Networking & Cloud Computing
epub |eng | 2019-01-31 | Author:Tony Hsiang-Chih Hsu
Step 3 – review the results The report will be generated under the /qark/report/report.html. The following screenshot shows the scanning report of the goatdroid.apk: QARK scanning report Automated security scanning ...
( Category:
Tools
March 8,2019 )
epub |eng | 2012-02-23 | Author:Michael Sikorski [Michael Sikorski and Andrew Honig]
( Category:
Hacking
March 8,2019 )
epub |eng | 2019-02-05 | Author:Erdal Ozkaya
Simple Mail Transfer Protocol Simple Mail Transfer Protocol (SMTP) is used for email purposes by many organizations. This protocol was added to the internet and it quickly became the simplest ...
( Category:
Privacy & Online Safety
March 8,2019 )
epub |eng | 2019-01-31 | Author:Luigi Fugaro
The 2PC consensus protocol has the ability to manage node failures through the transaction log. Usually, a periodic recovery thread processes all of the unfinished transactions. One of the main ...
( Category:
LAN
March 8,2019 )
epub, azw3 |eng | 2018-05-08 | Author:Dawn Griffiths
myWolf?.w?.hunger = 2 It’s like saying “if myWolf is not null, and myWolf’s w property value is not null, then assign a value of 2 to w’s hunger property”: Now ...
( Category:
Client-Server Systems
February 28,2019 )
epub |eng | 2019-02-14 | Author:Peter Bradley [Bradley, Peter]
Hacking a Wi-Fi Network – Practical Guide Kali Linux is a versatile tool and can be used for a lot of different things but it is best known for hacking ...
( Category:
Networks
February 27,2019 )
epub |eng | 2010-12-20 | Author:Chris Leeds [Chris Leeds]
( Category:
Web Development & Design
February 21,2019 )
mobi, pdf |eng | 2019-02-09 | Author:Mark L. Murphy
( Category:
Programming
February 19,2019 )
epub |eng | 2015-07-06 | Author:Luca Massaron & John Paul Mueller [Luca Massaron]
Stretching Python’s Capabilities In This Chapter Understanding how Scikit-learn works with classes Using sparse matrices and the hashing trick Testing performances and memory consumption Saving time with multicore algorithms If ...
( Category:
Programming Languages
February 17,2019 )
epub, azw3 |eng | 2014-05-13 | Author:Carl Laufer [Laufer, Carl]
While scanning the fast scanner will also create a table of active signals that it has found in the plugin window. It shows the time that they have been active ...
( Category:
Networking & Cloud Computing
February 16,2019 )
epub |eng | 2013-12-27 | Author:Shoemaker, Daniel Paul & Conklin, Wm. Arthur [Shoemaker, Daniel Paul]
Handling Configuration Parameters Configuration parameters can change the behavior of an application. Securing configuration parameters is an important issue when configuration can change programmatic behaviors. Managing the security of configuration ...
( Category:
Programming
February 16,2019 )
azw3 |eng | 2013-04-29 | Author:Perahia, Eldad & Stacey, Robert [Perahia, Eldad]
8.5.2 EIFS Another mechanism used to protect against hidden nodes is the extended inter-frame space (EIFS). A station uses EIFS instead of DIFS to defer if a frame is detected ...
( Category:
Engineering
February 15,2019 )
epub, pdf |eng | 2015-02-14 | Author:Violet Blue [Blue, Violet]
SOCIAL MEDIA CHECKLIST Our relationship with social sharing—photos, videos, status updates, location check-ins, and more—changes as our lives evolve. The way we feel about sharing something one day may be ...
( Category:
Safety & First Aid
February 14,2019 )
epub |eng | 2015-04-13 | Author:Christopher Hadnagy & Michele Fincher
My Mobile Is Secure I have actually overheard someone telling another person, “If you think it's a malicious e-mail, just open it up on your <iPad/iPhone/Android device/Windows mobile device/insert other ...
( Category:
Internet & Social Media
February 14,2019 )
epub |eng | 2014-02-21 | Author:Nigel Poulton
SMB/CIFS can be used to share and access devices other than files and folders. It can also share printers and be used for inter-process communication (IPC) between servers. SMB/CIFS originally ...
( Category:
Networking & Cloud Computing
February 14,2019 )
Categories
Popular ebooks
The Mikado Method by Ola Ellnestam Daniel Brolund(9815)Sass and Compass in Action by Wynn Netherland Nathan Weizenbaum Chris Eppstein Brandon Mathis(7811)
Grails in Action by Glen Smith Peter Ledbrook(7725)
Azure Containers Explained by Wesley Haakman & Richard Hooper(6901)
Configuring Windows Server Hybrid Advanced Services Exam Ref AZ-801 by Chris Gill(6896)
Running Windows Containers on AWS by Marcio Morales(6428)
Microsoft 365 Identity and Services Exam Guide MS-100 by Aaron Guilmette(5105)
Kotlin in Action by Dmitry Jemerov(5097)
Microsoft Cybersecurity Architect Exam Ref SC-100 by Dwayne Natwick(4682)
Combating Crime on the Dark Web by Nearchos Nearchou(4675)
Management Strategies for the Cloud Revolution: How Cloud Computing Is Transforming Business and Why You Can't Afford to Be Left Behind by Charles Babcock(4440)
The Ruby Workshop by Akshat Paul Peter Philips Dániel Szabó and Cheyne Wallace(4368)
The Age of Surveillance Capitalism by Shoshana Zuboff(3990)
Python for Security and Networking - Third Edition by José Manuel Ortega(3920)
Learn Wireshark by Lisa Bock(3594)
The Ultimate Docker Container Book by Schenker Gabriel N.;(3586)
Learn Windows PowerShell in a Month of Lunches by Don Jones(3531)
Mastering Python for Networking and Security by José Manuel Ortega(3378)
Mastering Azure Security by Mustafa Toroman and Tom Janetscheck(3364)
Blockchain Basics by Daniel Drescher(3332)
