Life in Bytes
Subscribe
Sign in
Home
Archive
About
Latest
Top
Discussions
My First Experience Working on ISO 27701: A Journey into Privacy Governance
Embarking on my first Privacy Information Management System (PIMS) implementation was a transformative experience.
Aug 8
•
Francisca A.
1
June 2025
Bridging the Skills Gap: Rethinking Cybersecurity Education in Africa
Africa’s cybersecurity talent gap is both a crisis and an opportunity.
Jun 4
•
Francisca A.
February 2025
Review on "The Psychology of Money" by Morgan Housel
Lessons in Wealth, Habits, and Happiness.
Feb 9
•
Francisca A.
July 2024
I'm Back...
Am I really back 🤪🤪
Jul 28, 2024
•
Francisca A.
May 2022
TryHackMe: Nmap Walkthrough
In this article, I'm going to write a walkthrough of the Nmap room on TryHackMe
May 18, 2022
•
Francisca A.
Cisca's Newsletter
Whoami
May 16, 2022
•
Francisca A.
Building A Node.js Application Using Docker
Docker allows us to run our applications as containers.
May 14, 2022
•
Francisca A.
1
Getting Started with Docker
Docker is a virtualization platform used to deliver software in packages called containers.
May 13, 2022
•
Francisca A.
1
Understanding Docker Concepts
Docker, an open-source project launched in 2013, has helped popularize technology and has helped drive the trend toward containerization and…
May 13, 2022
•
Francisca A.
Introduction To Cloud Computing
Cloud concepts have existed for many years.
May 13, 2022
•
Francisca A.
September 2020
What is Penetration Testing and Why it is Important?
A penetration test is a subclass of ethical hacking; it comprises a set of methods and procedures that aim at testing/protecting an organizations…
Sep 25, 2020
•
Francisca A.
June 2020
Hypothesis testing
The major reason for statistics is to test a hypothesis. Hypothesis testing... what's this all about. Before we dive into hypothesis testing let's get…
Jun 5, 2020
•
Francisca A.
This site requires JavaScript to run correctly. Please
turn on JavaScript
or unblock scripts