Network Security
mobi |eng | 2015-02-17 | Author:Paulino Calderón Pale
If the login attempt wasn't successful, we return an instance of brute.Error:return false, brute.Error:new( "Incorrect password" ). Our final class will look like this:Driver = { new = function(self, host, ...
( Category:
Network Security
July 31,2015 )
epub |eng | 2014-07-17 | Author:Ivan Ristić
Store keys safely Keep a copy of your keys in a safe location. Losing a server key is usually not a big deal because you can always generate a new ...
( Category:
Network Security
July 18,2015 )
mobi, epub, pdf |eng | 2011-08-14 | Author:Kevin Mitnick
Wait a minute. If they had come to arrest me, they would have knocked on my door while I was still in the apartment. Why would McGuire call the Village ...
( Category:
Crime & Criminals
June 21,2015 )
epub |eng | 2010-12-28 | Author:Deepak Chopra [Chopra, Deepak]
Hope: Hope is intangible because it rests upon belief. Your role is to be believer-in-chief. You hold out hope for a better future than anyone else can see. Hopelessness is ...
( Category:
Leadership
June 13,2015 )
epub, mobi, azw3 |eng | 2011-01-14 | Author:Goldstein, Emmanuel [Emmanuel, Goldstein,]
Dear 2600: Ive recently read that Despair, Inc. has registered the frowny emoticon :-(, copyrighted it, and is planning to sue anyone and everyone who uses the so-called frowny emoticon, ...
( Category:
Hacking
June 12,2015 )
mobi, azw3, epub, pdf |eng | 2011-01-14 | Author:Chris Sanders
Figure 6-31. The first ping packet, packet 1 Common sense tells us that if a computer sends an echo request, it should receive an echo reply, and that's just what ...
( Category:
Networks
June 11,2015 )
mobi, pdf |eng | 2007-01-15 | Author:Michael Rash
[ext_scanner]# nmap -sF -P0 -p 80 -n 71.157.X.X Starting Nmap 4.01 ( http://www.insecure.org/nmap/ ) at 2007-03-05 20:50 EST Interesting ports on 71.157.X.X: PORT STATE SERVICE 80/tcp open|filtered http Nmap finished: ...
( Category:
Networking & System Administration
June 11,2015 )
mobi |eng | 2010-06-20 | Author:Emmanuel Goldstein
Dear 2600: Ive recently read that Despair, Inc. has registered the frowny emoticon :-(, copyrighted it, and is planning to sue anyone and everyone who uses the so-called frowny emoticon, ...
( Category:
Hacking
June 11,2015 )
mobi, epub |eng | 2007-11-28 | Author:Rice, David [Rice, David]
To put this problem in context, when concrete is used for a roadway, it increases the speed cars are permitted to drive. When crumple zones are added to vehicles it ...
( Category:
Quality Control
June 11,2015 )
mobi |eng | 2009-09-01 | Author:Nitesh Dhanjani; Billy Rios; Brett Hardin
Your Employees Are on My Network When your employees join a Wi-Fi network at their favorite coffee shop, airport, hotel, or any place that offers a Wi-Fi hotspot, they are ...
( Category:
Hacking
June 11,2015 )
epub |eng | 2015-05-04 | Author:Gilchrist, Alasdair
C – Malicious.pcap 1. What was the complete URI of the original web request that led to the client being compromised? The first thing we have to do is get ...
( Category:
Network Security
June 5,2015 )
epub |eng | 2015-06-01 | Author:Shon Harris
A. Security parameter index B. Security ability C. Security association D. Security assistant C. Each IPSec VPN device will have at least one security association (SA) for each secure connection ...
( Category:
Encryption
June 2,2015 )
epub |eng | 2015-03-15 | Author:Joshua Wright & Johnny Cache [Wright, Joshua]
* * * * * * Figure 9-8 SmartRF Packet Sniffer data A sample packet capture of a Fitbit One device that can be displayed using the SmartRF Packet Sniffer ...
( Category:
Internet, Groupware, & Telecommunications
April 22,2015 )
epub, mobi |eng | 2012-06-28 | Author:Chappell, Laura [Chappell, Laura]
Checksum The checksum field covers the ICMP header only. Basic ICMPv6 Functionality RFC 4443 defines the purpose and functionality of ICMPv6. The ICMPv6 packet structure is the same as the ...
( Category:
Networks
March 23,2015 )
epub, pdf |eng | 2015-01-01 | Author:Srikanth Ramesh [Ramesh, Srikanth]
Figure 8. 17 Next, to load the dumped password hashes, click on "Load" button, select "PWDUMP file" option and load the hash.txt file obtained by running the PWDUMP tool on ...
( Category:
Hacking
January 20,2015 )
Categories
Popular ebooks
The Mikado Method by Ola Ellnestam Daniel Brolund(9780)Sass and Compass in Action by Wynn Netherland Nathan Weizenbaum Chris Eppstein Brandon Mathis(7784)
Grails in Action by Glen Smith Peter Ledbrook(7699)
Configuring Windows Server Hybrid Advanced Services Exam Ref AZ-801 by Chris Gill(6580)
Azure Containers Explained by Wesley Haakman & Richard Hooper(6568)
Running Windows Containers on AWS by Marcio Morales(6098)
Kotlin in Action by Dmitry Jemerov(5068)
Microsoft 365 Identity and Services Exam Guide MS-100 by Aaron Guilmette(4923)
Combating Crime on the Dark Web by Nearchos Nearchou(4504)
Management Strategies for the Cloud Revolution: How Cloud Computing Is Transforming Business and Why You Can't Afford to Be Left Behind by Charles Babcock(4416)
Microsoft Cybersecurity Architect Exam Ref SC-100 by Dwayne Natwick(4351)
The Ruby Workshop by Akshat Paul Peter Philips Dániel Szabó and Cheyne Wallace(4180)
The Age of Surveillance Capitalism by Shoshana Zuboff(3959)
Python for Security and Networking - Third Edition by José Manuel Ortega(3748)
Learn Windows PowerShell in a Month of Lunches by Don Jones(3510)
The Ultimate Docker Container Book by Schenker Gabriel N.;(3413)
Mastering Python for Networking and Security by José Manuel Ortega(3346)
Mastering Azure Security by Mustafa Toroman and Tom Janetscheck(3334)
Blockchain Basics by Daniel Drescher(3298)
Learn Wireshark by Lisa Bock(3273)
