Cryptography
epub |eng | 2016-04-08 | Author:Jonathan LeBlanc & Tim Messerschmidt
// development error handler // will print stacktrace if (app.get('env') === 'development') { app.use(function(err, req, res) { console.log('error'); res.status(err.status || 500); res.render('error', { message: err.message, error: err }); }); } ...
( Category:
Cybernetics
May 17,2019 )
epub |eng | 2015-02-08 | Author:Swan, Melanie [Swan, Melanie]
Blockchain Genomics 2.0: Industrialized All-Human-Scale Sequencing Solution At one level, there could be blockchain-enabled services where genomic data is sequenced and made available to individuals by private key outside the ...
( Category:
Cryptography
May 10,2019 )
epub |eng | 2015-05-09 | Author:Wright, Joshua
* * * A sample packet capture of a Fitbit One device that can be displayed using the SmartRF Packet Sniffer software (without the CC2540 USB hardware) is available on ...
( Category:
Cryptography
May 9,2019 )
epub, pdf |eng | 2019-05-03 | Author:Kalle Rosenbaum [Kalle Rosenbaum]
( Category:
Cryptography
May 7,2019 )
epub |eng | 2019-03-15 | Author:Will Button
Then we're going to use async and await to get the deployed version of our contract from the Ethereum network. So, let me break a async and await down for ...
( Category:
Encryption
May 6,2019 )
epub |eng | 2019-03-25 | Author:Salman A. Baset
Smart contract considerations As we mentioned, smart contracts are vital to business interaction between the participants of any blockchain network. As they essentially contain the rules and conditions under which ...
( Category:
Cryptography
May 5,2019 )
epub, pdf |eng | 2019-02-13 | Author:Arjuna Sky Kok
def fillPosts(self, posts): self.clearTweetsField() for post in posts: label_field = QtWidgets.QLabel(post) self.tweets_layout.addWidget(label_field) The same strategy is used in the two following methods. We clear the bookmark widgets from the bookmarks ...
( Category:
Cryptography
May 4,2019 )
azw3 |eng | 2017-01-05 | Author:Nadia El Mrabet & Marc Joye
parametrized by selecting an arbitrary x ∈ Z such that are both prime. Constant-time hashing to In Latincrypt 2012, Fouque and Tibouchi [25] presented a specialization of the procedure proposed ...
( Category:
Combinatorics
April 5,2019 )
epub |eng | 2014-09-22 | Author:Josh Datko [Datko, Josh]
In the FPS_CryptoCape.ino file, this is accomplished by setting digital output 2 as an output and then pulling the line low. When a fingerprint is recognized, the pin is configured ...
( Category:
Software Development
April 4,2019 )
epub |eng | 2014-06-04 | Author:Phil Champagne [Champagne, Phil]
* * * Re: Stealing Coins Posted by knightmb, July 25, 2010, 07:34:42 PM * * * Very nice. *another reason why I love open source* As I understand it ...
( Category:
Software Development
March 23,2019 )
epub |eng | 2019-01-29 | Author:Peter Lipovyanov
DTube takes decentralized social media a step further. It is a video sharing and streaming platform, similar to YouTube, built as an application on the Steem blockchain. The principles it ...
( Category:
Encryption
March 11,2019 )
epub, pdf |eng | | Author:Abhinav Singh
Once the scan setting pop up appears, click on OK to proceed. After few moments, the attack will be launched and any successful crack will be reported by Fern. Bluetooth ...
( Category:
Encryption
April 23,2016 )
epub, pdf |eng | | Author:Song Y. Yan
(b) (c) 3.Use Silver–Pohlig–Hellman algorithm to solve the discrete logarithms k: (a) (b) (c) . 4.Use Pollard’s ρ method to find the discrete logarithms k such that (a) (b) . ...
( Category:
Internet & Networking
April 8,2016 )
epub |eng | 2014-05-02 | Author:Dawn Dunkerley
Travel Advisory Network-based intrusion systems also are not effective in monitoring encrypted communications, such as over a virtual private network (VPN). When an intrusion is detected, the system works in ...
( Category:
Encryption
February 4,2016 )
epub, pdf |eng | 2015-12-22 | Author:Josiah Dykstra
Chapter 8. Digital Forensics Digital forensics holds a unique distinction among the group of cybersecurity fields in this book because it requires science. Forensic science, by definition, is the use ...
( Category:
Network Security
December 13,2015 )
Categories
Popular ebooks
Practical Threat Detection Engineering by Megan Roddie & Jason Deyalsingh & Gary J. Katz(6326)Effective Threat Investigation for SOC Analysts by Yahia Mostafa;(6196)
Practical Memory Forensics by Svetlana Ostrovskaya & Oleg Skulkin(5895)
Machine Learning Security Principles by John Paul Mueller(5878)
Attacking and Exploiting Modern Web Applications by Simone Onofri & Donato Onofri(5536)
Operationalizing Threat Intelligence by Kyle Wilhoit & Joseph Opacki(5518)
Solidity Programming Essentials by Ritesh Modi(3834)
Microsoft 365 Security, Compliance, and Identity Administration by Peter Rising(3481)
Mastering Python for Networking and Security by José Manuel Ortega(3317)
Future Crimes by Marc Goodman(3308)
Mastering Azure Security by Mustafa Toroman and Tom Janetscheck(3307)
Blockchain Basics by Daniel Drescher(3271)
Operationalizing Threat Intelligence by Joseph Opacki Kyle Wilhoit(3190)
Learn Computer Forensics - Second Edition by William Oettinger(2987)
Mobile App Reverse Engineering by Abhinav Mishra(2862)
Mastering Bitcoin: Programming the Open Blockchain by Andreas M. Antonopoulos(2835)
The Code Book by Simon Singh(2771)
From CIA to APT: An Introduction to Cyber Security by Edward G. Amoroso & Matthew E. Amoroso(2759)
Incident Response with Threat Intelligence by Roberto Martínez(2679)
The Art Of Deception by Kevin Mitnick(2581)
