Security & Encryption
epub |eng | 2015-11-01 | Author:Joseph Muniz & Gary McIntyre & Nadhem AlFardan [Muniz, Joseph]

The Upper and Lower Bounds of Technology Outside of the impact of process, another unforeseen challenge for the SOC team is associated with the technologies that could underpin SOC services. ...
( Category: Networking & Cloud Computing August 15,2017 )
epub, mobi |eng | | Author:2015

Fingerprinting servers through HTTP headers The next part of the HTTP protocol that we will be concentrating on are the HTTP headers. Found in both the requests and responses from ...
( Category: Security & Encryption August 14,2017 )
epub, mobi, pdf |eng | 2014-07-21 | Author:Phil Champagne [Champagne, Phil]

* * * Re: Stealing Coins Posted by knightmb, July 25, 2010, 07:34:42 PM * * * Very nice. *another reason why I love open source* As I understand it ...
( Category: History & Culture August 13,2017 )
epub |eng | 2016-05-31 | Author:Sahinoglu, Mehmet;

5.13 APPLICATION TO NATIONAL CYBERSECURITY RISK One of the most severe threats facing the United States or all free nations today is the national (federal and state) cyber-security in the ...
( Category: Technology July 27,2017 )
epub |eng | 2010-01-02 | Author:Jeffrey Carr [Jeffrey Carr]

( Category: Security & Encryption July 23,2017 )
azw3 |eng | 2015-04-26 | Author:Woland, Aaron & Redmon, Kevin [Woland, Aaron]

Figure 14-45 WLC Endpoint Status—Internet_Only. Now that we have validated the connection from the standpoint of the WLC, we can take a look at ISE, highlighting the communications that are ...
( Category: Networking & Cloud Computing July 22,2017 )
epub |eng | 2015-04-26 | Author:Woland, Aaron & Redmon, Kevin

Figure 14-45 WLC Endpoint Status—Internet_Only. Now that we have validated the connection from the standpoint of the WLC, we can take a look at ISE, highlighting the communications that are ...
( Category: Networking & Cloud Computing July 22,2017 )
epub, pdf |eng | 2014-07-12 | Author:Michael Collins

( Category: Networking & Cloud Computing July 13,2017 )
epub |eng | 2017-06-23 | Author:Miles Price [Price, Miles]

( Category: Security & Encryption July 7,2017 )
azw3, epub, pdf |eng | 2017-06-23 | Author:Miles Price

Physical security is a critical part of cyber security. Hackers will always look for any weakness that they can find, whether online or offline. Chapter 5: Social Engineering Did you ...
( Category: Security & Encryption July 7,2017 )
mobi, epub |eng | 2011-12-26 | Author:Kevin Freeman

And indeed, in the lead-up to September 2008, there was intense and focused investment in the commodity markets both directly and via proxies coming from oil producers and sovereign wealth ...
( Category: Politics & Government June 29,2017 )
mobi |eng | 2000-12-31 | Author:Unknown

CHAPTER 6 The first thing I notice is the hard bed under my back. My fingers bunch the waffle-weave blanket in my hands. I recognize the texture. Between that and ...
( Category: Historical June 29,2017 )
epub, mobi |eng | 2015-06-28 | Author:Conrad Barski & Chris Wilmer

Crowley and the Unfortunate Jelly-Filled Donut Incident For the remainder of this chapter, we’ll discuss the details of elliptical curve cryptography (ECC). But before we delve into the details of ...
( Category: Security & Encryption June 29,2017 )
mobi |eng | 2015-06-01 | Author:

05/2013 Lesson 10: File I-O This is a slightly more advanced topic than what I have covered so far, but I think that it is useful. File I/O is reading ...
( Category: Internet & Social Media June 29,2017 )