Security & Encryption
epub |eng | | Author:Niaz Chowdhury

11.4.2 Smart Property Smart property is a type of service powered by the smart contract features of blockchain technology. It has the potential to revolutionise the traditional lending system. For ...
( Category: Encryption October 7,2019 )
epub |eng | 2019-05-20 | Author:Imran Bashir

( Category: Cryptography October 3,2019 )
epub |eng | 2019-07-24 | Author:Marcus J. Carey & Jennifer Jin

Frantic running to a different location. We ended up cloning a badge from someone leaving the data center and then getting access to the data center, but we got so ...
( Category: Cryptography September 30,2019 )
epub |eng | 2019-02-15 | Author:Brenn Hill

( Category: Encryption September 30,2019 )
epub |eng | 2017-04-10 | Author:Amanda Berlin & Lee Brotherston [Amanda Berlin]

( Category: Networks September 24,2019 )
epub, mobi |eng | 2018-11-20 | Author:Rajneesh Gupta

You should see that the holder has indeed been changed by querying for key 1 again. Now, the holder attribute has been changed from Miriam to Alex: Finishing up: Remove ...
( Category: Hacking September 16,2019 )
epub |eng | 2019-02-27 | Author:Riyaz Ahemed Walikar & Dhruv Shah & Carlos A. Lozano [Riyaz Ahemed Walikar]

( Category: Network Security September 13,2019 )
epub |eng | | Author:Michael Erbschloe

(c) Definitions.—In this section: (1) PUBLISH.—The term publish means to circulate, deliver, distribute, disseminate, transmit, or otherwise make available to another person. (2) CRIME OF VIOLENCE.—The term crime of violence ...
( Category: Hacking September 13,2019 )
epub |eng | 2018-04-30 | Author:Erdal Ozkaya [Ozkaya, Erdal]

( Category: Testing September 5,2019 )
epub |eng | 2015-07-14 | Author:Ben Spivey & Joey Echeverria

Tip Using WITH GRANT OPTION is a great way to ease the administration burden on a global SQL administrator. A common example is to create a Hive database for a ...
( Category: Data Processing August 31,2019 )
epub |eng | 2019-08-26 | Author:Frank Abagnale

Rootkits: This is a collection of malicious and clandestine computer software that gives unauthorized users or criminals access to a computer and areas of its software system. It’s often installed ...
( Category: Retirement Planning August 28,2019 )
epub |eng | 2019-06-25 | Author:Daniel W. Dieterle [Dieterle, Daniel W.]

All instructions on how to use Pi-Tail for different connection techniques are covered in the Pi-Tail How To: https://github.com/Re4son/RPi-Tweaks/blob/master/pi-tail/Pi-Tail.HOWTO Additional Tips here: https://github.com/Re4son/RPi-Tweaks/blob/master/pi-tail/Pi-Tail.README Follow the Pi-Tail instructions carefully, as there ...
( Category: Network Security August 24,2019 )
azw3 |eng | 2019-06-30 | Author:Dieterle, Daniel [Dieterle, Daniel]

All instructions on how to use Pi-Tail for different connection techniques are covered in the Pi-Tail How To: https://github.com/Re4son/RPi-Tweaks/blob/master/pi-tail/Pi-Tail.HOWTO Additional Tips here: https://github.com/Re4son/RPi-Tweaks/blob/master/pi-tail/Pi-Tail.README Follow the Pi-Tail instructions carefully, as there ...
( Category: Network Security August 24,2019 )
epub |eng | 2019-07-22 | Author:Marcus J. Carey & Jennifer Jin

What qualities do you believe all highly successful cybersecurity professionals share? Belief in the fact that security keeps things running and more performant. If you yourself believe that security makes ...
( Category: Hacking August 24,2019 )
epub |eng | 2019-07-16 | Author:Marcus J. Carey & Jennifer Jin

What qualities do you believe all highly successful cybersecurity professionals share? Belief in the fact that security keeps things running and more performant. If you yourself believe that security makes ...
( Category: Hacking August 23,2019 )