Security & Encryption
epub |eng | 2016-04-15 | Author:Sean-Philip Oriyano
( Category:
Internet & Social Media
March 30,2018 )
mobi, pdf |eng | 2013-09-02 | Author:John R. Vacca
Delay and Rushing Delay is a natural consequence of implementations of the Internet architecture. Datagrams from a single connection typically transit a path across the Internet in bursts. This happens ...
( Category:
Networking & Cloud Computing
March 29,2018 )
azw3 |eng | 2017-10-05 | Author:Preston Miller & Chapin Bryce [Miller, Preston]
Viewing MSG files Recipe Difficulty: Easy Python Version: 2.7 or 3.5 Operating System: Windows Email messages can come in many different formats. The MSG format is another popular container for ...
( Category:
Networking & Cloud Computing
March 29,2018 )
mobi |eng | 0101-01-01 | Author:Michael Ligh & Steven Adair & Blake Hartstein & Matthew Richard [Ligh, Michael]
( Category:
Security & Encryption
March 27,2018 )
mobi |eng | 0101-01-01 | Author:Johnny Cache & Vincent Liu [Cache, Johnny]
Other than hardware acceleration, the pico-client behaves just like the normal client. The jc-wepcrackd server gets to remain happily unaware that it has hardware-accelerated clients doing its bidding. Using Your ...
( Category:
Security & Encryption
March 27,2018 )
mobi |eng | 0101-01-01 | Author:Aaron LeMasters & Michael Davis & Sean Bodmer [LeMasters, Aaron]
Unless otherwise noted, these tools only detect VMWare and Virtual PC VMs. For a more comprehensive list of detection methodologies for other VMs including Parallels, Bochs, Hydra, and many others, ...
( Category:
Security & Encryption
March 27,2018 )
epub |eng | 2016-12-02 | Author:Chris McNab
PIPELINING Supports batching of SMTP commands without waiting for individual responses for each DSN Delivery status notification support ENHANCEDSTATUSCODES Provides detailed SMTP status codesa 8BITMIME 8-bit data transmission support BINARYMIME ...
( Category:
Networking & Cloud Computing
March 26,2018 )
epub |eng | | Author:Marco Castrillón López, Luis Hernández Encinas, Pedro Martínez Gadea & Mª Eugenia Rosado María
where and . The Weingarten operator A is a -bilinear map and the normal connection is a connection in the normal bundle . Moreover, if are two normal vector fields, ...
( Category:
Computer Science
March 24,2018 )
epub |eng | | Author:Joseph Migga Kizza
6.4.4.3 Effects and Benefits of Telecommuting Whenever there is a change in the environment of workers, there are always some social, psychological, and financial effects on both employee and employer. ...
( Category:
Social Sciences
March 23,2018 )
azw3 |eng | 2005-10-13 | Author:Chris Shiflett [Shiflett, Chris]
Tip Some experts warn against relying on the consistency of User-Agent. The concern is that an HTTP proxy in a cluster can modify User-Agent inconsistently with other proxies in the ...
( Category:
Web Development & Design
March 22,2018 )
epub |eng | 2010-01-26 | Author:Michael J. Arata, Jr. [Michael J. Arata, Jr.]
There’s no such thing as 100-percent security or prevention, so if a company claims 100 percent, don’t sign up with it even if it’s in writing. Read the guarantee closely ...
( Category:
Personal Finance
March 22,2018 )
epub |eng | 2008-10-13 | Author:Linda Volonino & Reynaldo Anzaldua [Volonino, Linda & Anzaldua, Reynaldo]
Hard drive sizes vary depending on their combination of cylinders, heads, and sectors (CHS). Here’s the formula for calculating hard drive size: Hard drive size = number of platters × ...
( Category:
Security & Encryption
March 22,2018 )
epub |eng | | Author:Sushil Jajodia, V.S. Subrahmanian, Vipin Swarup & Cliff Wang
Duplicate Attacks A duplicate attack occurs when the same team uses the same payload to attack a team at different time instances. Duplicate attacks can be attributed to two reasons. ...
( Category:
Networking & Cloud Computing
March 20,2018 )
mobi |eng | 2010-11-05 | Author:Montague, David A. [Montague, David A.]
Building This In-House A merchant can easily implement checks to try and verify the consumer’s address, but a merchant cannot build anything that can yield the same check to the ...
( Category:
Security & Encryption
March 20,2018 )
epub, mobi |eng | 2018-02-06 | Author:Yasha Levine
Down the Rabbit Hole The year was 2014. On a warm and sunny November morning, I woke up, brewed a cup of coffee, and sat down at my desk to ...
( Category:
Politics & Government
March 18,2018 )
Categories
Cryptography | Encryption |
Hacking | Network Security |
Privacy & Online Safety | Security Certifications |
Viruses |
Popular ebooks
Practical Threat Detection Engineering by Megan Roddie & Jason Deyalsingh & Gary J. Katz(6724)Effective Threat Investigation for SOC Analysts by Yahia Mostafa;(6567)
Practical Memory Forensics by Svetlana Ostrovskaya & Oleg Skulkin(6287)
Machine Learning Security Principles by John Paul Mueller(6258)
Attacking and Exploiting Modern Web Applications by Simone Onofri & Donato Onofri(5929)
Operationalizing Threat Intelligence by Kyle Wilhoit & Joseph Opacki(5890)
Solidity Programming Essentials by Ritesh Modi(4032)
Microsoft 365 Security, Compliance, and Identity Administration by Peter Rising(3672)
Operationalizing Threat Intelligence by Joseph Opacki Kyle Wilhoit(3403)
Future Crimes by Marc Goodman(3350)
Mastering Python for Networking and Security by José Manuel Ortega(3346)
Mastering Azure Security by Mustafa Toroman and Tom Janetscheck(3335)
Blockchain Basics by Daniel Drescher(3303)
Learn Computer Forensics - Second Edition by William Oettinger(3167)
Incident Response with Threat Intelligence by Roberto Martínez(2890)
Mobile App Reverse Engineering by Abhinav Mishra(2884)
Mastering Bitcoin: Programming the Open Blockchain by Andreas M. Antonopoulos(2872)
The Code Book by Simon Singh(2830)
From CIA to APT: An Introduction to Cyber Security by Edward G. Amoroso & Matthew E. Amoroso(2782)
Building a Next-Gen SOC with IBM QRadar: Accelerate your security operations and detect cyber threats effectively by Ashish M Kothekar(2746)
