Privacy & Online Safety
epub |eng | 2023-08-15 | Author:Adarsh Nair & Greeshma M. R.
ISO/IEC standards related to information security incident management ISO/IEC 27035 is the guideline standard for information security incident management. There are also six other standards that relate to information security ...
( Category:
Privacy & Online Safety
August 6,2024 )
epub |eng | 2024-04-29 | Author:Srinivas Rao Aravilli
Figure 5.12 â Transactions aggregates By utilizing the PipelineDP framework, we can address the challenges and considerations involved in generating differentially private aggregates for large datasets. It provides a comprehensive ...
( Category:
Privacy & Online Safety
August 5,2024 )
pdf | | 2024-05-30 | Author:Santiago Vázquez, Francisco Javier;
( Category:
Privacy & Online Safety
July 24,2024 )
epub, pdf |eng | 2024-06-12 | Author:James Leyte-Vidal
Figure 6.3 â Password configuration on Ubuntu 20.04 As we can see, the password configuration should require a sha512 hashed password for users, as noted in the line with pam_unix.so ...
( Category:
Privacy & Online Safety
July 21,2024 )
pdf | | 2024-04-24 | Author:Aslaner, Milad;
( Category:
Privacy & Online Safety
July 10,2024 )
epub |eng | 2022-07-15 | Author:Kushantha Gunawardana
Levels of cyber anonymity As we discussed earlier, cyber anonymity is trying to hide your identity without hiding the action. The meaning of being anonymous is hiding your identity but ...
( Category:
Privacy & Online Safety
July 6,2024 )
pdf | | 2024-02-23 | Author:Razi Rais, Christina Morillo, Evan Gilman, and Doug Barth
( Category:
Privacy & Online Safety
April 23,2024 )
pdf | | | Author:Unknown
( Category:
Privacy & Online Safety
April 18,2024 )
pdf | | 2024-03-29 | Author:Unknown
( Category:
Privacy & Online Safety
April 7,2024 )
epub |eng | 2023-03-15 | Author:Benjamin Kovacevic
Microsoft Sentinel is a unified way to run a playbook, and it will make no difference whether Logic Apps Consumption or Logic Apps Standard is used. Navigating the playbooks GUI ...
( Category:
Privacy & Online Safety
March 16,2024 )
epub |eng | 2024-03-02 | Author:Razi Rais
( Category:
Privacy & Online Safety
March 1,2024 )
epub |eng | 2022-02-15 | Author:Walter Rocchi
(Optional) Should you be pleased with this result? Yes, if the current risk score is within the risk tolerance. Otherwise, the answer is no. This characteristic is optional, however it ...
( Category:
Privacy & Online Safety
February 28,2024 )
epub |eng | 2023-11-24 | Author:Vandana Verma Sehgal
Open source SCA tools SCA tools are used to identify and manage open source and third-party components in software applications. These tools help ensure the components are free from vulnerabilities, ...
( Category:
Privacy & Online Safety
February 9,2024 )
azw3 |eng | 2019-04-17 | Author:Serhack
Chapter 5 A deep dive into Monero & cryptography Since long before the birth of computers, mathematics and cryptography have been at the center of communication and information exchange. While ...
( Category:
Privacy & Online Safety
January 30,2024 )
pdf | | 2019-04-18 | Author:Unknown
( Category:
Privacy & Online Safety
January 30,2024 )
Categories
Popular ebooks
Practical Threat Detection Engineering by Megan Roddie & Jason Deyalsingh & Gary J. Katz(3965)Effective Threat Investigation for SOC Analysts by Yahia Mostafa;(3806)
Machine Learning Security Principles by John Paul Mueller(3534)
Practical Memory Forensics by Svetlana Ostrovskaya & Oleg Skulkin(3522)
Operationalizing Threat Intelligence by Kyle Wilhoit & Joseph Opacki(3209)
Attacking and Exploiting Modern Web Applications by Simone Onofri & Donato Onofri(3184)
Mastering Azure Security by Mustafa Toroman and Tom Janetscheck(3101)
Future Crimes by Marc Goodman(3093)
Mastering Python for Networking and Security by José Manuel Ortega(3089)
Blockchain Basics by Daniel Drescher(2997)
Mobile App Reverse Engineering by Abhinav Mishra(2683)
Operationalizing Threat Intelligence by Joseph Opacki Kyle Wilhoit(2644)
Mastering Bitcoin: Programming the Open Blockchain by Andreas M. Antonopoulos(2611)
Solidity Programming Essentials by Ritesh Modi(2570)
From CIA to APT: An Introduction to Cyber Security by Edward G. Amoroso & Matthew E. Amoroso(2562)
The Art Of Deception by Kevin Mitnick(2385)
The Code Book by Simon Singh(2359)
Microsoft 365 Security, Compliance, and Identity Administration by Peter Rising(2211)
Incident Response with Threat Intelligence by Roberto Martínez(2160)
Hands-On AWS Penetration Testing with Kali Linux by Benjamin Caudill & Karl Gilbert(1990)