Security & Encryption
epub |eng | 2013-12-27 | Author:Shoemaker, Daniel Paul & Conklin, Wm. Arthur [Shoemaker, Daniel Paul]
Handling Configuration Parameters Configuration parameters can change the behavior of an application. Securing configuration parameters is an important issue when configuration can change programmatic behaviors. Managing the security of configuration ...
( Category:
Programming
February 16,2019 )
epub, pdf |eng | 2015-02-14 | Author:Violet Blue [Blue, Violet]
SOCIAL MEDIA CHECKLIST Our relationship with social sharing—photos, videos, status updates, location check-ins, and more—changes as our lives evolve. The way we feel about sharing something one day may be ...
( Category:
Safety & First Aid
February 14,2019 )
epub |eng | 2015-04-13 | Author:Christopher Hadnagy & Michele Fincher
My Mobile Is Secure I have actually overheard someone telling another person, “If you think it's a malicious e-mail, just open it up on your <iPad/iPhone/Android device/Windows mobile device/insert other ...
( Category:
Internet & Social Media
February 14,2019 )
epub |eng | 2015-02-24 | Author:Matthew Monte
Attempting to combine and simplify two military systems was a complete failure. Starting from scratch is not necessarily much better either. Witness the Virtual Case File, a program designed to ...
( Category:
Internet & Social Media
February 14,2019 )
epub, mobi |eng | 2018-02-09 | Author:Sarhan M. Musa
7.4.1 Main Components Determination of Keys Encryption Algorithm Decryption Algorithm 7.4.1.1 Determination of Keys A User (Say User “A”) computes its private key and public key as follows: Choose two ...
( Category:
Security & Encryption
February 9,2019 )
epub |eng | 2017-02-04 | Author:Matt Walker
Questions 1. Which of the following attacks acts as a man-in-the-middle, exploiting fallback mechanisms in TLS clients? A. POODLE B. Heartbleed C. FREAK D. DROWN 2. RC4 is a simple, ...
( Category:
Internet & Social Media
February 5,2019 )
epub, pdf |eng | | Author:Scott Augenbaum
HOW TO AVOID BECOMING A VICTIM Decide if you really need cloud-based storage. Would you be better off keeping the information you’re storing in a safe or safe deposit box? ...
( Category:
Security & Encryption
January 31,2019 )
epub |eng | 2018-12-18 | Author:Andrew Coburn & Éireann Leverett & Gordon Woo
7.2.2 The Origins of US Legislation The legend of the computer whiz kid is part of hacking folklore, and has also had an influence on the development of US legislation ...
( Category:
Internet & Social Media
January 22,2019 )
epub |eng | 2015-07-24 | Author:The Editors of TIME
$250,000 Microsoft’s top cash reward to hackers who find potent ways to sneak around existing security protections in Windows $1.6M Reward money that Mozilla, the maker of Firefox, has paid ...
( Category:
Internet & Social Media
January 20,2019 )
azw3 |eng | 2013-03-03 | Author:Young, John G. [Young, John G.]
The Anti-virus Protection Response As a base to evaluate the existing free anti-virus programs, we have been relying on an excellent study project from a non-profit Austrian organization. Though it ...
( Category:
Security & Encryption
January 20,2019 )
azw3 |eng | 2014-11-30 | Author:Jeremiah Talamantes [Talamantes, Jeremiah]
Screenshot of WHOIS query of GOOGLE.COM Social Media, Job Boards & Blogs A cultural shift has occurred in the last three to five years for many companies. That shift was ...
( Category:
Security & Encryption
January 20,2019 )
epub |eng | 2014-04-17 | Author:Bill Blunden & Violet Cheung [Blunden, Bill]
147 Tracking GhostNet: Investigating a Cyber Espionage Network, Information Warfare Monitor, March 29, 2009, http://www.scribd.com/doc/13731776/Tracking-GhostNet-Investigating-a-Cyber-Espionage-Network. 148 “The rise and rise of the Russian mafia,” BBC News, November 21, 1998, http://news.bbc.co.uk/2/hi/special_report/1998/03/98/russian_mafia/70095.stm. ...
( Category:
Social Sciences
January 18,2019 )
epub |eng | 2018-10-28 | Author:Diana Graber
THE DOWNSIDES OF GAMING One morning Jules, a twelve-year-old boy whose sweet face makes him look barely ten, arrived early to class. I asked him how his weekend was, and ...
( Category:
Security & Encryption
January 16,2019 )
epub |eng | | Author:Python Penetration Testing Essentials
Testing the security system using custom packet crafting and injection So far, you have seen the implementation of ARP spoofing. Now, let's learn about an attack called the network disassociation ...
( Category:
Programming Languages
January 7,2019 )
epub, azw3, pdf |eng | 2018-12-31 | Author:Julien Danjou
wraps: A Decorator for Decorators It can get tedious to use update_wrapper() manually when creating decorators, so functools provides a decorator for decorators called wraps. Listing 7-6 shows the wraps ...
( Category:
Internet & Social Media
January 1,2019 )
Categories
Cryptography | Encryption |
Hacking | Network Security |
Privacy & Online Safety | Security Certifications |
Viruses |
Popular ebooks
Practical Threat Detection Engineering by Megan Roddie & Jason Deyalsingh & Gary J. Katz(6718)Effective Threat Investigation for SOC Analysts by Yahia Mostafa;(6563)
Practical Memory Forensics by Svetlana Ostrovskaya & Oleg Skulkin(6284)
Machine Learning Security Principles by John Paul Mueller(6252)
Attacking and Exploiting Modern Web Applications by Simone Onofri & Donato Onofri(5927)
Operationalizing Threat Intelligence by Kyle Wilhoit & Joseph Opacki(5885)
Solidity Programming Essentials by Ritesh Modi(4029)
Microsoft 365 Security, Compliance, and Identity Administration by Peter Rising(3669)
Operationalizing Threat Intelligence by Joseph Opacki Kyle Wilhoit(3401)
Future Crimes by Marc Goodman(3349)
Mastering Python for Networking and Security by José Manuel Ortega(3346)
Mastering Azure Security by Mustafa Toroman and Tom Janetscheck(3335)
Blockchain Basics by Daniel Drescher(3303)
Learn Computer Forensics - Second Edition by William Oettinger(3165)
Incident Response with Threat Intelligence by Roberto Martínez(2886)
Mobile App Reverse Engineering by Abhinav Mishra(2884)
Mastering Bitcoin: Programming the Open Blockchain by Andreas M. Antonopoulos(2872)
The Code Book by Simon Singh(2830)
From CIA to APT: An Introduction to Cyber Security by Edward G. Amoroso & Matthew E. Amoroso(2782)
Building a Next-Gen SOC with IBM QRadar: Accelerate your security operations and detect cyber threats effectively by Ashish M Kothekar(2741)
