My Opinion of XSS/CSS, Digital Forensic, and Digital Crime Investigation when I was a Young Student

Note

This is the fourteenth assignment from my Masters Advanced Network Security Course which has never been published anywhere and I, as the author and copyright holder, license this assignment customized CC-BY-SA where anyone can share, copy, republish, and sell on condition to state my name…

--

--

--

this blog contains all my articles licensed under creative commons attribution customized sharealike (cc-by-sa) where you can sell but mention the open one here

Love podcasts or audiobooks? Learn on the go with our new app.

Recommended from Medium

What can we do about the privacy breach by Paytm?

How Technology Can Be Used to Steal Your Identity?

{UPDATE} Risky Quiz Hack Free Resources Generator

Drift with Devil: Security of Multi-Sensor Fusion based Localization in High-Level Autonomous…

How to: Transfer Domain From Name.com to Porkbun.com

{UPDATE} Rope Heroes Hack Free Resources Generator

READ/DOWNLOAD*= Network Security Essentials Applications and Standards (5th Edition) FULL BOOK PDF…

Privacy in Context

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
Fajar Purnama

Fajar Purnama

this blog contains all my articles licensed under creative commons attribution customized sharealike (cc-by-sa) where you can sell but mention the open one here

More from Medium

Innovative Methods for Market Segmentation of HIV Services Webinar

Somewhere That’s Green: 3 Ways to Use Extended Realities to Make Your Theatrical Production More…

How to Seal Enclosures for Electronic Devices. Part 1: Plastic and Rubber

Electronic devices placed in water

KNIME spirits, at your service!