Shariyaz's Information Security Blog

Shariyaz's Information Security blog highlights the Information Security vulnerabilities.

Thursday, October 2, 2014

String-Theory-in-Nutshell

String Theory in Nutshell


Posted by Shariyaz at 10:42 AM No comments:
Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest
Newer Posts Older Posts Home
Subscribe to: Posts (Atom)

Total Pageviews

Follow me on Facebook

Labels

Information Security (2) Social Engineering (2) News (1) Scams (1) cyber security (1) jokes (1)

About Me

Shariyaz
View my complete profile

Popular Posts

  • Data Leakage Prevention
    Securing Organizations Confidential Data with Data Loss Prevention Systems Data leakage prevention is one of the key topics which we h...
  • Jokes
    Have a Laugh - Jokes just for fun When i am stressed out , i read a joke to Cheer me up. This is just for fun. Joke 1 The pope was...
  • Information Security Guide for Parents - Part 1
    Online Information Security Guide for Parents  Nowadays Information security plays a vital role in our day to day life. Especia...
  • Infosec Review - IT Business and Security News
  • Protect-the-business-from-Botnet-Attacks
    IT Security Review and Recommendation to   protect your Business from BotNets.  Copyright © 2014 by Shariyaz Abdeen Content...
  • About me
    Shariyaz Abdeen I am a Technical Project Manager  with 11 years experience managing medium to large scale Software Development and Cloud mig...
  • Cyber Crime Investigation - Email Scams
                                                                                                              ...
  • information security - How to Secure your data
    Nowadays Information security plays a vital role in our day to day life. Especially the social media have gone main-stream among the ...
  • Hologram 3D projection
    I am bored at work , so we started this 3D Hologram projection project :) This is how i enjoy my work and keep it interest...
  • infosec-tools
    Tools 1. Digital Attack Map - World Map Shows Every Denial Of Service Attack Happening Right Now In Real Time 2. Cyber Attack Map ...

Blog Archive

  • ►  2013 (11)
    • ►  March (1)
    • ►  July (1)
    • ►  August (3)
    • ►  September (2)
    • ►  October (2)
    • ►  November (2)
  • ▼  2014 (5)
    • ►  July (1)
    • ►  August (1)
    • ▼  October (1)
      • String-Theory-in-Nutshell
    • ►  November (1)
    • ►  December (1)
  • ►  2015 (1)
    • ►  August (1)

Live Statistics

Copyright © Author - Shariyaz Abdeen All Rights Reserved. Awesome Inc. theme. Powered by Blogger.