Network Security
epub |eng | | Author:Darren Quick & Kim-Kwang Raymond Choo
Garfinkel, S. (2010). Digital forensics research: The next 10 years. Digital Investigation, 7, S64–S73.Crossref Garfinkel, S. (2012a). Lessons learned writing digital forensics tools and managing a 30 TB digital evidence ...
( Category:
Pathology
March 12,2020 )
epub, pdf |eng | | Author:Shojiro Asai
9. H. Takada, μITRON 4.0 Specification (TRON Institute, 2004) 10. C.L. Liu, J.W. Layland, Scheduling algorithms for multiprogramming in a hard real-time environment. J. ACM 20(1), 46–61 (1973) 11. N. ...
( Category:
Quality Control
March 12,2020 )
epub, pdf |eng | 2017-05-10 | Author:Ben Piper [Ben Piper]
( Category:
LAN
March 11,2020 )
azw3 |eng | 2018-12-09 | Author:Nik Alleyne [Alleyne, Nik]
Log Analysis of Compromised Domain Controller As Nakia was able to gain some intelligence about what happened from the packet analysis, she figures the logs can assist her in being ...
( Category:
Viruses
March 11,2020 )
epub |eng | 2013-03-10 | Author:Stewart
CHAPTER 8 Firewall Deployment Considerations FIREWALLS CAN BE COMPLEX security solutions. You should plan the deployment of a firewall carefully, whether it’s for a small home office or a large ...
( Category:
Network Security
March 11,2020 )
epub |eng | | Author:Cliff Wang & Zhuo Lu
5.5.3 System Performance Considering that the CSI value under some antenna modes of RA can be low, to ensure normal communications after adopting RA, in this part we use the ...
( Category:
Network Security
March 11,2020 )
epub |eng | 2020-03-10 | Author:Heather Linn
The most common way of getting the process memory is with Mimikatz. Mimikatz needs either SYSTEM-level privilege on a target host or the debug privilege under an Administrator account. Mimikatz ...
( Category:
Internet & Networking
March 11,2020 )
epub, mobi |eng | | Author:Barry Pollard
37 https://tools.ietf.org/html/draft-bishop-httpbis-push-cases Alternatively, are we restricting ourselves too much in trying to maintain the old concept of HTTP being a request-and-response protocol? WebSockets and SSE show a need and appetite ...
( Category:
Network Security
March 11,2020 )
epub |eng | | Author:Swarup Bhunia & Mark M. Tehranipoor
Unlike arithmetic circuits which can be defined with one general specification polynomial, a general IP can be represented by a set of polynomials extracting from the golden IP. The golden ...
( Category:
Electronics
March 10,2020 )
epub |eng | | Author:Aditya Vempaty & Bhavya Kailkhura & Pramod K. Varshney
Fig. 4.10Estimate of with time [19] Fig. 4.11Boundary around which the sensors are ‘ambiguous’ [19] It is important to note that the performance of the proposed scheme depends on the ...
( Category:
Electronics
March 9,2020 )
epub |eng | | Author:Wojciech Samek & Grégoire Montavon & Andrea Vedaldi & Lars Kai Hansen & Klaus-Robert Müller
40. Poerner, N., Schütze, H., Roth, B.: Evaluating neural network explanation methods using hybrid documents and morphosyntactic agreement. In: Proceedings of the 56th Annual Meeting of the Association for Computational ...
( Category:
Intelligence & Semantics
March 8,2020 )
epub, pdf |eng | | Author:Jacob G. Oakley
Figure 7-2 shows what can happen when the lease on public IP addressing changes in a cloud provider between the time the target was decided and the time the attack ...
( Category:
Network Security
March 7,2020 )
epub, mobi |eng | 2018-09-28 | Author:José Manuel Ortega
class SSHConnection: def __init__(self): #ssh connection with paramiko library self.ssh = paramiko.SSHClient() def ssh_connect(self,ip,user,password,code=0): self.ssh.load_system_host_keys() self.ssh.set_missing_host_key_policy(paramiko.AutoAddPolicy()) print("[*] Testing user and password from dictionary") print("[*] User: %s" %(user)) print("[*] Pass :%s" ...
( Category:
Network Security
March 7,2020 )
epub |eng | 2018-10-03 | Author:Bala Subrahmanyam Varanasi, Rakesh Vidya Chandra
( Category:
Software Development
March 6,2020 )
epub |eng | 2019-03-02 | Author:Jeff T. Parker
PART III Cyber Incident Response Chapter 7 The Incident Response Process Chapter 8 Determining the Impact of Incidents Chapter 9 Preparing the Incident Response Toolkit Chapter 10 Selecting the Best ...
( Category:
Network Security
March 3,2020 )
Categories
Popular ebooks
The Mikado Method by Ola Ellnestam Daniel Brolund(9779)Sass and Compass in Action by Wynn Netherland Nathan Weizenbaum Chris Eppstein Brandon Mathis(7782)
Grails in Action by Glen Smith Peter Ledbrook(7697)
Configuring Windows Server Hybrid Advanced Services Exam Ref AZ-801 by Chris Gill(6573)
Azure Containers Explained by Wesley Haakman & Richard Hooper(6563)
Running Windows Containers on AWS by Marcio Morales(6094)
Kotlin in Action by Dmitry Jemerov(5066)
Microsoft 365 Identity and Services Exam Guide MS-100 by Aaron Guilmette(4921)
Combating Crime on the Dark Web by Nearchos Nearchou(4502)
Management Strategies for the Cloud Revolution: How Cloud Computing Is Transforming Business and Why You Can't Afford to Be Left Behind by Charles Babcock(4414)
Microsoft Cybersecurity Architect Exam Ref SC-100 by Dwayne Natwick(4346)
The Ruby Workshop by Akshat Paul Peter Philips Dániel Szabó and Cheyne Wallace(4177)
The Age of Surveillance Capitalism by Shoshana Zuboff(3956)
Python for Security and Networking - Third Edition by José Manuel Ortega(3744)
Learn Windows PowerShell in a Month of Lunches by Don Jones(3509)
The Ultimate Docker Container Book by Schenker Gabriel N.;(3411)
Mastering Python for Networking and Security by José Manuel Ortega(3345)
Mastering Azure Security by Mustafa Toroman and Tom Janetscheck(3332)
Blockchain Basics by Daniel Drescher(3295)
Learn Wireshark by Lisa Bock(3267)
