Security & Encryption
epub |eng | 2017-09-28 | Author:Rafay Baloch [Rafay Baloch]
( Category:
Hacking
June 10,2019 )
epub |eng | 2019-04-05 | Author:Menn, Joseph;
Laird also inspired what many independent security experts consider the best model for researching and exposing government use of the internet for repression: the Citizen Lab, at the University of ...
( Category:
Viruses
June 9,2019 )
epub |eng | 2017-09-10 | Author:Richard Diver & Manuel Singer & Jeff Stokes [Richard Diver]
( Category:
Windows Administration
June 9,2019 )
epub |eng | 2018-11-29 | Author:Shahmeer Amir & Carlos A. Lozano [Shahmeer Amir]
( Category:
Privacy & Online Safety
June 1,2019 )
epub |eng | | Author:Aditya Gupta
Let’s enter testing as the password here and press Enter. As soon as we press Enter, we can see that we have the breakpoint hit in the GDB session as ...
( Category:
Research
May 29,2019 )
epub |eng | | Author:Chet Hosmer
The next step is to store the extracted results in a Python dictionary to produce a baseline. Once the dictionary baseline is created, the resulting dictionary can be stored and ...
( Category:
Security & Encryption
May 29,2019 )
epub |eng | 2019-05-03 | Author:Instafo & Derek Drake [Instafo & Drake, Derek]
( Category:
Privacy & Online Safety
May 29,2019 )
azw3 |eng | 2015-12-03 | Author:Steven M. Bellovin [Bellovin, Steven M.]
10.3 Sandboxes Sandboxing, sometimes known as jailing, is a class of techniques designed to limit the access rights—the effective target environment—of a program. The intent, of course, is to limit ...
( Category:
Hacking
May 28,2019 )
mobi, pdf |eng | 2018-02-12 | Author:Clarence Chio and David Freeman
Automatic Feature Learning Not all data mining or machine learning techniques require manual feature engineering. Unsupervised feature learning and deep learning algorithms can automatically learn feature representations from either labeled ...
( Category:
Data Processing
May 20,2019 )
epub |eng | 2018-02-12 | Author:Clarence Chio & David Freeman
Summary So far in this chapter, we have provided a 10,000-foot view of network security, selecting a few highlights appropriate for the context of using machine learning for security. There ...
( Category:
Data Processing
May 20,2019 )
epub |eng | 2016-04-08 | Author:Jonathan LeBlanc & Tim Messerschmidt
// development error handler // will print stacktrace if (app.get('env') === 'development') { app.use(function(err, req, res) { console.log('error'); res.status(err.status || 500); res.render('error', { message: err.message, error: err }); }); } ...
( Category:
Cybernetics
May 17,2019 )
epub, pdf |eng | 2009-04-17 | Author:Andy Oram
Breakers usually represent the glass as half empty, and are often so pessimistic that you wonder, when listening to some of them, why the Internet hasn’t totally collapsed already and ...
( Category:
Networks
May 12,2019 )
epub |eng | 2019-05-06 | Author:Gary Rivlin
• • • IN MAY 2018, WEINSTEIN took the stage at the local security conference called DefendCon. This was his chance, at the age of forty-eight, to share some of ...
( Category:
Hacking
May 10,2019 )
epub |eng | 2015-02-08 | Author:Swan, Melanie [Swan, Melanie]
Blockchain Genomics 2.0: Industrialized All-Human-Scale Sequencing Solution At one level, there could be blockchain-enabled services where genomic data is sequenced and made available to individuals by private key outside the ...
( Category:
Cryptography
May 10,2019 )
epub |eng | 2019-04-21 | Author:Carl Albing & Paul Troncone [Carl Albing]
( Category:
Testing
May 9,2019 )
Categories
Cryptography | Encryption |
Hacking | Network Security |
Privacy & Online Safety | Security Certifications |
Viruses |
Popular ebooks
Practical Threat Detection Engineering by Megan Roddie & Jason Deyalsingh & Gary J. Katz(6714)Effective Threat Investigation for SOC Analysts by Yahia Mostafa;(6559)
Practical Memory Forensics by Svetlana Ostrovskaya & Oleg Skulkin(6279)
Machine Learning Security Principles by John Paul Mueller(6248)
Attacking and Exploiting Modern Web Applications by Simone Onofri & Donato Onofri(5920)
Operationalizing Threat Intelligence by Kyle Wilhoit & Joseph Opacki(5881)
Solidity Programming Essentials by Ritesh Modi(4025)
Microsoft 365 Security, Compliance, and Identity Administration by Peter Rising(3667)
Operationalizing Threat Intelligence by Joseph Opacki Kyle Wilhoit(3398)
Future Crimes by Marc Goodman(3348)
Mastering Python for Networking and Security by José Manuel Ortega(3346)
Mastering Azure Security by Mustafa Toroman and Tom Janetscheck(3335)
Blockchain Basics by Daniel Drescher(3301)
Learn Computer Forensics - Second Edition by William Oettinger(3162)
Mobile App Reverse Engineering by Abhinav Mishra(2884)
Incident Response with Threat Intelligence by Roberto Martínez(2883)
Mastering Bitcoin: Programming the Open Blockchain by Andreas M. Antonopoulos(2870)
The Code Book by Simon Singh(2828)
From CIA to APT: An Introduction to Cyber Security by Edward G. Amoroso & Matthew E. Amoroso(2782)
Building a Next-Gen SOC with IBM QRadar: Accelerate your security operations and detect cyber threats effectively by Ashish M Kothekar(2733)
