Networking & Cloud Computing
mobi |eng | | Author:2014
If you set up a local FTP server and run the following script, this script will log in to the FTP server and then will upload a file. If a ...
( Category:
Programming
August 20,2017 )
epub, pdf |eng | 2014-05-12 | Author:Glenn Greenwald [Greenwald, Glenn]
“Upstream” collection (from fiber-optic cables) and direct collection from the servers of Internet companies (PRISM) account for most of the records gathered by the NSA. In addition to such sweeping ...
( Category:
Politics & Government
August 20,2017 )
epub, azw3 |eng | 2016-09-29 | Author:Nipun Jaswal [Jaswal, Nipun]
We set the required options and payload as windows/meterpreter/bind_tcp that denotes a direct connection to the target. Let's see what happens when we exploit the system using the exploit command: ...
( Category:
Networking & Cloud Computing
August 20,2017 )
epub, pdf |eng | 2012-02-24 | Author:Julia Lerman & Rowan Miller [Julia Lerman]
Warning There is a bug in Entity Framework 4.1 and 4.2 that blocks you from using the GetDatabaseValues method for an entity that is not in the same namespace as ...
( Category:
Computer Science
August 20,2017 )
epub |eng | 2015-11-22 | Author:Reiber, Lee [Reiber, Lee]
Collecting the Device Physically If the feature phone has been powered off and is locked or disabled, or after completing a logical extraction of the mobile device, the examiner should ...
( Category:
Mobile Phones, Tablets & E-Readers
August 20,2017 )
epub |eng | | Author:2015
Initializing the topic content We can take advantage of this opportunity to also publish the current (or saved) states of the actuator output to the topics we will soon subscribe ...
( Category:
Internet & Social Media
August 20,2017 )
epub |eng | 2005-12-08 | Author:Kevin D. Mitnick & William L. Simon [Mitnick, Kevin D. & Simon, William L.]
Since most users choose a password that is either a name or a simple dictionary word, an attacker usually begins by setting l0phtCrack (or whatever program he's using) to perform ...
( Category:
Internet & Social Media
August 19,2017 )
epub |eng | 2017-02-16 | Author:Keijser, Jan Just
Script security and logging One of the major differences between OpenVPN 2.0 and later versions is related to the security when running scripts. With OpenVPN 2.0, all scripts were executed ...
( Category:
Networking & Cloud Computing
August 18,2017 )
epub |eng | | Author:Hitchcock, J. A. [J. A., HITCHCOCK]
Jamie Rose Bolen, killed by her neighbor Kevin Ray Underwood [Courtesy of Bonnie Kernene, mylifeofcrime.wordpress.com] Underwood after his arrest and before his eventual sentence of death [Courtesy of Purcell Police ...
( Category:
Security & Encryption
August 18,2017 )
epub |eng | 2015-05-21 | Author:Lucas, Michael W & Jude, Allan
Metadata Redundancy Each dataset stores an extra copy of its internal metadata, so that if a single block is corrupted, the amount of user data lost is limited. This extra ...
( Category:
Operating Systems
August 17,2017 )
mobi, epub |eng | | Author:2015
The functionality of the Make Table View tool is equivalent to the Make Feature Layer tool. The difference is that it works against standalone tables instead of feature classes. Remove ...
( Category:
Networking & Cloud Computing
August 17,2017 )
mobi, epub, pdf |eng | 2016-10-17 | Author:Raymond Phillips
As a result of this invasion of privacy, many users are starting to look for open-source privacy tools to help them stay anonymous online. These tools are transparent and independently ...
( Category:
Administrative Law
August 17,2017 )
epub |eng | 2016-12-13 | Author:Panek, William
( Category:
Certification
August 17,2017 )
epub |eng | 2016-08-17 | Author:Jim Doherty
Decoupling Networking Applications from Networking Gear In addition to the problems caused by network-wide distribution of intelligence, there is also a problem with the way we develop network applications and ...
( Category:
Networking & Cloud Computing
August 17,2017 )
epub |eng | | Author:2013
The following things are worth noticing: Editable fields are specifically tailored to the property type and in exactly the same way as for single fields (see the Configuring field types ...
( Category:
Programming
August 17,2017 )
Categories
Popular ebooks
The Mikado Method by Ola Ellnestam Daniel Brolund(9813)Sass and Compass in Action by Wynn Netherland Nathan Weizenbaum Chris Eppstein Brandon Mathis(7810)
Grails in Action by Glen Smith Peter Ledbrook(7719)
Azure Containers Explained by Wesley Haakman & Richard Hooper(6854)
Configuring Windows Server Hybrid Advanced Services Exam Ref AZ-801 by Chris Gill(6853)
Running Windows Containers on AWS by Marcio Morales(6379)
Kotlin in Action by Dmitry Jemerov(5092)
Microsoft 365 Identity and Services Exam Guide MS-100 by Aaron Guilmette(5077)
Combating Crime on the Dark Web by Nearchos Nearchou(4652)
Microsoft Cybersecurity Architect Exam Ref SC-100 by Dwayne Natwick(4632)
Management Strategies for the Cloud Revolution: How Cloud Computing Is Transforming Business and Why You Can't Afford to Be Left Behind by Charles Babcock(4438)
The Ruby Workshop by Akshat Paul Peter Philips Dániel Szabó and Cheyne Wallace(4341)
The Age of Surveillance Capitalism by Shoshana Zuboff(3983)
Python for Security and Networking - Third Edition by José Manuel Ortega(3901)
The Ultimate Docker Container Book by Schenker Gabriel N.;(3562)
Learn Wireshark by Lisa Bock(3543)
Learn Windows PowerShell in a Month of Lunches by Don Jones(3530)
Mastering Python for Networking and Security by José Manuel Ortega(3376)
Mastering Azure Security by Mustafa Toroman and Tom Janetscheck(3356)
Blockchain Basics by Daniel Drescher(3327)
