Security & Encryption
epub |eng | 2015-08-16 | Author:Wouter Verbeke & Veronique Van Vlasselaer & Bart Baesens [Wouter Verbeke]

Figure 4.37 Calculating Predictions Using a Cut-Off A confusion matrix can now be calculated as shown in Table 4.5. Table 4.5 Confusion Matrix Actual Status Positive (Fraud) Negative (No Fraud) ...
( Category: Network Security April 16,2020 )
mobi, azw3, epub, pdf |eng | 2015-01-31 | Author:Shaheen Shariff

Mackie said he is keenly aware that he will be making a constitutional argument to drop the convictions against his client while the federal government is moving to strengthen Canada’s ...
( Category: Reform & Policy April 15,2020 )
epub |eng | | Author:Kishan G. Mehrotra, Chilukuri K. Mohan & HuaMing Huang

6.1 Distance from the Rest of the Data The simplest anomaly detection algorithms are based on the assumptions about the data distribution, e.g., that data is one-dimensional and normally distributed ...
( Category: Computer Vision & Pattern Recognition April 14,2020 )
epub |eng | 2020-03-10 | Author:Knight, Alissa [Knight, Alissa]

When You Don't Know the IMSI or MSISDN of the TCU When you find yourself in the precarious position of a black box or gray box penetration test, or even ...
( Category: Cryptography April 10,2020 )
epub |eng | 2019-04-30 | Author:Weimin Sun [Weimin Sun]

During the fundraising period between August 1, 2017 and December 1, 2017, the fund had raised more than $3.6 million from 44 investors, who were primarily individuals residing in at ...
( Category: Encryption April 6,2020 )
epub |eng | | Author:Sreejith Keeriyattil

Stakeholder Meetings Before going ahead with your design, it is important to have a detailed discussion with each of the application owners. As a security consultant, your job is to ...
( Category: Network Security April 6,2020 )
epub, pdf |eng | | Author:Ronald T. Kneusel

With this separation of A and B into super digits we can examine the D 2n∕1n algorithm, Algorithm D 2n∕1n 1. [Given] A < β n B, β∕2 ≤ B ...
( Category: Algorithms April 6,2020 )
epub |eng | 2019-04-27 | Author:Merunas Grincalaitis [Merunas Grincalaitis]

Auditing tools will save you countless hours in confusing errors, bugs, and vulnerabilities. They will become one of your most used set of tools, combined with your already awesome development ...
( Category: Encryption April 5,2020 )
epub |eng | 2019-04-30 | Author:Xun (Brian) Wu [Xun (Brian) Wu]

The SDK is installed at /usr/lib/python3/dist-packages/sawtooth_sdk. How to do it... Let's go through a step-by-step guide to implement a transaction processor. We will highlight the important code segments to explain ...
( Category: Cryptography April 5,2020 )
epub |eng | 2018-10-23 | Author:Aaron Philipp, David Cowen, Chris Davis

( Category: Hacking April 5,2020 )
epub |eng | | Author:Kanclirz, Jan , Jr.

If the server you're scanning is running HTTPS, or secure HTTP, Netcat cannot directly communicate with this port. You will need a TLS wrapper, such as stunnel, to take the ...
( Category: Network Security April 3,2020 )
epub, mobi |eng | 2020-03-27 | Author:West, Levi [West, Levi]

Ensure the Latest Firmware is Installed Why it’s important: Firmware is software that is embedded on your hardware to help it run. Many Internet users do not update the firmware ...
( Category: Respiratory April 3,2020 )
epub |eng | | Author:Jacob G. Oakley

Non-cyber Threat to Mission In a non-cyber sense, the greatest threat to successful jamming of another receiver by an emitting payload is that once jamming begins, the target can take ...
( Category: Astronautics & Space Flight April 1,2020 )
epub |eng | | Author:Michael Schwartz & Maciej Machulak

Easy JavaScript Client This JavaScript client is one of the easiest ways to test OpenID Connect, although it’s not the most secure (remember Figure 5-1). The client we will use ...
( Category: LDAP March 31,2020 )