Skip to content
Search for:
Professional Bodies License No.: PB 94
INSTITUTE OF ICT PROFESSIONALS GHANA
CONTACT USinfo@iipgh.org
AddressOKSART Place, 2nd Floor, Ring Road Central – Circle
DONATE
  • Home
  • About Us
    • OUR INSTITUTE
    • Institute Structure
  • Membership
    • Online Registration
    • Good Standing Members
    • Verify Membership
  • ACADEMY
    • Coding Education for Ghana Program
      • The Coding Program
      • The Coding Caravan
      • Digital Design and Creative Coding
    • Downloads
      • Coding Brochure
      • Coding Program FAQ
      • Coding Caravan brochure
  • Media & Gallery
    Gallery
    Articles
    OUR VIDEOS
    PUBLIC AWARENESS
    OUR EVENT
    NEWS FEED
    Gallery
    gallery15
    confslide4
    confslide13
    gallery8
    gallery1
    Object
    gallery2
    Object
    VIEW MORE
  • Services
    • Consulting Service
    • Public Education / Capacity Building
      • Cyber Security Awareness
      • Tech Entrepreneurs Forum
      • Tech Job Fair
      • Industry Academia Tech Dialogue
      • The Coding Caravan
      • National Teaching Council
      • Women In Tech
        • Women Led Program
  • Contacts Us
Search for:
Page 3
Homepage
/
KAUNDA Ibn Ahmed
/
KAUNDA Ibn Ahmed
/
Page 3

Tag: KAUNDA Ibn Ahmed

Facebook Will: What Will Happen To My Facebook Account After I Pass Away?Articles

Facebook Will: What Will Happen To My Facebook Account After I Pass Away?

13 February, 2020
By Richard Kafui0articles, Facebook, KAUNDA Ibn Ahmed, Memorialization

This particular post is about Facebook platform. That feature on Facebook is called “Memorialization“. In short, you are creating a Digital Will for your Facebook account.

Learn more
Share:
Facebook
Twitter
Google+
LinkedIn
Latest WebApp Security Threats Part 2: How to Prevent Injection AttackArticles

Latest WebApp Security Threats Part 2: How to Prevent Injection Attack

06 February, 2020
By Richard Kafui0articles, Injection Attack, KAUNDA Ibn Ahmed, Web Application Security

“With these tools [hacking tools] in your hand, you guys are powered to do anything but remember, with a gun in your hand, you can be security man, you can…

Learn more
Share:
Facebook
Twitter
Google+
LinkedIn
Latest WebApp Security Threats Part 1: How to Perform Injection AttackArticles

Latest WebApp Security Threats Part 1: How to Perform Injection Attack

31 January, 2020
By Richard Kafui0articles, Injection Attack, KAUNDA Ibn Ahmed, Web Application Security, Web Applications

Injection attack in short, is trying to add (inject) a query (a test, a letter, a code, or anything imaginable) at the front end of a web application, hoping the…

Learn more
Share:
Facebook
Twitter
Google+
LinkedIn

Posts pagination

PREV 1 2 3
© 2025 INSTITUTE OF ICT PROFESSIONALS GHANA. All Rights Reserved. Privacy Policy || Professional Bodies License No.: PB 94