Global Security-Mohit

Objective- Provide an unbiased platform for communication that cuts across hierarchy and dimensions of Global security landscape. Develop Technology Awareness keeping recent Trends and Incidents. Create security consciousness among all communities. Guide Enterprises who are seeking a profitable & secure future. Educate and train businesses in business resilience.

Saturday, August 18, 2007

Web Services

Tutorial on Basic of Web Services
http://www.w3schools.com/webservices/ws_intro.asp
Posted by Mohit Kohli at 8:22 AM No comments:
Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest

White Paper on Authentication

White papers:
Authentication Domain

http://www.authenticationworld.com/papers.html
Posted by Mohit Kohli at 4:14 AM No comments:
Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest

Oracle Identity Management List of Books

Oracle Identity Management List of Books:
http://download-west.oracle.com/docs/cd/B28196_01/nav/docindex.htm
Posted by Mohit Kohli at 4:13 AM No comments:
Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest
Newer Posts Home
Subscribe to: Posts (Atom)

Pages

  • Home
  • Photography

About Me

My photo
Mohit Kohli
Mumbai, India
Presently, I am heading the Security Practice.The objective of this initiative is to works towards a secure tomorrow by enhancing security awareness and consciousness in the industry and user communities. I am Interested in research around end to end Security solutions like Identity and Access Management, Risk Management, cyber security etc.. For any query or assistance, I will be reachable on mohit.kohli@gmail.com The views expressed on this blog are solely individual and do not reflect Organizational view
View my complete profile

Subscribe via email

Enter your email address:

Delivered by FeedBurner

Popular Posts

  • Cyber Crime History (1820) to Today's enforcement law’s (2013)
    Cyber crime has shown a serious threat to society since many decades. We will not believe the first cyber crime recorded in late 1820 . Ye...
  • Banks Transitional move towards Unique Customer Identification Code( UCIC)
    The increasing complexity and volume of financial transactions leads to customers having multiple identities within a bank, across the bank...
  • TCPIP-Vulnerabilities & Countermeasures
    Presentation on TCPIP-Vulnerabilities and Countermeasures http://www.scribd.com/doc/19536994/Presentation-on-TCPIP-Vulnerabilities ...
  • "5-Which" of Password Management
  • Ransomware a Digital Era weapon, a high Revenue business!!!
    The world today is full of unlimited business opportunities. We all operate in the digital era to perform business operations (by Connecti...
  • Security Technology Marathon (Rise/Fall)
    As we see more and more businesses are becoming internet-enabled with basic security mechanism in place. The year 2011 was one of the land...
  • Global Password Management Best Practices
    In continuation with recent post “5-Which of Password Management”, I thought to drill down on best practices of Global password managem...
  • India in top 10 league for Spear Phishing
    We discussed the aim of phishing and the modus-operandi of achieving it. Likewise,  Spear Phishing is an attempt directed at specific ind...
  • Cyber Crime a Smart City Killer. Closed-Circuit Security Cameras a Digital War Weapon
    Smart City: “A city that uses technology to automate and improve city services, making citizens’ lives better.” The definition looks very ...
  • Enterprise security posture needs to align with Identity and Access Management (IAM) Trends
    The most important question every CISO or CIO concerns about optimization and efficiency around process with minimal security incident (to...

Security in Nut-Shell

  • October 2017 (1)
  • July 2017 (2)
  • July 2016 (1)
  • June 2016 (1)
  • October 2015 (1)
  • November 2014 (1)
  • March 2014 (1)
  • January 2014 (1)
  • September 2013 (6)
  • August 2013 (4)
  • January 2013 (1)
  • May 2012 (1)
  • October 2011 (4)
  • August 2011 (1)
  • July 2011 (3)
  • June 2011 (8)
  • September 2009 (1)
  • September 2007 (1)
  • August 2007 (3)

Total Pageviews

Search This Blog

Visitor Map

Subscribe via email

Subscribe to Global Security-Mohit by Email

Subscribe To

Posts
Atom
Posts
All Comments
Atom
All Comments
Mohit Kohli. Awesome Inc. theme. Powered by Blogger.