Yan Shijian and Liu Xiufang. Includes error corrections, alternative proofs, and supplementary discussions. Intended for active learners as a study aid under the CC BY-NC-SA 4.0 license.
dannebrob
Collection of notes on my ENCOR and CCNP studies.
grandeemir
This repository contains my personal notes, configurations, diagrams, and resources compiled during my CCNA preparation. It is intended to be a centralized, accessible resource for myself and anyone else studying for the certification.
LetsLearntocodeforfun
A great study resource for the CCNA Exam. I create this with the help of Jeremy's It Lab Slides, my personal notes, and help of Gemini 2.5 Pro AI
akramchraibi
These are personnal notes that I have taken while preparing for the (ISC)² Certified in Cybersecurity
Plains78
No description available
AK-NetEng
My personal notes for the Cisco CCNA 200-301 exam.
richwebb8
No description available
K1switch
No description available
TsSource
Personal study notes for CCA
wajeeh-it
My personal CCNA learning notes covering networking fundamentals, routing, switching, and subnetting.
sabahGH20
My CCNA 200-301 study notes and lab projects.
0xsimaa
Structured study notes for the ISC2 Certified in Cybersecurity (CC) certification. Covers core domains — security principles, network security, access control, and incident response — documented for retention and real-world understanding. From exam prep to foundational knowledge.
BenGigs
Structured notes, commands, and lab summaries for CCNA exam prep following Jeremy’s IT Lab curriculum.
Aliraqi404
No description available
bitm4ker
Writeups documenting my CCST Cybersecurity Study Notes.
goffr2
This is a repo for my CCNA notes I take while studying for the exam
Samuel-Cybersec7
No description available
Cyber-Umb
No description available
MrBitasmblTester2
Build a web application that allows students to input lectures, textbooks, or articles and automatically generate concise, structured study notes.
BecomingCyber
📘 Study guide and self-assessment portfolio for the ISC2 Certified in Cybersecurity (CC) exam. Includes notes, diagrams, practice questions, quizzes, and a structured study plan.
MrBitasmblTester2
Build a web application that allows students to input lectures, textbooks, or articles and automatically generate concise, structured study notes using AI summarization and keyword extraction.
MrBitasmblTester
Build a web app for students to generate concise, structured AI-powered study notes from lectures, textbooks, or articles.
SamuMGH04
A curated collection of technical notes, diagrams, and study materials focused on Computer Engineering . Content is written in Italian to ensure maximum clarity in conceptual expression. All material is protected and distributed under license CC BY-NC-ND 4.0
This repository contains a curated set of last-minute study notes and multiple-choice practice questions for the ISC2 Certified in Cybersecurity (CC) exam. It covers all five exam domains, the ISC2 Code of Professional Ethics (canons), and key networking topics like IP addressing, subnetting, and common ports.
All 30 repositories loaded