Network Security
epub, azw3 |eng | 2015-09-24 | Author:Hayden, Lance
* * * Behavioral Models for Security Culture Transformation Information security today is undergoing a series of experiments in behavioral engineering and cultural transformation, although we do not tend to ...
( Category:
Information Theory
March 22,2020 )
epub |eng | 2018-11-12 | Author:Mark Collier, David Endler
Manipulating or flooding ARP entries on your network can cause a serious denial of service on the local segment you’re testing, rendering the network unusable for a short time, or ...
( Category:
Hacking
March 22,2020 )
epub |eng | 2011-01-04 | Author:Joshua Davies
So what are these P_MD5 and P_SHA1 blocks that are XORed together to produce the final result? Well, if you recall from Chapter 4, MD5 produces 16 bytes of output, ...
( Category:
Encryption
March 21,2020 )
epub |eng | | Author:Carl S. Young
The process of integration adds infinitesimally small pieces of a function dx′ to yield the area under the curve described by that function. If the function is constant in each ...
( Category:
Probability & Statistics
March 21,2020 )
epub |eng | | Author:Stephen Haunts
First Alice encrypts some data that she wants to send to Bob. Once this data has been encrypted, Alice takes a hash of that data and then she signs the ...
( Category:
C & C++ Windows Programming
March 20,2020 )
epub |eng | | Author:John Viega & David LeBlanc & Michael Howard
( Category:
Software Development
March 19,2020 )
epub, pdf |eng | 2014-12-16 | Author:Darren R. Hayes [Darren R. Hayes]
( Category:
Network Security
March 18,2020 )
epub |eng | | Author:Kwangjo Kim & Muhamad Erza Aminanto & Harry Chandra Tanuwidjaja
5.1 Generative This sub-chapter groups IDSs that use deep learning for feature extraction only and use shallow methods for the classification task. 5.1.1 Deep Neural Network Roy et al. [1] ...
( Category:
Mobile & Wireless
March 15,2020 )
epub |eng | | Author:Eric C. Thompson
Architecting and Deployment One way to deploy an IDS is placing it at a network ingress/egress point. This captures north-south traffic. Figure 5-12 represents the use of a mirroring port ...
( Category:
Hacking
March 15,2020 )
epub |eng | 2018-09-24 | Author:Samuel Bowne
( Category:
Cryptography
March 14,2020 )
epub |eng | | Author:S. Margret Anouncia & Hardik A. Gohel & Subbiah Vairamuthu
9 Results Based on the visualization plots, it can sufficiently be concluded that, the hypothesis that approved conversion (final consumption) depends directly on the:1.Number of clicks received by the social ...
( Category:
Network Security
March 14,2020 )
epub |eng | | Author:Osama Mustafa & Robert P. Lockard
def handle_close(self): self.close() self.receiver.close() if __name__=='__main__': import optparse parser = optparse.OptionParser() parser.add_option( '-l','--local-ip', dest='local_ip',default='127.0.0.1', help='Local IP address to bind to') parser.add_option( '-p','--local-port', type='int',dest='local_port',default=80, help='Local port to bind to') parser.add_option( '-r','--remote-ip',dest='remote_ip', ...
( Category:
Network Security
March 14,2020 )
epub |eng | | Author:Chet Hosmer
btnSelectFolder Handles the button click to the right of the Report Folder selection and provides a folder browser for the user. The user must select an existing folder, or create ...
( Category:
Network Security
March 13,2020 )
epub, azw3 |eng | 2019-07-05 | Author:Gigi Sayfan
We are not going to discuss these in more detail, as this is beyond the scope of this book. However, you can find complete details from the official documentation at ...
( Category:
Storage & Retrieval
March 13,2020 )
epub |eng | 2018-09-25 | Author:Chet Hosmer
Switch Configuration for Packet Capture At this point you might be asking how to configure an environment to begin experimenting with packet capturing using these methods. Within most modern networking ...
( Category:
Networks
March 13,2020 )
Categories
Popular ebooks
The Mikado Method by Ola Ellnestam Daniel Brolund(9779)Sass and Compass in Action by Wynn Netherland Nathan Weizenbaum Chris Eppstein Brandon Mathis(7782)
Grails in Action by Glen Smith Peter Ledbrook(7697)
Configuring Windows Server Hybrid Advanced Services Exam Ref AZ-801 by Chris Gill(6573)
Azure Containers Explained by Wesley Haakman & Richard Hooper(6563)
Running Windows Containers on AWS by Marcio Morales(6094)
Kotlin in Action by Dmitry Jemerov(5066)
Microsoft 365 Identity and Services Exam Guide MS-100 by Aaron Guilmette(4921)
Combating Crime on the Dark Web by Nearchos Nearchou(4502)
Management Strategies for the Cloud Revolution: How Cloud Computing Is Transforming Business and Why You Can't Afford to Be Left Behind by Charles Babcock(4414)
Microsoft Cybersecurity Architect Exam Ref SC-100 by Dwayne Natwick(4346)
The Ruby Workshop by Akshat Paul Peter Philips Dániel Szabó and Cheyne Wallace(4177)
The Age of Surveillance Capitalism by Shoshana Zuboff(3957)
Python for Security and Networking - Third Edition by José Manuel Ortega(3744)
Learn Windows PowerShell in a Month of Lunches by Don Jones(3509)
The Ultimate Docker Container Book by Schenker Gabriel N.;(3411)
Mastering Python for Networking and Security by José Manuel Ortega(3345)
Mastering Azure Security by Mustafa Toroman and Tom Janetscheck(3332)
Blockchain Basics by Daniel Drescher(3296)
Learn Wireshark by Lisa Bock(3267)
