Encryption
epub |eng | 2019-04-30 | Author:Xun (Brian) Wu [Xun (Brian) Wu]
The SDK is installed at /usr/lib/python3/dist-packages/sawtooth_sdk. How to do it... Let's go through a step-by-step guide to implement a transaction processor. We will highlight the important code segments to explain ...
( Category:
Cryptography
April 5,2020 )
epub |eng | 2019-02-25 | Author:Rod Stephens & Clayton Hunt & John Callaway & Ovais Mehboob Ahmed Khan [Rod Stephens]
( Category:
Encryption
March 31,2020 )
epub |eng | 2019-09-20 | Author:Xun (Brian) Wu [Xun (Brian) Wu]
We were able to create the art token and list the art in the art market. Next, we will implement the buyer functions. Implementing the buyArt() function The users can ...
( Category:
Software Development
March 28,2020 )
epub |eng | 2016-03-14 | Author:Darril Gibson
EXAM TIP An alert provides notification of a potential adverse event. Personnel analyze the event to determine if it is an incident. An alert can be a false positive, which ...
( Category:
Encryption
March 28,2020 )
epub |eng | 2011-01-04 | Author:Joshua Davies
So what are these P_MD5 and P_SHA1 blocks that are XORed together to produce the final result? Well, if you recall from Chapter 4, MD5 produces 16 bytes of output, ...
( Category:
Encryption
March 21,2020 )
epub |eng | 2016-02-11 | Author:Solis Tech
XIV.C. – Is Reverse Engineering Similar to Hacking? Since it is the method for the extraction of information on a circuit that can’t be retrieved ordinarily, reverse engineering is argued ...
( Category:
Software Development
March 21,2020 )
epub |eng | 2019-11-26 | Author:Roger A. Grimes
Quantum Marketing Many of the best technological inventions of our time were largely driven and funded by advertising and marketing. Radio, television, and cable TV were driven by advertising. The ...
( Category:
Cryptography
March 21,2020 )
epub |eng | 2019-09-04 | Author:Phil Quade
SUCCESSFUL SEGMENTATION ISN'T SEPARATION: IT'S COLLABORATION Colin Anderson, Levi Strauss & Co. In cybersecurity, effective segmentation is often what determines whether your company finds itself on the front page of ...
( Category:
Encryption
March 16,2020 )
epub |eng | 2018-09-24 | Author:Samuel Bowne
( Category:
Cryptography
March 14,2020 )
epub |eng | 2020-03-10 | Author:Heather Linn
The most common way of getting the process memory is with Mimikatz. Mimikatz needs either SYSTEM-level privilege on a target host or the debug privilege under an Administrator account. Mimikatz ...
( Category:
Internet & Networking
March 11,2020 )
epub |eng | | Author:Yanofsky, Noson S.; Mannucci, Mirco A.
Figure 6.7. The action of DFT†. [P(ω0), P(ω1), P(ω2),…, P(ωk),…, P(ωM−1)]T is the vector of the values of the polynomial at the powers of the Mth root of unity. Let ...
( Category:
Cryptography
March 10,2020 )
epub |eng | 2019-03-02 | Author:Jeff T. Parker
PART III Cyber Incident Response Chapter 7 The Incident Response Process Chapter 8 Determining the Impact of Incidents Chapter 9 Preparing the Incident Response Toolkit Chapter 10 Selecting the Best ...
( Category:
Network Security
March 3,2020 )
mobi, epub |eng | 2020-02-24 | Author:Dr. Chase Cunningham
( Category:
Cryptography
March 2,2020 )
epub |eng | | Author:Al Cimino
In 2011, a memorial to the Polish codebreakers was unveiled at Bletchley Park. Bletchley Park, headquarters of Station X, the most secret site in Britain during World War II. CHAPTER ...
( Category:
Encryption
February 28,2020 )
epub |eng | 2020-01-29 | Author:Preston, Robert [Preston, Robert]
( Category:
Encryption
February 19,2020 )
Categories
Popular ebooks
Practical Threat Detection Engineering by Megan Roddie & Jason Deyalsingh & Gary J. Katz(6326)Effective Threat Investigation for SOC Analysts by Yahia Mostafa;(6196)
Practical Memory Forensics by Svetlana Ostrovskaya & Oleg Skulkin(5895)
Machine Learning Security Principles by John Paul Mueller(5878)
Attacking and Exploiting Modern Web Applications by Simone Onofri & Donato Onofri(5536)
Operationalizing Threat Intelligence by Kyle Wilhoit & Joseph Opacki(5518)
Solidity Programming Essentials by Ritesh Modi(3835)
Microsoft 365 Security, Compliance, and Identity Administration by Peter Rising(3481)
Mastering Python for Networking and Security by José Manuel Ortega(3317)
Future Crimes by Marc Goodman(3309)
Mastering Azure Security by Mustafa Toroman and Tom Janetscheck(3308)
Blockchain Basics by Daniel Drescher(3272)
Operationalizing Threat Intelligence by Joseph Opacki Kyle Wilhoit(3190)
Learn Computer Forensics - Second Edition by William Oettinger(2987)
Mobile App Reverse Engineering by Abhinav Mishra(2862)
Mastering Bitcoin: Programming the Open Blockchain by Andreas M. Antonopoulos(2837)
The Code Book by Simon Singh(2772)
From CIA to APT: An Introduction to Cyber Security by Edward G. Amoroso & Matthew E. Amoroso(2759)
Incident Response with Threat Intelligence by Roberto Martínez(2679)
The Art Of Deception by Kevin Mitnick(2582)
