Data in the Enterprise
epub, pdf |eng | 2010-08-24 | Author:Himanshu Dwivedi [Himanshu Dwivedi]
IAX.Brute performs the passive dictionary attack and, using these examples, identifies the password as 123voiptest. Active Dictionary Attack In addition to passive attacks, IAX is also vulnerable to pre-computed dictionary ...
( Category:
Hacking
March 26,2014 )
epub |eng | 2013-07-21 | Author:Joan Lambert
To apply a character style Select the text you want to format, or position the cursor anywhere in a single word you want to format. In the Styles pane or ...
( Category:
Electronic Data Interchange (EDI)
March 26,2014 )
epub |eng | 2013-05-29 | Author:Matthew Hester & Chris Henley
Use Backup and Recovery Tools Three tools allow you to access the backup and recovery toolset in Windows Server 2012. You have a fully functioning GUI management tool called Windows ...
( Category:
Windows Administration
March 26,2014 )
mobi, epub |eng | 2012-02-07 | Author:Ben Forta
Using Joins and Join Conditions Before wrapping up this two chapter discussion on joins, it is worthwhile to summarize some key points regarding joins and their use: • Pay careful ...
( Category:
Client-Server Systems
March 25,2014 )
mobi, epub, pdf |eng | 2009-06-30 | Author:Rob Flickenger
See also: [Hack #47] Hack #50. Tunneling: IPIP Encapsulation IP tunneling with the Linux IPIP driver If you have never worked with IP tunneling before, you might want to take ...
( Category:
Hacking
March 25,2014 )
mobi, epub |eng | 2011-05-23 | Author:Joshua D. Drake;John C. Worsley
Dropping an operator An operator can be dropped with the DROP OPERATOR command. An operator may only be dropped by the user who created it, or by a PostgreSQL superuser. ...
( Category:
Networks
March 25,2014 )
mobi, epub |eng | 2009-11-29 | Author:McConnell, Steve [McConnell, Steve]
(1)Count "1" for the routine itself. (2)Count "2" for the for. (3)Count "3" for the if. (4)Count "4" for the if and "5" for the &&. (5)Count "6" for the ...
( Category:
Software Development
March 25,2014 )
epub |eng | 2011-07-13 | Author:Tom Carpenter
Exchange Server has evolved over multiple decades. Figure 9-3 shows the evolution of Exchange Server through different releases over the years. Exchange Server 2010 represents years of enhancements and added ...
( Category:
Client-Server Systems
March 25,2014 )
epub |eng | 2011-11-17 | Author:Nathan Winters & Neil Johnson & Nicolas Blank
Protecting against Unauthorized Network Access It will soon be common for email users to access their corporate email solution mainly from a device that is not connected to their corporate ...
( Category:
Client-Server Systems
March 25,2014 )
mobi, epub |eng | 2012-05-28 | Author:Blum, Andrew [Blum, Andrew]
The next day I visited Witteman at the AMS-IX offices. On the wall behind his desk was a homemade mash-up of the movie poster from 300, based on the bloody ...
( Category:
Communication & Media Studies
March 24,2014 )
epub, azw3 |eng | | Author:Andrew Blum
The next day I visited Witteman at the AMS-IX offices. On the wall behind his desk was a homemade mash-up of the movie poster from 300, based on the bloody ...
( Category:
Communication & Media Studies
March 24,2014 )
Popular ebooks
The Mikado Method by Ola Ellnestam Daniel Brolund(9352)Sass and Compass in Action by Wynn Netherland Nathan Weizenbaum Chris Eppstein Brandon Mathis(7440)
Grails in Action by Glen Smith Peter Ledbrook(7332)
Kotlin in Action by Dmitry Jemerov(4682)
Management Strategies for the Cloud Revolution: How Cloud Computing Is Transforming Business and Why You Can't Afford to Be Left Behind by Charles Babcock(4157)
The Age of Surveillance Capitalism by Shoshana Zuboff(3465)
Learn Windows PowerShell in a Month of Lunches by Don Jones(3276)
Mastering Azure Security by Mustafa Toroman and Tom Janetscheck(3049)
Mastering Python for Networking and Security by José Manuel Ortega(3003)
Blockchain Basics by Daniel Drescher(2928)
Microsoft 365 Identity and Services Exam Guide MS-100 by Aaron Guilmette(2885)
Configuring Windows Server Hybrid Advanced Services Exam Ref AZ-801 by Chris Gill(2856)
Azure Containers Explained by Wesley Haakman & Richard Hooper(2751)
TCP IP by Todd Lammle(2670)
From CIA to APT: An Introduction to Cyber Security by Edward G. Amoroso & Matthew E. Amoroso(2508)
Hands-On Azure for Developers by Kamil Mrzyglod(2467)
Combating Crime on the Dark Web by Nearchos Nearchou(2457)
React Native - Building Mobile Apps with JavaScript by Novick Vladimir(2359)
The Social Psychology of Inequality by Unknown(2344)
MCSA Windows Server 2016 Study Guide: Exam 70-740 by William Panek(2329)