Identity & History
258 posts, 147,902 words. Sorted by length (most substantial first).
-
Law & Regulation The Geography of Cybercrime
-
Education Virgil: The Aeneid
-
Education Medieval Latin: Commentary II
-
Bitcoin & Blockchain Technology Tulips and other myths
-
Education Medieval Latin: Commentary I
-
Bitcoin & Blockchain Technology Satoshi and Science
-
Law & Regulation Cancelled: The New Censorship
-
Economics & Sound Money The Changes to Cultural Identity in a Global World
-
Bitcoin & Blockchain Technology Satoshi Nakamoto
-
Other Educating the English
-
Bitcoin & Blockchain Technology Personal Security Device
-
Bitcoin & Blockchain Technology Q&A/Written Interview — The answers — Part 1
-
Art & Aesthetics Ribbons and the Dream of Digital Envelopment
-
Education The Woke Regression
-
Law & Regulation The Rise and Fall of European Neutrality from the United States
-
Education An Unlyrical Ode to the Bard?
-
Law & Regulation The Rebirth of Anti-Semitism
-
Philosophy Jan Van Eyck — A Study in Optics
-
Economics & Sound Money The Closing of Open Society
-
Law & Regulation Merchants and the Tokugawa Political Order
-
Economics & Sound Money Paper Critique: Economic Geography and the Location of TNCs
-
Other Monsterousness
-
Law & Regulation WWI and Wilson
-
Education Counterculture and Mixed Messages
-
Philosophy The Development of Modern Art
-
Economics & Sound Money Cot Death in the Nanny State
-
Economics & Sound Money Pan-Asianism and the Greater East Asian Co-Prosperity Sphere
-
Economics & Sound Money Historical Maps
-
History Genocide and Ethnic Cleansing
-
Philosophy Paper Critique: The Geography of Fear
-
Philosophy Art Nouveau
-
Economics & Sound Money Paper Critique: ‘Trade and Geography in the Spread of Islam’
-
Economics & Sound Money London and the Thames
-
Academic Papers & Research Document Management Archives
-
Academic Papers & Research International Relations Archives
-
Academic Papers & Research Bitcoin Archives
-
Academic Papers & Research Security Archives
-
Philosophy Twenty Years of a Bank Worker’s Life
-
Academic Papers & Research Information Security Archives
-
Academic Papers & Research Digital Forensics Archives
-
Academic Papers & Research Cybercrime Archives
-
Academic Papers & Research Data Archives
-
Academic Papers & Research Decolonisation Archives
-
Academic Papers & Research Diplomacy Archives
-
Academic Papers & Research Government Archives
-
Academic Papers & Research Law Archives
-
Academic Papers & Research Psychology Archives
-
Academic Papers & Research Science Archives
-
Academic Papers & Research Colonialism Archives
-
Academic Papers & Research Commerce Archives
-
Academic Papers & Research Education Archives
-
Academic Papers & Research Mythology Archives
-
Other Carnivorous Sponges
-
Economics & Sound Money Paper Critique: ‘Scale-free human migration and the geography of social networks’
-
Academic Papers & Research Cryptography Archives
-
Academic Papers & Research Enforcement Archives
-
Academic Papers & Research Freedom Archives
-
Academic Papers & Research Philosophy Archives
-
Academic Papers & Research Psychometric Testing Archives
-
Academic Papers & Research Social Mobility Archives
-
Academic Papers & Research Communism Archives
-
Academic Papers & Research Constitution Archives
-
Academic Papers & Research Cultures Archives
-
Academic Papers & Research Globalisation Archives
-
Academic Papers & Research Hardware Archives
-
Academic Papers & Research Psychotherapy Archives
-
Academic Papers & Research Reflection Archives
-
Academic Papers & Research Society Archives
-
Philosophy On ‘Bullshit’
-
Economics & Sound Money Nation and State: Old Wine in New Bottles
