ECCENTRIX
Popular repositories Loading
-
Unlocking-the-Power-of-Multifactor-Authentication-Strengthening-Company-Security
Unlocking-the-Power-of-Multifactor-Authentication-Strengthening-Company-Security PublicThis writing explores how MFA works, its potential impact on companies, and strategies for successful implementation
-
Microsoft-Defender-for-Cloud-Apps
Microsoft-Defender-for-Cloud-Apps PublicThis article is about Microsoft Defender for Cloud Apps, exploring its functionalities and practical use cases to illuminate how it fortifies cloud security.
-
A-Day-in-the-Life-of-a-Chief-Information-Officer-CIO
A-Day-in-the-Life-of-a-Chief-Information-Officer-CIO PublicDiscover what a typical day of a CIO is, highlighting the tasks they execute and how they communicate with different teams to maintain the organization's security.
-
Demystifying-Access-Control-Models-RBAC-MAC-and-DAC-Explained
Demystifying-Access-Control-Models-RBAC-MAC-and-DAC-Explained PublicThis writing is about differences in RBAC, MAC, and DAC security models. It helps understand the use of each in a practical case.
-
A-Comprehensive-Comparison-of-Cisco-Routing-Protocols-Making-the-Right-Choice-for-Your-Network
A-Comprehensive-Comparison-of-Cisco-Routing-Protocols-Making-the-Right-Choice-for-Your-Network PublicThis article compares Cisco's routing protocols, shedding light on their key features, practical applications, and real-world implementation scenarios.
-
Understanding-How-Cloud-Hosting-Functions
Understanding-How-Cloud-Hosting-Functions PublicThis writing explores the Cloud Hosting - a popular type of service available to customers interested in outsourcing some of their IT infrastructure.
Repositories
- Azure-Private-Endpoints Public
In this article, we explore Azure Private Endpoint, a feature designed to ensure secure and private connectivity to Azure services.
ECCENTRIX-CA/Azure-Private-Endpoints’s past year of commit activity - Understanding-the-Difference-Between-VPN-and-VNet-Peering-in-Azure Public
In this article, we explore the differences between VPN and VNet Peering in Azure, two key technologies for network connectivity.
ECCENTRIX-CA/Understanding-the-Difference-Between-VPN-and-VNet-Peering-in-Azure’s past year of commit activity - Session-Border-Controllers-in-IP-Telephony- Public
In this article, we explore the role of Session Border Controllers (SBCs) in IP telephony networks.
ECCENTRIX-CA/Session-Border-Controllers-in-IP-Telephony-’s past year of commit activity - Implementing-BYOD-Devices-in-the-Workplace- Public
In this article, we explore the implementation of BYOD (Bring Your Own Device) policies in the workplace.
ECCENTRIX-CA/Implementing-BYOD-Devices-in-the-Workplace-’s past year of commit activity - The-Application-Proxy-in-Azure- Public
In this article, we explore the Azure Application Proxy, a secure solution for providing remote access to on-premises applications.
ECCENTRIX-CA/The-Application-Proxy-in-Azure-’s past year of commit activity - The-Role-of-OSINT-in-Computer-Security- Public
In this article, we explore the role of OSINT (Open-Source Intelligence) in computer security. Learn how OSINT leverages publicly available data to identify threats, assess vulnerabilities, and enhance incident response, along with best practices and tools for effective implementation.
ECCENTRIX-CA/The-Role-of-OSINT-in-Computer-Security-’s past year of commit activity - Comprehensive-Guide-to-Security-and-CISSP-Trainings-and-Certification-Paths- Public
In this article, we explore the paths to achieving Security+ and CISSP certifications, two top credentials in cybersecurity.
ECCENTRIX-CA/Comprehensive-Guide-to-Security-and-CISSP-Trainings-and-Certification-Paths-’s past year of commit activity - Differences-Between-Power-BI-Desktop-and-Power-BI-for-the-Web- Public
In this article, we explore the key differences between Power BI Desktop and Power BI for the Web, two essential tools in the Power BI ecosystem.
ECCENTRIX-CA/Differences-Between-Power-BI-Desktop-and-Power-BI-for-the-Web-’s past year of commit activity - Exploring-the-Relationship-Between-Microsoft-Graph-and-Microsoft-Copilot- Public
In this article, we explore the powerful synergy between Microsoft Graph and Microsoft Copilot. Discover how these tools enhance development by combining real-time data access with AI-driven code generation, accelerating productivity and enabling innovative applications.
ECCENTRIX-CA/Exploring-the-Relationship-Between-Microsoft-Graph-and-Microsoft-Copilot-’s past year of commit activity - 20-Useful-Ways-to-Use-Copilot-in-Your-Day-to-Day-Productivity Public
ChatGPT This guide clarifies Microsoft 365 Groups, covering their definition, uses, differences from legacy groups, and integration with other Microsoft 365 services.
ECCENTRIX-CA/20-Useful-Ways-to-Use-Copilot-in-Your-Day-to-Day-Productivity’s past year of commit activity
People
This organization has no public members. You must be a member to see who’s a part of this organization.
Top languages
Loading…
Most used topics
Loading…