Network Security
epub |eng | | Author:Michael McPhee
Tip If at any point you are unsure of your options, you can just type the help command. It will list all the available commands in that particular section. There ...
( Category:
Microprocessors & System Design
May 27,2019 )
epub, pdf |eng | 2009-04-17 | Author:Andy Oram
Breakers usually represent the glass as half empty, and are often so pessimistic that you wonder, when listening to some of them, why the Internet hasn’t totally collapsed already and ...
( Category:
Networks
May 12,2019 )
epub |eng | 2015-05-09 | Author:Wright, Joshua
* * * A sample packet capture of a Fitbit One device that can be displayed using the SmartRF Packet Sniffer software (without the CC2540 USB hardware) is available on ...
( Category:
Cryptography
May 9,2019 )
epub |eng | 2018-12-17 | Author:Stanley Siegel & Chris Williams & Scott Donaldson [Stanley Siegel]
Guarding Against Counterfeit E-Mails and Secure E-Mail Because e-mail protocols are inherently insecure, it may be possible for attackers to generate and send counterfeit e-mails. Counterfeit e-mails may appear to ...
( Category:
Hacking
May 6,2019 )
epub |eng | 2019-02-14 | Author:Roman Zabicki [Roman Zabicki]
( Category:
Hacking
May 3,2019 )
epub |eng | 2018-04-29 | Author:Mike Meyers
FIGURE 2.5-30 Typical home network interface box In an office environment, the demarc is usually more complex, given that a typical building simply has to serve a much larger number ...
( Category:
Networks
April 29,2019 )
epub, pdf |eng | 2019-03-24 | Author:Chris Dotson
User Reports In a perfect world, all bugs and vulnerabilities would be discovered and fixed before users see them. Now that you’ve stopped laughing, you need to consider that you ...
( Category:
Cloud Computing
April 20,2019 )
azw3 |eng | 2017-01-05 | Author:Nadia El Mrabet & Marc Joye
parametrized by selecting an arbitrary x ∈ Z such that are both prime. Constant-time hashing to In Latincrypt 2012, Fouque and Tibouchi [25] presented a specialization of the procedure proposed ...
( Category:
Combinatorics
April 5,2019 )
epub, pdf |eng | | Author:Chandra, Rakesh Vidya; Varanasi, Bala Subrahmanyam
Creating an authentication Request If we remember the theme of the third chapter, we learned different kinds of authentication with requests, such as Basic authentication, Digest authentication, and OAuth authentication. ...
( Category:
Software Development
April 4,2019 )
epub |eng | 2016-03-29 | Author:Minko Gechev [Gechev, Minko]
Note In order to get platform independent reference to a DOM element, again, we can use @ContentChildren and @ViewChildren. For instance, if we have the following template: <input #todo> we ...
( Category:
Network Security
April 4,2019 )
azw3, epub, pdf |eng | 2015-07-15 | Author:Piyush Verma
OS fingerprinting attempts OS fingerprinting is the technique where an attacker tries to identify the operating system running on the target machine(s). An attacker can perform either passive or active ...
( Category:
Network Security
April 4,2019 )
epub, pdf |eng | 2014-01-13 | Author:Ed Wilson [Ed Wilson]
Note Keep in mind that you want to convert the contents of the passwordHash.txt file to a secure string and not the path to the passwordHash.txt file. The first time ...
( Category:
Enterprise Applications
April 1,2019 )
epub |eng | 2013-05-28 | Author:Brian Svidergol & Robbie Allen
Using a command-line interface The following command creates an AD integrated reverse zone: > dnscmd <DNSServerName> /zoneadd <ZoneName> /DsPrimary Using PowerShell The following PowerShell command will create an Active Directory−integrated ...
( Category:
Networks
April 1,2019 )
mobi, epub |eng | 2010-08-15 | Author:Rob Cameron, Brad Woodberg, Patricio Giecco, Timothy Eberhard, and James Quinn
Drop-Packet Drop-Packet will drop an individual offending packet, but not the rest of the session. Typically, you want to use the Drop-Connection action when malicious activity is detected on a ...
( Category:
Network Security
April 1,2019 )
epub |eng | 2019-01-31 | Author:Preston Miller
Writing Excel spreadsheets – xlsx_writer.py The xlsx_writer.py script contains the logic for creating an excel document containing our processed UserAssist values. In addition to this, this script also creates an ...
( Category:
Network Security
March 11,2019 )
Categories
Popular ebooks
The Mikado Method by Ola Ellnestam Daniel Brolund(9779)Sass and Compass in Action by Wynn Netherland Nathan Weizenbaum Chris Eppstein Brandon Mathis(7782)
Grails in Action by Glen Smith Peter Ledbrook(7697)
Configuring Windows Server Hybrid Advanced Services Exam Ref AZ-801 by Chris Gill(6568)
Azure Containers Explained by Wesley Haakman & Richard Hooper(6558)
Running Windows Containers on AWS by Marcio Morales(6087)
Kotlin in Action by Dmitry Jemerov(5066)
Microsoft 365 Identity and Services Exam Guide MS-100 by Aaron Guilmette(4918)
Combating Crime on the Dark Web by Nearchos Nearchou(4499)
Management Strategies for the Cloud Revolution: How Cloud Computing Is Transforming Business and Why You Can't Afford to Be Left Behind by Charles Babcock(4414)
Microsoft Cybersecurity Architect Exam Ref SC-100 by Dwayne Natwick(4341)
The Ruby Workshop by Akshat Paul Peter Philips Dániel Szabó and Cheyne Wallace(4174)
The Age of Surveillance Capitalism by Shoshana Zuboff(3955)
Python for Security and Networking - Third Edition by José Manuel Ortega(3741)
Learn Windows PowerShell in a Month of Lunches by Don Jones(3509)
The Ultimate Docker Container Book by Schenker Gabriel N.;(3408)
Mastering Python for Networking and Security by José Manuel Ortega(3344)
Mastering Azure Security by Mustafa Toroman and Tom Janetscheck(3330)
Blockchain Basics by Daniel Drescher(3294)
Learn Wireshark by Lisa Bock(3263)