-
Philosophy Collectivism and Protagoras of Abdera
-
Education Cancelled: A Polemic on Education
-
Law & Regulation The Voyage of Captain John Saris to Japan
-
Academic Papers & Research Analysis of a Serial Based Digital Voice Recorder
-
Academic Papers & Research Exploiting Format Strings With Python
-
Academic Papers & Research DPA Exploitation and GOTs With Python
-
Academic Papers & Research Live Capture Procedures
-
Academic Papers & Research Current Issues in DNS
-
Academic Papers & Research Rome and the Road to the Distant East
-
Academic Papers & Research Liberty or death
-
Academic Papers & Research Blake and Milton Reactionary and Revolutionary
-
Academic Papers & Research Prometheus: Choosing to be Bound
-
Academic Papers & Research Code in a Flash
-
Academic Papers & Research Overwriting Can Occur Anytime, As Long As it is Done Once After
-
Academic Papers & Research The Banality of the Monsterous
-
Academic Papers & Research There’s Nothing but Data Out There
-
Academic Papers & Research Choosing Your Turtle
-
Academic Papers & Research Unix Network and System Profiling
-
Academic Papers & Research SQL Rootkits
-
Academic Papers & Research Simmering Conflicts and War by Other Means: The Seleukid Empire of Antiochus III
-
Academic Papers & Research Treating Generalised Anxiety Disorder (GAD)
-
Academic Papers & Research Neoliberalism and Doublespeak
-
Academic Papers & Research Establishing Meaning in the First Amendment
-
Academic Papers & Research Sisyphus Impenitent
-
Academic Papers & Research Contextualising Information About Aesthetics
-
Academic Papers & Research Starting to Write Your Own Linux Shellcode
-
Academic Papers & Research An Analysis of Psychometric Testing for the COO Role
-
Academic Papers & Research Hard Drive Errors and Replacements
-
Academic Papers & Research Beyond Godel
-
Academic Papers & Research The Odyssey: An Endless Story of Reaching Home
-
Academic Papers & Research Understanding Conditionals in Shellcode
-
Academic Papers & Research The Illusion of Scale in Segregated Witness
-
Academic Papers & Research The Scene and the Unseen
-
Academic Papers & Research Requirements for Record Keeping and Document Destruction in a Digital World
-
Academic Papers & Research System State Backup
-
Academic Papers & Research The Evolution of Meaning: The Foundation of the American State Papers
-
Academic Papers & Research Using HELIX Live for Windows
-
Academic Papers & Research Starting a Drive Repair/Recovery Lab
-
Academic Papers & Research The Irrationality Defense of Paternalism
-
Academic Papers & Research Kim: The Revolution Devours Its Own, Over and Over
-
Academic Papers & Research Those Who Are Left Behind
-
Academic Papers & Research Erasing Drives Should Be Quick and Easy
-
Academic Papers & Research Taking Control, Functions to DLL Injection
-
Academic Papers & Research Beyond Automated Tools and Frameworks: The Shellcode Injection Process
-
Academic Papers & Research Extending Control, API Hooking
-
Academic Papers & Research Geographical Aspects of Cybercrime: A Literature Review
-
Academic Papers & Research Hex Dumping Flash From a Mobile
-
Academic Papers & Research Overwriting Hard Drive Data
-
Academic Papers & Research Unix System Accounting and Process Accounting
-
Academic Papers & Research Arab Colonialism and the Roots of the Golden Age of Islam
-
Academic Papers & Research The Changes to Cultural Identity in a Global World
-
Academic Papers & Research A Taxonomy of Information Systems Audits, Assessments and Reviews
-
Academic Papers & Research Finer Points of Find
-
Academic Papers & Research What Happens When You Overwrite Data?
