Security & Encryption
epub |eng | 2016-06-24 | Author:Shon Harris
802.11e This standard has provided QoS and support of multimedia traffic in wireless transmissions. Multimedia and other types of time-sensitive applications have a lower tolerance for delays in data transmission. ...
( Category:
Certification
June 24,2018 )
epub |eng | 2018-05-31 | Author:Patrick Acheampong [Acheampong, Patrick]
Data collection, protection and privacy The vision for the IoT is to make our everyday lives easier and boost the efficiency and productivity of businesses and employees. The data collected ...
( Category:
Security & Encryption
June 22,2018 )
epub |eng | 2017-09-07 | Author:Scott J Roberts
What to Exploit? When F3EAD is not properly implemented or is not carried out completely, you likely will find yourself dealing with the same intrusions or types of incidents not ...
( Category:
Computer Science
June 20,2018 )
azw3 |eng | 2018-02-18 | Author:Chronis, Peter [Chronis, Peter]
Porter’s Five Forces To influence buyer behavior, corporate leaders and board members need to take an increasing role in demanding better cybersecurity from their organizations. Corporate leaders must set high ...
( Category:
Security & Encryption
June 20,2018 )
azw3, pdf |eng | 2018-02-22 | Author:Bladen, Brian [Bladen, Brian]
DuckDuckGo It may be the Tor’s default search engine but it is worth mentioning what it does. DuckDuckGo will allow you to search the web without being spied on, taking ...
( Category:
Internet & Social Media
June 19,2018 )
epub |eng | 2018-06-19 | Author:David E. Sanger
CHAPTER VIII THE FUMBLE I cannot forecast to you the action of Russia. It is a riddle wrapped in a mystery inside an enigma; but perhaps there is a key. ...
( Category:
Americas
June 19,2018 )
epub |eng | 2012-06-18 | Author:Caroline Wong
* * * Tip There will always be events that are highly improbable and, therefore, likely to end up at the bottom of the list of priorities. These are sometimes ...
( Category:
Networking & Cloud Computing
June 18,2018 )
epub |eng | 2017-11-27 | Author:Mick Knutson & Robert Winch & Peter Mularien
( Category:
Security & Encryption
June 16,2018 )
mobi, epub |eng | | Author:2014
Based on the type of application being tested, these values should be changed. An active scan can be triggered automatically. Take a look at the following screenshot: Sometimes, we need ...
( Category:
Networking & Cloud Computing
June 16,2018 )
epub |eng | 2002-06-15 | Author:Fred Piper & Sean Murphy
A block cipher in ECB mode Suppose that an unknown block cipher with an unknown key is used to encrypt the message ‘The price is four thousand pounds’. All that ...
( Category:
Security & Encryption
June 15,2018 )
epub |eng | 2018-02-13 | Author:Clarence Chio
Summary So far in this chapter, we have provided a 10,000-foot view of network security, selecting a few highlights appropriate for the context of using machine learning for security. There ...
( Category:
Databases & Big Data
June 13,2018 )
epub |eng | 2018-04-25 | Author:Saryu Nayyar [Nayyar, Saryu]
Perspectives on data lake adoption While all data lakes are theoretically the same in their function, how organizations use them differs widely. How data lakes are planned, organized and set ...
( Category:
Security & Encryption
May 28,2018 )
epub |eng | 2014-05-18 | Author:Merkow, Mark S.,Breithaupt, Jim & Jim Breithaupt
Another type of physical security control involves mechanisms such as fences and gates to control access to a facility. Yet another type of physical security control, technical controls, uses computer ...
( Category:
Security & Encryption
May 18,2018 )
epub, azw3 |eng | 2018-06-19 | Author:Nick Furneaux
Figure 8-12: Hierarchical paths in the recovered text. These are the Hierarchical Deterministic paths that make up an HD wallet. If you keep scrolling through the list, you will eventually ...
( Category:
Security & Encryption
May 15,2018 )
epub |eng | 2018-02-13 | Author:Hamza Megahed [Megahed, Hamza]
Now, let's build the bind syscall: xor rax, rax add rax, 50 xor rsi , rsi inc rsi syscall We'll move on to next function, which is accept: clientfd = ...
( Category:
Programming
May 11,2018 )
Categories
Cryptography | Encryption |
Hacking | Network Security |
Privacy & Online Safety | Security Certifications |
Viruses |
Popular ebooks
Practical Threat Detection Engineering by Megan Roddie & Jason Deyalsingh & Gary J. Katz(6722)Effective Threat Investigation for SOC Analysts by Yahia Mostafa;(6566)
Practical Memory Forensics by Svetlana Ostrovskaya & Oleg Skulkin(6287)
Machine Learning Security Principles by John Paul Mueller(6257)
Attacking and Exploiting Modern Web Applications by Simone Onofri & Donato Onofri(5929)
Operationalizing Threat Intelligence by Kyle Wilhoit & Joseph Opacki(5889)
Solidity Programming Essentials by Ritesh Modi(4031)
Microsoft 365 Security, Compliance, and Identity Administration by Peter Rising(3671)
Operationalizing Threat Intelligence by Joseph Opacki Kyle Wilhoit(3403)
Future Crimes by Marc Goodman(3349)
Mastering Python for Networking and Security by José Manuel Ortega(3346)
Mastering Azure Security by Mustafa Toroman and Tom Janetscheck(3335)
Blockchain Basics by Daniel Drescher(3303)
Learn Computer Forensics - Second Edition by William Oettinger(3167)
Incident Response with Threat Intelligence by Roberto Martínez(2889)
Mobile App Reverse Engineering by Abhinav Mishra(2884)
Mastering Bitcoin: Programming the Open Blockchain by Andreas M. Antonopoulos(2872)
The Code Book by Simon Singh(2830)
From CIA to APT: An Introduction to Cyber Security by Edward G. Amoroso & Matthew E. Amoroso(2782)
Building a Next-Gen SOC with IBM QRadar: Accelerate your security operations and detect cyber threats effectively by Ashish M Kothekar(2746)
