Security & Encryption
epub, mobi |eng | 2018-01-24 | Author:Yuri Diogenes
Remote Registry The heart of the Windows OS is the Registry as it gives control over both the hardware and software of a machine. The Registry is normally used as ...
( Category:
Operating Systems
December 27,2018 )
azw3 |eng | 2018-12-20 | Author:Redmond PhD, Dr. Michael C
Preparations Before an Event or Incident ❖ Application Security It is essential to segregate conflicting duties and protect sensitive information through appropriate security principles for applications. Process & Systems Integrity ...
( Category:
Networking & Cloud Computing
December 26,2018 )
epub, azw3, pdf |eng | 2019-12-22 | Author:Dennis Andriesse
Running the Gadget Finder The command line interface for the gadget finder is the same as for the disassembly tools. Listing 8-12 shows what the output should look like. Listing ...
( Category:
Operating Systems
December 23,2018 )
epub |eng | 2016-12-04 | Author:Stefan Baumgartner [Stefan Baumgartner]
This feature has become significant because developers often rely on code transpilers like CoffeeScript, TypeScript, or Babel.js. Those tools allow you to write JavaScript code in a more modern or ...
( Category:
Web Development & Design
December 22,2018 )
epub, azw3 |eng | 2018-12-04 | Author:OccupyTheWeb
Summary Linux has a number of commands to enable you to combine and compress your files for easier transfer. For combining files, tar is the command of choice, and you ...
( Category:
Internet & Social Media
December 18,2018 )
mobi |eng | 2015-07-14 | Author:Aaron Cordova, Billie Rinaldi, and Michael Wall
Secondary Indexing Applications that use a single table and employ a simple access pattern are among the most scalable, consistent, and fast. This type of design can serve in a ...
( Category:
Security & Encryption
December 18,2018 )
epub |eng | 2017-04-27 | Author:Arthur Salmon
( Category:
Networking & Cloud Computing
December 15,2018 )
epub |eng | 2018-12-11 | Author:Ray Rothrock
CREATING DIGITAL RESILIENCE ONE NODE AT A TIME In its early evolution from the ARPANET and NSFNet, the Internet incorporated in its architecture and protocols the rudiments of resilience (Chapter ...
( Category:
Security & Encryption
December 12,2018 )
epub |eng | 2018-07-25 | Author:Tony Miedaner [Miedaner, Tony]
Promiscuous mode /etc/rc3.d/S110promscuous Signature feed We use the ThreatExpert feed; the script to do this is included in Appendix A, Suricata-downloads.sh. IP reputation We use multiple sources for our bad ...
( Category:
Security & Encryption
December 11,2018 )
epub, pdf |eng | 2016-12-10 | Author:Alasdair Gilchrist
However, upgrades are very risky; –Loss of power – Should the device, especially an IoT device lose power half why through a Firmware upgrade it could result in bricking the ...
( Category:
Internet & Social Media
December 11,2018 )
epub |eng | 2018-06-13 | Author:karina astudillo
( Category:
Internet & Social Media
December 10,2018 )
epub |eng | 2018-06-27 | Author:MacDonnell Ulsch
( Category:
Management & Leadership
December 10,2018 )
epub |eng | 2017-12-09 | Author:Daniel Lachance
A QUICK ANSWER KEY 1. D 2. C 3. B 4. A 5. C 6. B, C 7. C, D, E 8. C 9. D 10. C 11. A 12. ...
( Category:
Networking & Cloud Computing
December 10,2018 )
epub, pdf |eng | 2018-06-26 | Author:Alexis John Lingad [Lingad, Alexis John]
This situation happens frequently because of the lack of know-how or sometimes laziness of so many developers. Based on the research of Stephen from SANS Technology Institute, there are still ...
( Category:
Internet & Social Media
December 10,2018 )
epub |eng | 2018-06-24 | Author:Christopher Hadnagy [Hadnagy, Christopher]
PRO TIP You don't want to be warm and friendly but then become cold and uncaring as soon as you get what you want. Those kinds of incongruent actions can ...
( Category:
Security & Encryption
December 10,2018 )
Categories
Cryptography | Encryption |
Hacking | Network Security |
Privacy & Online Safety | Security Certifications |
Viruses |
Popular ebooks
Practical Threat Detection Engineering by Megan Roddie & Jason Deyalsingh & Gary J. Katz(6718)Effective Threat Investigation for SOC Analysts by Yahia Mostafa;(6563)
Practical Memory Forensics by Svetlana Ostrovskaya & Oleg Skulkin(6284)
Machine Learning Security Principles by John Paul Mueller(6252)
Attacking and Exploiting Modern Web Applications by Simone Onofri & Donato Onofri(5927)
Operationalizing Threat Intelligence by Kyle Wilhoit & Joseph Opacki(5885)
Solidity Programming Essentials by Ritesh Modi(4029)
Microsoft 365 Security, Compliance, and Identity Administration by Peter Rising(3669)
Operationalizing Threat Intelligence by Joseph Opacki Kyle Wilhoit(3401)
Future Crimes by Marc Goodman(3349)
Mastering Python for Networking and Security by José Manuel Ortega(3346)
Mastering Azure Security by Mustafa Toroman and Tom Janetscheck(3335)
Blockchain Basics by Daniel Drescher(3303)
Learn Computer Forensics - Second Edition by William Oettinger(3165)
Incident Response with Threat Intelligence by Roberto Martínez(2886)
Mobile App Reverse Engineering by Abhinav Mishra(2884)
Mastering Bitcoin: Programming the Open Blockchain by Andreas M. Antonopoulos(2872)
The Code Book by Simon Singh(2830)
From CIA to APT: An Introduction to Cyber Security by Edward G. Amoroso & Matthew E. Amoroso(2782)
Building a Next-Gen SOC with IBM QRadar: Accelerate your security operations and detect cyber threats effectively by Ashish M Kothekar(2741)
