Big Data and Machine Learning
Big Data, as its name suggests, refers to a lot of data. However, it is not just the amount of…
Big Data, as its name suggests, refers to a lot of data. However, it is not just the amount of…
ISO 27001 is the world’s best-known internationally accepted standard for ISMS (Information Security Management System). ISO published it on 14…
DWDM is an advanced multiplexing technology used in fiber optic communication. This technology enables the simultaneous transmission of multiple data…
The information has become important regardless of the type of information in the information age we live in. For this…
The network structure called “internet” today has evolved from the coming together of several small networks working independently of each…
Virtual LAN, or VLAN, is the concept of separating the local network into virtual areas. It is located in the…
In order to ensure security within a network, it is first necessary to master the network structure and identify network…
Split Horizon is a technique to prevent the formation of loops while sharing the route information of the Split Horizon…
Encryption is the process of converting human-readable data, namely plain texts, into incomprehensible texts. To tell it simply, that is…
NAC is a technology that implements a system for authentication to ensure network security. It enables the automatic operation of…
SSL ensures that the communication between the server and the user can be encrypted for general frame and protection during…
Today, almost all cyber attacks take place in order to access information. At this stage, the security of the files…
Managing infrastructure is a core requirement for most modern applications. A large number of hardware must be managed correctly in…
FIREWALL A firewall is a network device that works on the 3rd and 4th OSI Layers, namely Network and Transmission…
The cyber threat landscape is growing rapidly, and organizations around the world are struggling to find the protection they need…
YOU CAN NOT COPY THAT TEXT !
COPYRIGHT TO EMRE CICEK.