Security & Encryption
azw3, epub |eng | 2017-05-24 | Author:S. R. Tabone & Ahmed Arifur Rahman
Ransomware classification considering severity and complexity Lock screen ransomware and encrypting ransomware are the likely variants of ransomware program. Lock screen ransomware prevents the user from accessing the PC and ...
( Category:
Viruses
March 14,2020 )
epub |eng | 2018-09-24 | Author:Samuel Bowne
( Category:
Cryptography
March 14,2020 )
epub |eng | | Author:S. Margret Anouncia & Hardik A. Gohel & Subbiah Vairamuthu
9 Results Based on the visualization plots, it can sufficiently be concluded that, the hypothesis that approved conversion (final consumption) depends directly on the:1.Number of clicks received by the social ...
( Category:
Network Security
March 14,2020 )
epub |eng | | Author:Stan Z. Li & Anil K. Jain
( Category:
Intelligence & Semantics
March 14,2020 )
epub |eng | | Author:Osama Mustafa & Robert P. Lockard
def handle_close(self): self.close() self.receiver.close() if __name__=='__main__': import optparse parser = optparse.OptionParser() parser.add_option( '-l','--local-ip', dest='local_ip',default='127.0.0.1', help='Local IP address to bind to') parser.add_option( '-p','--local-port', type='int',dest='local_port',default=80, help='Local port to bind to') parser.add_option( '-r','--remote-ip',dest='remote_ip', ...
( Category:
Network Security
March 14,2020 )
epub |eng | | Author:Matthew Beckstrom & Brady Lund
Navigating the Router Console When I2P downloads, you will be directed to the Router Console, which opens in your default Internet browser. This is what we would (endearingly!) call a ...
( Category:
Storage & Retrieval
March 13,2020 )
epub |eng | 2019-08-05 | Author:Software Diagnostics Institute & Dmitry Vostokov [Software Diagnostics Institute]
( Category:
Software Development
March 13,2020 )
epub |eng | 2018-09-25 | Author:Chet Hosmer
Switch Configuration for Packet Capture At this point you might be asking how to configure an environment to begin experimenting with packet capturing using these methods. Within most modern networking ...
( Category:
Networks
March 13,2020 )
epub |eng | | Author:Leslie F. Sikos
4.4.2.4 Presence of Proof-of-Concept The presence of PoC exploits in EDB increases the likelihood of vulnerability exploitation. It can be treated as a binary feature that indicates whether a PoC ...
( Category:
Intelligence & Semantics
March 12,2020 )
azw3, epub |eng | 2017-05-11 | Author:Alan Radley
Privacy is not for the passive. — Jeffrey Rosen N.B. Info-Sec is such a vastly complex—and rapidly evolving—technological field—that it is impossible to depict anything but a rudimentary facsimile (of ...
( Category:
Security & Encryption
March 12,2020 )
epub |eng | | Author:Joseph N. Pelton & Indu B. Singh
Today, some 7 years later, this broadband first responder network system is now in various stages of implementation with some 15 states specifically opted into this program and all of ...
( Category:
City Planning & Urban Development
March 12,2020 )
epub |eng | | Author:Darren Quick & Kim-Kwang Raymond Choo
Garfinkel, S. (2010). Digital forensics research: The next 10 years. Digital Investigation, 7, S64–S73.Crossref Garfinkel, S. (2012a). Lessons learned writing digital forensics tools and managing a 30 TB digital evidence ...
( Category:
Pathology
March 12,2020 )
epub, pdf |eng | | Author:Shojiro Asai
9. H. Takada, μITRON 4.0 Specification (TRON Institute, 2004) 10. C.L. Liu, J.W. Layland, Scheduling algorithms for multiprogramming in a hard real-time environment. J. ACM 20(1), 46–61 (1973) 11. N. ...
( Category:
Quality Control
March 12,2020 )
azw3 |eng | 2018-12-09 | Author:Nik Alleyne [Alleyne, Nik]
Log Analysis of Compromised Domain Controller As Nakia was able to gain some intelligence about what happened from the packet analysis, she figures the logs can assist her in being ...
( Category:
Viruses
March 11,2020 )
epub |eng | | Author:Cliff Wang & Zhuo Lu
5.5.3 System Performance Considering that the CSI value under some antenna modes of RA can be low, to ensure normal communications after adopting RA, in this part we use the ...
( Category:
Network Security
March 11,2020 )
Categories
Cryptography | Encryption |
Hacking | Network Security |
Privacy & Online Safety | Security Certifications |
Viruses |
Popular ebooks
Practical Threat Detection Engineering by Megan Roddie & Jason Deyalsingh & Gary J. Katz(6712)Effective Threat Investigation for SOC Analysts by Yahia Mostafa;(6558)
Practical Memory Forensics by Svetlana Ostrovskaya & Oleg Skulkin(6276)
Machine Learning Security Principles by John Paul Mueller(6245)
Attacking and Exploiting Modern Web Applications by Simone Onofri & Donato Onofri(5918)
Operationalizing Threat Intelligence by Kyle Wilhoit & Joseph Opacki(5878)
Solidity Programming Essentials by Ritesh Modi(4024)
Microsoft 365 Security, Compliance, and Identity Administration by Peter Rising(3666)
Operationalizing Threat Intelligence by Joseph Opacki Kyle Wilhoit(3397)
Future Crimes by Marc Goodman(3348)
Mastering Python for Networking and Security by José Manuel Ortega(3346)
Mastering Azure Security by Mustafa Toroman and Tom Janetscheck(3335)
Blockchain Basics by Daniel Drescher(3301)
Learn Computer Forensics - Second Edition by William Oettinger(3159)
Mobile App Reverse Engineering by Abhinav Mishra(2882)
Incident Response with Threat Intelligence by Roberto Martínez(2882)
Mastering Bitcoin: Programming the Open Blockchain by Andreas M. Antonopoulos(2870)
The Code Book by Simon Singh(2827)
From CIA to APT: An Introduction to Cyber Security by Edward G. Amoroso & Matthew E. Amoroso(2781)
Building a Next-Gen SOC with IBM QRadar: Accelerate your security operations and detect cyber threats effectively by Ashish M Kothekar(2731)
