Security & Encryption
epub |eng | 2019-12-08 | Author:Mukund Chaudhary & Abhishek Chopra [Mukund Chaudhary]

( Category: Storage & Retrieval December 12,2019 )
epub |eng | | Author:Nihad A. Hassan & Rami Hijazi

Way Backpack ( https://github.com/jsvine/waybackpack ) is a tool that allows you to download the entire Wayback Machine archive for a given web page. Library of Congress ( https://loc.gov/websites ) is ...
( Category: Security & Encryption November 30,2019 )
epub, mobi |eng | 2018-11-29 | Author:Joshua Saxe & Hillary Sanders

Figure 7-2: Suspiciousness scores output by the hypothetical MalDetect system for individual software binaries Suspiciousness scores are informative, but in order to calculate MalDetect’s true positive rate and false positive ...
( Category: Testing November 30,2019 )
epub, mobi |eng | 2019-11-29 | Author:OccupyTheWeb

Summary Linux has a number of commands to enable you to combine and compress your files for easier transfer. For combining files, tar is the command of choice, and you ...
( Category: Hacking November 30,2019 )
epub |eng | 2019-03-22 | Author:Robert van Mölken

Each of the partners can choose to implement their middleware and back-office system with different software tools—there are no limitations, other than the payload format of the messages. You can ...
( Category: Encryption November 29,2019 )
epub |eng | 2019-01-18 | Author:Maximiliano Santos

Food safety regulations – ISO 22000 As a result of globalization, many kinds of food come and go from different countries. There are a lot of serious consequences that can ...
( Category: Expert Systems November 29,2019 )
epub |eng | 2019-03-22 | Author:Nitin Gaur

Participants are agents Our examination of participant types shows us that they all have one thing in common—they have a significant degrees of agency—they actively do things. Although systems and ...
( Category: Cryptography November 29,2019 )
epub |eng | 2019-03-22 | Author:Harish Garg

Now lets get some information about this block. For example, the block fee, block size, and block transactions can be obtained by using fee, size, and transactions properties respectively on ...
( Category: Encryption November 29,2019 )
epub |eng | 2018-08-10 | Author:Barbosa de Azevedo, Fernando Uilherme [Barbosa de Azevedo, Fernando Uilherme]

Chapter 15: Ransomware Ransomware, sometimes called crypto viral extortion, is a form of malicious software that prevents users from accessing their personal files, usually through encryption. Hackers require that a ...
( Category: Hacking November 17,2019 )
epub |eng | 2019-04-29 | Author:Benjamin Caudill & Karl Gilbert [Benjamin Caudill]

( Category: LAN November 12,2019 )
epub |eng | 2019-11-04 | Author:Andy Greenberg;

* * * ■ By the end of 2017, theories of how the Shadow Brokers had pulled off their shocking theft of NSA secrets would begin to come to light, ...
( Category: Russian & Former Soviet Union October 31,2019 )
epub |eng | 2018-08-22 | Author:Julien Vehent [Julien Vehent]

( Category: Windows Administration October 21,2019 )
epub |eng | 2019-10-18 | Author:Jason Andress

Open Source Intelligence Open source intelligence (OSINT) is information collected from publicly available sources, such as job postings and public records. This publicly available data can reveal an enormous amount ...
( Category: Network Security October 19,2019 )
epub |eng | 2018-11-12 | Author:Wolf Halton

In the preceding screenshot, we can see that we have captured the Administrator login from the \\WIN10-01 workstation. This was captured when the user logged on to the domain from ...
( Category: Network Security October 19,2019 )
epub |eng | 2019-05-07 | Author:Joseph Steinberg

Other models and many variants of the models I list exist as well. While the models may step from easier to secure to harder to secure, they also step from ...
( Category: Security & Encryption October 16,2019 )