Security & Encryption
epub |eng | 2015-06-29 | Author:Spivey, Ben & Echeverria, Joey
Tip Using WITH GRANT OPTION is a great way to ease the administration burden on a global SQL administrator. A common example is to create a Hive database for a ...
( Category:
Databases & Big Data
March 11,2018 )
azw3, pdf |eng | 2017-06-19 | Author:Evan Gilman & Doug Barth [Gilman, Evan]
Build systems can ingest signed code and produce a signed output, but the function(s) applied in between (i.e., the build itself) is generally not protected cryptographically — this is where ...
( Category:
Networking & Cloud Computing
March 11,2018 )
azw3 |eng | 2015-10-13 | Author:Todd Lammle & Alex Tatistcheff & John Gay [Lammle, Todd]
Figure 6.48 Reviewed status Figure 6.49 shows a portion of the search page where you can also search by name for events reviewed by a particular user or search for ...
( Category:
Networking & Cloud Computing
March 11,2018 )
epub |eng | 2011-01-27 | Author:Niels Ferguson & Bruce Schneier & Tadayoshi Kohno
10.2 Generating Small Primes Sometimes it is useful to have a list of small primes, so here is the Sieve of Eratosthenes, which is still the best algorithm for generating ...
( Category:
Security & Encryption
March 11,2018 )
epub |eng | 2015-03-11 | Author:Springer, Paul;
Hayden, Michael Michael Hayden (b. 1945) is a retired U.S. Air Force general who served as the 15th director of the National Security Agency (NSA) and the Central Intelligence Agency ...
( Category:
Military
March 11,2018 )
mobi |eng | 2014-09-01 | Author:Adam Tanner
( Category:
Marketing & Sales
March 10,2018 )
azw3 |eng | 2017-06-08 | Author:Brandon Perry [Perry, Brandon]
Installing OpenVAS The easiest way to install OpenVAS is to download the prebuilt OpenVAS Demo Virtual Appliance from http://www.openvas.org/. The file you’ll download is an .ova file (open virtualization archive) ...
( Category:
Internet & Social Media
March 10,2018 )
epub |eng | 2011-02-21 | Author:poulsen,kevin [poulsen,kevin]
20 The Starlight Room ine chandeliers hung over the lush velvet booths at Harry Denton’s Starlight Room, the light scattering off a two-hundred-pound mirror bal suspended over the dance floor. ...
( Category:
Specific Groups
March 8,2018 )
epub |eng | 2013-01-29 | Author:Walker, Matt
( Category:
Internet & Social Media
March 5,2018 )
epub |eng | | Author:2013
Adding Google Play Services to Android Studio The first thing we need to know is what we need to add to our Android Studio. We have just learned that the ...
( Category:
Mobile Phones, Tablets & E-Readers
March 5,2018 )
epub, mobi |eng | 2015-04-24 | Author:Sweigart, Al [Sweigart, Al]
Practice Exercises, Chapter 12, Set E Practice exercises can be found at http://invpy.com/hackingpractice12E. Summary The dictionary data type is useful because like a list it can contain multiple values. However ...
( Category:
Internet & Social Media
March 4,2018 )
epub |eng | | Author:2013
Chapter 6. Your Tools – Crypto APIs To respect user privacy, applications that process sensitive data need to protect this data from prying eyes. Although the Android stack provides layered ...
( Category:
Operating Systems
March 3,2018 )
epub, mobi |eng | | Author:2016
Using validated cryptographic implementations is an excellent practice overall, but do it smartly and don't assume that certain cryptographic modules that would seem to meet all of the functional and ...
( Category:
Mobile Phones, Tablets & E-Readers
March 3,2018 )
azw3, epub |eng | 2016-07-13 | Author:Hines, Bill & Doerr, Derek & Kramer, Terrill & McWilliams, Len [Hines, Bill]
Listing 2-4 ISSM User Group Access Profile for the ISSM Log Target. "*/*/*?Access=r" "*/default/logging/target?Name=ISSMLogTarget&Access=r+w+a+d+x" These access profiles provide group members with read-only access to all application domains and full permissions ...
( Category:
Security & Encryption
February 26,2018 )
mobi |eng | 2016-07-12 | Author:Bill Hines & Derek Doerr & Terrill Kramer & Len McWilliams
Listing 2-4 ISSM User Group Access Profile for the ISSM Log Target. "*/*/*?Access=r" "*/default/logging/target?Name=ISSMLogTarget&Access=r+w+a+d+x" These access profiles provide group members with read-only access to all application domains and full permissions ...
( Category:
Security & Encryption
February 26,2018 )
Categories
Cryptography | Encryption |
Hacking | Network Security |
Privacy & Online Safety | Security Certifications |
Viruses |
Popular ebooks
Practical Threat Detection Engineering by Megan Roddie & Jason Deyalsingh & Gary J. Katz(6736)Effective Threat Investigation for SOC Analysts by Yahia Mostafa;(6578)
Practical Memory Forensics by Svetlana Ostrovskaya & Oleg Skulkin(6297)
Machine Learning Security Principles by John Paul Mueller(6271)
Attacking and Exploiting Modern Web Applications by Simone Onofri & Donato Onofri(5944)
Operationalizing Threat Intelligence by Kyle Wilhoit & Joseph Opacki(5904)
Solidity Programming Essentials by Ritesh Modi(4041)
Microsoft 365 Security, Compliance, and Identity Administration by Peter Rising(3680)
Operationalizing Threat Intelligence by Joseph Opacki Kyle Wilhoit(3410)
Future Crimes by Marc Goodman(3351)
Mastering Python for Networking and Security by José Manuel Ortega(3348)
Mastering Azure Security by Mustafa Toroman and Tom Janetscheck(3337)
Blockchain Basics by Daniel Drescher(3305)
Learn Computer Forensics - Second Edition by William Oettinger(3172)
Incident Response with Threat Intelligence by Roberto Martínez(2897)
Mobile App Reverse Engineering by Abhinav Mishra(2886)
Mastering Bitcoin: Programming the Open Blockchain by Andreas M. Antonopoulos(2873)
The Code Book by Simon Singh(2832)
From CIA to APT: An Introduction to Cyber Security by Edward G. Amoroso & Matthew E. Amoroso(2783)
Building a Next-Gen SOC with IBM QRadar: Accelerate your security operations and detect cyber threats effectively by Ashish M Kothekar(2758)
