Security & Encryption
epub |eng | 2015-06-29 | Author:Spivey, Ben & Echeverria, Joey

Tip Using WITH GRANT OPTION is a great way to ease the administration burden on a global SQL administrator. A common example is to create a Hive database for a ...
( Category: Databases & Big Data March 11,2018 )
azw3, pdf |eng | 2017-06-19 | Author:Evan Gilman & Doug Barth [Gilman, Evan]

Build systems can ingest signed code and produce a signed output, but the function(s) applied in between (i.e., the build itself) is generally not protected cryptographically — this is where ...
( Category: Networking & Cloud Computing March 11,2018 )
azw3 |eng | 2015-10-13 | Author:Todd Lammle & Alex Tatistcheff & John Gay [Lammle, Todd]

Figure 6.48 Reviewed status Figure 6.49 shows a portion of the search page where you can also search by name for events reviewed by a particular user or search for ...
( Category: Networking & Cloud Computing March 11,2018 )
epub |eng | 2011-01-27 | Author:Niels Ferguson & Bruce Schneier & Tadayoshi Kohno

10.2 Generating Small Primes Sometimes it is useful to have a list of small primes, so here is the Sieve of Eratosthenes, which is still the best algorithm for generating ...
( Category: Security & Encryption March 11,2018 )
epub |eng | 2015-03-11 | Author:Springer, Paul;

Hayden, Michael Michael Hayden (b. 1945) is a retired U.S. Air Force general who served as the 15th director of the National Security Agency (NSA) and the Central Intelligence Agency ...
( Category: Military March 11,2018 )
azw3 |eng | 2017-06-08 | Author:Brandon Perry [Perry, Brandon]

Installing OpenVAS The easiest way to install OpenVAS is to download the prebuilt OpenVAS Demo Virtual Appliance from http://www.openvas.org/. The file you’ll download is an .ova file (open virtualization archive) ...
( Category: Internet & Social Media March 10,2018 )
epub |eng | 2011-02-21 | Author:poulsen,kevin [poulsen,kevin]

20 The Starlight Room ine chandeliers hung over the lush velvet booths at Harry Denton’s Starlight Room, the light scattering off a two-hundred-pound mirror bal suspended over the dance floor. ...
( Category: Specific Groups March 8,2018 )
epub |eng | 2013-01-29 | Author:Walker, Matt

( Category: Internet & Social Media March 5,2018 )
epub |eng | | Author:2013

Adding Google Play Services to Android Studio The first thing we need to know is what we need to add to our Android Studio. We have just learned that the ...
( Category: Mobile Phones, Tablets & E-Readers March 5,2018 )
epub, mobi |eng | 2015-04-24 | Author:Sweigart, Al [Sweigart, Al]

Practice Exercises, Chapter 12, Set E Practice exercises can be found at http://invpy.com/hackingpractice12E. Summary The dictionary data type is useful because like a list it can contain multiple values. However ...
( Category: Internet & Social Media March 4,2018 )
epub |eng | | Author:2013

Chapter 6. Your Tools – Crypto APIs To respect user privacy, applications that process sensitive data need to protect this data from prying eyes. Although the Android stack provides layered ...
( Category: Operating Systems March 3,2018 )
epub, mobi |eng | | Author:2016

Using validated cryptographic implementations is an excellent practice overall, but do it smartly and don't assume that certain cryptographic modules that would seem to meet all of the functional and ...
( Category: Mobile Phones, Tablets & E-Readers March 3,2018 )
azw3, epub |eng | 2016-07-13 | Author:Hines, Bill & Doerr, Derek & Kramer, Terrill & McWilliams, Len [Hines, Bill]

Listing 2-4 ISSM User Group Access Profile for the ISSM Log Target. "*/*/*?Access=r" "*/default/logging/target?Name=ISSMLogTarget&Access=r+w+a+d+x" These access profiles provide group members with read-only access to all application domains and full permissions ...
( Category: Security & Encryption February 26,2018 )
mobi |eng | 2016-07-12 | Author:Bill Hines & Derek Doerr & Terrill Kramer & Len McWilliams

Listing 2-4 ISSM User Group Access Profile for the ISSM Log Target. "*/*/*?Access=r" "*/default/logging/target?Name=ISSMLogTarget&Access=r+w+a+d+x" These access profiles provide group members with read-only access to all application domains and full permissions ...
( Category: Security & Encryption February 26,2018 )