Privacy & Online Safety
epub |eng | 2020-02-21 | Author:Shekhar, Shashi; Vold, Pamela; & Pamela Vold [Shekhar, Shashi & Vold, Pamela]
Figure 11 City of Minneapolis. Source: Minnesota Spatial Computing Group. Limitations and Concerns Because GIS is a visualization tool, it can also be used to represent data inaccurately. For example, ...
( Category:
Privacy & Online Safety
July 8,2020 )
epub |eng | 2020-03-30 | Author:Cameron James [James, Cameron]
2 Weeks to Go Aoife found me before I found her. I’d gotten the bus to the train station, obviously too early, so I sat on the metal seat and ...
( Category:
Privacy & Online Safety
July 6,2020 )
epub |eng | 2015-03-26 | Author:Isaac Sharpe [Sharpe, Isaac]
Chapter Ten Wireless Hacking & Security A wireless network is a type of network that employs connections between desktops, laptops, printers, etc. using absolutely no wired media, e.g. LAN cables. ...
( Category:
Electronics
July 5,2020 )
epub |eng | 2020-03-13 | Author:Maureen Webb [Webb, Maureen]
Solid? Tim Berners-Lee, the inventor of the World Wide Web and Harry Halpin’s boss at the World Wide Web Consortium (W3C), seems to be working on this project. But a ...
( Category:
Democracy
June 30,2020 )
azw3 |eng | 2020-05-06 | Author:Daniel Jones [Jones, Daniel]
Chapter Four Determining Compliance Requirements In this chapter, we will be looking into the legal frameworks, how and why compliance is critical to information security. To stay in compliance with ...
( Category:
Network Security
June 29,2020 )
azw3 |eng | 2018-02-28 | Author:Leonard Eddison [Eddison, Leonard]
Chapter 2: The Technical Side Since bitcoin is a digital currency that is dealt with entirely online, it is only natural that it has a technical side to it. As ...
( Category:
Privacy & Online Safety
June 29,2020 )
epub |eng | 2017-11-10 | Author:Wagner, Alex & Wagner, Alex [Wagner, Alex]
The primary purpose could many other thinks. Other than advertising only, and some of the Adware-s might be working with other malware that is logging all the information that you ...
( Category:
Hacking
June 29,2020 )
epub |eng | 2019-11-23 | Author:Morgan, Kevin [Morgan, Kevin]
Free Wi-Fi networks The hunting grounds preferred by crackers are free Wi-Fi networks, i.e. not for a fee. Free Wi-Fi networks are easy to access and there is no risk ...
( Category:
Networks
June 27,2020 )
azw3, epub |eng | 2020-06-18 | Author:HOFFMAN, HUGO & HOFFMAN, HUGO [HOFFMAN, HUGO]
Chapter 37 DMVPN & Site-to-site VPN When it comes to site-to-site VPN type of a connection, we're talking about IPSec in which case our routers are going to form a ...
( Category:
Encryption
June 21,2020 )
epub |eng | 2020-04-06 | Author:Heather Adkins
Using analysis tools like linters to detect common code defects such as dead code, unnecessary dependencies, or language-specific gotchas. Often, such tools can also automatically fix your code. Creating notifications ...
( Category:
Cloud Computing
June 10,2020 )
epub |eng | 2020-06-02 | Author:James Veitch [Veitch, James]
From: Princess Mina To: James Veitch Subject: Re: how are you Date: January 16 9:07 pm my uncle is a very wicked and mean man, everybody fears him whosoever that ...
( Category:
European
June 4,2020 )
epub |eng | 2020-04-10 | Author:Luk Arbuckle
Dealing with Indirect Identifiers Ridding yourself of indirect identifiers, in the same fashion as direct identifiers, would mean eliminating all risk (sounds good!) as well as all analytic utility from ...
( Category:
Data Processing
May 30,2020 )
azw3 |eng | 2018-01-22 | Author:Norman, Alan T. [Norman, Alan T.]
Figure 28 - Tor Settings Dialog If you have your own list of bridge relays that you prefer to connect, choose the “Enter custom bridges” radio button and paste the ...
( Category:
Hacking
May 25,2020 )
epub |eng | 2020-03-30 | Author:Keith Martin
How to Save the World Here’s cryptography in action, as often witnessed on television dramas (and the likes of James Bond movies). Two intelligence agents sit tensely in a car, ...
( Category:
Cryptography
May 22,2020 )
epub |eng | 2020-05-18 | Author:Keith Martin [Martin, Keith]
How to Save the World Here’s cryptography in action, as often witnessed on television dramas (and the likes of James Bond movies). Two intelligence agents sit tensely in a car, ...
( Category:
Cryptography
May 19,2020 )
Categories
Popular ebooks
Practical Threat Detection Engineering by Megan Roddie & Jason Deyalsingh & Gary J. Katz(6326)Effective Threat Investigation for SOC Analysts by Yahia Mostafa;(6196)
Practical Memory Forensics by Svetlana Ostrovskaya & Oleg Skulkin(5895)
Machine Learning Security Principles by John Paul Mueller(5878)
Attacking and Exploiting Modern Web Applications by Simone Onofri & Donato Onofri(5536)
Operationalizing Threat Intelligence by Kyle Wilhoit & Joseph Opacki(5518)
Solidity Programming Essentials by Ritesh Modi(3834)
Microsoft 365 Security, Compliance, and Identity Administration by Peter Rising(3481)
Mastering Python for Networking and Security by José Manuel Ortega(3317)
Future Crimes by Marc Goodman(3308)
Mastering Azure Security by Mustafa Toroman and Tom Janetscheck(3307)
Blockchain Basics by Daniel Drescher(3271)
Operationalizing Threat Intelligence by Joseph Opacki Kyle Wilhoit(3190)
Learn Computer Forensics - Second Edition by William Oettinger(2987)
Mobile App Reverse Engineering by Abhinav Mishra(2862)
Mastering Bitcoin: Programming the Open Blockchain by Andreas M. Antonopoulos(2835)
The Code Book by Simon Singh(2771)
From CIA to APT: An Introduction to Cyber Security by Edward G. Amoroso & Matthew E. Amoroso(2759)
Incident Response with Threat Intelligence by Roberto Martínez(2679)
The Art Of Deception by Kevin Mitnick(2581)
