Choosing and Using Security Questions Cheat Sheet Introduction Contents Choosing Security Questions Desired Characteristics Types of Security Questions User Defined Security Qu...
Pangeo: Earth Science Who Am I? What Problem are We Trying to Solve? How Dask Helps Why We Chose Dask Originally Pain Points Technology around Dask Pangeo: Earth Science ...
Mobile Security Primer The Mobile Attack Surface Attack Vectors The Device Browser-based attacks Phone/SMS-based attacks Application-based attacks OS-based attacks The Netwo...
Release Process Requirements Release Candidate Document Build Distribute Official Release Release Process Managing a release is easiest in an environment that is as clean...
Contribution Welcome Before You Start Code of Conduct Community Expectations Getting Started Your First Contribution Find Something to Work On Find a Good Topic Work on an Is...
Why Lisp? Why Lisp? It’s hard, in only a few pages of an introductory chapter, to explain why users of a language like it, and it’s even harder to make the case for why you sho...
Settings Sync Turning on Settings Sync Configuring synced data Conflicts Switching Accounts Restoring data Reporting issues How do I delete my data? Next steps Common quest...