Cryptography
epub |eng | 2020-03-30 | Author:Keith Martin
How to Save the World Here’s cryptography in action, as often witnessed on television dramas (and the likes of James Bond movies). Two intelligence agents sit tensely in a car, ...
( Category:
Cryptography
May 22,2020 )
epub |eng | 2020-05-18 | Author:Keith Martin [Martin, Keith]
How to Save the World Here’s cryptography in action, as often witnessed on television dramas (and the likes of James Bond movies). Two intelligence agents sit tensely in a car, ...
( Category:
Cryptography
May 19,2020 )
epub |eng | 2020-04-22 | Author:Preston, Robert [Preston, Robert]
Organizations must prioritize log direction appropriately throughout the business. Organizations must produce and keep a log management infrastructure. Organizations must offer appropriate support for all employees with log management duties. ...
( Category:
Encryption
April 29,2020 )
epub |eng | 2020-03-10 | Author:Knight, Alissa [Knight, Alissa]
When You Don't Know the IMSI or MSISDN of the TCU When you find yourself in the precarious position of a black box or gray box penetration test, or even ...
( Category:
Cryptography
April 10,2020 )
epub |eng | 2019-04-30 | Author:Weimin Sun [Weimin Sun]
During the fundraising period between August 1, 2017 and December 1, 2017, the fund had raised more than $3.6 million from 44 investors, who were primarily individuals residing in at ...
( Category:
Encryption
April 6,2020 )
epub |eng | 2019-04-27 | Author:Merunas Grincalaitis [Merunas Grincalaitis]
Auditing tools will save you countless hours in confusing errors, bugs, and vulnerabilities. They will become one of your most used set of tools, combined with your already awesome development ...
( Category:
Encryption
April 5,2020 )
epub |eng | 2019-04-30 | Author:Xun (Brian) Wu [Xun (Brian) Wu]
The SDK is installed at /usr/lib/python3/dist-packages/sawtooth_sdk. How to do it... Let's go through a step-by-step guide to implement a transaction processor. We will highlight the important code segments to explain ...
( Category:
Cryptography
April 5,2020 )
epub |eng | 2019-02-25 | Author:Rod Stephens & Clayton Hunt & John Callaway & Ovais Mehboob Ahmed Khan [Rod Stephens]
( Category:
Encryption
March 31,2020 )
epub |eng | 2019-09-20 | Author:Xun (Brian) Wu [Xun (Brian) Wu]
We were able to create the art token and list the art in the art market. Next, we will implement the buyer functions. Implementing the buyArt() function The users can ...
( Category:
Software Development
March 28,2020 )
epub |eng | 2016-03-14 | Author:Darril Gibson
EXAM TIP An alert provides notification of a potential adverse event. Personnel analyze the event to determine if it is an incident. An alert can be a false positive, which ...
( Category:
Encryption
March 28,2020 )
epub |eng | 2016-02-11 | Author:Solis Tech
XIV.C. – Is Reverse Engineering Similar to Hacking? Since it is the method for the extraction of information on a circuit that can’t be retrieved ordinarily, reverse engineering is argued ...
( Category:
Software Development
March 21,2020 )
epub |eng | 2019-11-26 | Author:Roger A. Grimes
Quantum Marketing Many of the best technological inventions of our time were largely driven and funded by advertising and marketing. Radio, television, and cable TV were driven by advertising. The ...
( Category:
Cryptography
March 21,2020 )
epub |eng | 2019-09-04 | Author:Phil Quade
SUCCESSFUL SEGMENTATION ISN'T SEPARATION: IT'S COLLABORATION Colin Anderson, Levi Strauss & Co. In cybersecurity, effective segmentation is often what determines whether your company finds itself on the front page of ...
( Category:
Encryption
March 16,2020 )
epub |eng | 2018-09-24 | Author:Samuel Bowne
( Category:
Cryptography
March 14,2020 )
epub |eng | 2020-03-10 | Author:Heather Linn
The most common way of getting the process memory is with Mimikatz. Mimikatz needs either SYSTEM-level privilege on a target host or the debug privilege under an Administrator account. Mimikatz ...
( Category:
Internet & Networking
March 11,2020 )
Categories
Popular ebooks
Mastering Azure Security by Mustafa Toroman and Tom Janetscheck(3032)Future Crimes by Marc Goodman(3005)
Mastering Python for Networking and Security by José Manuel Ortega(2958)
Blockchain Basics by Daniel Drescher(2895)
Mastering Bitcoin: Programming the Open Blockchain by Andreas M. Antonopoulos(2516)
From CIA to APT: An Introduction to Cyber Security by Edward G. Amoroso & Matthew E. Amoroso(2486)
Practical Threat Detection Engineering by Megan Roddie & Jason Deyalsingh & Gary J. Katz(2461)
Effective Threat Investigation for SOC Analysts by Yahia Mostafa;(2308)
The Art Of Deception by Kevin Mitnick(2301)
The Code Book by Simon Singh(2217)
Machine Learning Security Principles by John Paul Mueller(2019)
Practical Memory Forensics by Svetlana Ostrovskaya & Oleg Skulkin(2009)
Hands-On AWS Penetration Testing with Kali Linux by Benjamin Caudill & Karl Gilbert(1861)
Wireless Hacking 101 by Karina Astudillo(1851)
DarkMarket by Misha Glenny(1849)
Applied Network Security by Arthur Salmon & Michael McLafferty & Warun Levesque(1841)
Solidity Programming Essentials by Ritesh Modi(1840)
Mobile Forensics Cookbook by Igor Mikhaylov(1815)
Serious Cryptography: A Practical Introduction to Modern Encryption by Aumasson Jean-Philippe(1810)
Operationalizing Threat Intelligence by Kyle Wilhoit & Joseph Opacki(1695)