Network Security
epub |eng | 2009-04-14 | Author:Ryan Russell & Johnny Long & Timothy Mullen [Russell, Ryan & Long, Johnny & Mullen, Timothy]
In the Beginning… CHAPTER 21 497 It did not take long for her to begin the process anew with the top-tier boards, the regional and world headquarters for the groups ...
( Category:
Hacking
January 16,2020 )
epub |eng | 2019-12-26 | Author:Yuri Diogenes, Erdal Ozkaya
( Category:
Network Security
January 3,2020 )
mobi |eng | 2019-12-26 | Author:Erdal Ozkaya Yuri Diogenes [Yuri Diogenes, Erdal Ozkaya]
( Category:
Network Security
January 2,2020 )
epub, pdf |eng | | Author:Wolfgang W. Osterhage
Bibliography 1. I. Papadhopulli, N. Frasheri, Today’s challenges of symbolic execution and search based algorithms for automated structural testing. Open J. Commun. Softw. (2015) 2. W. Osterhage, Automatisierte Verfahren für ...
( Category:
Software Development
January 2,2020 )
epub |eng | 2019-12-10 | Author:William Stallings [William Stallings]
( Category:
Network Security
December 12,2019 )
epub, mobi, azw3, pdf |eng | 2018-11-29 | Author:Joshua Saxe & Hillary Sanders
Figure 7-2: Suspiciousness scores output by the hypothetical MalDetect system for individual software binaries Suspiciousness scores are informative, but in order to calculate MalDetect’s true positive rate and false positive ...
( Category:
Testing
November 30,2019 )
epub, mobi, pdf |eng | 2019-11-29 | Author:Dennis Andriesse
Running the Gadget Finder The command line interface for the gadget finder is the same as for the disassembly tools. Listing 8-12 shows what the output should look like. Listing ...
( Category:
Testing
November 30,2019 )
epub |eng | 2019-08-22 | Author:Lisa Bock [Lisa Bock]
( Category:
Network Security
November 3,2019 )
epub |eng | 2019-10-18 | Author:Jason Andress
Open Source Intelligence Open source intelligence (OSINT) is information collected from publicly available sources, such as job postings and public records. This publicly available data can reveal an enormous amount ...
( Category:
Network Security
October 19,2019 )
epub |eng | 2018-11-12 | Author:Wolf Halton
In the preceding screenshot, we can see that we have captured the Administrator login from the \\WIN10-01 workstation. This was captured when the user logged on to the domain from ...
( Category:
Network Security
October 19,2019 )
epub |eng | 2019-06-26 | Author:Erdal Ozkaya
EC-Council, Computer Hacking Forensic Investigator (CHFI) EC-Council also offers another certification for individuals who wish to take up a career in the digital forensics space: Computer Hacking Forensic Investigator, commonly ...
( Category:
Linux & UNIX Administration
October 15,2019 )
epub |eng | | Author:Sudhi R. Sinha & Youngchoon Park
9.Access rights—Provisioning users with elevated privileges beyond the minimum required, such as the use of administrator accounts for routing functions, creates a risk for unintentional and malicious incidents. An example ...
( Category:
Enterprise Applications
October 10,2019 )
epub |eng | 2017-04-10 | Author:Amanda Berlin & Lee Brotherston [Amanda Berlin]
( Category:
Networks
September 24,2019 )
epub, mobi |eng | 2018-11-20 | Author:Rajneesh Gupta
You should see that the holder has indeed been changed by querying for key 1 again. Now, the holder attribute has been changed from Miriam to Alex: Finishing up: Remove ...
( Category:
Hacking
September 16,2019 )
epub |eng | 2019-02-27 | Author:Riyaz Ahemed Walikar & Dhruv Shah & Carlos A. Lozano [Riyaz Ahemed Walikar]
( Category:
Network Security
September 13,2019 )
Categories
Popular ebooks
The Mikado Method by Ola Ellnestam Daniel Brolund(9779)Sass and Compass in Action by Wynn Netherland Nathan Weizenbaum Chris Eppstein Brandon Mathis(7782)
Grails in Action by Glen Smith Peter Ledbrook(7697)
Configuring Windows Server Hybrid Advanced Services Exam Ref AZ-801 by Chris Gill(6573)
Azure Containers Explained by Wesley Haakman & Richard Hooper(6561)
Running Windows Containers on AWS by Marcio Morales(6093)
Kotlin in Action by Dmitry Jemerov(5066)
Microsoft 365 Identity and Services Exam Guide MS-100 by Aaron Guilmette(4921)
Combating Crime on the Dark Web by Nearchos Nearchou(4500)
Management Strategies for the Cloud Revolution: How Cloud Computing Is Transforming Business and Why You Can't Afford to Be Left Behind by Charles Babcock(4414)
Microsoft Cybersecurity Architect Exam Ref SC-100 by Dwayne Natwick(4344)
The Ruby Workshop by Akshat Paul Peter Philips Dániel Szabó and Cheyne Wallace(4176)
The Age of Surveillance Capitalism by Shoshana Zuboff(3956)
Python for Security and Networking - Third Edition by José Manuel Ortega(3744)
Learn Windows PowerShell in a Month of Lunches by Don Jones(3509)
The Ultimate Docker Container Book by Schenker Gabriel N.;(3410)
Mastering Python for Networking and Security by José Manuel Ortega(3344)
Mastering Azure Security by Mustafa Toroman and Tom Janetscheck(3331)
Blockchain Basics by Daniel Drescher(3295)
Learn Wireshark by Lisa Bock(3267)
