Security & Encryption
epub |eng | 2019-03-22 | Author:Nitin Gaur
Participants are agents Our examination of participant types shows us that they all have one thing in common—they have a significant degrees of agency—they actively do things. Although systems and ...
( Category:
Cryptography
November 29,2019 )
epub, pdf |eng | 2019-03-22 | Author:Harish Garg
Now lets get some information about this block. For example, the block fee, block size, and block transactions can be obtained by using fee, size, and transactions properties respectively on ...
( Category:
Encryption
November 29,2019 )
epub |eng | 2018-08-10 | Author:Barbosa de Azevedo, Fernando Uilherme [Barbosa de Azevedo, Fernando Uilherme]
Chapter 15: Ransomware Ransomware, sometimes called crypto viral extortion, is a form of malicious software that prevents users from accessing their personal files, usually through encryption. Hackers require that a ...
( Category:
Hacking
November 17,2019 )
epub |eng | 2019-04-29 | Author:Benjamin Caudill & Karl Gilbert [Benjamin Caudill]
( Category:
LAN
November 12,2019 )
epub |eng | 2019-11-04 | Author:Andy Greenberg;
* * * ■ By the end of 2017, theories of how the Shadow Brokers had pulled off their shocking theft of NSA secrets would begin to come to light, ...
( Category:
Russian & Former Soviet Union
October 31,2019 )
epub |eng | 2018-08-22 | Author:Julien Vehent [Julien Vehent]
( Category:
Windows Administration
October 21,2019 )
epub |eng | 2019-10-18 | Author:Jason Andress
Open Source Intelligence Open source intelligence (OSINT) is information collected from publicly available sources, such as job postings and public records. This publicly available data can reveal an enormous amount ...
( Category:
Network Security
October 19,2019 )
epub |eng | 2018-11-12 | Author:Wolf Halton
In the preceding screenshot, we can see that we have captured the Administrator login from the \\WIN10-01 workstation. This was captured when the user logged on to the domain from ...
( Category:
Network Security
October 19,2019 )
epub, pdf |eng | 2019-05-07 | Author:Joseph Steinberg
Other models and many variants of the models I list exist as well. While the models may step from easier to secure to harder to secure, they also step from ...
( Category:
Security & Encryption
October 16,2019 )
epub |eng | 2018-12-24 | Author:Mohamed Wali
App Service plans When you create an App Service, such as a Web App for example, you will be asked to specify the App Service plan. An App Service plan ...
( Category:
LAN
October 14,2019 )
epub |eng | 2019-12-02 | Author:Jack J. Domet & Thomas J. Parenty [Jack J. Domet]
( Category:
Information Management
October 14,2019 )
epub |eng | 2019-09-19 | Author:Michael Born
( Category:
Linux & UNIX Administration
October 12,2019 )
epub |eng | | Author:Sudhi R. Sinha & Youngchoon Park
9.Access rights—Provisioning users with elevated privileges beyond the minimum required, such as the use of administrator accounts for routing functions, creates a risk for unintentional and malicious incidents. An example ...
( Category:
Enterprise Applications
October 10,2019 )
epub |eng | 2018-09-12 | Author:Marlow, Keith [Marlow, Keith]
#4 Zombie PII Definition : Keeping PII in a system or service on the basis that it might prove useful in the future. Where on examination the information is either ...
( Category:
Systems Analysis & Design
October 9,2019 )
epub |eng | 2019-07-16 | Author:Marcus J Carey & Jennifer Jin
What qualities do you believe all highly successful cybersecurity professionals share? Belief in the fact that security keeps things running and more performant. If you yourself believe that security makes ...
( Category:
Hacking
October 7,2019 )
Categories
Cryptography | Encryption |
Hacking | Network Security |
Privacy & Online Safety | Security Certifications |
Viruses |
Popular ebooks
Practical Threat Detection Engineering by Megan Roddie & Jason Deyalsingh & Gary J. Katz(6718)Effective Threat Investigation for SOC Analysts by Yahia Mostafa;(6563)
Practical Memory Forensics by Svetlana Ostrovskaya & Oleg Skulkin(6284)
Machine Learning Security Principles by John Paul Mueller(6252)
Attacking and Exploiting Modern Web Applications by Simone Onofri & Donato Onofri(5927)
Operationalizing Threat Intelligence by Kyle Wilhoit & Joseph Opacki(5885)
Solidity Programming Essentials by Ritesh Modi(4028)
Microsoft 365 Security, Compliance, and Identity Administration by Peter Rising(3669)
Operationalizing Threat Intelligence by Joseph Opacki Kyle Wilhoit(3401)
Future Crimes by Marc Goodman(3349)
Mastering Python for Networking and Security by José Manuel Ortega(3346)
Mastering Azure Security by Mustafa Toroman and Tom Janetscheck(3335)
Blockchain Basics by Daniel Drescher(3303)
Learn Computer Forensics - Second Edition by William Oettinger(3165)
Incident Response with Threat Intelligence by Roberto Martínez(2886)
Mobile App Reverse Engineering by Abhinav Mishra(2884)
Mastering Bitcoin: Programming the Open Blockchain by Andreas M. Antonopoulos(2871)
The Code Book by Simon Singh(2830)
From CIA to APT: An Introduction to Cyber Security by Edward G. Amoroso & Matthew E. Amoroso(2782)
Building a Next-Gen SOC with IBM QRadar: Accelerate your security operations and detect cyber threats effectively by Ashish M Kothekar(2740)
