Network Security
epub |eng | 2016-01-29 | Author:Eric Kralicek [Kralicek, Eric]
2.Traditional rack servers Blade Server Solution The blade servers chosen1 for this solution provide up to 16 individual blades per frame. Each frame has been fitted with 15 G6 blade ...
( Category:
Client-Server Systems
August 6,2020 )
epub |eng | 2011-08-14 | Author:Jason Andress & Steve Winterfeld
How the Military Approaches Social Engineering The military has been in the spy–counterspy business from the beginning; they are also experts at interrogation. Spying is the long con, whereas interrogation ...
( Category:
Network Security
August 2,2020 )
epub |eng | | Author:Yang Xu
(3) (f means working frequency, unit MHz; d means path distance, unit m; n means indoor propagation index, a constant within 2.0–3.3, relating to the nature of the building; in ...
( Category:
Quality Control
August 1,2020 )
epub, pdf |eng | 2018-08-31 | Author:Gilberto Najera-Gutierrez [Gilberto Najera-Gutierrez]
Then, we will see the WebSocket Message Editor window, where we can change all of the parameters of the message, including its direction and contents, and send it again: Most ...
( Category:
Network Security
July 9,2020 )
epub |eng | | Author:Jim Seaman
27www.raf.mod.uk/our-organisation/force-protection/news/raf-leeming-based-34-squadron-raf-regiment-returns-to-cyprus/ 28www.us-cert.gov/ncas/current-activity/2019/11/04/cset-version-92-now-available 29www.army-technology.com/contractors/infrastructure/hesco/ 30www.ibm.com/security/data-breach 31www.pcisecuritystandards.org/assessors_and_solutions/pin_transaction_devices 32www.elsevier.com/books/social-engineering-penetration-testing/watson/978-0-12-420124-8 33https://content.fireeye.com/m-trends
( Category:
Network Security
July 8,2020 )
epub |eng | 2015-07-14 | Author:Kenneth R. van Wyk & Mark G. Graff & Dan S. Peters & Diana L. Burley
* * * import java.io.Console; import java.util.regex.Matcher; import java.util.regex.Pattern; /* A validation class that uses Java regex to validate input fields and * implement a primitive (and easily bypassed!) blacklist ...
( Category:
Network Security
July 8,2020 )
epub |eng | 2020-05-22 | Author:Harpreet Singh and Himanshu Sharma [Harpreet Singh and Himanshu Sharma]
( Category:
Testing
July 8,2020 )
epub |eng | | Author:Ayantika Chatterjee & Khin Mi Mi Aung
4.9 Design of Encrypted Queue In the ADT queue, the entities in the collection are kept in order. The basic difference of stack with queue is that stack elements are ...
( Category:
Networks
July 2,2020 )
epub |eng | | Author:Neil C. Rowe & Julian Rrushi
11.8.3 Metadata of Typical File Systems We have been studying a collection of 4265 drives containing 251.7 million files obtained from various sources around the world (Rowe 2016). The term ...
( Category:
Network Security
July 1,2020 )
epub |eng | 2015-02-17 | Author:Peter H. Gregory
( Category:
Interviewing
June 11,2020 )
azw3, epub, pdf |eng | 2020-06-09 | Author:Hayslip, Gary [Hayslip, Gary]
Chapter 13 What Does a Cyber-resilient Business Look Like? Resiliency is not just for large organizations. SMBs should incorporate resiliency principles as a means of reducing risk. As a community, ...
( Category:
Network Security
June 11,2020 )
epub |eng | 2019-03-25 | Author:Sagar Rahalkar & Sairam Jetty [Sagar Rahalkar]
( Category:
Network Security
April 29,2020 )
epub, pdf |eng | | Author:Xiaodong Lin
( Category:
Pathology
April 24,2020 )
epub |eng | | Author:Arthur M. Langer [Langer, Arthur M.]
6.2.4 Exclusive Pair Model This model is bi-directional or full-duplex with an ongoing open two-way communication between a client and server (Fig. 6.8). The server is aware of all connections ...
( Category:
Software Development
April 16,2020 )
epub |eng | 2015-08-16 | Author:Wouter Verbeke & Veronique Van Vlasselaer & Bart Baesens [Wouter Verbeke]
Figure 4.37 Calculating Predictions Using a Cut-Off A confusion matrix can now be calculated as shown in Table 4.5. Table 4.5 Confusion Matrix Actual Status Positive (Fraud) Negative (No Fraud) ...
( Category:
Network Security
April 16,2020 )
Categories
Popular ebooks
Mastering Azure Security by Mustafa Toroman and Tom Janetscheck(3030)Future Crimes by Marc Goodman(3002)
Mastering Python for Networking and Security by José Manuel Ortega(2952)
Blockchain Basics by Daniel Drescher(2892)
Mastering Bitcoin: Programming the Open Blockchain by Andreas M. Antonopoulos(2514)
From CIA to APT: An Introduction to Cyber Security by Edward G. Amoroso & Matthew E. Amoroso(2483)
Practical Threat Detection Engineering by Megan Roddie & Jason Deyalsingh & Gary J. Katz(2383)
The Art Of Deception by Kevin Mitnick(2300)
Effective Threat Investigation for SOC Analysts by Yahia Mostafa;(2237)
The Code Book by Simon Singh(2211)
Machine Learning Security Principles by John Paul Mueller(1939)
Practical Memory Forensics by Svetlana Ostrovskaya & Oleg Skulkin(1923)
Wireless Hacking 101 by Karina Astudillo(1849)
DarkMarket by Misha Glenny(1847)
Hands-On AWS Penetration Testing with Kali Linux by Benjamin Caudill & Karl Gilbert(1846)
Applied Network Security by Arthur Salmon & Michael McLafferty & Warun Levesque(1840)
Mobile Forensics Cookbook by Igor Mikhaylov(1814)
Serious Cryptography: A Practical Introduction to Modern Encryption by Aumasson Jean-Philippe(1809)
Solidity Programming Essentials by Ritesh Modi(1807)
Bulletproof Android: Practical Advice for Building Secure Apps (Developer's Library) by Godfrey Nolan(1671)