Security & Encryption
epub, mobi |eng | 2015-02-23 | Author:Marc Goodman [Goodman, Marc]
Hacking Hardware A much rarer breed of hacker targets the physical elements that make up a computer system, including the microchips, electronics, controllers, memory, circuits, components, transistors, and sensors—core elements ...
( Category:
Social Sciences
June 28,2017 )
epub |eng | 2014-11-10 | Author:Kim Zetter [Zetter, Kim]
* * * 1 John Arquilla and David Ronfeldt, “Cyberwar Is Coming!” published by RAND in 1993 and reprinted as chapter 2 in Arquilla and Ronfeldt’s book In Athena’s Camp: ...
( Category:
Politics & Government
June 23,2017 )
mobi, azw3, epub |eng | 2017-04-03 | Author:Lee Brotherston & Amanda Berlin
Password Breaches According to the 2016 Verizon Data Breach Incident Report, 63% of confirmed data breaches involved weak, default, or stolen passwords and 76% of network intrusions were carried out ...
( Category:
Networking & Cloud Computing
June 21,2017 )
epub |eng | 2017-03-22 | Author:Mohan Menon [Menon, Mohan]
http://green.dexknows.com/DexGreen/selectDexAction.do https://www.dobsearch.com/faq.php http://www.ebureau.com/privacy-center/opt-out http://www.efindoutthetruth.com/disclaimer.htm http://www.employeescreen.com/privacy.asp http://www.enformion.com/help.aspx?vw=statement http://www.epsilon.com/consumer-preference-center http://64.129.51.74/epsilon-consumer-preference-center www.optoutprescreen.com http://www.experian.com/privacy/opting_out.html [email protected]
( Category:
Security & Encryption
June 21,2017 )
epub, pdf |eng | 2017-02-04 | Author:Cyberpunk University [University, Cyberpunk]
( Category:
Internet & Social Media
June 21,2017 )
epub |eng | 2012-04-04 | Author:Swenson, Christopher
Basic Feistel Encryption Algorithm The basic Feistel encryption algorithm structure is r rounds long, with the round function f. 1. Split the initial plaintext, P, into two halves: The “left ...
( Category:
Security & Encryption
June 21,2017 )
epub, azw3, pdf |eng | 2017-06-14 | Author:Alex Wagner [Wagner, Alex]
Rainbow Tables This is a pre-computed for reverse engineering hash functions that are cryptographic for the goal in mind to crack multiple passwords. This is more advanced, however overall this ...
( Category:
Internet & Social Media
June 20,2017 )
epub |eng | 2013-02-11 | Author:Brett Shavers
( Category:
Computer Science
June 19,2017 )
epub |eng | 2012-02-05 | Author:Daniel J. Barrett
( Category:
Operating Systems
June 19,2017 )
epub |eng | 2010-06-18 | Author:Aaron Philipp & David Cowen & Chris Davis
( Category:
Internet & Social Media
June 19,2017 )
epub |rus | 0101-01-01 | Author:By Anton Chuvakin, Cyrus Peikari [By Anton Chuvakin, Cyrus Peikari]
( Category:
Networking & Cloud Computing
June 19,2017 )
epub |eng | 2004-06-17 | Author:daniel j. solove
( Category:
Constitutional Law
June 18,2017 )
epub |eng | 2012-06-17 | Author:Chris Porter
( Category:
Networking & Cloud Computing
June 18,2017 )
mobi |eng | 2010-10-01 | Author:Casey, Eoghan;Malin, Cameron H.;Aquilina, James M. [Casey, Eoghan;Malin, Cameron H.;Aquilina, James M.]
( Category:
Operating Systems
June 18,2017 )
epub |eng | 2008-06-17 | Author:Omar Santos
( Category:
Networking & Cloud Computing
June 18,2017 )
Categories
Cryptography | Encryption |
Hacking | Network Security |
Privacy & Online Safety | Security Certifications |
Viruses |
Popular ebooks
Practical Threat Detection Engineering by Megan Roddie & Jason Deyalsingh & Gary J. Katz(6741)Effective Threat Investigation for SOC Analysts by Yahia Mostafa;(6580)
Practical Memory Forensics by Svetlana Ostrovskaya & Oleg Skulkin(6301)
Machine Learning Security Principles by John Paul Mueller(6272)
Attacking and Exploiting Modern Web Applications by Simone Onofri & Donato Onofri(5947)
Operationalizing Threat Intelligence by Kyle Wilhoit & Joseph Opacki(5907)
Solidity Programming Essentials by Ritesh Modi(4043)
Microsoft 365 Security, Compliance, and Identity Administration by Peter Rising(3682)
Operationalizing Threat Intelligence by Joseph Opacki Kyle Wilhoit(3412)
Future Crimes by Marc Goodman(3351)
Mastering Python for Networking and Security by José Manuel Ortega(3349)
Mastering Azure Security by Mustafa Toroman and Tom Janetscheck(3337)
Blockchain Basics by Daniel Drescher(3305)
Learn Computer Forensics - Second Edition by William Oettinger(3173)
Incident Response with Threat Intelligence by Roberto Martínez(2899)
Mobile App Reverse Engineering by Abhinav Mishra(2886)
Mastering Bitcoin: Programming the Open Blockchain by Andreas M. Antonopoulos(2873)
The Code Book by Simon Singh(2832)
From CIA to APT: An Introduction to Cyber Security by Edward G. Amoroso & Matthew E. Amoroso(2783)
Building a Next-Gen SOC with IBM QRadar: Accelerate your security operations and detect cyber threats effectively by Ashish M Kothekar(2762)
