Security & Encryption
epub |eng | 2024-04-29 | Author:Srinivas Rao Aravilli
Figure 5.12 â Transactions aggregates By utilizing the PipelineDP framework, we can address the challenges and considerations involved in generating differentially private aggregates for large datasets. It provides a comprehensive ...
( Category:
Privacy & Online Safety
August 5,2024 )
epub, pdf |eng | 2024-05-23 | Author:Dennis Chow
Validating syntax and linting Up until this chapter, we have been focused on the development of our detection use cases and then deployment. As your team is likely to grow, ...
( Category:
Viruses
August 5,2024 )
pdf | | 2024-05-30 | Author:Santiago Vázquez, Francisco Javier;
( Category:
Privacy & Online Safety
July 24,2024 )
epub, pdf |eng | 2024-06-12 | Author:James Leyte-Vidal
Figure 6.3 â Password configuration on Ubuntu 20.04 As we can see, the password configuration should require a sha512 hashed password for users, as noted in the line with pam_unix.so ...
( Category:
Privacy & Online Safety
July 21,2024 )
epub, pdf |eng | 2024-06-18 | Author:Rohan Pinto
( Category:
Cryptography
July 19,2024 )
epub |eng | | Author:Stefania Loredana Nita & Marius Iulian Mihailescu
Input-based attacks. In these types of attacks, the attacker can use information about the input values or control them in order to find the vulnerabilities of the PRNG. This also ...
( Category:
Encryption
July 17,2024 )
pdf | | 2020-08-25 | Author:William M. Springer II [Springer, William M. II]
( Category:
Encryption
July 16,2024 )
pdf | | 2024-04-24 | Author:Aslaner, Milad;
( Category:
Privacy & Online Safety
July 10,2024 )
epub |eng | 2022-07-15 | Author:Kushantha Gunawardana
Levels of cyber anonymity As we discussed earlier, cyber anonymity is trying to hide your identity without hiding the action. The meaning of being anonymous is hiding your identity but ...
( Category:
Privacy & Online Safety
July 6,2024 )
epub |eng | 2024-05-13 | Author:Malcolm McDonald; [McDonald, Malcolm]
Strengthening your authentication Not everyone has a social media login or Gmail address, and SAML is generally used only in a corporate setting because supporting your own identity provider is ...
( Category:
Encryption
July 3,2024 )
epub |eng | 2024-03-14 | Author:Sasha Kranjac , Omar Kudović
( Category:
Viruses
July 1,2024 )
pdf | | 2024-04-30 | Author:Toledano, Soledad Antelada;
( Category:
Viruses
June 24,2024 )
epub |eng | 2024-03-29 | Author:Akhil Sharma
test: Functions prefixed with test are considered individual test cases. These functions are executed as separate tests to validate specific behaviors or functionalities. For instance, see the following: function test_NumberIs42() ...
( Category:
Cryptography
June 18,2024 )
epub |eng | 2023-06-15 | Author:Jaswal, Nipun; [Jaswal, Nipun]
Figure 6.1: Wireshark displaying TLS handshake packets Upon using the filter, tls.handshake.extentions_server_name == "www.nipunjaswal.com", we find that the TLS handshake has occurred for the said website. We will discuss the ...
( Category:
Viruses & Malware
June 17,2024 )
Categories
Cryptography | Encryption |
Hacking | Network Security |
Privacy & Online Safety | Security Certifications |
Viruses |
Popular ebooks
Practical Threat Detection Engineering by Megan Roddie & Jason Deyalsingh & Gary J. Katz(6693)Effective Threat Investigation for SOC Analysts by Yahia Mostafa;(6535)
Practical Memory Forensics by Svetlana Ostrovskaya & Oleg Skulkin(6253)
Machine Learning Security Principles by John Paul Mueller(6226)
Attacking and Exploiting Modern Web Applications by Simone Onofri & Donato Onofri(5896)
Operationalizing Threat Intelligence by Kyle Wilhoit & Joseph Opacki(5859)
Solidity Programming Essentials by Ritesh Modi(4010)
Microsoft 365 Security, Compliance, and Identity Administration by Peter Rising(3654)
Operationalizing Threat Intelligence by Joseph Opacki Kyle Wilhoit(3383)
Future Crimes by Marc Goodman(3346)
Mastering Python for Networking and Security by José Manuel Ortega(3344)
Mastering Azure Security by Mustafa Toroman and Tom Janetscheck(3330)
Blockchain Basics by Daniel Drescher(3294)
Learn Computer Forensics - Second Edition by William Oettinger(3148)
Mobile App Reverse Engineering by Abhinav Mishra(2880)
Mastering Bitcoin: Programming the Open Blockchain by Andreas M. Antonopoulos(2868)
Incident Response with Threat Intelligence by Roberto Martínez(2868)
The Code Book by Simon Singh(2823)
From CIA to APT: An Introduction to Cyber Security by Edward G. Amoroso & Matthew E. Amoroso(2779)
Building a Next-Gen SOC with IBM QRadar: Accelerate your security operations and detect cyber threats effectively by Ashish M Kothekar(2708)
