Security & Encryption
epub, mobi |eng | | Author:Fred Kaplan

* * * The pivotal moment in this shift occurred at NSA headquarters on Friday, October 24, 2008. At two-thirty that afternoon, a team of SIGINT analysts noticed something strange ...
( Category: Viruses March 14,2016 )
mobi |eng | 2015-12-07 | Author:Kevin Donaldson

Linux Linux is an open-source operating system that is not as common as Windows or Mac. However, it is gaining popularity nowadays because of its fuss-free interface and open-source concept. ...
( Category: Viruses March 8,2016 )
azw3 |eng | 2015-12-07 | Author:Donaldson, Kevin [Donaldson, Kevin]

Linux Linux is an open-source operating system that is not as common as Windows or Mac. However, it is gaining popularity nowadays because of its fuss-free interface and open-source concept. ...
( Category: Viruses March 8,2016 )
epub |eng | 2015-12-21 | Author:Neil W. Carson [Carson, Neil W.]

War Crimes – That is exactly what it provides and users post videos they have of War Crimes they have committed. Many languages are used on its forums and there ...
( Category: Privacy & Online Safety March 8,2016 )
epub, mobi |eng | 2013-03-04 | Author:Misra, Anmol [DUBEY, ABHISHEK]

5.4 Miscellaneous Issues 5.4.1 Data Storage on Internal, External, and Cloud There are various locations available for Android application data storage, including files, databases, preferences, and cache. Data can be ...
( Category: Software Development March 5,2016 )
azw3 |eng | 2016-02-08 | Author:

Tip #7: Disable Java, JavaScript and Flash Remember this: Tor is not able to protect your data with active content like Flash, JavaScript, QuickTime, etc. The reason is these applications ...
( Category: Privacy & Online Safety March 3,2016 )
epub |eng | 2014-06-17 | Author:Matt Walker

What is the attacker attempting to perform? A. A SQL injection attack against the blog’s underlying database B. A cross-site scripting attack C. A buffer overflow DoS attack D. A ...
( Category: Security February 15,2016 )
epub |eng | 2014-05-02 | Author:Dawn Dunkerley

Travel Advisory Network-based intrusion systems also are not effective in monitoring encrypted communications, such as over a virtual private network (VPN). When an intrusion is detected, the system works in ...
( Category: Encryption February 4,2016 )
epub, azw3 |eng | 2015-09-29 | Author:Duffy, Christopher

We did not get a hit for smith, but perhaps others will confirm during this attack. Before we write our script, you need to know the different error or control ...
( Category: Network Security January 31,2016 )
epub |eng | 2015-12-15 | Author:Beaver, Kevin

( Category: LAN January 14,2016 )
azw3 |eng | 2015-12-15 | Author:Beaver, Kevin [Beaver, Kevin]

Scanning your local airwaves Monitor the airwaves around your building to see what authorized and unauthorized APs you can find. You’re looking for the SSID, which is your wireless network ...
( Category: LAN January 14,2016 )
azw3, epub |eng | 2015-12-12 | Author:Witt, Ron [Witt, Ron]

A good description of these features is provided by Microsoft’s https://technet.microsoft.com/en-us/ link below. https://technet.microsoft.com/en-us/library/dn986865%28v=vs.85%29.aspx To Learn more about Windows 10 and your online services Using your device Communicating with people ...
( Category: Windows Desktop January 4,2016 )
azw3 |eng | 2015-11-16 | Author:Mosco, Vincent [Mosco, Vincent]

Privacy and Security Privacy and security concerns are coming together to form another question mark over the IT industry, including cloud computing and big data. In order to properly assess ...
( Category: Communication Policy January 3,2016 )
epub |eng | 2015-07-26 | Author:Baesens, Bart & Van Vlasselaer, Veronique & Verbeke, Wouter

Figure 4.37 Calculating Predictions Using a Cut-Off A confusion matrix can now be calculated as shown in Table 4.5. Table 4.5 Confusion Matrix Actual Status Positive (Fraud) Negative (No Fraud) ...
( Category: Data Mining December 31,2015 )
azw3 |eng | 2015-07-26 | Author:Baesens, Bart & Van Vlasselaer, Veronique & Verbeke, Wouter [Baesens, Bart]

Figure 4.37 Calculating Predictions Using a Cut-Off A confusion matrix can now be calculated as shown in Table 4.5. Table 4.5 Confusion Matrix Actual Status Positive (Fraud) Negative (No Fraud) ...
( Category: Data Mining December 31,2015 )