Security & Encryption
epub |eng | 2018-09-04 | Author:Manul Laphroaig
Cool. We can just add a check here. Perhaps something like this? Now just replace our ret instruction with the check. ret in x86 is simply this: where our code ...
( Category:
History & Culture
September 5,2018 )
azw3 |eng | 2018-07-30 | Author:Mitani, Masaaki & Sato, Shinichi & Hinoki, Idero [Mitani, Masaaki]
( Category:
Security & Encryption
September 4,2018 )
azw3, epub |eng | 2018-07-30 | Author:Masaaki Mitani & Shinichi Sato & Idero Hinoki [Mitani, Masaaki]
( Category:
Security & Encryption
September 4,2018 )
epub |eng | | Author:Susan McLean
Last year I moved to high school, and from only having eighteen people in my year to nearly one hundred, it was a change I wasn’t prepared for. Many things ...
( Category:
Security & Encryption
August 31,2018 )
epub, pdf |eng | 2018-08-28 | Author:Regalado, Daniel; Harris, Shon; Harper, Allen; Eagle, Chris; Ness, Jonathan
* * * NOTE It may be helpful to sort the Attach screen by the Name column to quickly find the process. If you need more time to attach, you ...
( Category:
Security & Encryption
August 29,2018 )
epub |eng | 2017-09-04 | Author:Song, Houbing,Fink, Glenn A.,Jeschke, Sabina & Glenn A. Fink & Sabina Jeschke [Неизв.]
10.3.2 A Policy-Based Establishment of Cloud Robot Networks We present an integration of the PEACE framework [10, 13] and ABE to secure cloud robot networks. We first provide an overview ...
( Category:
Security & Encryption
August 25,2018 )
epub, mobi |eng | 2017-08-24 | Author:Brandon Perry
Installing OpenVAS The easiest way to install OpenVAS is to download the prebuilt OpenVAS Demo Virtual Appliance from http://www.openvas.org/. The file you’ll download is an .ova file (open virtualization archive) ...
( Category:
Internet & Social Media
August 25,2018 )
epub |eng | | Author:Heli Tiirmaa-Klaar, Jan Gassen, Elmar Gerhards-Padilla & Peter Martini
2.2 Botnets Botnets consist of a particular kind of malware, the so-called bots or drones. These drones combine malicious functionalities of other malware classes into one general-purpose weapon for cyber ...
( Category:
Networking & Cloud Computing
August 25,2018 )
epub, mobi, pdf |eng | 2018-07-30 | Author:Matt Burrough [Burrough, Matt]
Accessing Queues Azure Storage queues provide a place to line up transactions and process them sequentially as resources become available. Mainly software developers use queues; after all, few people other ...
( Category:
Internet & Social Media
August 24,2018 )
epub |eng | 2015-08-26 | Author:Edward Lucas [Lucas, Edward]
7 The Spy in Your Pocket The mobile phone enables probably the most sophisticated and pervasive attacks on privacy and anonymity yet invented. The benefit is greatest for governments. If ...
( Category:
Security & Encryption
August 23,2018 )
epub |eng | 2017-08-20 | Author:Jonathan Haun [Jonathan Haun]
( Category:
Software
August 21,2018 )
epub |eng | 2018-07-16 | Author:Ric Messier [Messier, Ric]
( Category:
Internet & Social Media
August 11,2018 )
epub |eng | 2018-02-26 | Author:Chiheb Chebbi [Chebbi, Chiheb]
( Category:
Operating Systems
August 11,2018 )
epub |eng | 2015-08-07 | Author:Bruce Schneier [Schneier, Bruce]
16 Social Norms and the Big Data Trade-off In the preceding three chapters, I outlined a lot of changes that need to happen: changes in government, corporate, and individual behavior. ...
( Category:
Politics & Government
August 8,2018 )
epub, pdf |eng | 2016-07-12 | Author:Siraj Raval
'ipfs init' This will take a few seconds; it’s adding bootstrapped (hardcoded) peers to your configuration and giving your node an identity key-pair to identify as a peer to the ...
( Category:
Security & Encryption
August 7,2018 )
Categories
Cryptography | Encryption |
Hacking | Network Security |
Privacy & Online Safety | Security Certifications |
Viruses |
Popular ebooks
Practical Threat Detection Engineering by Megan Roddie & Jason Deyalsingh & Gary J. Katz(6724)Effective Threat Investigation for SOC Analysts by Yahia Mostafa;(6567)
Practical Memory Forensics by Svetlana Ostrovskaya & Oleg Skulkin(6287)
Machine Learning Security Principles by John Paul Mueller(6258)
Attacking and Exploiting Modern Web Applications by Simone Onofri & Donato Onofri(5929)
Operationalizing Threat Intelligence by Kyle Wilhoit & Joseph Opacki(5890)
Solidity Programming Essentials by Ritesh Modi(4032)
Microsoft 365 Security, Compliance, and Identity Administration by Peter Rising(3672)
Operationalizing Threat Intelligence by Joseph Opacki Kyle Wilhoit(3403)
Future Crimes by Marc Goodman(3350)
Mastering Python for Networking and Security by José Manuel Ortega(3346)
Mastering Azure Security by Mustafa Toroman and Tom Janetscheck(3335)
Blockchain Basics by Daniel Drescher(3303)
Learn Computer Forensics - Second Edition by William Oettinger(3167)
Incident Response with Threat Intelligence by Roberto Martínez(2890)
Mobile App Reverse Engineering by Abhinav Mishra(2884)
Mastering Bitcoin: Programming the Open Blockchain by Andreas M. Antonopoulos(2872)
The Code Book by Simon Singh(2830)
From CIA to APT: An Introduction to Cyber Security by Edward G. Amoroso & Matthew E. Amoroso(2782)
Building a Next-Gen SOC with IBM QRadar: Accelerate your security operations and detect cyber threats effectively by Ashish M Kothekar(2746)
