Cryptography
epub |eng | 2015-12-22 | Author:Josiah Dykstra
Chapter 8. Digital Forensics Digital forensics holds a unique distinction among the group of cybersecurity fields in this book because it requires science. Forensic science, by definition, is the use ...
( Category:
Network Security
December 13,2015 )
epub, azw3 |eng | 2015-10-08 | Author:Easttom, Chuck
Note This is a generic overview of the essentials of a sponge construction; there can be variations on this process. The details of the function F will vary with specific ...
( Category:
Encryption
October 30,2015 )
epub |eng | 2014-10-30 | Author:Nestler, Vincent & Harrison, Keith & Hirsch, Matthew & Conklin, Wm. Arthur
Note If you are using virtual machines and have the ability to create snapshots, now would be a good time to take another one. At this point, if you have ...
( Category:
Network Security
August 17,2015 )
epub |eng | 2014-07-17 | Author:Ivan Ristić
Store keys safely Keep a copy of your keys in a safe location. Losing a server key is usually not a big deal because you can always generate a new ...
( Category:
Network Security
July 18,2015 )
epub |eng | 2000-08-29 | Author:Simon Singh [Singh, Simon]
5 The Language Barrier While British codebreakers were breaking the German Enigma cipher and altering the course of the war in Europe, American codebreakers were having an equally important influence ...
( Category:
Cryptography
June 12,2015 )
mobi, epub |eng | 2013-08-15 | Author:Oriyano, Sean-Philip [Oriyano, Sean-Philip]
IMHO I would love to take a moment and give credit where credit is due by pointing out the efforts of Room 40. This organization was in existence from 1914 ...
( Category:
Cryptography
June 12,2015 )
epub |eng | 2015-06-01 | Author:Shon Harris
A. Security parameter index B. Security ability C. Security association D. Security assistant C. Each IPSec VPN device will have at least one security association (SA) for each secure connection ...
( Category:
Encryption
June 2,2015 )
epub |eng | 2015-03-15 | Author:Joshua Wright & Johnny Cache [Wright, Joshua]
* * * * * * Figure 9-8 SmartRF Packet Sniffer data A sample packet capture of a Fitbit One device that can be displayed using the SmartRF Packet Sniffer ...
( Category:
Internet, Groupware, & Telecommunications
April 22,2015 )
epub |eng | 2015-01-09 | Author:Daniel Regalado & Shon Harris & Allen Harper & Chris Eagle & Jonathan Ness & Branko Spasojevic & Ryan Linn & Stephen Sims [Regalado, Daniel]
Congratulations, we now have a shell with the effective uid (euid) of root. Using “return to libc” (ret2libc), we have the ability to direct application flow to other parts of ...
( Category:
Encryption
December 15,2014 )
epub, mobi |eng | 2014-04-08 | Author:Andreas M. Antonopoulos [Antonopoulos, Andreas M.]
Figure 2-9. Alice’s transaction included in block #277,317 Spending the transaction Now that Alice’s transaction has been embedded in the blockchain as part of a block, it is part of ...
( Category:
Entrepreneurship
April 19,2014 )
epub |eng | 2009-02-08 | Author:Chandra, Pravir, Messier, Matt, Viega, John & Matt Messier & Pravir Chandra [John Viega]
type The operation to perform, which can be one of the following constants: EVP_CTRL_GET_RC2_KEY_BITS EVP_CTRL_SET_RC2_KEY_BITS EVP_CTRL_GET_RC5_ROUNDS EVP_CTRL_SET_RC5_ROUNDS arg The numerical value to set, if appropriate. If not appropriate, its value ...
( Category:
Network Security
April 6,2014 )
epub, mobi |zho | 2003-08-12 | Author:Simon Singh [Singh, Simon]
5 The Language Barrier While British codebreakers were breaking the German Enigma cipher and altering the course of the war in Europe, American codebreakers were having an equally important influence ...
( Category:
Encryption
March 26,2014 )
epub |eng | 2013-04-17 | Author:Darril Gibson
Windows Memory Diagnostics Used to check the hardware memory Component Services Used to manually add Component Object Model (COM) reusable code. This is most commonly needed when an application is ...
( Category:
LAN
March 26,2014 )
mobi, azw3, epub |eng | 2011-01-25 | Author:Singh, Simon [Singh, Simon]
5 The Language Barrier While British codebreakers were breaking the German Enigma cipher and altering the course of the war in Europe, American codebreakers were having an equally important influence ...
( Category:
Cryptography
March 25,2014 )
Categories
Popular ebooks
Future Crimes by Marc Goodman(2708)Blockchain Basics by Daniel Drescher(2424)
From CIA to APT: An Introduction to Cyber Security by Edward G. Amoroso & Matthew E. Amoroso(2193)
Mastering Bitcoin: Programming the Open Blockchain by Andreas M. Antonopoulos(2169)
The Art Of Deception by Kevin Mitnick(1967)
The Code Book by Simon Singh(1754)
Applied Network Security by Arthur Salmon & Michael McLafferty & Warun Levesque(1676)
Wireless Hacking 101 by Karina Astudillo(1623)
Serious Cryptography: A Practical Introduction to Modern Encryption by Aumasson Jean-Philippe(1602)
DarkMarket by Misha Glenny(1526)
Bulletproof Android: Practical Advice for Building Secure Apps (Developer's Library) by Godfrey Nolan(1517)
Bitcoin: The Basics of Blockchain and Investing in Cryptocurrency by K. Connors(1405)
Mobile Forensics Cookbook by Igor Mikhaylov(1312)
Linux Forensics by Philip Polstra(1283)
Healthcare Information Security and Privacy (All-In-One) by Sean Murphy(1192)
Information Security Risk Assessment Toolkit by Mark Talabis & Jason Martin(1172)
CompTIA CSA+ Cybersecurity Analyst Certification All-in-One Exam Guide (CS0-001) (EBook) by Maymi Fernando & Chapman Brent(1157)
We Are Anonymous: Inside the Hacker World of LulzSec, Anonymous, and the Global Cyber Insurgency by Olson Parmy(1068)
The Tao of Network Security Monitoring by Richard Bejtlich(1057)
Encyclopedia of Cyber Warfare by Springer Paul(1004)
