Security & Encryption
epub |eng | 2018-01-15 | Author:Dr. Eric Cole [Dr. Eric Cole]
Password Complexity and Perplexity Just about everyone uses at least one password; some people have upwards of ten. Password diligence and best practices deteriorate as people view them as a ...
( Category:
Security & Encryption
January 12,2018 )
azw3, epub |eng | 2017-02-24 | Author:Alan T. Norman
Just so we know, the little figure above was just written to introduce a new variable type, which we will definitely use later on. The variable type is char. This ...
( Category:
Internet & Social Media
January 11,2018 )
epub |eng | 2017-12-06 | Author:James M. Stewart
Protocol/service Port(s) Notes FTP TCP ports 20 (data) and 21 (control) SSH TCP port 22 All protocols encrypted by SSH also use TCP port 22, such as SFTP, SHTTP, SCP, ...
( Category:
Certification
January 6,2018 )
epub |eng | 2015-01-04 | Author:Jim Manico
Securing Data in Transit The standard way to protect against the network-based threats mentioned earlier is to use the cryptographic protocol Secure Sockets Layer (SSL) or its modern incarnation, Transport ...
( Category:
Web Development & Design
January 4,2018 )
epub |eng | 2012-08-17 | Author:Christopher Elisan
LINGO UAC, as defined by Microsoft, is a security component that allows an administrator to enter credentials during a nonadministrator user session to perform occasional administrative tasks. Fake AV also ...
( Category:
Networking & Cloud Computing
January 3,2018 )
epub |eng | 2015-07-13 | Author:Leclair, Jane
Conclusion and Future Trends in the Critical Manufacturing Sector It is very important to remember that maintaining a state of compliance with the regulations and laws that govern a sector ...
( Category:
Security & Encryption
January 3,2018 )
epub, azw3, mobi, pdf |eng | 2016-07-22 | Author:Don Silver [Silver, Don]
It’s best to do regular backups after doing antivirus and antispyware scans first to get rid of any malware on the device. If your device later gets hacked, you’ll be ...
( Category:
Security & Encryption
January 3,2018 )
epub |eng | 2015-08-27 | Author:Lucas, Edward
7 The Spy in Your Pocket The mobile phone enables probably the most sophisticated and pervasive attacks on privacy and anonymity yet invented. The benefit is greatest for governments. If ...
( Category:
Security & Encryption
January 3,2018 )
epub |eng | 2012-06-21 | Author:Sean Bodmer
Deception Is Essential The computer security business in both the public and private sectors is led by an important and influential group of people who know so little about so ...
( Category:
Networking & Cloud Computing
January 3,2018 )
epub |eng | | Author:Gilberto Nájera-Gutiérrez
( Category:
Networking & Cloud Computing
January 3,2018 )
epub, pdf |eng | 2012-02-27 | Author:Edward Amoroso
Figure 7.1 Size comparison issues in a trusted computing base. A major consideration in the protection of national infrastructure thus becomes how to manage, promote, and ensure proper human discretion ...
( Category:
Management & Leadership
January 3,2018 )
epub |eng | 2014-01-03 | Author:Sood, Aditya, Enbody, Richard & Richard Enbody
Inline hooking Inline hooking allows the attackers to overwrite the first few bytes of target function and place a jump instruction that redirects the execution flow to the attacker controlled ...
( Category:
Networking & Cloud Computing
January 3,2018 )
azw3, epub |eng | 2017-06-12 | Author:Andreas M. Antonopoulos [Antonopoulos, Andreas M.]
Transaction Pools Almost every node on the bitcoin network maintains a temporary list of unconfirmed transactions called the memory pool, mempool, or transaction pool. Nodes use this pool to keep ...
( Category:
Processes & Infrastructure
January 2,2018 )
epub |eng | 2016-05-30 | Author:Jim Bronskill & David McKie [Jim Bronskill]
2. In Your Vehicle Your family vehicle is learning more about who’s behind the wheel — everything from where you like to shop to how hard you brake — as ...
( Category:
Security & Encryption
December 30,2017 )
azw3, epub |eng | 2017-11-21 | Author:Aumasson, Jean-Philippe [Aumasson, Jean-Philippe]
The trick to authenticating multiple messages using a universal hash function arrived thanks to IBM researchers Wegman and Carter and their 1981 paper “New Hash Functions and Their Use in ...
( Category:
Security & Encryption
December 28,2017 )
Categories
Cryptography | Encryption |
Hacking | Network Security |
Privacy & Online Safety | Security Certifications |
Viruses |
Popular ebooks
Practical Threat Detection Engineering by Megan Roddie & Jason Deyalsingh & Gary J. Katz(6727)Effective Threat Investigation for SOC Analysts by Yahia Mostafa;(6570)
Practical Memory Forensics by Svetlana Ostrovskaya & Oleg Skulkin(6289)
Machine Learning Security Principles by John Paul Mueller(6260)
Attacking and Exploiting Modern Web Applications by Simone Onofri & Donato Onofri(5932)
Operationalizing Threat Intelligence by Kyle Wilhoit & Joseph Opacki(5894)
Solidity Programming Essentials by Ritesh Modi(4036)
Microsoft 365 Security, Compliance, and Identity Administration by Peter Rising(3673)
Operationalizing Threat Intelligence by Joseph Opacki Kyle Wilhoit(3406)
Future Crimes by Marc Goodman(3350)
Mastering Python for Networking and Security by José Manuel Ortega(3347)
Mastering Azure Security by Mustafa Toroman and Tom Janetscheck(3335)
Blockchain Basics by Daniel Drescher(3303)
Learn Computer Forensics - Second Edition by William Oettinger(3168)
Incident Response with Threat Intelligence by Roberto Martínez(2890)
Mobile App Reverse Engineering by Abhinav Mishra(2884)
Mastering Bitcoin: Programming the Open Blockchain by Andreas M. Antonopoulos(2872)
The Code Book by Simon Singh(2831)
From CIA to APT: An Introduction to Cyber Security by Edward G. Amoroso & Matthew E. Amoroso(2782)
Building a Next-Gen SOC with IBM QRadar: Accelerate your security operations and detect cyber threats effectively by Ashish M Kothekar(2748)
