Computers & Technology
azw3, epub |eng | 2017-09-10 | Author:Hacking Studios
Intrusion detection system (IDS) is a blanket term for computer software that monitors a system for any kind of suspicious activity. The information about the suspicious activity is then sent ...
( Category:
Internet & Social Media
November 2,2017 )
azw3 |eng | 2017-09-08 | Author:Collins, Michael [Collins, Michael]
1 And I prefer to keep my Windows and Linux boxes physically wired. 2 Note that the prefix is the equivalent to a subnet’s netmask. 3 That doesn’t mean you ...
( Category:
Databases & Big Data
November 2,2017 )
azw3 |eng | 2017-09-05 | Author:John R. Hines
What is Tor (the onion router)? Web browser designed for anonymous web surfing. Open source, multi-platform browser. More secure than most commonly-used browsers but it is not impervious to attack. ...
( Category:
Computers & Technology
November 2,2017 )
azw3 |eng | 2017-10-15 | Author:Olivoy
This is somewhat the same principle as above. Knowing that a proper TCP connection requires three packets with three different flags, one sees right away the finesse of this rule ...
( Category:
Operating Systems
November 2,2017 )
azw3 |eng | 2017-08-10 | Author:Edward G. Amoroso & Matthew E. Amoroso
Figure 14-3. Three-Step TCP Handshake Between Client Browser and Website This so-called TCP/IP handshake provides the base communication on which most network security methods operate. The most common security method, ...
( Category:
Security & Encryption
November 2,2017 )
azw3 |eng | 2017-07-18 | Author:Morel, Benoit [Morel, Benoit]
* * * 217 http://www.brainyquote.com/quotes/authors/w/willie_sutton.html. 218 https://www.frbservices.org/serviceofferings/fedwire/fedwire_funds_service.html. 219 Clearing House Interbank Payments System, https://www.theclearinghouse.org/payments/chips. 220 Society for Worldwide Interbank Financial Telecommunication, http://www.swift.com/index.page?lang=en. 221 http://dealbook.nytimes.com/2014/10/02/jpmorgan-discovers-further-cyber-security-issues/. 222 http://krebsonsecurity.com/2014/01/a-first-look-at-the-target-intrusion-malware/.
( Category:
Computers & Technology
November 2,2017 )
azw3 |eng | 2017-08-18 | Author:Lachance, Daniel & Clarke, Glen E. [Lachance, Daniel]
A QUICK ANSWER KEY 1. D 2. C 3. B 4. A 5. C 6. B, C 7. C, D, E 8. C 9. D 10. C 11. A 12. ...
( Category:
Security & Encryption
November 2,2017 )
epub |eng | 2016-11-02 | Author:Silman, Jon;
16 THE SPECIFIC CHALLENGES OF MOBILE SECURITY Before the advent of the iPhone or the smartphone, cell phones were much simpler—easy and convenient ways to contact people. Now, they do ...
( Category:
Computers & Technology
November 2,2017 )
azw3 |eng | 2017-10-18 | Author:Ackerman, Pascal [Ackerman, Pascal]
Siemens S7-400 Credentials disclosure Same-subnet computer systems PLC WS100-west Former insider Business network Malware WAN Outsider Nation-state actor Correlating known vulnerable systems to other parts of the system under consideration ...
( Category:
Computers & Technology
November 2,2017 )
azw3 |eng | 2017-10-15 | Author:Collins, Robert [Collins, Robert]
( Category:
Networking & Cloud Computing
November 2,2017 )
azw3 |eng | 2017-09-08 | Author:Bell, Laura & Brunton-Spall, Michael & Smith, Rich & Bird, Jim [Bell, Laura]
If You Got Bugs, You’ll Get Pwned We know that there is a strong connection between code quality and security. The more bugs you have, the more security problems you ...
( Category:
Programming
November 2,2017 )
epub |eng | 2014-08-04 | Author:Davenport, Cyndy, Voiculescu, Ishka & Ishka Voiculescu
Establishing EOP Design Profiles One of the most challenging parts of complex corridor (i.e., cul-de-sac, intersection, or roundabout) is establishing design profiles for non-centerline alignments. You must have design profiles ...
( Category:
Arts & Photography
November 2,2017 )
epub |eng | | Author:Nick Selby
FUN FACT LIVING ON BITCOINS In 2013, reporter Kashmir Hill wondered whether she could live for a week paying for things only in bitcoin. She had trouble finding vendors who ...
( Category:
Computer Science
November 2,2017 )
epub |eng | 2016-03-02 | Author:Vandome, Nick
Within Elements, there are a number of Photomerge effects that can be used to combine elements from different photos to create a new image. This can be used to remove ...
( Category:
Software
November 2,2017 )
epub, azw3 |eng | 2017-10-16 | Author:Jake Smith & Jake Smith [Smith, Jake]
I used the common OSMC distribution in this guide; it’s based on Kodi and has a native support for OMXPlayer. It also comes with a slick user interface that makes ...
( Category:
Programming
November 2,2017 )
Categories
Popular ebooks
Deep Learning with Python by François Chollet(27999)The Mikado Method by Ola Ellnestam Daniel Brolund(25282)
Hello! Python by Anthony Briggs(24335)
Secrets of the JavaScript Ninja by John Resig Bear Bibeault(23421)
Kotlin in Action by Dmitry Jemerov(22504)
The Well-Grounded Java Developer by Benjamin J. Evans Martijn Verburg(21961)
Dependency Injection in .NET by Mark Seemann(21838)
OCA Java SE 8 Programmer I Certification Guide by Mala Gupta(20707)
Algorithms of the Intelligent Web by Haralambos Marmanis;Dmitry Babenko(19517)
Grails in Action by Glen Smith Peter Ledbrook(18595)
Adobe Camera Raw For Digital Photographers Only by Rob Sheppard(17031)
Sass and Compass in Action by Wynn Netherland Nathan Weizenbaum Chris Eppstein Brandon Mathis(15836)
Secrets of the JavaScript Ninja by John Resig & Bear Bibeault(13684)
Test-Driven iOS Development with Swift 4 by Dominik Hauser(11851)
Jquery UI in Action : Master the concepts Of Jquery UI: A Step By Step Approach by ANMOL GOYAL(11151)
A Developer's Guide to Building Resilient Cloud Applications with Azure by Hamida Rebai Trabelsi(10621)
Hit Refresh by Satya Nadella(9188)
The Kubernetes Operator Framework Book by Michael Dame(8563)
Exploring Deepfakes by Bryan Lyon and Matt Tora(8400)
Robo-Advisor with Python by Aki Ranin(8358)