Network Security
epub |eng | | Author:Yang Xu
(3) (f means working frequency, unit MHz; d means path distance, unit m; n means indoor propagation index, a constant within 2.0–3.3, relating to the nature of the building; in ...
( Category:
Quality Control
August 1,2020 )
epub |eng | | Author:Timo Steffens
6.2 Domestic and International Conflicts Geopolitical analysis is very different from the other aspects in attribution, that cover artifacts like samples or server images directly linked to the attackers. In ...
( Category:
Hacking
July 26,2020 )
epub, mobi |eng | 2020-07-15 | Author:Tom Steele & Chris Patten & Dan Kottmann
Implementing a MySQL Database Miner To make your MySQL implementation work, you’ll inspect the information_schema.columns table. This table maintains metadata about all the databases and their structures, including table and ...
( Category:
Testing
July 10,2020 )
epub |eng | | Author:Matthew Katzer
The common mistake that is made is that the desktop systems have not been verified with the Company Portal application and are not compliant before the MDM services are deployed ...
( Category:
PCs
July 10,2020 )
epub, pdf, mobi, azw3 |eng | 2018-08-31 | Author:Gilberto Najera-Gutierrez [Gilberto Najera-Gutierrez]
Then, we will see the WebSocket Message Editor window, where we can change all of the parameters of the message, including its direction and contents, and send it again: Most ...
( Category:
Network Security
July 9,2020 )
epub |eng | 2020-07-05 | Author:Mustafa Toroman and Tom Janetscheck
Understanding Azure Virtual Network The first step in the transition from an on-premises environment to the cloud is Infrastructure as a Service (IaaS). One of the key elements in IaaS ...
( Category:
Cloud Computing
July 8,2020 )
epub |eng | | Author:Jim Seaman
27www.raf.mod.uk/our-organisation/force-protection/news/raf-leeming-based-34-squadron-raf-regiment-returns-to-cyprus/ 28www.us-cert.gov/ncas/current-activity/2019/11/04/cset-version-92-now-available 29www.army-technology.com/contractors/infrastructure/hesco/ 30www.ibm.com/security/data-breach 31www.pcisecuritystandards.org/assessors_and_solutions/pin_transaction_devices 32www.elsevier.com/books/social-engineering-penetration-testing/watson/978-0-12-420124-8 33https://content.fireeye.com/m-trends
( Category:
Network Security
July 8,2020 )
epub |eng | 2020-04-06 | Author:Richard Diver and Gary Bushey
These rules are very useful to set up to provide a single location to go to to see all of the alerts from Azure Security applications. Machine learning behavioral analytics ...
( Category:
Testing
July 8,2020 )
epub |eng | 2015-07-14 | Author:Kenneth R. van Wyk & Mark G. Graff & Dan S. Peters & Diana L. Burley
* * * import java.io.Console; import java.util.regex.Matcher; import java.util.regex.Pattern; /* A validation class that uses Java regex to validate input fields and * implement a primitive (and easily bypassed!) blacklist ...
( Category:
Network Security
July 8,2020 )
epub |eng | 2020-05-22 | Author:Harpreet Singh and Himanshu Sharma [Harpreet Singh and Himanshu Sharma]
( Category:
Testing
July 8,2020 )
epub |eng | 2012-03-27 | Author:David Pollino
“Click on that link,” Jay commanded. Joel clicked the link and the Order History page was displayed (Figure C16-2). Figure C16-2. Order History page “What does the Reorder button do?” ...
( Category:
Networks
July 7,2020 )
epub |eng | | Author:Konstantinos Markantonakis & Keith Mayes
10.8.1 Value Added Service Management The situation for value-added service management is less clear than the core SIM functionality and there are a number of different scenarios that need to ...
( Category:
Electronics
July 5,2020 )
epub |eng | | Author:Ayantika Chatterjee & Khin Mi Mi Aung
4.9 Design of Encrypted Queue In the ADT queue, the entities in the collection are kept in order. The basic difference of stack with queue is that stack elements are ...
( Category:
Networks
July 2,2020 )
epub |eng | | Author:Neil C. Rowe & Julian Rrushi
11.8.3 Metadata of Typical File Systems We have been studying a collection of 4265 drives containing 251.7 million files obtained from various sources around the world (Rowe 2016). The term ...
( Category:
Network Security
July 1,2020 )
epub |eng | 2017-08-29 | Author:Chuck Easttom [Easttom, Chuck]
( Category:
Network Security
July 1,2020 )
Categories
Popular ebooks
The Mikado Method by Ola Ellnestam Daniel Brolund(9669)Sass and Compass in Action by Wynn Netherland Nathan Weizenbaum Chris Eppstein Brandon Mathis(7672)
Grails in Action by Glen Smith Peter Ledbrook(7591)
Configuring Windows Server Hybrid Advanced Services Exam Ref AZ-801 by Chris Gill(6073)
Azure Containers Explained by Wesley Haakman & Richard Hooper(6040)
Running Windows Containers on AWS by Marcio Morales(5547)
Kotlin in Action by Dmitry Jemerov(4941)
Microsoft 365 Identity and Services Exam Guide MS-100 by Aaron Guilmette(4623)
Management Strategies for the Cloud Revolution: How Cloud Computing Is Transforming Business and Why You Can't Afford to Be Left Behind by Charles Babcock(4331)
Combating Crime on the Dark Web by Nearchos Nearchou(4201)
The Ruby Workshop by Akshat Paul Peter Philips Dániel Szabó and Cheyne Wallace(3863)
The Age of Surveillance Capitalism by Shoshana Zuboff(3835)
Microsoft Cybersecurity Architect Exam Ref SC-100 by Dwayne Natwick(3823)
Python for Security and Networking - Third Edition by José Manuel Ortega(3433)
Learn Windows PowerShell in a Month of Lunches by Don Jones(3424)
Mastering Python for Networking and Security by José Manuel Ortega(3249)
Mastering Azure Security by Mustafa Toroman and Tom Janetscheck(3240)
Blockchain Basics by Daniel Drescher(3201)
The Ultimate Docker Container Book by Schenker Gabriel N.;(3101)
TCP IP by Todd Lammle(2896)
