Skip to content
Navigation menu
Search
Powered by Algolia
Search
Log in
Create account
DEV Community
Close
#
theory
Follow
Hide
the language of music
Posts
Left menu
đź‘‹
Sign in
for the ability to sort posts by
relevant
,
latest
, or
top
.
Right menu
Boring Cybersecurity Theory: Controls, Frameworks, and Compliance
Dzmitry Harbachou
Dzmitry Harbachou
Dzmitry Harbachou
Follow
Aug 15 '25
Boring Cybersecurity Theory: Controls, Frameworks, and Compliance
#
cybersecurity
#
theory
#
beginners
1
 reaction
Comments
Add Comment
6 min read
Boring Cybersecurity Theory: Security Domains From CISSP
Dzmitry Harbachou
Dzmitry Harbachou
Dzmitry Harbachou
Follow
Aug 14 '25
Boring Cybersecurity Theory: Security Domains From CISSP
#
cybersecurity
#
beginners
#
theory
1
 reaction
Comments
Add Comment
5 min read
Boring Cybersecurity Theory: Threats (Vulnerability, Attack, Malware)
Dzmitry Harbachou
Dzmitry Harbachou
Dzmitry Harbachou
Follow
Aug 13 '25
Boring Cybersecurity Theory: Threats (Vulnerability, Attack, Malware)
#
cybersecurity
#
beginners
#
theory
#
security
2
 reactions
Comments
Add Comment
13 min read
Boring Cybersecurity Theory: Where it all began
Dzmitry Harbachou
Dzmitry Harbachou
Dzmitry Harbachou
Follow
Aug 13 '25
Boring Cybersecurity Theory: Where it all began
#
cybersecurity
#
beginners
#
security
#
theory
1
 reaction
Comments
Add Comment
5 min read
Boring Cybersecurity Theory: Risk Management
Dzmitry Harbachou
Dzmitry Harbachou
Dzmitry Harbachou
Follow
Aug 13 '25
Boring Cybersecurity Theory: Risk Management
#
cybersecurity
#
beginners
#
theory
1
 reaction
Comments
Add Comment
8 min read
Boring Cybersecurity Theory: CIA Triad (The Core Principles of Security)
Dzmitry Harbachou
Dzmitry Harbachou
Dzmitry Harbachou
Follow
Aug 13 '25
Boring Cybersecurity Theory: CIA Triad (The Core Principles of Security)
#
cybersecurity
#
beginners
#
basic
#
theory
1
 reaction
Comments
Add Comment
3 min read
Boring Cybersecurity Theory: Hats (Understand Attackers)
Dzmitry Harbachou
Dzmitry Harbachou
Dzmitry Harbachou
Follow
Aug 13 '25
Boring Cybersecurity Theory: Hats (Understand Attackers)
#
cybersecurity
#
beginners
#
theory
#
hacker
1
 reaction
Comments
Add Comment
5 min read
Bloom Filters: Space-Efficient Probabilistic Data Structures
Micah Kepe
Micah Kepe
Micah Kepe
Follow
Aug 3 '24
Bloom Filters: Space-Efficient Probabilistic Data Structures
#
theory
#
datascience
#
datastructures
Comments
Add Comment
6 min read
Federated Learning
Midas/XIV
Midas/XIV
Midas/XIV
Follow
Jul 30 '24
Federated Learning
#
ai
#
theory
1
 reaction
Comments
Add Comment
3 min read
An exercise in semantics - Method vs Function
Yannick Loth
Yannick Loth
Yannick Loth
Follow
Jun 1 '24
An exercise in semantics - Method vs Function
#
programming
#
theory
#
semantics
Comments
Add Comment
5 min read
Como andam as suas Relações?
Random Bits
Random Bits
Random Bits
Follow
Apr 24 '24
Como andam as suas Relações?
#
math
#
set
#
theory
#
graph
6
 reactions
Comments
1
 comment
5 min read
Language types for integration safety
David Haley
David Haley
David Haley
Follow
Jan 16 '24
Language types for integration safety
#
api
#
types
#
theory
#
programming
Comments
Add Comment
1 min read
Node.js interview preparations
Dezina
Dezina
Dezina
Follow
Jan 23 '22
Node.js interview preparations
#
node
#
interview
#
crud
#
theory
6
 reactions
Comments
Add Comment
7 min read
What are the different types of errors in JavaScript?
Senichi
Senichi
Senichi
Follow
Sep 19 '21
What are the different types of errors in JavaScript?
#
javascript
#
theory
#
errors
7
 reactions
Comments
1
 comment
1 min read
The Simple Guide to Programming Paradigms
Tamerlan
Tamerlan
Tamerlan
Follow
Jul 26 '21
The Simple Guide to Programming Paradigms
#
computerscience
#
beginners
#
programming
#
theory
90
 reactions
Comments
14
 comments
6 min read
đź‘‹
Sign in
for the ability to sort posts by
relevant
,
latest
, or
top
.
We're a place where coders share, stay up-to-date and grow their careers.
Log in
Create account