Saturday, August 11, 2012
Mountain Lake, originally uploaded by jfinke.
Here is the first part of an article I wrote that tries to explain what the Federal Information Security Management Act is. It gives a brief overview and the starts through the 7 steps.
Here is an article I wrote regarding the basics of Access Controls. It deals mostly with AC in Information Assurance.
Here are some equations which are important points when studying for your PMP exam. Program Evaluation Review Technique (PERT) This equation takes three estimates, Optimistic, Realistic, and Pessimistic, and averages them out with a weight given to Realistic.
Saturday, November 3, 2007
This uses LaTeX to generate equations. Then an image is generated from the LaTeX. Tutorials for this: http://www.andy-roberts.net/misc/latex/latextutorial9.html http://www.andy-roberts.net/misc/latex/latextutorial10.html http://www.forkosh.com/mimetextutorial.html