Security & Encryption
azw3, epub |eng | 2015-09-30 | Author:Philip Polstra [Polstra, Philip]
0x400 Metadata Csum Checksums are used on metadata items 0x800 Replica The filesystem supports replicas 0x1000 ReadOnly Should only be mounted as read-only When the Sparse Superblock feature is in ...
( Category:
Security & Encryption
December 23,2017 )
epub, azw3 |eng | 0101-01-01 | Author:Oleg Afonin & Vladimir Katalov [Afonin, Oleg & Katalov, Vladimir]
Specify the file name: The path is relative to the home directory: Wait while the filesystem is being extracted: This can be a lengthy process, especially when acquiring devices with ...
( Category:
Networking & Cloud Computing
December 23,2017 )
azw3 |eng | 2017-09-06 | Author:K. Connors
When уоu аrе trаvеlіng, the рrосеѕѕ оf еxсhаngіng currency іѕ quite сumbеrѕоmе. Thіѕ іѕ wоrѕе whеn you аrе gоіng tо more thаn оnе dеѕtіnаtіоn. In аddіtіоn, саrrуіng large amounts оf ...
( Category:
History & Culture
December 18,2017 )
epub |eng | 2016-12-14 | Author:Tyson T. Brooks
Figure 7.2 An IoT-enabled home automation system. Reproduced with permission of IEEE. The controller and the field devices (i.e., smart devices) share raw operational data, raw informational data, instructions, or ...
( Category:
Security & Encryption
December 7,2017 )
epub |eng | 2017-04-01 | Author:Mike Chapple & David Seidl
If large numbers of devices or systems were inspected, the full listing of targets is often moved to an appendix, and the listing of what was reviewed will list a ...
( Category:
Certification
December 7,2017 )
epub |eng | 2005-12-07 | Author:Richard Bejtlich
Tasks NSM engineers should be proficient in at least one scripting language and one programming language. Most find shell or PERL scripting to be very helpful. Shell scripts can be ...
( Category:
Networking & Cloud Computing
December 7,2017 )
mobi, azw3 |eng | 2015-02-23 | Author:Marc Goodman [Goodman, Marc]
Hacking Hardware A much rarer breed of hacker targets the physical elements that make up a computer system, including the microchips, electronics, controllers, memory, circuits, components, transistors, and sensors—core elements ...
( Category:
Technology
December 2,2017 )
mobi, epub |eng | 0101-01-01 | Author:Adam Levin
Loss of Reputation When a medical file has been altered by a suspect, it becomes an albatross around the victim’s neck. A judge in the Skodnek case wrote: The evidence ...
( Category:
Personal Finance
December 2,2017 )
mobi, pdf |eng | 2012-05-13 | Author:Thomas Strentz [Strentz, Thomas]
144 Psychological Aspects of Crisis Negotiation, Second Edition Figure 14.1 Negotiating face to face with a jumper requires a team effort. Note the weapon and the protective hold of the ...
( Category:
Psychology & Counseling
December 2,2017 )
epub, mobi, pdf |eng | 2016-12-01 | Author:Jean-Philippe Aumasson
How SipHash Works SipHash uses a trick that makes it more secure than basic sponge functions: instead of XORing message blocks only once before the permutation, SipHash XORs them before ...
( Category:
Security & Encryption
December 1,2017 )
azw3 |eng | 2013-08-01 | Author:Nate Anderson
The anonymity. Unlike early spammers, the Mega-D owner covered his tracks better, at least in public. He sent messages composed by others, which pointed to websites that were managed by ...
( Category:
Security & Encryption
November 29,2017 )
epub |eng | 2015-09-08 | Author:Andrei Soldatov & Irina Borogan [Soldatov, Andrei & Borogan, Irina]
On the outskirts of St. Petersburg, in a glossy new business center, there is a small company named Protei. The company’s office was a bit chaotic in 2011—they had just ...
( Category:
Politics & Government
November 28,2017 )
epub |eng | 2011-05-09 | Author:Kevin Beaver & Peter T. Davis [Beaver, Kevin & Davis, Peter T.]
Chapter 10: Still at War 171 3. Select the directory where you want to install the program. Use the default unless you have a compelling reason not to do so. ...
( Category:
Internet & Social Media
November 28,2017 )
epub |eng | | Author:Kianoosh G. Boroojeni, M. Hadi Amini & S. S. Iyengar
(3.31) If the parameter μ is small, it means that the columns subspace of the matrix U is not aligned with the standard basis. The orthogonal matrix U is used ...
( Category:
Engineering
November 26,2017 )
epub |eng | 2011-02-22 | Author:Kevin Poulsen [Poulsen, Kevin]
Chris relocated Tea to his own neighborhood and paid for her to rent an apartment in her real name in Dana Point, a coastal town in southern Orange County. At ...
( Category:
Specific Groups
November 25,2017 )
Categories
Cryptography | Encryption |
Hacking | Network Security |
Privacy & Online Safety | Security Certifications |
Viruses |
Popular ebooks
Practical Threat Detection Engineering by Megan Roddie & Jason Deyalsingh & Gary J. Katz(6727)Effective Threat Investigation for SOC Analysts by Yahia Mostafa;(6570)
Practical Memory Forensics by Svetlana Ostrovskaya & Oleg Skulkin(6289)
Machine Learning Security Principles by John Paul Mueller(6260)
Attacking and Exploiting Modern Web Applications by Simone Onofri & Donato Onofri(5933)
Operationalizing Threat Intelligence by Kyle Wilhoit & Joseph Opacki(5894)
Solidity Programming Essentials by Ritesh Modi(4036)
Microsoft 365 Security, Compliance, and Identity Administration by Peter Rising(3673)
Operationalizing Threat Intelligence by Joseph Opacki Kyle Wilhoit(3406)
Future Crimes by Marc Goodman(3350)
Mastering Python for Networking and Security by José Manuel Ortega(3347)
Mastering Azure Security by Mustafa Toroman and Tom Janetscheck(3335)
Blockchain Basics by Daniel Drescher(3303)
Learn Computer Forensics - Second Edition by William Oettinger(3168)
Incident Response with Threat Intelligence by Roberto Martínez(2890)
Mobile App Reverse Engineering by Abhinav Mishra(2884)
Mastering Bitcoin: Programming the Open Blockchain by Andreas M. Antonopoulos(2872)
The Code Book by Simon Singh(2831)
From CIA to APT: An Introduction to Cyber Security by Edward G. Amoroso & Matthew E. Amoroso(2782)
Building a Next-Gen SOC with IBM QRadar: Accelerate your security operations and detect cyber threats effectively by Ashish M Kothekar(2748)
