Security & Encryption
azw3, epub |eng | 2017-06-30 | Author:Richard Anderson
( Category:
Certification
April 3,2018 )
azw3, epub |eng | 2016-12-09 | Author:Andre Spencer
If we were able to see everything the NSA knows about each one of us, we would probably get very nervous. The NSA knows that ultimate power lays in the ...
( Category:
Security & Encryption
April 3,2018 )
epub, pdf |eng | 2012-04-02 | Author:Varsalone, Jesse, McFadden, Matthew [Varsalone, Jesse and McFadden, Matthew]
Commands to Perform a Command Line Traceroute Windows terminal: tracert www.yahoo.com Linux: traceroute –T for TCP SYN probes; traceroute –I for TCP ICMP probes To perform a TCP traceroute: traceroute ...
( Category:
Internet & Social Media
April 2,2018 )
azw3, epub |eng | 2017-06-30 | Author:Richard Anderson
( Category:
Certification
April 2,2018 )
azw3 |eng | 2017-10-21 | Author:Robert Keane [Keane, Robert]
Random forests The next kind of algorithm that you can use is known as a random forest. These are popular algorithms to use in the world of data science so ...
( Category:
Mathematics
April 1,2018 )
azw3 |eng | 2017-05-12 | Author:Mark Foulsham & Brian Hitchen [Foulsham, Mark]
(82) In order to demonstrate compliance with this Regulation, the controller or processor should maintain records of processing activities under its responsibility. Each controller and processor should be obliged to ...
( Category:
Management & Leadership
April 1,2018 )
azw3 |eng | 2017-09-16 | Author:Hacking Studios [Studios, Hacking]
As you can see this particular method of hacking is going to be pretty simple and easy to work with. All that is needed is to make sure that the ...
( Category:
Internet & Social Media
April 1,2018 )
azw3 |eng | 2017-07-15 | Author:John R. Hines
Default problem #1: Windows 10 doesn't create a standard user-equivalent identity for you. Windows 10 automatically creates you an admin-equivalent identity. That's good. However, if a bad guy discovers your ...
( Category:
Security & Encryption
April 1,2018 )
epub |eng | 2013-11-21 | Author:Ertem Osmanoglu
Authentication Implementation Approaches Authentication infrastructure is made complex by the need to cover multiple locations; a variety of customer and employee devices; network, email, database, application, and Web components; and ...
( Category:
Networking & Cloud Computing
April 1,2018 )
epub, mobi |eng | 2013-08-22 | Author:Laura P. Taylor
A Functional Baseline describes the architecture and functions of the system according to orignal specifications. The Functional Baselines contains all of the documentation that describes the systems features, performance, design, ...
( Category:
Constitutional Law
April 1,2018 )
epub, pdf |eng | 2016-09-26 | Author:Chet Hosmer
Fig. 4.8 Select files for export to python. Once the desired files are selected, you choose EnScript from the EnCase menu bar. This will provide a list of available EnScripts. ...
( Category:
Programming Languages
April 1,2018 )
epub, mobi, pdf |eng | 2013-09-02 | Author:John R. Vacca
Title V – Removing Obstacles to Investigating Terrorism Attorney General and Secretary of State are authorized to pay rewards to combat terrorism. It allowed DNA identification of terrorists and other ...
( Category:
Security & Encryption
March 31,2018 )
epub, mobi |eng | 2013-07-10 | Author:James Broad
Dissecting Security Controls Before beginning any of the tasks in this phase it is important to understand the structure of the security controls contained in the security controls catalog. The ...
( Category:
Insurance
March 31,2018 )
epub |eng | 2009-07-23 | Author:Nagra, Jasvir & Collberg, Christian [Nagra, Jasvir]
At the end of mutation round 3, upper memory gets xored with lower memory, and you pick C4 to contain P3 in cleartext: At runtime, after executing the code in ...
( Category:
Security & Encryption
March 31,2018 )
azw3, mobi, epub |eng | 2017-03-24 | Author:Mr Kotiyana
( Category:
Job Hunting & Careers
March 31,2018 )
Categories
Cryptography | Encryption |
Hacking | Network Security |
Privacy & Online Safety | Security Certifications |
Viruses |
Popular ebooks
Practical Threat Detection Engineering by Megan Roddie & Jason Deyalsingh & Gary J. Katz(6722)Effective Threat Investigation for SOC Analysts by Yahia Mostafa;(6566)
Practical Memory Forensics by Svetlana Ostrovskaya & Oleg Skulkin(6287)
Machine Learning Security Principles by John Paul Mueller(6257)
Attacking and Exploiting Modern Web Applications by Simone Onofri & Donato Onofri(5929)
Operationalizing Threat Intelligence by Kyle Wilhoit & Joseph Opacki(5889)
Solidity Programming Essentials by Ritesh Modi(4031)
Microsoft 365 Security, Compliance, and Identity Administration by Peter Rising(3671)
Operationalizing Threat Intelligence by Joseph Opacki Kyle Wilhoit(3403)
Future Crimes by Marc Goodman(3349)
Mastering Python for Networking and Security by José Manuel Ortega(3346)
Mastering Azure Security by Mustafa Toroman and Tom Janetscheck(3335)
Blockchain Basics by Daniel Drescher(3303)
Learn Computer Forensics - Second Edition by William Oettinger(3167)
Incident Response with Threat Intelligence by Roberto Martínez(2889)
Mobile App Reverse Engineering by Abhinav Mishra(2884)
Mastering Bitcoin: Programming the Open Blockchain by Andreas M. Antonopoulos(2872)
The Code Book by Simon Singh(2830)
From CIA to APT: An Introduction to Cyber Security by Edward G. Amoroso & Matthew E. Amoroso(2782)
Building a Next-Gen SOC with IBM QRadar: Accelerate your security operations and detect cyber threats effectively by Ashish M Kothekar(2746)
