Security & Encryption
epub |eng | 2012-03-25 | Author:Martin, Keith M.
8.1.3 Non-deterministic generators There are two general approaches to generating randomness. First we will look at non-deterministic generation, which relies on unpredictable sources in the physical world. This is a ...
( Category:
Skills
March 26,2014 )
epub |eng | 2012-03-25 | Author:Dinkar Sitaram & Geetha Manjunath
• partition(key2) : Determine a data partition and return the reducer number The partition function is given the key with the number of reducers and returns the index of the ...
( Category:
Cloud Computing
March 26,2014 )
epub |eng | 2012-10-23 | Author:Joe Fichera & Steven Bolt
Snort One suggestion I have is to use another open source tool, Snort. Snort is a network intrusion prevention and detection system (IPS/IDS) that was developed by Sourcefire. Snort[5] can ...
( Category:
Network Security
March 26,2014 )
epub, mobi |eng | 2013-07-25 | Author:Richard Bejtlich
Part IV. NSM in Action Chapter 9. NSM Operations Analysts need tools to find intruders, but methodology is more important than software. Tools collect and interpret data, but methodology provides ...
( Category:
Networks
March 26,2014 )
epub |eng | 2013-07-01 | Author:Wilhelm, Thomas [Wilhelm, Thomas]
TCP Scanning Most of the interesting applications from a pentest perspective use TCP to communicate across the networks, including Web servers, file transfer applications, databases, and more. There are a ...
( Category:
Hacking
March 26,2014 )
epub |eng | 2012-03-25 | Author:Jack Wiles & Terry Gudaitis & Jennifer Jabbusch & Russ Rogers & Sean Lowther
• Secured management interfaces for the APs, controllers, chassis hosting controllers • Strict change management policies • Monitoring and auditing configuration changes and alerts on changes • Annual or semi-annual ...
( Category:
Hacking
March 26,2014 )
epub, pdf |eng | 2013-01-27 | Author:Eric Cole
There is a lot of focus, energy and effort put against incident response today, but what we have found is not everyone is using the same definitions. Therefore in order ...
( Category:
Hacking
March 26,2014 )
epub |eng | 2012-08-01 | Author:Anton Chuvakin & Branden R. Williams
Other aspects of your vulnerability management program apply to securing the software developed in-house. Section 6.3 states that one needs to “develop software applications based on industry best practices and ...
( Category:
Enterprise Applications
March 26,2014 )
epub |eng | 2011-06-17 | Author:Pc User [User, Pc]
20 It is possible through a technique called cloaking, and for this reason, cloaking is possibly one of the best friends black hat SEO practitioners could ever have. In order ...
( Category:
PCs
March 26,2014 )
epub |eng | 2012-07-18 | Author:Denny Cherry
Summary Microsoft SQL Server Analysis Services is a complex beast of an application. It has a complex, but extremely through security policy system. Understanding the security policies of SQL Server ...
( Category:
Network Security
March 26,2014 )
epub |eng | 2012-10-23 | Author:Mark Talabis & Jason Martin
Chapter 4 Information Security Risk Assessment: Data Analysis Information in this chapter: • Introduction • Compiling Observations from Organizational Risk Documents • Preparation of Threat and Vulnerability Catalogs • Overview ...
( Category:
Operations Research
March 26,2014 )
epub |eng | 2012-07-17 | Author:Miller, Gregory, Peter [Miller, Gregory, Peter]
Figure 9-1: The main components of a CPU. The basic operation of a microprocessor consists of two distinct phases: fetch and execute. (It’s not too different from what your dog ...
( Category:
Security Certifications
March 26,2014 )
epub, pdf |eng | 2012-11-28 | Author:Preston Gralla [Preston Gralla]
Note Note: Many routers ship with a default channel of 6, so if you’re using that channel, you’re most likely to run into interference from nearby Wi-Fi networks. How you ...
( Category:
Microsoft Windows Registry
March 26,2014 )
epub, pdf, mobi |eng | 2013-06-20 | Author:Pauli, Josh [Pauli, Josh]
Bypassing Authentication We can now construct a valid SQL statement that will execute gracefully and retrieve information that we have no right to retrieve. We know we are dealing with ...
( Category:
Hacking
March 26,2014 )
epub |eng | 2011-03-25 | Author:Martin L. Abbott & Michael T. Fisher
* * * Rule 28 has an ugly and slightly misleading and controversial title meant to provoke thought and discussion. Of course it makes sense to have a team responsible ...
( Category:
Programming
March 26,2014 )
Categories
Cryptography | Encryption |
Hacking | Network Security |
Privacy & Online Safety | Security Certifications |
Viruses |
Popular ebooks
Practical Threat Detection Engineering by Megan Roddie & Jason Deyalsingh & Gary J. Katz(6737)Effective Threat Investigation for SOC Analysts by Yahia Mostafa;(6578)
Practical Memory Forensics by Svetlana Ostrovskaya & Oleg Skulkin(6298)
Machine Learning Security Principles by John Paul Mueller(6271)
Attacking and Exploiting Modern Web Applications by Simone Onofri & Donato Onofri(5944)
Operationalizing Threat Intelligence by Kyle Wilhoit & Joseph Opacki(5905)
Solidity Programming Essentials by Ritesh Modi(4042)
Microsoft 365 Security, Compliance, and Identity Administration by Peter Rising(3681)
Operationalizing Threat Intelligence by Joseph Opacki Kyle Wilhoit(3411)
Future Crimes by Marc Goodman(3351)
Mastering Python for Networking and Security by José Manuel Ortega(3348)
Mastering Azure Security by Mustafa Toroman and Tom Janetscheck(3337)
Blockchain Basics by Daniel Drescher(3305)
Learn Computer Forensics - Second Edition by William Oettinger(3172)
Incident Response with Threat Intelligence by Roberto Martínez(2898)
Mobile App Reverse Engineering by Abhinav Mishra(2886)
Mastering Bitcoin: Programming the Open Blockchain by Andreas M. Antonopoulos(2873)
The Code Book by Simon Singh(2832)
From CIA to APT: An Introduction to Cyber Security by Edward G. Amoroso & Matthew E. Amoroso(2783)
Building a Next-Gen SOC with IBM QRadar: Accelerate your security operations and detect cyber threats effectively by Ashish M Kothekar(2760)
