Security & Encryption
epub |eng | 2023-10-03 | Author:Dr. Ahmad MK Nasser
10.4.1 Design [WP-10-01] Cybersecurity specifications [WP-10-02] Cybersecurity requirements for post-development [WP-10-03] Documentation of the modeling, design, or programming languages and coding guidelines [WP-10-04] Verification report for the cybersecurity specifications [WP-10-05] ...
( Category:
Viruses
October 27,2023 )
pdf | | 2023-07-25 | Author:Unknown
( Category:
Viruses & Malware
October 7,2023 )
epub |eng | 2022-10-15 | Author:Bhushan Trivedi & Savita Gandhi & Dhiren Pandit [Trivedi, Bhushan & Gandhi, Savita & Pandit, Dhiren]
12.3 How it works The idea of asymmetric key encryption is quite simple. We assume two keys, PrKey and a PuKey, for each user. The users communicate with each other ...
( Category:
Cryptography
October 1,2023 )
pdf | | 2023-09-14 | Author:Sean D. Mack
( Category:
Privacy & Online Safety
September 30,2023 )
epub |eng | 2023-07-12 | Author:Elonka Dunin & Klaus Schmeh [Dunin, Elonka & Schmeh, Klaus]
( Category:
Cryptography
September 26,2023 )
epub, pdf |eng | 2023-08-02 | Author:Joshua Kuo & Ross Gibson [Kuo, Joshua & Gibson, Ross]
A Brief Overview of Recursive Resolvers and Delegation To better understand how malicious actors exploit recursive resolvers in cache poisoning attacks, itâs helpful to know a few basics of a ...
( Category:
Viruses & Malware
September 15,2023 )
pdf |en | | Author: Michael Chesbro
( Category:
Online Safety & Piracy
September 9,2023 )
pdf | | 2023-08-01 | Author:Yahia, Mostafa;
( Category:
Viruses
August 25,2023 )
epub |eng | | Author:Sascha Block
4.4.8 Infrastructure Teams Roles Teamlead, Infrastructure Engineer Tasks These teams provide established infrastructure services within the company. The differentiation between an infrastructure team and a DevOps team is that no ...
( Category:
Cryptography
August 19,2023 )
pdf | | 2011-02-22 | Author:unknow
( Category:
Cryptography
August 18,2023 )
pdf |en | | Author: Matt Bishop
( Category:
Networking
August 17,2023 )
epub |eng | 2023-07-28 | Author:Ankush Chowdhary and Prashant Kulkarni
Note The rotation of the CMEK will not impact data availability since the service keeps track of which CMEK version was used to encrypt the data and will use that ...
( Category:
Encryption
August 14,2023 )
epub |eng | 2017-02-13 | Author:Kevin D. Mitnick [Mitnick, Kevin D.]
Seriously. You donât want someone to hit the Back button on the browser and see your dating information. Or change it. Also, remember to uncheck the box that says âRemember ...
( Category:
Privacy & Online Safety
July 31,2023 )
epub |eng | 2023-06-27 | Author:Megan Roddie, Jason Deyalsingh, Gary J. Katz
One plainly wrong approach would be to build a detection that looks for exact matches for all the event attributes. The reason this wonât work is that we expect certain ...
( Category:
Viruses
July 24,2023 )
pdf |en | | Author: Ashish M Kothekar
( Category:
Online Safety & Piracy
July 15,2023 )
Categories
Cryptography | Encryption |
Hacking | Network Security |
Privacy & Online Safety | Security Certifications |
Viruses |
Popular ebooks
Practical Threat Detection Engineering by Megan Roddie & Jason Deyalsingh & Gary J. Katz(5486)Effective Threat Investigation for SOC Analysts by Yahia Mostafa;(5358)
Practical Memory Forensics by Svetlana Ostrovskaya & Oleg Skulkin(5070)
Machine Learning Security Principles by John Paul Mueller(5042)
Attacking and Exploiting Modern Web Applications by Simone Onofri & Donato Onofri(4733)
Operationalizing Threat Intelligence by Kyle Wilhoit & Joseph Opacki(4705)
Solidity Programming Essentials by Ritesh Modi(3381)
Mastering Azure Security by Mustafa Toroman and Tom Janetscheck(3200)
Future Crimes by Marc Goodman(3195)
Mastering Python for Networking and Security by José Manuel Ortega(3184)
Blockchain Basics by Daniel Drescher(3144)
Microsoft 365 Security, Compliance, and Identity Administration by Peter Rising(3016)
Mobile App Reverse Engineering by Abhinav Mishra(2767)
Operationalizing Threat Intelligence by Joseph Opacki Kyle Wilhoit(2725)
Mastering Bitcoin: Programming the Open Blockchain by Andreas M. Antonopoulos(2707)
From CIA to APT: An Introduction to Cyber Security by Edward G. Amoroso & Matthew E. Amoroso(2660)
The Code Book by Simon Singh(2556)
Learn Computer Forensics - Second Edition by William Oettinger(2529)
The Art Of Deception by Kevin Mitnick(2479)
Incident Response with Threat Intelligence by Roberto Martínez(2242)
