Security & Encryption
epub |eng | 2015-05-09 | Author:Wright, Joshua

* * * A sample packet capture of a Fitbit One device that can be displayed using the SmartRF Packet Sniffer software (without the CC2540 USB hardware) is available on ...
( Category: Cryptography May 9,2019 )
epub, pdf |eng | 2019-05-03 | Author:Kalle Rosenbaum [Kalle Rosenbaum]

( Category: Cryptography May 7,2019 )
epub |eng | 2018-12-17 | Author:Stanley Siegel & Chris Williams & Scott Donaldson [Stanley Siegel]

Guarding Against Counterfeit E-Mails and Secure E-Mail Because e-mail protocols are inherently insecure, it may be possible for attackers to generate and send counterfeit e-mails. Counterfeit e-mails may appear to ...
( Category: Hacking May 6,2019 )
epub |eng | 2019-03-15 | Author:Will Button

Then we're going to use async and await to get the deployed version of our contract from the Ethereum network. So, let me break a async and await down for ...
( Category: Encryption May 6,2019 )
epub |eng | 2019-03-25 | Author:Salman A. Baset

Smart contract considerations As we mentioned, smart contracts are vital to business interaction between the participants of any blockchain network. As they essentially contain the rules and conditions under which ...
( Category: Cryptography May 5,2019 )
epub, pdf |eng | 2019-02-13 | Author:Arjuna Sky Kok

def fillPosts(self, posts): self.clearTweetsField() for post in posts: label_field = QtWidgets.QLabel(post) self.tweets_layout.addWidget(label_field) The same strategy is used in the two following methods. We clear the bookmark widgets from the bookmarks ...
( Category: Cryptography May 4,2019 )
epub |eng | 2019-02-14 | Author:Roman Zabicki [Roman Zabicki]

( Category: Hacking May 3,2019 )
epub |eng | 2019-03-29 | Author:Himanshu Sharma

( Category: Hacking May 3,2019 )
epub, azw3 |eng | 2019-05-06 | Author:Sergey Bratus & Eugene Rodionov & Alex Matrosov [Sergey Bratus]

( Category: Testing May 2,2019 )
epub, pdf |eng | 2019-03-24 | Author:Chris Dotson

User Reports In a perfect world, all bugs and vulnerabilities would be discovered and fixed before users see them. Now that you’ve stopped laughing, you need to consider that you ...
( Category: Cloud Computing April 20,2019 )
epub |eng | 2017-05-14 | Author:Richard Greene,Rachel Robison-Greene

Only Light Your Torch If There Is No Recourse So far, my friend, you’ve seen two roads. The one road was paved by Edmund Burke, who many regard as the ...
( Category: Technothrillers April 10,2019 )
epub, azw3, pdf |eng | 2015-03-17 | Author:Christopher Hadnagy & Michele Fincher [Hadnagy, Christopher]

My Mobile Is Secure I have actually overheard someone telling another person, “If you think it's a malicious e-mail, just open it up on your <iPad/iPhone/Android device/Windows mobile device/insert other ...
( Category: Electronic Data Interchange (EDI) April 8,2019 )
mobi |eng | 2019-03-20 | Author:Novelli, Stefano & Silvestri, Marco [Novelli, Stefano]

Figure 23: results of a conventional Opera browser on Panopticlick 6.10.2 Defending yourself from Browser Fingerprinting If you accurately followed each single recommendation from the previous topics, your browser is ...
( Category: Hacking April 7,2019 )
azw3 |eng | 2017-01-05 | Author:Nadia El Mrabet & Marc Joye

parametrized by selecting an arbitrary x ∈ Z such that are both prime. Constant-time hashing to In Latincrypt 2012, Fouque and Tibouchi [25] presented a specialization of the procedure proposed ...
( Category: Combinatorics April 5,2019 )
epub |eng | 2016-03-29 | Author:Minko Gechev [Gechev, Minko]

Note In order to get platform independent reference to a DOM element, again, we can use @ContentChildren and @ViewChildren. For instance, if we have the following template: <input #todo> we ...
( Category: Network Security April 4,2019 )