Network Security
epub, pdf |eng | 2015-12-22 | Author:Josiah Dykstra
Chapter 8. Digital Forensics Digital forensics holds a unique distinction among the group of cybersecurity fields in this book because it requires science. Forensic science, by definition, is the use ...
( Category:
Network Security
December 13,2015 )
epub, azw3 |eng | 2015-10-08 | Author:Easttom, Chuck
Note This is a generic overview of the essentials of a sponge construction; there can be variations on this process. The details of the function F will vary with specific ...
( Category:
Encryption
October 30,2015 )
epub |eng | 2012-10-15 | Author:Mike Meyers
Figure 19-50 Compatibility mode options in Windows 7 The newer Compatibility tab also adds some new options (see Figure 19-51) to help older programs run: Figure 19-51 Windows 7 Compatibility ...
( Category:
LAN
October 16,2015 )
epub, azw3 |eng | 2010-09-01 | Author:Frank Ahearn & Eileen Horan [Ahearn, Frank]
ABANDONMENT If you’re leaving a husband, wife, or kids, I hope you’re doing it the right way (if there is a right way) by finding a lawyer and giving them ...
( Category:
Network Security
October 11,2015 )
mobi, epub, azw3 |eng | 2015-06-17 | Author:Sarker, Dr. M. O. Faruque & Washington, Sam [Sarker, Dr. M. O. Faruque]
if __name__ == '__main__': sender = input("Enter sender email address: ") recipient = input("Enter recipeint email address: ") send_email(sender, recipient) The preceding code is similar to our first example, except ...
( Category:
Introductory & Beginning
October 11,2015 )
epub |eng | 2014-10-30 | Author:Nestler, Vincent & Harrison, Keith & Hirsch, Matthew & Conklin, Wm. Arthur
Note If you are using virtual machines and have the ability to create snapshots, now would be a good time to take another one. At this point, if you have ...
( Category:
Network Security
August 17,2015 )
mobi |eng | 2015-02-17 | Author:Paulino Calderón Pale
If the login attempt wasn't successful, we return an instance of brute.Error:return false, brute.Error:new( "Incorrect password" ). Our final class will look like this:Driver = { new = function(self, host, ...
( Category:
Network Security
July 31,2015 )
epub |eng | 2014-07-17 | Author:Ivan Ristić
Store keys safely Keep a copy of your keys in a safe location. Losing a server key is usually not a big deal because you can always generate a new ...
( Category:
Network Security
July 18,2015 )
mobi, epub, pdf |eng | 2011-08-14 | Author:Kevin Mitnick
Wait a minute. If they had come to arrest me, they would have knocked on my door while I was still in the apartment. Why would McGuire call the Village ...
( Category:
Crime & Criminals
June 21,2015 )
epub |eng | 2010-12-28 | Author:Deepak Chopra [Chopra, Deepak]
Hope: Hope is intangible because it rests upon belief. Your role is to be believer-in-chief. You hold out hope for a better future than anyone else can see. Hopelessness is ...
( Category:
Leadership
June 13,2015 )
epub |eng | 2011-01-14 | Author:Goldstein, Emmanuel [Emmanuel, Goldstein,]
Dear 2600: Ive recently read that Despair, Inc. has registered the frowny emoticon :-(, copyrighted it, and is planning to sue anyone and everyone who uses the so-called frowny emoticon, ...
( Category:
Hacking
June 12,2015 )
mobi, azw3, epub, pdf |eng | 2011-01-14 | Author:Chris Sanders
Figure 6-31. The first ping packet, packet 1 Common sense tells us that if a computer sends an echo request, it should receive an echo reply, and that's just what ...
( Category:
Networks
June 11,2015 )
mobi, pdf |eng | 2007-01-15 | Author:Michael Rash
[ext_scanner]# nmap -sF -P0 -p 80 -n 71.157.X.X Starting Nmap 4.01 ( http://www.insecure.org/nmap/ ) at 2007-03-05 20:50 EST Interesting ports on 71.157.X.X: PORT STATE SERVICE 80/tcp open|filtered http Nmap finished: ...
( Category:
Networking & System Administration
June 11,2015 )
mobi |eng | 2010-06-20 | Author:Emmanuel Goldstein
Dear 2600: Ive recently read that Despair, Inc. has registered the frowny emoticon :-(, copyrighted it, and is planning to sue anyone and everyone who uses the so-called frowny emoticon, ...
( Category:
Hacking
June 11,2015 )
mobi, epub |eng | 2007-11-28 | Author:Rice, David [Rice, David]
To put this problem in context, when concrete is used for a roadway, it increases the speed cars are permitted to drive. When crumple zones are added to vehicles it ...
( Category:
Quality Control
June 11,2015 )
Categories
Popular ebooks
The Mikado Method by Ola Ellnestam Daniel Brolund(9332)Sass and Compass in Action by Wynn Netherland Nathan Weizenbaum Chris Eppstein Brandon Mathis(7421)
Grails in Action by Glen Smith Peter Ledbrook(7315)
Kotlin in Action by Dmitry Jemerov(4665)
Management Strategies for the Cloud Revolution: How Cloud Computing Is Transforming Business and Why You Can't Afford to Be Left Behind by Charles Babcock(4144)
The Age of Surveillance Capitalism by Shoshana Zuboff(3440)
Learn Windows PowerShell in a Month of Lunches by Don Jones(3263)
Mastering Azure Security by Mustafa Toroman and Tom Janetscheck(3037)
Mastering Python for Networking and Security by José Manuel Ortega(2979)
Blockchain Basics by Daniel Drescher(2905)
Microsoft 365 Identity and Services Exam Guide MS-100 by Aaron Guilmette(2771)
Configuring Windows Server Hybrid Advanced Services Exam Ref AZ-801 by Chris Gill(2653)
TCP IP by Todd Lammle(2652)
Azure Containers Explained by Wesley Haakman & Richard Hooper(2544)
From CIA to APT: An Introduction to Cyber Security by Edward G. Amoroso & Matthew E. Amoroso(2492)
Hands-On Azure for Developers by Kamil Mrzyglod(2443)
React Native - Building Mobile Apps with JavaScript by Novick Vladimir(2348)
Combating Crime on the Dark Web by Nearchos Nearchou(2331)
The Social Psychology of Inequality by Unknown(2328)
MCSA Windows Server 2016 Study Guide: Exam 70-740 by William Panek(2321)