Security & Encryption
epub, azw3 |eng | 2015-09-24 | Author:Hayden, Lance
* * * Behavioral Models for Security Culture Transformation Information security today is undergoing a series of experiments in behavioral engineering and cultural transformation, although we do not tend to ...
( Category:
Information Theory
March 22,2020 )
epub |eng | | Author:Maurizio Martellini & Andrea Malizia
4 Bio-risk Management Culture The BRMC design is based on the organizational-culture model developed by Professor Edgar Schein from the Massachusetts Institute of Technology (MIT). Schein proposes that culture in ...
( Category:
Security & Encryption
March 22,2020 )
azw3 |eng | 2006-11-20 | Author:Andrew Cumming & Gordon Russell [Cumming, Andrew]
Figure 8-2. Creating a view with Query Builder in Access Tip In the Access Query Builder, you can create a GROUP BY query using the Totals toggle (this button is ...
( Category:
Hacking
March 22,2020 )
epub |eng | 2018-11-12 | Author:Mark Collier, David Endler
Manipulating or flooding ARP entries on your network can cause a serious denial of service on the local segment you’re testing, rendering the network unusable for a short time, or ...
( Category:
Hacking
March 22,2020 )
epub |eng | 2011-01-04 | Author:Joshua Davies
So what are these P_MD5 and P_SHA1 blocks that are XORed together to produce the final result? Well, if you recall from Chapter 4, MD5 produces 16 bytes of output, ...
( Category:
Encryption
March 21,2020 )
epub |eng | 2016-02-11 | Author:Solis Tech
XIV.C. – Is Reverse Engineering Similar to Hacking? Since it is the method for the extraction of information on a circuit that can’t be retrieved ordinarily, reverse engineering is argued ...
( Category:
Software Development
March 21,2020 )
epub |eng | 2019-11-26 | Author:Roger A. Grimes
Quantum Marketing Many of the best technological inventions of our time were largely driven and funded by advertising and marketing. Radio, television, and cable TV were driven by advertising. The ...
( Category:
Cryptography
March 21,2020 )
epub, pdf |deu | 2011-09-05 | Author:Stamp, Mark.; Low, Richard M. [Stamp, Mark.; Low, Richard M.]
4.7 FEAL 4.7.1 FEAL-4 Cipher 4.7.2 FEAL-4 Differential Attack 4.7.3 FEAL-4 Linear Attack 4.7.4 Confusion and Diffusion 4.8 Summary 4.9 Problems Chapter 5 Hash Functions 5.1 Introduction 5.2 Birthdays and ...
( Category:
Security & Encryption
March 21,2020 )
epub |eng | 2019-01-30 | Author:Annette Harper
( Category:
LAN
March 21,2020 )
epub |eng | | Author:Carl S. Young
The process of integration adds infinitesimally small pieces of a function dx′ to yield the area under the curve described by that function. If the function is constant in each ...
( Category:
Probability & Statistics
March 21,2020 )
epub |eng | 2020-03-20 | Author:Mike Meyers
CAUTION Restoring a factory recovery partition wipes out all user data and apps, restoring the system to its as-shipped condition. This feature should be used only if there is no ...
( Category:
LAN
March 21,2020 )
epub |eng | 2003-07-15 | Author:Bruce Berkowitz
Chapter 13 AN ELECTRONIC PEARL HARBOR? By now it ought to be clear how much our national security depends on our policies for promoting, regulating, and controlling information technology. We ...
( Category:
Telecommunications & Sensors
March 21,2020 )
epub |eng | | Author:Vasantha Lakshmi
Note Intune on Azure does not showcase malware/alerts as it did in the old version of Intune. Similar to this, our other sources such as alerts from Windows Defender Exploit ...
( Category:
C & C++ Windows Programming
March 21,2020 )
epub |eng | | Author:Kim-Kwang Raymond Choo & Ali Dehghantanha
3. F.N. Dezfouli, A. Dehghantanha, R. Mahmod, N.F.B.M. Sani, S.B. Shamsuddin, F. Daryabar, A survey on malware analysis and detection techniques. Int. J. Adv. Comput. Technol. 5(14), 42 (2013) 4. ...
( Category:
Intelligence & Semantics
March 21,2020 )
epub |eng | | Author:Jeni Rogers
Don’t Get Reeled In by Phishers Phishing is a tactic that scammers use to try to gain personal details about you or get access to your private accounts and data. ...
( Category:
Hacking
March 20,2020 )
Categories
Cryptography | Encryption |
Hacking | Network Security |
Privacy & Online Safety | Security Certifications |
Viruses |
Popular ebooks
Practical Threat Detection Engineering by Megan Roddie & Jason Deyalsingh & Gary J. Katz(6714)Effective Threat Investigation for SOC Analysts by Yahia Mostafa;(6559)
Practical Memory Forensics by Svetlana Ostrovskaya & Oleg Skulkin(6279)
Machine Learning Security Principles by John Paul Mueller(6248)
Attacking and Exploiting Modern Web Applications by Simone Onofri & Donato Onofri(5920)
Operationalizing Threat Intelligence by Kyle Wilhoit & Joseph Opacki(5881)
Solidity Programming Essentials by Ritesh Modi(4025)
Microsoft 365 Security, Compliance, and Identity Administration by Peter Rising(3667)
Operationalizing Threat Intelligence by Joseph Opacki Kyle Wilhoit(3398)
Future Crimes by Marc Goodman(3348)
Mastering Python for Networking and Security by José Manuel Ortega(3346)
Mastering Azure Security by Mustafa Toroman and Tom Janetscheck(3335)
Blockchain Basics by Daniel Drescher(3301)
Learn Computer Forensics - Second Edition by William Oettinger(3162)
Mobile App Reverse Engineering by Abhinav Mishra(2884)
Incident Response with Threat Intelligence by Roberto Martínez(2883)
Mastering Bitcoin: Programming the Open Blockchain by Andreas M. Antonopoulos(2870)
The Code Book by Simon Singh(2828)
From CIA to APT: An Introduction to Cyber Security by Edward G. Amoroso & Matthew E. Amoroso(2782)
Building a Next-Gen SOC with IBM QRadar: Accelerate your security operations and detect cyber threats effectively by Ashish M Kothekar(2733)
