Security & Encryption
epub, mobi, azw3 |eng | 2012-10-15 | Author:Nigel Chapman & Jenny Chapman [Chapman, Nigel]
Key Points When access to a Web application is controlled by data in a session, a hacker may attempt to break in by forging a valid session, or by hijacking ...
( Category:
Web Development & Design
April 17,2018 )
epub |eng | 2010-04-17 | Author:Richard A. Clarke & Robert K. Knake
1. THE GREATEST TRICK The first reason you hear is that many cyber attacks that have happened have left behind no marks, no gaping crater like Manhattan’s Ground Zero. When ...
( Category:
Politics & Government
April 17,2018 )
epub |eng | 2017-03-31 | Author:Domenic Antonucci [Неизв.]
Risk transfer tools such as insurance. These should be considered specifically in terms of third-party and supply chain exposure, where appropriate, in order to provide the relevant balance sheet protection. ...
( Category:
Education & Reference
April 16,2018 )
azw3, pdf |eng | 2016-02-23 | Author:David L. Cannon [Cannon, David L.]
Figure 4.43 Comparison of some of the different telephone circuits Packet-Switched Circuits Packet switching evolved to eliminate the need for everyone to set up expensive dedicated lines. The Internet is ...
( Category:
Security & Encryption
April 16,2018 )
azw3 |eng | 2016-06-06 | Author:Jonathan LeBlanc & Tim Messerschmidt [LeBlanc, Jonathan]
sub Required Subject Identifier — must not exceed 255 ASCII characters aud Required The ID Token’s audience — must contain the OAuth client_id exp Required Expiration time iat Required Time ...
( Category:
Computer Science
April 15,2018 )
azw3, mobi, epub, pdf |eng | 2017-06-28 | Author:Michael McPhee [McPhee, Michael]
Sample phishing lure, used to test employees. Every link in here is potentially tainted. Hyperlinks, graphics, anything interactive in the page or the e-mail can be a useful lure, and ...
( Category:
Security & Encryption
April 15,2018 )
epub |eng | | Author:Niklas Büscher & Stefan Katzenbeisser
63. Muchnick, S.S.: Advanced Compiler Design and Implementation. Morgan Kaufmann, San Francisco (1997) 64. Naor, M., Pinkas, B., Sumner, R.: Privacy preserving auctions and mechanism design. In: EC, pp. 129–139 ...
( Category:
Engineering
April 15,2018 )
azw3, pdf |eng | 2017-06-30 | Author:Vijay Kumar Velu [Velu, Vijay Kumar]
( Category:
Internet & Social Media
April 15,2018 )
epub |zho | 2010-10-26 | Author:joseph menn [Menn, Joseph]
To collect the extorted money, the rings went into the forums of CarderPlanet or a similar site aimed at English speakers, Shadowcrew, and advertised for an “executive” to coordinate “drops.” ...
( Category:
True Crime
April 14,2018 )
epub |eng | 2016-12-29 | Author:VanPutte, Michael
Chapter 10. Shadow Boxing Si vis pacem, para bellum “If you wish for peace, prepare for war.” “In the near future many conflicts will not take place on the open ...
( Category:
Security & Encryption
April 14,2018 )
epub |eng | 2016-12-07 | Author:Allan Liska
Summary In this chapter, we covered some of the ways to begin to think about how to protect your end users through education and assessment along with technology. This protection ...
( Category:
Internet & Social Media
April 14,2018 )
epub |eng | | Author:Michael J. Palmiotto
Theme 2: Symbolic Vehicle The second theme that emerged from the interviews highlight the frustration and anger of being stopped for what they say is for stereotyping because of their ...
( Category:
Criminal Law
April 14,2018 )
azw3 |eng | 2017-08-14 | Author:Jeremy Martin
if ($_.Name -icontains "---"){ } else { # If the name contains content, add it to the array Select-Object -unique $results += New-Object PSObject $_.Name } } # Export the ...
( Category:
Internet & Social Media
April 14,2018 )
azw3, epub |eng | 2017-09-05 | Author:Artemis Caro
Chapter 7: Consensus Algorithms: Proof-of-Work vs. Proof-of-Stake A significant part of what drives the real-world implementation of blockchain protocols involves conducting secure transactions, whether they are purely financial transactions as ...
( Category:
Security & Encryption
April 14,2018 )
azw3 |eng | 2017-03-17 | Author:Lawrence Harte [Harte, Lawrence]
Figure 1.17, Digital Watermarking Operation Digital Fingerprint A digital fingerprint is a unique set of characteristics and data that is associated with a particular data file, transmission system or storage ...
( Category:
Engineering
April 14,2018 )
Categories
Cryptography | Encryption |
Hacking | Network Security |
Privacy & Online Safety | Security Certifications |
Viruses |
Popular ebooks
Practical Threat Detection Engineering by Megan Roddie & Jason Deyalsingh & Gary J. Katz(6718)Effective Threat Investigation for SOC Analysts by Yahia Mostafa;(6563)
Practical Memory Forensics by Svetlana Ostrovskaya & Oleg Skulkin(6284)
Machine Learning Security Principles by John Paul Mueller(6252)
Attacking and Exploiting Modern Web Applications by Simone Onofri & Donato Onofri(5927)
Operationalizing Threat Intelligence by Kyle Wilhoit & Joseph Opacki(5885)
Solidity Programming Essentials by Ritesh Modi(4029)
Microsoft 365 Security, Compliance, and Identity Administration by Peter Rising(3669)
Operationalizing Threat Intelligence by Joseph Opacki Kyle Wilhoit(3401)
Future Crimes by Marc Goodman(3349)
Mastering Python for Networking and Security by José Manuel Ortega(3346)
Mastering Azure Security by Mustafa Toroman and Tom Janetscheck(3335)
Blockchain Basics by Daniel Drescher(3303)
Learn Computer Forensics - Second Edition by William Oettinger(3165)
Incident Response with Threat Intelligence by Roberto Martínez(2886)
Mobile App Reverse Engineering by Abhinav Mishra(2884)
Mastering Bitcoin: Programming the Open Blockchain by Andreas M. Antonopoulos(2872)
The Code Book by Simon Singh(2830)
From CIA to APT: An Introduction to Cyber Security by Edward G. Amoroso & Matthew E. Amoroso(2782)
Building a Next-Gen SOC with IBM QRadar: Accelerate your security operations and detect cyber threats effectively by Ashish M Kothekar(2741)
