Security & Encryption
epub |eng | 2010-04-20 | Author:Clarke, Richard A. [Clarke, Richard A.]
( Category:
Security & Encryption
August 5,2020 )
epub |eng | 2011-08-14 | Author:Jason Andress & Steve Winterfeld
How the Military Approaches Social Engineering The military has been in the spy–counterspy business from the beginning; they are also experts at interrogation. Spying is the long con, whereas interrogation ...
( Category:
Network Security
August 2,2020 )
epub |eng | | Author:Yang Xu
(3) (f means working frequency, unit MHz; d means path distance, unit m; n means indoor propagation index, a constant within 2.0–3.3, relating to the nature of the building; in ...
( Category:
Quality Control
August 1,2020 )
epub |eng | 2017-04-18 | Author:Logan Styles [Styles, Logan]
Other tips that can keep you lurking from the shadows are: - If you plan on using your hacking skills to carry out some suspicious activities, never use your home ...
( Category:
Hacking
July 31,2020 )
epub |eng | | Author:Timo Steffens
6.2 Domestic and International Conflicts Geopolitical analysis is very different from the other aspects in attribution, that cover artifacts like samples or server images directly linked to the attackers. In ...
( Category:
Hacking
July 26,2020 )
epub |eng | 2015-07-14 | Author:Unknown
Box 14.1 Key Points • Attention and eye movements are reciprocally linked; preparing saccades moves attention and moving attention primes saccades. This is evidence for the influential premotor theory of ...
( Category:
Drawing
July 25,2020 )
azw3, epub |eng | 2016-12-06 | Author:Ron D McFarland Ph.D.
Apple lists several core practices necessary for secure programming. These include (hyperlinks are embedded): Avoiding Buffer Overflows and Underflows describes the various types of buffer overflows and explains how to ...
( Category:
Testing
July 22,2020 )
epub, azw3 |eng | 2020-07-12 | Author:Camden, Cahill [Camden, Cahill]
The stock can be bought, sold, traded, or moved around. The stock is legally bound by rules and regulations set by the government. These rules and regulations mean the company ...
( Category:
Encryption
July 21,2020 )
epub |eng | 2001-07-14 | Author:Alexander C. Martin [Zim, Herbert S.; Martin, Alexander C.]
ALDERS are close relatives of the Birches, with similar flowers, fruits, and seeds. Their bark is marked with horizontal lenticels as in Birches. Alders, however, are mostly shrubs. Of about ...
( Category:
Forests & Forestry
July 21,2020 )
epub |eng | 2019-01-18 | Author:Jeff T. Parker & Michael Gregg [Jeff T. Parker & Gregg, Michael]
Classification Description Top Secret Its disclosure would cause grave damage to national security. This information requires the highest level of control. Secret Its disclosure would be expected to cause serious ...
( Category:
Security Certifications
July 20,2020 )
azw3, pdf |eng | 2015-06-30 | Author:Aaron Cordova & Billie Rinaldi & Michael Wall [Cordova, Aaron]
Secondary Indexing Applications that use a single table and employ a simple access pattern are among the most scalable, consistent, and fast. This type of design can serve in a ...
( Category:
Encryption
July 20,2020 )
epub |eng | 2020-07-13 | Author:Stanislav Abaimov; Maurizio Martellini
2.5.2 Vulnerabilities of Nuclear Weapon Systems and N3C Today’s NSA secrets become tomorrow’s Ph.D. theses and the next day’s hacker tools Bruce Schneier Nuclear Weapons Overview Nuclear weapons, enhanced by ...
( Category:
Security & Encryption
July 14,2020 )
epub, mobi |eng | 2020-07-15 | Author:Tom Steele & Chris Patten & Dan Kottmann
Implementing a MySQL Database Miner To make your MySQL implementation work, you’ll inspect the information_schema.columns table. This table maintains metadata about all the databases and their structures, including table and ...
( Category:
Testing
July 10,2020 )
epub, pdf, mobi, azw3 |eng | 2018-08-31 | Author:Gilberto Najera-Gutierrez [Gilberto Najera-Gutierrez]
Then, we will see the WebSocket Message Editor window, where we can change all of the parameters of the message, including its direction and contents, and send it again: Most ...
( Category:
Network Security
July 9,2020 )
epub |eng | | Author:Cameron Buchanan
Connecting to WEP and WPA networks We can also connect to the authorized network after we have cracked the network key. This can come in handy during penetration testing. Logging ...
( Category:
Testing
July 8,2020 )
Categories
Cryptography | Encryption |
Hacking | Network Security |
Privacy & Online Safety | Security Certifications |
Viruses |
Popular ebooks
Practical Threat Detection Engineering by Megan Roddie & Jason Deyalsingh & Gary J. Katz(6712)Effective Threat Investigation for SOC Analysts by Yahia Mostafa;(6558)
Practical Memory Forensics by Svetlana Ostrovskaya & Oleg Skulkin(6276)
Machine Learning Security Principles by John Paul Mueller(6245)
Attacking and Exploiting Modern Web Applications by Simone Onofri & Donato Onofri(5918)
Operationalizing Threat Intelligence by Kyle Wilhoit & Joseph Opacki(5878)
Solidity Programming Essentials by Ritesh Modi(4024)
Microsoft 365 Security, Compliance, and Identity Administration by Peter Rising(3666)
Operationalizing Threat Intelligence by Joseph Opacki Kyle Wilhoit(3397)
Future Crimes by Marc Goodman(3348)
Mastering Python for Networking and Security by José Manuel Ortega(3346)
Mastering Azure Security by Mustafa Toroman and Tom Janetscheck(3335)
Blockchain Basics by Daniel Drescher(3301)
Learn Computer Forensics - Second Edition by William Oettinger(3159)
Mobile App Reverse Engineering by Abhinav Mishra(2884)
Incident Response with Threat Intelligence by Roberto Martínez(2882)
Mastering Bitcoin: Programming the Open Blockchain by Andreas M. Antonopoulos(2870)
The Code Book by Simon Singh(2827)
From CIA to APT: An Introduction to Cyber Security by Edward G. Amoroso & Matthew E. Amoroso(2781)
Building a Next-Gen SOC with IBM QRadar: Accelerate your security operations and detect cyber threats effectively by Ashish M Kothekar(2731)
