Security & Encryption
epub, mobi |eng | | Author:Fred Kaplan
* * * The pivotal moment in this shift occurred at NSA headquarters on Friday, October 24, 2008. At two-thirty that afternoon, a team of SIGINT analysts noticed something strange ...
( Category:
Viruses
March 14,2016 )
mobi |eng | 2015-12-07 | Author:Kevin Donaldson
Linux Linux is an open-source operating system that is not as common as Windows or Mac. However, it is gaining popularity nowadays because of its fuss-free interface and open-source concept. ...
( Category:
Viruses
March 8,2016 )
azw3 |eng | 2015-12-07 | Author:Donaldson, Kevin [Donaldson, Kevin]
Linux Linux is an open-source operating system that is not as common as Windows or Mac. However, it is gaining popularity nowadays because of its fuss-free interface and open-source concept. ...
( Category:
Viruses
March 8,2016 )
epub |eng | 2015-12-21 | Author:Neil W. Carson [Carson, Neil W.]
War Crimes – That is exactly what it provides and users post videos they have of War Crimes they have committed. Many languages are used on its forums and there ...
( Category:
Privacy & Online Safety
March 8,2016 )
epub, mobi |eng | 2013-03-04 | Author:Misra, Anmol [DUBEY, ABHISHEK]
5.4 Miscellaneous Issues 5.4.1 Data Storage on Internal, External, and Cloud There are various locations available for Android application data storage, including files, databases, preferences, and cache. Data can be ...
( Category:
Software Development
March 5,2016 )
azw3 |eng | 2016-02-08 | Author:
Tip #7: Disable Java, JavaScript and Flash Remember this: Tor is not able to protect your data with active content like Flash, JavaScript, QuickTime, etc. The reason is these applications ...
( Category:
Privacy & Online Safety
March 3,2016 )
epub |eng | 2014-06-17 | Author:Matt Walker
What is the attacker attempting to perform? A. A SQL injection attack against the blog’s underlying database B. A cross-site scripting attack C. A buffer overflow DoS attack D. A ...
( Category:
Security
February 15,2016 )
epub |eng | 2014-05-02 | Author:Dawn Dunkerley
Travel Advisory Network-based intrusion systems also are not effective in monitoring encrypted communications, such as over a virtual private network (VPN). When an intrusion is detected, the system works in ...
( Category:
Encryption
February 4,2016 )
epub, azw3 |eng | 2015-09-29 | Author:Duffy, Christopher
We did not get a hit for smith, but perhaps others will confirm during this attack. Before we write our script, you need to know the different error or control ...
( Category:
Network Security
January 31,2016 )
epub |eng | 2015-12-15 | Author:Beaver, Kevin
( Category:
LAN
January 14,2016 )
azw3 |eng | 2015-12-15 | Author:Beaver, Kevin [Beaver, Kevin]
Scanning your local airwaves Monitor the airwaves around your building to see what authorized and unauthorized APs you can find. You’re looking for the SSID, which is your wireless network ...
( Category:
LAN
January 14,2016 )
azw3, epub |eng | 2015-12-12 | Author:Witt, Ron [Witt, Ron]
A good description of these features is provided by Microsoft’s https://technet.microsoft.com/en-us/ link below. https://technet.microsoft.com/en-us/library/dn986865%28v=vs.85%29.aspx To Learn more about Windows 10 and your online services Using your device Communicating with people ...
( Category:
Windows Desktop
January 4,2016 )
azw3 |eng | 2015-11-16 | Author:Mosco, Vincent [Mosco, Vincent]
Privacy and Security Privacy and security concerns are coming together to form another question mark over the IT industry, including cloud computing and big data. In order to properly assess ...
( Category:
Communication Policy
January 3,2016 )
epub |eng | 2015-07-26 | Author:Baesens, Bart & Van Vlasselaer, Veronique & Verbeke, Wouter
Figure 4.37 Calculating Predictions Using a Cut-Off A confusion matrix can now be calculated as shown in Table 4.5. Table 4.5 Confusion Matrix Actual Status Positive (Fraud) Negative (No Fraud) ...
( Category:
Data Mining
December 31,2015 )
azw3 |eng | 2015-07-26 | Author:Baesens, Bart & Van Vlasselaer, Veronique & Verbeke, Wouter [Baesens, Bart]
Figure 4.37 Calculating Predictions Using a Cut-Off A confusion matrix can now be calculated as shown in Table 4.5. Table 4.5 Confusion Matrix Actual Status Positive (Fraud) Negative (No Fraud) ...
( Category:
Data Mining
December 31,2015 )
Categories
Cryptography | Encryption |
Hacking | Network Security |
Privacy & Online Safety | Security Certifications |
Viruses |
Popular ebooks
Practical Threat Detection Engineering by Megan Roddie & Jason Deyalsingh & Gary J. Katz(6741)Effective Threat Investigation for SOC Analysts by Yahia Mostafa;(6581)
Practical Memory Forensics by Svetlana Ostrovskaya & Oleg Skulkin(6302)
Machine Learning Security Principles by John Paul Mueller(6272)
Attacking and Exploiting Modern Web Applications by Simone Onofri & Donato Onofri(5948)
Operationalizing Threat Intelligence by Kyle Wilhoit & Joseph Opacki(5908)
Solidity Programming Essentials by Ritesh Modi(4044)
Microsoft 365 Security, Compliance, and Identity Administration by Peter Rising(3683)
Operationalizing Threat Intelligence by Joseph Opacki Kyle Wilhoit(3413)
Future Crimes by Marc Goodman(3351)
Mastering Python for Networking and Security by José Manuel Ortega(3349)
Mastering Azure Security by Mustafa Toroman and Tom Janetscheck(3337)
Blockchain Basics by Daniel Drescher(3305)
Learn Computer Forensics - Second Edition by William Oettinger(3173)
Incident Response with Threat Intelligence by Roberto Martínez(2899)
Mobile App Reverse Engineering by Abhinav Mishra(2887)
Mastering Bitcoin: Programming the Open Blockchain by Andreas M. Antonopoulos(2873)
The Code Book by Simon Singh(2832)
From CIA to APT: An Introduction to Cyber Security by Edward G. Amoroso & Matthew E. Amoroso(2783)
Building a Next-Gen SOC with IBM QRadar: Accelerate your security operations and detect cyber threats effectively by Ashish M Kothekar(2763)
