Security & Encryption
epub |eng | 2011-03-17 | Author:Gordon S. Linoff & Michael J. Berry
( Category:
Databases & Big Data
June 18,2017 )
epub |eng | 2008-06-17 | Author:Jazib Frahim & Qiang Huang
( Category:
Networking & Cloud Computing
June 18,2017 )
epub |eng | 2011-05-22 | Author:David R. Miller & Michael Gregg
( Category:
Certification
June 18,2017 )
epub |rus | 0101-01-01 | Author:By Vijay Bollapragada, Mohamed Khalid, Scott Wainner [By Vijay Bollapragada, Mohamed Khalid, Scott Wainner]
( Category:
Networking & Cloud Computing
June 18,2017 )
epub |eng | 2013-09-24 | Author:Joe Kissell
( Category:
Security & Encryption
June 18,2017 )
epub, mobi |eng | | Author:Joseph Kong [Joseph Kong]
The modfind Function The modfind function returns the modid of a kernel module based on its module name. #include <sys/param.h> #include <sys/module.h> int modfind(const char *modname); Modids are integers used ...
( Category:
Internet & Social Media
June 18,2017 )
mobi |eng | 2009-02-08 | Author:Cox, Kerry J. & Gerg, Christopher [Cox, Kerry J.]
( Category:
Networking & Cloud Computing
June 18,2017 )
epub |eng | 2012-06-07 | Author:Steven Anson & Steve Bunting & Ryan Johnson & Scott Pearson
( Category:
Networking & Cloud Computing
June 18,2017 )
epub |eng | 2005-10-01 | Author:Matthew Macdonald [Macdonald, Matthew]
( Category:
Web Development & Design
June 17,2017 )
epub, pdf |eng | | Author:Sheran Gunasekera
Figure 6-13. Setting up an SSL/TLS Session TLS and SSL use a combination of cryptographic techniques to ensure data transmission is secure. Let’s look at this session setup now. I’m ...
( Category:
Programming
June 17,2017 )
epub |eng | 2012-07-02 | Author:Sean Bodmer & Dr. Max Kilger & Gregory Carpenter & Jade Jones [Bodmer, Sean & Kilger, Max & Carpenter, Gregory & Jones, Jade]
The ideas, conclusions, and opinions expressed in this chapter are those of the author. They do not reflect the official position of the US government or the Department of Defense. ...
( Category:
Networking & Cloud Computing
June 17,2017 )
epub |eng | 2012-06-16 | Author:Bob Vachon
Figure 12-11. NAT Wizard Welcome Window After reading the default policies that will be applied, click Next. The Basic NAT Wizard interface configuration window opens, as shown in Figure 12-12. ...
( Category:
Networking & Cloud Computing
June 17,2017 )
mobi, epub |eng | 2013-06-01 | Author:Wayner, Peter [Wayner, Peter]
The PipeNet's strict process for sending information ensures that each link between machines only carries the same amount of information at each step. The data moves along the chain in ...
( Category:
Security & Encryption
June 16,2017 )
epub |eng | 2013-04-01 | Author:Recx
DYNAMIC SQL – CURSORS An area where we’ve seen real issues that have potentially devastating effects is where dynamic SQL is used in a cursor. Consider the following vulnerable construct ...
( Category:
Security & Encryption
June 15,2017 )
epub |eng | 1999-01-02 | Author:Microsoft Corporation [Microsoft Corporation]
Reading the Meter After the meter is set up, you are ready to test a wall outlet. There are three tests to perform. With AC voltage, it does not matter ...
( Category:
Software
June 15,2017 )
Categories
Cryptography | Encryption |
Hacking | Network Security |
Privacy & Online Safety | Security Certifications |
Viruses |
Popular ebooks
Practical Threat Detection Engineering by Megan Roddie & Jason Deyalsingh & Gary J. Katz(6737)Effective Threat Investigation for SOC Analysts by Yahia Mostafa;(6578)
Practical Memory Forensics by Svetlana Ostrovskaya & Oleg Skulkin(6298)
Machine Learning Security Principles by John Paul Mueller(6271)
Attacking and Exploiting Modern Web Applications by Simone Onofri & Donato Onofri(5944)
Operationalizing Threat Intelligence by Kyle Wilhoit & Joseph Opacki(5905)
Solidity Programming Essentials by Ritesh Modi(4042)
Microsoft 365 Security, Compliance, and Identity Administration by Peter Rising(3681)
Operationalizing Threat Intelligence by Joseph Opacki Kyle Wilhoit(3411)
Future Crimes by Marc Goodman(3351)
Mastering Python for Networking and Security by José Manuel Ortega(3348)
Mastering Azure Security by Mustafa Toroman and Tom Janetscheck(3337)
Blockchain Basics by Daniel Drescher(3305)
Learn Computer Forensics - Second Edition by William Oettinger(3172)
Incident Response with Threat Intelligence by Roberto Martínez(2898)
Mobile App Reverse Engineering by Abhinav Mishra(2886)
Mastering Bitcoin: Programming the Open Blockchain by Andreas M. Antonopoulos(2873)
The Code Book by Simon Singh(2832)
From CIA to APT: An Introduction to Cyber Security by Edward G. Amoroso & Matthew E. Amoroso(2783)
Building a Next-Gen SOC with IBM QRadar: Accelerate your security operations and detect cyber threats effectively by Ashish M Kothekar(2760)
