Security & Encryption
epub |eng | | Author:Steve Grobman & Allison Cerra
2. Higher premiums create the perception of higher quality. A 2008 study by Antonio Rangel of the California Institute of Technology found that if people are told a wine is ...
( Category:
Security & Encryption
November 5,2016 )
epub |eng | | Author:Richard M. Hicks
Create the First Entry Point To enable multisite DirectAccess, open the Remote Access Management console, highlight DirectAccess and VPN in the navigation tree, and click Enable Multisite under Multisite Deployment ...
( Category:
C & C++ Windows Programming
September 14,2016 )
epub |eng | | Author:Luis Ayala
Firewall access control lists Firewall hard disk image IDS rules IDS image Back up of firewall, router, and switch IOS Backup of PLC configurations and firmware Backup RTU software, database, ...
( Category:
Embedded Systems
July 28,2016 )
epub |eng | 2015-07-17 | Author:Finn Brunton [Brunton, Finn]
4 Is Obfuscation Justified? Be fire with fire; Threaten the threatener and outface the brow. Shakespeare, King John, 1595 After a lecture on TrackMeNot,1 a member of the audience rose ...
( Category:
Civil Rights & Liberties
July 18,2016 )
epub, azw3, mobi |eng | | Author:Gordon Corera
CHAPTER TWELVE BRITAIN AND THE CYBER SPIES There was ‘jubilation’ as the message winged its way from northern India to New York. It was short and simple: ‘Hello from Dharamsala’ ...
( Category:
Hacking
July 17,2016 )
epub, azw3, mobi, pdf |eng | 2016-06-12 | Author:Lori MacVittie [MacVittie, Lori]
Figure 7: Example of an encoded XSS attack Cross-site request forgery (CSRF) CSRF is less often discussed than its XSS cousin, likely owing to better security models that are able ...
( Category:
Security & Encryption
July 10,2016 )
epub |eng | 2011-05-18 | Author:Darril Gibson
A perimeter network is also called a demilitarized zone (DMZ). Perimeter networks are typically created using two hardware-based firewalls, as shown in Figure 7-4. However, it’s also possible to create ...
( Category:
Security & Encryption
July 3,2016 )
epub |eng | 2013-10-24 | Author:Nitesh Dhanjani [Nitesh Dhanjani and Justin Clarke]
Scanner Design Now that we have defined the basic requirements for our scanner, we can start to develop an overview of the scanner’s overall structure. Based on our requirements, two ...
( Category:
LAN
May 11,2016 )
epub, pdf |eng | | Author:Abhinav Singh
Once the scan setting pop up appears, click on OK to proceed. After few moments, the attack will be launched and any successful crack will be reported by Fern. Bluetooth ...
( Category:
Encryption
April 23,2016 )
mobi, azw3, epub |eng | 2013-09-25 | Author:Joseph Muniz
Chapter 5 Select View Cookie Information, and you will see stored cookies. You can click on Edit Cookie to bring up the cookie editor and replace the current cookie with ...
( Category:
Testing
April 11,2016 )
epub |eng | | Author:Mike O’Leary
Persistence Another important use of malware by attackers is for persistence. Persistence scripts allow an attacker the ability to return to a compromised system without the necessity of exploiting it ...
( Category:
Networks
April 8,2016 )
epub, pdf |eng | | Author:Song Y. Yan
(b) (c) 3.Use Silver–Pohlig–Hellman algorithm to solve the discrete logarithms k: (a) (b) (c) . 4.Use Pollard’s ρ method to find the discrete logarithms k such that (a) (b) . ...
( Category:
Internet & Networking
April 8,2016 )
epub |eng | 2013-03-23 | Author:Seacord, Robert C. [Seacord, Robert C.]
Nonexceptional Integer Logic Errors Many exploitable software flaws do not require an exceptional condition to occur but are simply a result of poorly written code. The following function contains a ...
( Category:
C
April 2,2016 )
mobi |eng | 2016-01-28 | Author:Bhanu Birani & Mayank Birani
Now, go to Xcode and navigate to Product | Archive to archive the build for distribution. Since we have installed our desktop app of HockeyApp, we will receive a popup ...
( Category:
Network Security
March 31,2016 )
azw3 |eng | 2016-02-28 | Author:Datt, Samir [Datt, Samir]
The essential components of a forensic-friendly log management system include log management infrastructure and log management planning and policies. Log management infrastructure Network forensic investigations heavily rely on the logs ...
( Category:
Network Security
March 31,2016 )
Categories
Cryptography | Encryption |
Hacking | Network Security |
Privacy & Online Safety | Security Certifications |
Viruses |
Popular ebooks
Practical Threat Detection Engineering by Megan Roddie & Jason Deyalsingh & Gary J. Katz(6751)Effective Threat Investigation for SOC Analysts by Yahia Mostafa;(6590)
Practical Memory Forensics by Svetlana Ostrovskaya & Oleg Skulkin(6314)
Machine Learning Security Principles by John Paul Mueller(6284)
Attacking and Exploiting Modern Web Applications by Simone Onofri & Donato Onofri(5960)
Operationalizing Threat Intelligence by Kyle Wilhoit & Joseph Opacki(5920)
Solidity Programming Essentials by Ritesh Modi(4048)
Microsoft 365 Security, Compliance, and Identity Administration by Peter Rising(3687)
Operationalizing Threat Intelligence by Joseph Opacki Kyle Wilhoit(3418)
Mastering Python for Networking and Security by José Manuel Ortega(3357)
Future Crimes by Marc Goodman(3351)
Mastering Azure Security by Mustafa Toroman and Tom Janetscheck(3337)
Blockchain Basics by Daniel Drescher(3306)
Learn Computer Forensics - Second Edition by William Oettinger(3177)
Incident Response with Threat Intelligence by Roberto Martínez(2903)
Mobile App Reverse Engineering by Abhinav Mishra(2888)
Mastering Bitcoin: Programming the Open Blockchain by Andreas M. Antonopoulos(2873)
The Code Book by Simon Singh(2832)
From CIA to APT: An Introduction to Cyber Security by Edward G. Amoroso & Matthew E. Amoroso(2783)
Building a Next-Gen SOC with IBM QRadar: Accelerate your security operations and detect cyber threats effectively by Ashish M Kothekar(2776)
