ITaP Security and Policy is often asked to recommend a set of systems security configuration guidelines that can be consulted by Purdue System Administrators in the absence of specific Purdue ...
Security guidelines provided by IT Purdue Systems Security incorporating guidance from Purdue policies and standards, CIS Controls, and mitigating controls against known incidents. Use VPN or other ...
Linux can have a somewhat split personality. If you use it as a desktop OS, it has a lot of GUI tools, although sometimes you still need to access the command line. If you use it as a headless server, ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results