Link to Medium.com Article: https://highervista.medium.com/sqlite-training-presentations-4746b3d98d56
Link to Medium.com Article: https://highervista.medium.com/cybersecurity-through-the-software-development-lifecycle-e4c06d4d6984
Link to Medium.com Article: https://highervista.medium.com/trends-in-database-technology-and-database-security-part-1-b1600b1d491e
Link to Medium.com Article: https://highervista.medium.com/protection-from-open-source-code-and-cots-the-nist-8183-e17c27aade7e
Link to Medium.com Article: https://highervista.medium.com/data-leakage-application-programming-risk-mitigation-14de9f44f738
Link to Medium.com Article: https://highervista.medium.com/a-primer-to-function-point-analysis-for-the-software-project-manager-8436e3fd6b59
Link to Medium.com Article: https://highervista.medium.com/the-general-data-protection-regulation-gdpr-impact-on-us-organizations-and-software-development-bba9cf37162e
Link to Medium.com Article: https://highervista.medium.com/mitigating-the-hackers-use-of-dos-ddos-79575565347c
Link to Medium.com Article: https://highervista.medium.com/standards-help-to-limit-hackers-in-gaining-access-to-critical-infrastructure-61ed91ba69ed
Link to Medium.com Article: https://highervista.medium.com/the-hackers-use-of-dos-ddos-a48fbbac2ef