Networking & Cloud Computing
epub |eng | 2019-01-31 | Author:Tony Hsiang-Chih Hsu

Step 3 – review the results The report will be generated under the /qark/report/report.html. The following screenshot shows the scanning report of the goatdroid.apk: QARK scanning report Automated security scanning ...
( Category: Tools March 8,2019 )
epub |eng | 2012-02-23 | Author:Michael Sikorski [Michael Sikorski and Andrew Honig]

( Category: Hacking March 8,2019 )
epub |eng | 2019-02-05 | Author:Erdal Ozkaya

Simple Mail Transfer Protocol Simple Mail Transfer Protocol (SMTP) is used for email purposes by many organizations. This protocol was added to the internet and it quickly became the simplest ...
( Category: Privacy & Online Safety March 8,2019 )
epub |eng | 2019-01-31 | Author:Luigi Fugaro

The 2PC consensus protocol has the ability to manage node failures through the transaction log. Usually, a periodic recovery thread processes all of the unfinished transactions. One of the main ...
( Category: LAN March 8,2019 )
epub, azw3 |eng | 2018-05-08 | Author:Dawn Griffiths

myWolf?.w?.hunger = 2 It’s like saying “if myWolf is not null, and myWolf’s w property value is not null, then assign a value of 2 to w’s hunger property”: Now ...
( Category: Client-Server Systems February 28,2019 )
epub |eng | 2019-02-14 | Author:Peter Bradley [Bradley, Peter]

Hacking a Wi-Fi Network – Practical Guide Kali Linux is a versatile tool and can be used for a lot of different things but it is best known for hacking ...
( Category: Networks February 27,2019 )
epub |eng | 2010-12-20 | Author:Chris Leeds [Chris Leeds]

( Category: Web Development & Design February 21,2019 )
mobi, pdf |eng | 2019-02-09 | Author:Mark L. Murphy

( Category: Programming February 19,2019 )
epub |eng | 2015-07-06 | Author:Luca Massaron & John Paul Mueller [Luca Massaron]

Stretching Python’s Capabilities In This Chapter Understanding how Scikit-learn works with classes Using sparse matrices and the hashing trick Testing performances and memory consumption Saving time with multicore algorithms If ...
( Category: Programming Languages February 17,2019 )
epub, azw3 |eng | 2014-05-13 | Author:Carl Laufer [Laufer, Carl]

While scanning the fast scanner will also create a table of active signals that it has found in the plugin window. It shows the time that they have been active ...
( Category: Networking & Cloud Computing February 16,2019 )
epub |eng | 2013-12-27 | Author:Shoemaker, Daniel Paul & Conklin, Wm. Arthur [Shoemaker, Daniel Paul]

Handling Configuration Parameters Configuration parameters can change the behavior of an application. Securing configuration parameters is an important issue when configuration can change programmatic behaviors. Managing the security of configuration ...
( Category: Programming February 16,2019 )
azw3 |eng | 2013-04-29 | Author:Perahia, Eldad & Stacey, Robert [Perahia, Eldad]

8.5.2 EIFS Another mechanism used to protect against hidden nodes is the extended inter-frame space (EIFS). A station uses EIFS instead of DIFS to defer if a frame is detected ...
( Category: Engineering February 15,2019 )
epub, pdf |eng | 2015-02-14 | Author:Violet Blue [Blue, Violet]

SOCIAL MEDIA CHECKLIST Our relationship with social sharing—photos, videos, status updates, location check-ins, and more—changes as our lives evolve. The way we feel about sharing something one day may be ...
( Category: Safety & First Aid February 14,2019 )
epub |eng | 2015-04-13 | Author:Christopher Hadnagy & Michele Fincher

My Mobile Is Secure I have actually overheard someone telling another person, “If you think it's a malicious e-mail, just open it up on your <iPad/iPhone/Android device/Windows mobile device/insert other ...
( Category: Internet & Social Media February 14,2019 )
epub |eng | 2014-02-21 | Author:Nigel Poulton

SMB/CIFS can be used to share and access devices other than files and folders. It can also share printers and be used for inter-process communication (IPC) between servers. SMB/CIFS originally ...
( Category: Networking & Cloud Computing February 14,2019 )