User contributions for Dobradavid
A user with 93 edits. Account created on 21 August 2009.
13 May 2024
- 15:0215:02, 13 May 2024 diff hist +281 m Canadian Army Trophy →CAT '24: added pictures Tag: Reverted
3 May 2024
- 15:4015:40, 3 May 2024 diff hist +1 m Canadian Army Trophy →CAT '24
- 15:2815:28, 3 May 2024 diff hist +929 m Canadian Army Trophy No edit summary
22 January 2023
- 21:5921:59, 22 January 2023 diff hist +835 m Information security →Laws and regulations
20 January 2023
- 23:1623:16, 20 January 2023 diff hist +2 m Computer security →Agencies
- 22:1822:18, 20 January 2023 diff hist +1 m Computer security →Agencies
- 22:1322:13, 20 January 2023 diff hist +5 m Computer security →Agencies
- 21:5621:56, 20 January 2023 diff hist 0 m Computer security →Agencies
- 21:5221:52, 20 January 2023 diff hist +2 m Computer security →Agencies
- 21:5121:51, 20 January 2023 diff hist +827 m Computer security →Agencies
29 January 2020
- 15:5415:54, 29 January 2020 diff hist −24 Computer security →End user security training
- 15:5315:53, 29 January 2020 diff hist +200 Computer security →End user security training: POST-SECONDARY EDUCATION NETWORK SECURITY: THE END USER CHALLENGE AND EVOLVING THREATS K. Reimers1, D. Andersson2
- 15:3415:34, 29 January 2020 diff hist −1 Computer security →Agencies
- 15:3415:34, 29 January 2020 diff hist +56 Computer security →Agencies
- 15:3215:32, 29 January 2020 diff hist +570 Computer security →Agencies: The United States Department of Defense has a dedicated division responsible for Cyberwarfare and has requirements for cybersecurity positions for all DoD personnel and all DoD contrators. The Department of Defense Directive's 8571 and 8140 specify what vender security credentials must be held by Information Assurance person working in any capacity in the Department of Defense or it's subordinate departments. <ref>Anderson, D. and Reimers, K. "Cyber Security Employment Policy
8 November 2019
- 15:1615:16, 8 November 2019 diff hist +83 m Bronze Star Medal →External links: added respource
25 October 2019
- 17:4117:41, 25 October 2019 diff hist +808 m Oliver Eaton Cromwell Update with sources
23 October 2019
- 13:3213:32, 23 October 2019 diff hist +22 m Educational specialist Minor edit. I have an Ed.S. in Computing Technology
18 February 2019
- 20:4620:46, 18 February 2019 diff hist −1 m Canadian Army Trophy →CAT '79
- 20:4520:45, 18 February 2019 diff hist 0 m Canadian Army Trophy →CAT '79: corrected spelling of "campany"
- 20:4420:44, 18 February 2019 diff hist +1 m Professional certification (computer technology) Added "s" to surname
26 December 2018
- 15:4915:49, 26 December 2018 diff hist +145 m Canadian Army Trophy →CAT '79
- 15:4615:46, 26 December 2018 diff hist +44 m Canadian Army Trophy →CAT '79
- 14:5414:54, 26 December 2018 diff hist +271 m Canadian Army Trophy →CAT '79
- 14:3114:31, 26 December 2018 diff hist +130 m Bronze Star Medal →External links
13 December 2017
- 16:3216:32, 13 December 2017 diff hist +517 Computer security →Computer protection (countermeasures)
- 16:2116:21, 13 December 2017 diff hist +23 m Network security →See also
- 15:4215:42, 13 December 2017 diff hist +18 m Network security →See also
- 15:3915:39, 13 December 2017 diff hist +21 m Network security →See also
- 15:3815:38, 13 December 2017 diff hist +23 m Network security →See also
- 15:3715:37, 13 December 2017 diff hist −1 m Network security →Security managements
- 15:1415:14, 13 December 2017 diff hist +490 End user →Security
21 September 2017
- 11:4111:41, 21 September 2017 diff hist −13 m Bronze Star Medal →General information
- 11:4011:40, 21 September 2017 diff hist +2 m Bronze Star Medal →General information
- 11:3911:39, 21 September 2017 diff hist +84 m User talk:Dobradavid →February 2017
- 11:3711:37, 21 September 2017 diff hist +167 m Bronze Star Medal →General information
25 June 2017
- 18:3218:32, 25 June 2017 diff hist +64 m Forest–Ivanhoe Residential Historic District Added web site with Forest Ivanhoe images.
19 June 2017
- 12:4212:42, 19 June 2017 diff hist +1,195 m Computer security →Job market
- 11:3011:30, 19 June 2017 diff hist +2,469 m Social engineering (security) →Techniques and terms
- 11:2711:27, 19 June 2017 diff hist +260 m Computer security →References
- 11:2611:26, 19 June 2017 diff hist +2,469 m Computer security →Vulnerabilities and attacks
- 11:2311:23, 19 June 2017 diff hist +41 m Computer security →Scholars
- 11:2011:20, 19 June 2017 diff hist −4 m Information security →References
- 11:1911:19, 19 June 2017 diff hist +262 m Information security →References
- 11:1711:17, 19 June 2017 diff hist +312 m Information security →Information security culture
- 11:1011:10, 19 June 2017 diff hist +23 m David Andersson No edit summary
- 11:0811:08, 19 June 2017 diff hist +102 m David Andersson No edit summary
- 11:0511:05, 19 June 2017 diff hist +39 m Information security →Scholars working in the field
7 February 2017
- 22:5422:54, 7 February 2017 diff hist −462 m Spaced armour →Against kinetic penetrators: The sources cited are not credible/not valid - Dr Anderson
5 February 2017
- 14:1614:16, 5 February 2017 diff hist −190 m Spaced armour Reference given is a non-credible web page citing some hobbyists