-
Academic Papers & Research Electronic Contracting, New Wine in Old Bottles
-
Academic Papers & Research System Scanner
-
Academic Papers & Research Testing Homogeneity of Variance
-
Academic Papers & Research Reverse Engineering Java
-
Academic Papers & Research Data Recovery: ECC Data and Recovery
-
Academic Papers & Research An Analysis of SpyKing
-
Academic Papers & Research Free Windows Drive Tools
-
Academic Papers & Research Packer Analysis Report-Debugging and Unpacking the NsPack 3.4 and 3.7 Packer
-
Academic Papers & Research Overwriting Hard Drive Data: The Great Wiping Controversy
-
Academic Papers & Research Simple Anti-Forensic and Signature stamping techniques using Unicode
-
Academic Papers & Research A Question of Platinum Plus
-
Academic Papers & Research Live Investigations
-
Academic Papers & Research Unix Logging
-
Academic Papers & Research The Great Gatsby: Limits on Social Mobility
-
Academic Papers & Research Understanding *NIX File Linking (ln)
-
Academic Papers & Research Spin-Stand Microscopy of Hard Disk Data
-
Academic Papers & Research Electronic Contracting in an Insecure World
-
Certificates & Credentials Brisbane YMCA Youth Club – Best Military Tactics
-
Art & Aesthetics Wayback Machine
-
Certificates & Credentials 5 Years Membership of the ACS
-
Certificates & Credentials Academic Record – SANS Institute
-
Certificates & Credentials Australian Institute of Management (AIM) Associate Fellow
-
Certificates & Credentials Australian Institute of Management (AIM) Member
-
Certificates & Credentials Certificate of Appreciation – Hastings Family Support Services
-
Certificates & Credentials Certificate of Appreciation – UnitingCare Burnside
-
Certificates & Credentials Certified Computer Examiner
-
Certificates & Credentials CISM Certified Information Security Manager
-
Certificates & Credentials ISACA Certified Information Security Manager
-
Certificates & Credentials ISACA Certified Information Systems Auditor – CISA
-
Certificates & Credentials Certified Information Systems Auditor
-
Certificates & Credentials Certified Information Systems Security Professional
-
Certificates & Credentials Certified Information Systems Security Professional
-
Certificates & Credentials Certified Professional
-
Certificates & Credentials Cisco Certified Network Associate
-
Certificates & Credentials CISSP Certified Information Systems Security Professional
-
Certificates & Credentials CISSP Information Systems Security Architecture Professional
-
Certificates & Credentials CISSP Information Systems Security Management Professional
-
Certificates & Credentials CompTIA Security+ Certified Professional – skills and knowledge
-
Certificates & Credentials CompTIA Security+ Certified Professional
-
Certificates & Credentials Course in OHS Consultation – WorkCover New South Wales
-
Certificates & Credentials Fundamentals of Automotive Mechanics – Thomson Education Direct
-
Certificates & Credentials GIAC Gold: Analysis of a Serial Based Digital Voice Recorder
-
Certificates & Credentials GIAC Certified ISO-17799 Specialist
-
Certificates & Credentials GIAC Certified ISO-17799 Specialist – G7799
-
Certificates & Credentials GIAC Certified Project Manager – GCPM
-
Certificates & Credentials GIAC Certified Unix Security Administrator – GCUX
-
Certificates & Credentials GIAC Certified Windows Security Administrator – GCWN
-
Certificates & Credentials GIAC Certified Windows Security Administrator
-
Certificates & Credentials GIAC Gold: Current Issues in DNS
-
Certificates & Credentials GIAC Platinum Cutting Hacking Techniques
-
Certificates & Credentials GIAC Electronic Contracting in a Secure World
-
Certificates & Credentials GIAC Gold Electronic Contracting in an Insecure World
-
Certificates & Credentials GIAC Gold: Requirements for Record Keeping and Document Destruction in a Digital World
-
Certificates & Credentials GIAC Gold – Electronic Contracting in a Secure World
-
Certificates & Credentials GIAC Gold: Hydration Detection
-
Certificates & Credentials GIAC Information Security Fundamentals – GISF
-
Certificates & Credentials GIAC Information Security Professional – GISP
-
Certificates & Credentials GIAC Law of Fraud
-
Certificates & Credentials GIAC Leadership Management
-
Certificates & Credentials GIAC Legal Issues in Information Technology and Information Security – GLEG
-
Certificates & Credentials GIAC Legal Issues in Information Technology and Information Security
-
Certificates & Credentials GIAC Legal Issues in Information Technology and Security – GLEG
-
Certificates & Credentials GIAC.NET – GNET
-
Certificates & Credentials GIAC Payment Card Industry
-
Certificates & Credentials GIAC Penetration Tester
-
Certificates & Credentials GIAC Secure Software Programmer .Net – GSSP – .Net
-
Certificates & Credentials GIAC Platinum Security Compliance – GSC
-
Certificates & Credentials GIAC Platinum Security Expert – GSE
-
Certificates & Credentials GIAC Security Leadership – GSLC
-
Certificates & Credentials GIAC Security Policy and Awareness
-
Certificates & Credentials GIAC Stay Sharp: Defeating Rogue Access Points
-
Certificates & Credentials GIAC Web Application Penetration Tester – GWAPT
-
Certificates & Credentials GIAC Web Application Security
-
Certificates & Credentials GIAC Intrusion Prevention
-
Certificates & Credentials ICBIFE 2011 – Who Pays for a Security Violation
-
Certificates & Credentials IEEE Defining the Principles of Object-Oriented Programming
-
Certificates & Credentials IASCA (Information Systems Audit and Control Association) Member
-
Certificates & Credentials Information Systems Security Architecture Professional (ISSAP) Concentration
-
Certificates & Credentials CISSP Information Systems Security Architecture Professional
-
Certificates & Credentials Information Systems Security Management Professional
-
Certificates & Credentials Information Systems Security Management Professional
-
Certificates & Credentials International Conference on Economics Accounting and Finance Chair
-
Certificates & Credentials International Systems Security Engineering Association Systems Security Professional – Practitioner
-
Certificates & Credentials Master of Arts
-
Certificates & Credentials National Security Training Academy – Security Industry Course and Firerarm Certificate of Achievement
-
Certificates & Credentials Provisional Member
-
Certificates & Credentials SANS Analyst Paper Supporting Webcast: Using SIM in your PCI Compliance Program
-
Certificates & Credentials SANS Comprehensive Packet Analysis
-
Certificates & Credentials SANS Getting Back to Basics Principles of System Lockdown
-
Certificates & Credentials SANS Gooey GUIs to Concrete Clients: Hardening your Network from the Inside Out
-
Certificates & Credentials SANS If I’d Only Known: Benefits of Advanced Correlation
-
Certificates & Credentials SANS Internet Storm Center: Threat Update
-
Certificates & Credentials SANS Internet Storm Center: Threat Update
-
Certificates & Credentials SANS Legal Issues in Information Technology and Information Security
-
Certificates & Credentials SANS Maximising the Value of your Log Management Solution
-
Certificates & Credentials SANS Network Security for Small-Midsized Companies
-
Certificates & Credentials SANS OnDemand MGT524: Security Policy and Awareness +Certificate
-
Certificates & Credentials SANS Penetration Testing with Confidence: 10 Keys to Success
-
Certificates & Credentials SANS Protecting Information & Managing Risk
-
Certificates & Credentials SANS Secure Software Webcast Series
-
Certificates & Credentials SANS Secure Software Webcast Series
-
Certificates & Credentials SANS Security Essentials – How to make email good again
-
Certificates & Credentials SANS SQL Injection: The Hackers Gold Mine
-
Certificates & Credentials SANS Stay Sharp Master Packet Analysis
-
Certificates & Credentials SANS Using Application Firewalls to Comply with the PCI 1.1 Data Security Standard
-
Certificates & Credentials SANS Virtual Machine Detection: Keeping Attackers inside the Matrix, By Ed Skoudis
-
Certificates & Credentials SANS Vista Security in a Nutshell What You Need to Know Now
-
Certificates & Credentials Australian Computer Society – Senior Member