Network Security
epub |eng | | Author:Cliff Wang & Zhuo Lu
5.5.3 System Performance Considering that the CSI value under some antenna modes of RA can be low, to ensure normal communications after adopting RA, in this part we use the ...
( Category:
Network Security
March 11,2020 )
epub |eng | | Author:Swarup Bhunia & Mark M. Tehranipoor
Unlike arithmetic circuits which can be defined with one general specification polynomial, a general IP can be represented by a set of polynomials extracting from the golden IP. The golden ...
( Category:
Electronics
March 10,2020 )
epub |eng | | Author:Aditya Vempaty & Bhavya Kailkhura & Pramod K. Varshney
Fig. 4.10Estimate of with time [19] Fig. 4.11Boundary around which the sensors are ‘ambiguous’ [19] It is important to note that the performance of the proposed scheme depends on the ...
( Category:
Electronics
March 9,2020 )
epub |eng | | Author:Wojciech Samek & Grégoire Montavon & Andrea Vedaldi & Lars Kai Hansen & Klaus-Robert Müller
40. Poerner, N., Schütze, H., Roth, B.: Evaluating neural network explanation methods using hybrid documents and morphosyntactic agreement. In: Proceedings of the 56th Annual Meeting of the Association for Computational ...
( Category:
Intelligence & Semantics
March 8,2020 )
epub, pdf |eng | | Author:Jacob G. Oakley
Figure 7-2 shows what can happen when the lease on public IP addressing changes in a cloud provider between the time the target was decided and the time the attack ...
( Category:
Network Security
March 7,2020 )
epub, mobi |eng | 2018-09-28 | Author:José Manuel Ortega
class SSHConnection: def __init__(self): #ssh connection with paramiko library self.ssh = paramiko.SSHClient() def ssh_connect(self,ip,user,password,code=0): self.ssh.load_system_host_keys() self.ssh.set_missing_host_key_policy(paramiko.AutoAddPolicy()) print("[*] Testing user and password from dictionary") print("[*] User: %s" %(user)) print("[*] Pass :%s" ...
( Category:
Network Security
March 7,2020 )
epub |eng | 2019-03-02 | Author:Jeff T. Parker
PART III Cyber Incident Response Chapter 7 The Incident Response Process Chapter 8 Determining the Impact of Incidents Chapter 9 Preparing the Incident Response Toolkit Chapter 10 Selecting the Best ...
( Category:
Network Security
March 3,2020 )
epub |eng | | Author:Sébastien Ziegler
The initial UPRAAM model developed in Privacy Flag was including about 150 checks and controls, defined to assess the compliance with most applicable data protection obligations. However, this initial theoretical ...
( Category:
Electronics
February 28,2020 )
epub, mobi, pdf |eng | 2019-08-02 | Author:Alessandro Parisi
How to spot fake logins From what we have said so far, it should be clear that the use of authentication procedures based on security tokens, such as passwords, SMS, ...
( Category:
Intelligence & Semantics
February 26,2020 )
epub |eng | | Author:Misty Blowers
WWII Missiles WWII was the first war to use rocket-powered missiles – a weapon developed by the Germans during the war called the V2 rocket. Germans used the V2 rockets ...
( Category:
Storage & Retrieval
February 23,2020 )
epub |eng | 2019-12-15 | Author:Prabath Siriwardena [Prabath Siriwardena]
( Category:
Object-Oriented Design
February 19,2020 )
epub |eng | 2019-12-26 | Author:Yuri Diogenes, Erdal Ozkaya
( Category:
Network Security
January 3,2020 )
mobi |eng | 2019-12-26 | Author:Erdal Ozkaya Yuri Diogenes [Yuri Diogenes, Erdal Ozkaya]
( Category:
Network Security
January 2,2020 )
epub, pdf |eng | | Author:Wolfgang W. Osterhage
Bibliography 1. I. Papadhopulli, N. Frasheri, Today’s challenges of symbolic execution and search based algorithms for automated structural testing. Open J. Commun. Softw. (2015) 2. W. Osterhage, Automatisierte Verfahren für ...
( Category:
Software Development
January 2,2020 )
epub |eng | | Author:Tony Campbell
Edward Snowden Edward Snowden was employed by the National Security Agency (NSA) as a computer systems consultant, with administrator-level privileges to the NSA’s internal network. For whatever reason, and there ...
( Category:
Maintenance, Repair & Upgrading
April 7,2017 )
Categories
Popular ebooks
Mastering Azure Security by Mustafa Toroman and Tom Janetscheck(3043)Future Crimes by Marc Goodman(3015)
Mastering Python for Networking and Security by José Manuel Ortega(2989)
Blockchain Basics by Daniel Drescher(2913)
Practical Threat Detection Engineering by Megan Roddie & Jason Deyalsingh & Gary J. Katz(2739)
Effective Threat Investigation for SOC Analysts by Yahia Mostafa;(2571)
Mastering Bitcoin: Programming the Open Blockchain by Andreas M. Antonopoulos(2531)
From CIA to APT: An Introduction to Cyber Security by Edward G. Amoroso & Matthew E. Amoroso(2500)
The Art Of Deception by Kevin Mitnick(2319)
Machine Learning Security Principles by John Paul Mueller(2310)
Practical Memory Forensics by Svetlana Ostrovskaya & Oleg Skulkin(2297)
The Code Book by Simon Singh(2237)
Attacking and Exploiting Modern Web Applications by Simone Onofri & Donato Onofri(1978)
Operationalizing Threat Intelligence by Kyle Wilhoit & Joseph Opacki(1976)
Solidity Programming Essentials by Ritesh Modi(1965)
Hands-On AWS Penetration Testing with Kali Linux by Benjamin Caudill & Karl Gilbert(1896)
Wireless Hacking 101 by Karina Astudillo(1864)
DarkMarket by Misha Glenny(1858)
Applied Network Security by Arthur Salmon & Michael McLafferty & Warun Levesque(1847)
Mobile Forensics Cookbook by Igor Mikhaylov(1821)