Computers & Technology
epub |eng | 2013-08-11 | Author:Karl E Wiegers & Joy Beatty
Games people play with priorities The knee-jerk response to a request for customers to set priorities sometimes is, “I need all these features. Just make it happen.” They feel that ...
( Category:
Management & Leadership
March 26,2014 )
epub |eng | 2012-04-30 | Author:Jesmond Allen & James Chudley
Figure 13-2: Usability testing in action In this example, I would give users the simple task of researching and attempting to purchase a new camera online having deliberately recruited people ...
( Category:
Book Design
March 26,2014 )
epub, pdf |eng | 2012-11-28 | Author:Preston Gralla [Preston Gralla]
Note Note: Many routers ship with a default channel of 6, so if you’re using that channel, you’re most likely to run into interference from nearby Wi-Fi networks. How you ...
( Category:
Microsoft Windows Registry
March 26,2014 )
epub |eng | 2012-11-09 | Author:Kenneth Tam & Martín H. Hoz Salvador & Ken McAlpine & Rick Basile & Bruce Matsugu & Josh More
The above result indicates that there is connectivity to both the Internet to one of the FDN servers. The name service.fortiguard.net has several IP addresses associated to it, so every ...
( Category:
Computers & Technology
March 26,2014 )
epub, pdf |eng | 2013-06-20 | Author:Pauli, Josh [Pauli, Josh]
Bypassing Authentication We can now construct a valid SQL statement that will execute gracefully and retrieve information that we have no right to retrieve. We know we are dealing with ...
( Category:
Hacking
March 26,2014 )
epub, pdf |eng | 2010-08-31 | Author:Wallace Wang [Wallace Wang]
Figure 13-1. A WHOIS search can reveal the true owner behind charity domain names. Even if you find a valid charity, be careful of their privacy policies. To earn additional ...
( Category:
Business Technology
March 26,2014 )
epub |eng | 2011-03-25 | Author:Martin L. Abbott & Michael T. Fisher
* * * Rule 28 has an ugly and slightly misleading and controversial title meant to provoke thought and discussion. Of course it makes sense to have a team responsible ...
( Category:
Programming
March 26,2014 )
epub |eng | 2013-07-22 | Author:Peter Loshin
Using Tails from a USB drive means: • As a writeable medium, if the USB device is large enough you can configure a persistent volume (a section of the device ...
( Category:
Network Security
March 26,2014 )
epub, pdf |eng | 2012-08-27 | Author:Mike Shema
Protecting Information Compromising the information in a database is not the only goal of an attacker, but it surely exists as a major one. Many methods are available to protect ...
( Category:
Hacking
March 26,2014 )
epub, pdf |eng | 2012-11-22 | Author:Derrick Rountree
3.2.1. Using OpenID The OpenID process starts with user registration. The user must choose an OpenID provider with whom to register. There are several OpenID providers available including Facebook, Google, ...
( Category:
Network Security
March 26,2014 )
epub, mobi, pdf |eng | 2012-11-19 | Author:Matthew Metheny
Table 6.5 Key Process Activities—Step 3 Table 6.6 Key Process Activities—Step 4 Both NIST and the ISO/IEC processes address the ongoing communications and sharing of risk-related information with decision makers ...
( Category:
Cloud Computing
March 26,2014 )
epub, pdf |eng | 2010-05-17 | