Security & Encryption
epub |eng | 2015-05-09 | Author:Wright, Joshua
* * * A sample packet capture of a Fitbit One device that can be displayed using the SmartRF Packet Sniffer software (without the CC2540 USB hardware) is available on ...
( Category:
Cryptography
May 9,2019 )
epub, pdf |eng | 2019-05-03 | Author:Kalle Rosenbaum [Kalle Rosenbaum]
( Category:
Cryptography
May 7,2019 )
epub |eng | 2018-12-17 | Author:Stanley Siegel & Chris Williams & Scott Donaldson [Stanley Siegel]
Guarding Against Counterfeit E-Mails and Secure E-Mail Because e-mail protocols are inherently insecure, it may be possible for attackers to generate and send counterfeit e-mails. Counterfeit e-mails may appear to ...
( Category:
Hacking
May 6,2019 )
epub |eng | 2019-03-15 | Author:Will Button
Then we're going to use async and await to get the deployed version of our contract from the Ethereum network. So, let me break a async and await down for ...
( Category:
Encryption
May 6,2019 )
epub |eng | 2019-03-25 | Author:Salman A. Baset
Smart contract considerations As we mentioned, smart contracts are vital to business interaction between the participants of any blockchain network. As they essentially contain the rules and conditions under which ...
( Category:
Cryptography
May 5,2019 )
epub, pdf |eng | 2019-02-13 | Author:Arjuna Sky Kok
def fillPosts(self, posts): self.clearTweetsField() for post in posts: label_field = QtWidgets.QLabel(post) self.tweets_layout.addWidget(label_field) The same strategy is used in the two following methods. We clear the bookmark widgets from the bookmarks ...
( Category:
Cryptography
May 4,2019 )
epub |eng | 2019-02-14 | Author:Roman Zabicki [Roman Zabicki]
( Category:
Hacking
May 3,2019 )
epub |eng | 2019-03-29 | Author:Himanshu Sharma
( Category:
Hacking
May 3,2019 )
epub, azw3 |eng | 2019-05-06 | Author:Sergey Bratus & Eugene Rodionov & Alex Matrosov [Sergey Bratus]
( Category:
Testing
May 2,2019 )
epub, pdf |eng | 2019-03-24 | Author:Chris Dotson
User Reports In a perfect world, all bugs and vulnerabilities would be discovered and fixed before users see them. Now that you’ve stopped laughing, you need to consider that you ...
( Category:
Cloud Computing
April 20,2019 )
epub |eng | 2017-05-14 | Author:Richard Greene,Rachel Robison-Greene
Only Light Your Torch If There Is No Recourse So far, my friend, you’ve seen two roads. The one road was paved by Edmund Burke, who many regard as the ...
( Category:
Technothrillers
April 10,2019 )
epub, azw3, pdf |eng | 2015-03-17 | Author:Christopher Hadnagy & Michele Fincher [Hadnagy, Christopher]
My Mobile Is Secure I have actually overheard someone telling another person, “If you think it's a malicious e-mail, just open it up on your <iPad/iPhone/Android device/Windows mobile device/insert other ...
( Category:
Electronic Data Interchange (EDI)
April 8,2019 )
mobi |eng | 2019-03-20 | Author:Novelli, Stefano & Silvestri, Marco [Novelli, Stefano]
Figure 23: results of a conventional Opera browser on Panopticlick 6.10.2 Defending yourself from Browser Fingerprinting If you accurately followed each single recommendation from the previous topics, your browser is ...
( Category:
Hacking
April 7,2019 )
azw3 |eng | 2017-01-05 | Author:Nadia El Mrabet & Marc Joye
parametrized by selecting an arbitrary x ∈ Z such that are both prime. Constant-time hashing to In Latincrypt 2012, Fouque and Tibouchi [25] presented a specialization of the procedure proposed ...
( Category:
Combinatorics
April 5,2019 )
epub |eng | 2016-03-29 | Author:Minko Gechev [Gechev, Minko]
Note In order to get platform independent reference to a DOM element, again, we can use @ContentChildren and @ViewChildren. For instance, if we have the following template: <input #todo> we ...
( Category:
Network Security
April 4,2019 )
Categories
Cryptography | Encryption |
Hacking | Network Security |
Privacy & Online Safety | Security Certifications |
Viruses |
Popular ebooks
Practical Threat Detection Engineering by Megan Roddie & Jason Deyalsingh & Gary J. Katz(6718)Effective Threat Investigation for SOC Analysts by Yahia Mostafa;(6563)
Practical Memory Forensics by Svetlana Ostrovskaya & Oleg Skulkin(6284)
Machine Learning Security Principles by John Paul Mueller(6252)
Attacking and Exploiting Modern Web Applications by Simone Onofri & Donato Onofri(5927)
Operationalizing Threat Intelligence by Kyle Wilhoit & Joseph Opacki(5885)
Solidity Programming Essentials by Ritesh Modi(4029)
Microsoft 365 Security, Compliance, and Identity Administration by Peter Rising(3669)
Operationalizing Threat Intelligence by Joseph Opacki Kyle Wilhoit(3401)
Future Crimes by Marc Goodman(3349)
Mastering Python for Networking and Security by José Manuel Ortega(3346)
Mastering Azure Security by Mustafa Toroman and Tom Janetscheck(3335)
Blockchain Basics by Daniel Drescher(3303)
Learn Computer Forensics - Second Edition by William Oettinger(3165)
Incident Response with Threat Intelligence by Roberto Martínez(2886)
Mobile App Reverse Engineering by Abhinav Mishra(2884)
Mastering Bitcoin: Programming the Open Blockchain by Andreas M. Antonopoulos(2872)
The Code Book by Simon Singh(2830)
From CIA to APT: An Introduction to Cyber Security by Edward G. Amoroso & Matthew E. Amoroso(2782)
Building a Next-Gen SOC with IBM QRadar: Accelerate your security operations and detect cyber threats effectively by Ashish M Kothekar(2741)
