Security & Encryption
epub |eng | 2015-08-16 | Author:Wouter Verbeke & Veronique Van Vlasselaer & Bart Baesens [Wouter Verbeke]
Figure 4.37 Calculating Predictions Using a Cut-Off A confusion matrix can now be calculated as shown in Table 4.5. Table 4.5 Confusion Matrix Actual Status Positive (Fraud) Negative (No Fraud) ...
( Category:
Network Security
April 16,2020 )
mobi, azw3, epub, pdf |eng | 2015-01-31 | Author:Shaheen Shariff
Mackie said he is keenly aware that he will be making a constitutional argument to drop the convictions against his client while the federal government is moving to strengthen Canada’s ...
( Category:
Reform & Policy
April 15,2020 )
Anomaly Detection Principles and Algorithms by Kishan G. Mehrotra Chilukuri K. Mohan & HuaMing Huang
epub |eng | | Author:Kishan G. Mehrotra, Chilukuri K. Mohan & HuaMing Huang
6.1 Distance from the Rest of the Data The simplest anomaly detection algorithms are based on the assumptions about the data distribution, e.g., that data is one-dimensional and normally distributed ...
( Category:
Computer Vision & Pattern Recognition
April 14,2020 )
epub |eng | 2020-03-10 | Author:Knight, Alissa [Knight, Alissa]
When You Don't Know the IMSI or MSISDN of the TCU When you find yourself in the precarious position of a black box or gray box penetration test, or even ...
( Category:
Cryptography
April 10,2020 )
epub |eng | 2019-04-30 | Author:Weimin Sun [Weimin Sun]
During the fundraising period between August 1, 2017 and December 1, 2017, the fund had raised more than $3.6 million from 44 investors, who were primarily individuals residing in at ...
( Category:
Encryption
April 6,2020 )
epub |eng | | Author:Sreejith Keeriyattil
Stakeholder Meetings Before going ahead with your design, it is important to have a detailed discussion with each of the application owners. As a security consultant, your job is to ...
( Category:
Network Security
April 6,2020 )
epub, pdf |eng | | Author:Ronald T. Kneusel
With this separation of A and B into super digits we can examine the D 2n∕1n algorithm, Algorithm D 2n∕1n 1. [Given] A < β n B, β∕2 ≤ B ...
( Category:
Algorithms
April 6,2020 )
epub |eng | 2019-04-27 | Author:Merunas Grincalaitis [Merunas Grincalaitis]
Auditing tools will save you countless hours in confusing errors, bugs, and vulnerabilities. They will become one of your most used set of tools, combined with your already awesome development ...
( Category:
Encryption
April 5,2020 )
epub |eng | 2019-04-30 | Author:Xun (Brian) Wu [Xun (Brian) Wu]
The SDK is installed at /usr/lib/python3/dist-packages/sawtooth_sdk. How to do it... Let's go through a step-by-step guide to implement a transaction processor. We will highlight the important code segments to explain ...
( Category:
Cryptography
April 5,2020 )
epub |eng | 2018-10-23 | Author:Aaron Philipp, David Cowen, Chris Davis
( Category:
Hacking
April 5,2020 )
epub, mobi, pdf |eng | 2019-12-03 | Author:Zach Codings [Codings, Zach]
( Category:
Hacking
April 5,2020 )
epub |eng | | Author:Kanclirz, Jan , Jr.
If the server you're scanning is running HTTPS, or secure HTTP, Netcat cannot directly communicate with this port. You will need a TLS wrapper, such as stunnel, to take the ...
( Category:
Network Security
April 3,2020 )
epub, mobi |eng | 2020-03-27 | Author:West, Levi [West, Levi]
Ensure the Latest Firmware is Installed Why it’s important: Firmware is software that is embedded on your hardware to help it run. Many Internet users do not update the firmware ...
( Category:
Respiratory
April 3,2020 )
epub |eng | | Author:Jacob G. Oakley
Non-cyber Threat to Mission In a non-cyber sense, the greatest threat to successful jamming of another receiver by an emitting payload is that once jamming begins, the target can take ...
( Category:
Astronautics & Space Flight
April 1,2020 )
epub |eng | | Author:Michael Schwartz & Maciej Machulak
Easy JavaScript Client This JavaScript client is one of the easiest ways to test OpenID Connect, although it’s not the most secure (remember Figure 5-1). The client we will use ...
( Category:
LDAP
March 31,2020 )
Categories
Cryptography | Encryption |
Hacking | Network Security |
Privacy & Online Safety | Security Certifications |
Viruses |
Popular ebooks
Practical Threat Detection Engineering by Megan Roddie & Jason Deyalsingh & Gary J. Katz(6709)Effective Threat Investigation for SOC Analysts by Yahia Mostafa;(6554)
Practical Memory Forensics by Svetlana Ostrovskaya & Oleg Skulkin(6273)
Machine Learning Security Principles by John Paul Mueller(6244)
Attacking and Exploiting Modern Web Applications by Simone Onofri & Donato Onofri(5914)
Operationalizing Threat Intelligence by Kyle Wilhoit & Joseph Opacki(5874)
Solidity Programming Essentials by Ritesh Modi(4023)
Microsoft 365 Security, Compliance, and Identity Administration by Peter Rising(3664)
Operationalizing Threat Intelligence by Joseph Opacki Kyle Wilhoit(3396)
Future Crimes by Marc Goodman(3348)
Mastering Python for Networking and Security by José Manuel Ortega(3346)
Mastering Azure Security by Mustafa Toroman and Tom Janetscheck(3335)
Blockchain Basics by Daniel Drescher(3301)
Learn Computer Forensics - Second Edition by William Oettinger(3159)
Mobile App Reverse Engineering by Abhinav Mishra(2882)
Incident Response with Threat Intelligence by Roberto Martínez(2880)
Mastering Bitcoin: Programming the Open Blockchain by Andreas M. Antonopoulos(2870)
The Code Book by Simon Singh(2827)
From CIA to APT: An Introduction to Cyber Security by Edward G. Amoroso & Matthew E. Amoroso(2781)
Building a Next-Gen SOC with IBM QRadar: Accelerate your security operations and detect cyber threats effectively by Ashish M Kothekar(2729)
