Computers & Technology	
					
					
								epub, mobi |eng | 2013-07-22  | Author:Peter Loshin
								Using Tails from a USB drive means: • As a writeable medium, if the USB device is large enough you can configure a persistent volume (a section of the device ...
							
							
								( Category:
								
								
									
										
									
										
									
										
									
										
										Network Security
										
									
								
								
								March 26,2014 )
							
						
								epub, pdf |eng | 2012-08-27  | Author:Mike Shema
								Protecting Information Compromising the information in a database is not the only goal of an attacker, but it surely exists as a major one. Many methods are available to protect ...
							
							
								( Category:
								
								
									
										
									
										
									
										
									
										
										Hacking
										
									
								
								
								March 26,2014 )
							
						
								epub, pdf |eng | 2012-11-22  | Author:Derrick Rountree
								3.2.1. Using OpenID The OpenID process starts with user registration. The user must choose an OpenID provider with whom to register. There are several OpenID providers available including Facebook, Google, ...
							
							
								( Category:
								
								
									
										
									
										
									
										
									
										
										Network Security
										
									
								
								
								March 26,2014 )
							
						
								epub, mobi, pdf |eng | 2012-11-19  | Author:Matthew Metheny
								Table 6.5 Key Process Activities—Step 3 Table 6.6 Key Process Activities—Step 4 Both NIST and the ISO/IEC processes address the ongoing communications and sharing of risk-related information with decision makers ...
							
							
								( Category:
								
								
									
										
									
										
									
										
									
										
										Cloud Computing
										
									
								
								
								March 26,2014 )
							
						
								epub, pdf |eng | 2010-05-17  | Author:Kimberly Graves
								Because DoS attacks are so powerful and can cripple a production system or network, this chapter does not include any DoS tool exercises. If you want to test the tools ...
							
							
								( Category:
								
								
									
										
									
										
									
										
										Internet & Social Media
										
									
								
								
								March 26,2014 )
							
						
								epub |eng, eng | 2012-08-22  | Author:Andy Greenberg
								Hello, Scientology. We are Anonymous. Over the years, we have been watching you. Your campaigns of misinformation; suppression of dissent; your litigious nature, all of these things have caught our ...
							
							
								( Category:
								
								
									
										
									
										
									
										
									
										
										Hacking
										
									
								
								
								March 26,2014 )
							
						
								epub, pdf |eng | 2011-03-22  | Author:Tom Canavan
								Incorporate these things into your plan, and schedule a disaster drill soon after to ensure that the plan has successfully been updated. The post-test review is where you formulate your ...
							
							
								( Category:
								
								
									
										
									
										
									
										
										Networking & Cloud Computing
										
									
								
								
								March 26,2014 )
							
						
								epub, pdf |eng | 2010-08-24  | Author:Himanshu Dwivedi [Himanshu Dwivedi]
								IAX.Brute performs the passive dictionary attack and, using these examples, identifies the password as 123voiptest. Active Dictionary Attack In addition to passive attacks, IAX is also vulnerable to pre-computed dictionary ...
							
							
								( Category:
								
								
									
										
									
										
									
										
									
										
										Hacking
										
									
								
								
								March 26,2014 )
							
						
								epub, mobi, pdf |eng | 2013-04-23  | Author:Jared Cohen & Eric Schmidt [Cohen, Jared & Schmidt, Eric]
								Sudden access to technology does not in and of itself enable radicalized individuals to become cyber terrorists. There is a technical skills barrier that, to date, has forestalled an explosion ...
							
							
								( Category:
								
								
									
										
									
										
									
										
									
										
										Specific Topics
										
									
								
								
								March 26,2014 )
							
						
								epub |eng | 2013-03-26  | Author:Fortnow, Lance [Fortnow, Lance]
								The Gödel Letter In 1956 Kurt Gödel wrote a letter to John von Neumann, one of the pioneers of computer science and many other fields. In this letter (written in ...
							
							
								( Category:
								
								
									
										
									
										
									
										
									
										
									
										
										Linear Programming
										
									
								
								
								March 26,2014 )
							
						
								epub |eng | 2009-03-25  | Author:Morgan, George G.
								Federal-Land States Records The Public Lands in the Federal-Land States were distributed in a variety of ways over different time periods. Others were auctioned or sold by lottery. Initial sales ...
							
							
								( Category:
								
								
									
										
									
										
									
										
										Genealogy
										
									
								
								
								March 26,2014 )
							
						
								epub |eng | 2010-06-07  | Author:Tom Bissell [Bissell, Tom]
								
							
							
								( Category:
								
								
									
										
									
										
									
										
										Games & Strategy Guides
										
									
								
								
								March 26,2014 )
							
						
								epub |eng | 2011-12-04  | Author:Mott, Tony [Mott, Tony]
								2000s SSX Tricky Original release date : 2001 Platform : Various Developer : Electronic Arts Genre : Sports Wintry counterparts to the mega-popular Tony Hawk’s Pro Skater series, the SSX ...
							
							
								( Category:
								
								
									
										
									
										
									
										
									
										
										Game Design
										
									
								
								
								March 26,2014 )
							
						
								epub |eng |   | Author:Lori Andrews
								Even if we specifically designate our social network pages as private, social network sites do a particularly bad job of protecting privacy. In 2011, Joanne Kuzma of the University of ...
							
							
								( Category:
								
								
									
										
									
										
									
										
									
										
										Social Media
										
									
								
								
								March 26,2014 )
							
						
								epub |eng | 2013-01-16  | Author:Evgeny Morozov
								Against Technological Defeatism Viewed in the abstract, it may seem that the tides of digital preemption, situational crime prevention, and reputation-based controls are unstoppable and irreversible. Information is everywhere, and ...
							
							
								( Category:
								
								
									
										
									
										
									
										
									
										
										Social Media
										
									
								
								
								March 26,2014 )
							
						
							
								Categories
							
						
						
Popular ebooks
Adobe Camera Raw For Digital Photographers Only by Rob Sheppard(16878)Deep Learning with Python by François Chollet(12894)
A Developer's Guide to Building Resilient Cloud Applications with Azure by Hamida Rebai Trabelsi(10276)
Hello! Python by Anthony Briggs(10140)
The Mikado Method by Ola Ellnestam Daniel Brolund(10037)
OCA Java SE 8 Programmer I Certification Guide by Mala Gupta(9997)
Dependency Injection in .NET by Mark Seemann(9534)
Hit Refresh by Satya Nadella(9011)
Algorithms of the Intelligent Web by Haralambos Marmanis;Dmitry Babenko(8540)
The Kubernetes Operator Framework Book by Michael Dame(8314)
Exploring Deepfakes by Bryan Lyon and Matt Tora(8113)
Practical Computer Architecture with Python and ARM by Alan Clements(8048)
Robo-Advisor with Python by Aki Ranin(8037)
Implementing Enterprise Observability for Success by Manisha Agrawal and Karun Krishnannair(8026)
Sass and Compass in Action by Wynn Netherland Nathan Weizenbaum Chris Eppstein Brandon Mathis(7936)
Building Low Latency Applications with C++ by Sourav Ghosh(7913)
Svelte with Test-Driven Development by Daniel Irvine(7909)
Grails in Action by Glen Smith Peter Ledbrook(7903)
Test-Driven iOS Development with Swift 4 by Dominik Hauser(7871)
Becoming a Dynamics 365 Finance and Supply Chain Solution Architect by Brent Dawson(7825)
 
 
								 
								 
								 
								 
								 
								 
								 
								 
								 
								 
								 
								 
								 
								