Nomen Nescio

Web Name: Nomen Nescio

WebSite: http://www.nomennesc.io

ID:329452

Keywords:

Nomen,Nescio

Description:


Nomen Nescio

Contact Information:

E-mail: info [at] nomennesc.io PGP

Keywords:

free open source software, consultancy, analysis, hacking, training, ...

Nomen Nescio

Nomen Nescio (Latin: name unknown) is a consultancy firm specialised in digital privacy and security. Nomen Nescio is available for consultancy, systems and software architecture, development, implementation, and training.

Contact Information:

E-mail: info [at] nomennesc.io PGP

Key ID: 0x65383A62 - Key Fingerprint: 3000 FE56 DE77 551F B3BF CB8E 903A B149 6538 3A62

Nomen Nescio is based in the Netherlands and registered at the Chamber of Commerce, no. 30194361

Security & Privacy

Nomen Nescio can assist with:
 * Training * Risk-analysis * Counter-surveillance * Auditing * Intrusion detection * Hardening * Forensics and emergency response

Security & Privacy

“There is no single solution for keeping yourself safe online. Digital security isn't about which tools you use; rather, it's about understanding the threats you face and how you can counter those threats.” - Electronic Frontier Foundation

And that is why security trainings ought to start with threat-modeling. Identifying the threats you, your application, and/or your organisation face, what risks those threats pose, and where the priorities lie, leads the path towards implementing effective policies and mitigations. Such mitigations can range from very simple policies to in-depth technical means. As the security of the whole depends on the weakest link, both are generally of equal importance. Nomen Nescio offers:

* Training - from raising awareness within your organisation to speficic security applications and practices.
* Risk-analysis - analytically identifying threats and determining risk, using OCTAVE/Allegro.
* Counter-surveillance - implementing mitigations against surveillance, both on a technical and policy level.
* Pentesting - testing the effectiveness of your security measures.
* Intrusion detection - automated detection and mitigation of known attack vectors against your application.
* Hardening - technical mitigations to prevent successful attacks against your application.
* Forensics and emergency response - security incident and emergency management, incident analysis, clean-up, implementing emergency response mitigations to prevent further escalation, et cetera.

A reduced fee applies for NGO's and educational organisations.

Research & Analysis

Abstract

Given the vast amount of information available online, gathering empirical data for scientific research - not in the least within digital humanities - has to a large degree become a process that can be automated, leading to larger datasets and higher statistical probability. Nomen Nescio has experience assisting with data-mining and analysis in various fields of research.

Research & Analysis

“It was a pleasure to work with [Nomen Nescio] on data-mining FreeBSD's software repository and analysing activity logs” - George Dafermos, TU Delft

Nomen Nescio has a broad experience developing technical tools for academic purposes. These include, amongst others, scraping web-content, log-parsing, code-analysis, bioaccoustics, natural language processing, and graph analysis.

A recent publication in Internet Policy Review shows how tools for graph analysis on a large dataset developed by Nomen Nescio have been used.

Development

#include <stdio.h>
int main(){
const char* l[]= {"C","Perl","assembler","bash","others"};
int i;
printf("I speak: ");
for(i=0;i<(sizeof(l)/sizeof(l[0]))-1;i++) printf("%s, ",l[i]);
printf("and %s.\n",l[i]);
return 0;
}

Development

#include <stdio.h>int main(){        const char* l[]= {"C","Perl","assembler","bash","others"};        int i;        printf("I speak: ");        for(i=0;i<(sizeof(l)/sizeof(l[0]))-1;i++){                printf("%s, ",l[i]);        }        printf("and %s.\n",l[i]);        return 0;}

Nomen Nescio is available for software development in C, C++, assembler, Python, Perl, PHP, and R. Modeling and architecture in UML or BPMN are also optional.

A reduced fee applies for GPL-licensed software.

System Engineering

Keywords:

* System architecture
* Implementation
* High availability
* Security
* Virtualisation
* Network Storage

High Availability & Virtualisation

“Excellent knowledge with a broad spectrum of IT architecture, design and implementation of large scale virtual machine environments, bulletproof failover en load balancing IT infrastructures. Deep knowledge of mail, authentication methods and general IT services.” - Immanuel Derks, Translucent Systems

Areas of expertise:

* System and network architecture
* Security systems
* LDAP
* Zimbra
* CEPH

Use of free open source software is (strongly) preferred. Experience with a wide variety of open source high availability, storage, and virtualisation technologies.

Identity & Access Management

                +------+    +----+         +----->| LDAP |<-->| HR |         |      +------+    +----+  +--------------+   ^  | provisioning |   |     +-----+  +--------------+   +-----| IdP |        |                  +-----+        v                    ^     +--------------+        |     | applications |--------+     +--------------+

Identity & Access Management

Nomen Nescio is available for a variety of works in the IAM sphere, including:

* Modeling business logic
* Implementing automated workflows
* Developing provisioning tools
* Implementing Self-service portals
* Setting up and managing authentication chains
* Federation and Single-Sign-On
* 2Factor authentication
* Designing and implementing (Role Based) Access Control

As always, with a preference for solutions using free open source software.

TAGS:Nomen Nescio

<<< Thank you for your visit >>>

Websites to related :
OK - Jouw persoonlijke shopping

  Hi! OK maakt gebruik van cookies. Functionele, analytische en marketing cookies zorgen ervoor dat je de beste bezoekerservaring krijgt en sneller vind

Fenomény sveta - Vzdelávací p

  

Välkommen till Mekonomen Hallun

  Hallunda BilverkstadStartsidaService & ReparationDäckRekond & BiltvättÖvriga tjänsterKampanjerLeverantörerMiljöOm ossKontakt Service Däck AC

Home | HUGO Gene Nomenclature Co

  keywords:
description:
Toggle navigation Menu

Phenomenex, Inc.

  keywords:automatic redirection
description:
Redirecting to... Phenomenex.com manually.

Janus Head Journal of Interdisc

  Janus Head Journal of Interdisciplinary Studies in Literature, Continental Philosophy, Phenomenological Psychology, and the Arts Menu and widgetsMaeve

Nomenclator's HomePage

  リンクの連絡は必要ありません。わざわざご連絡いただいても何もありません。作者: 貞廣知行 (さだひろ=ともゆき)メールに画像を添付する必要があれば、できるだ

GenomeNet

  KEGG: Kyoto Encyclopedia of Genes and Genomes KEGG2 - Table of contents KEGG PATHWAY - Systems information: pathways KEGG BRITE - Systems informati

The Phenomenal Qualities Project

  The Phenomenal Qualities Project Investigating the nature of consciousness and its place in the physical world Conference: The Nature of PhenomenalQu

Yourazzi - Yourazzi | Youtuber H

  Ahmet Aga Yourazzi.com a Özel Açıklamalarda Bulundu Türkiye'nin ilk youtuberlara yönelik haver ve magazin sitesi yourazzi.comTaklitlerinden kaç

ads

Hot Websites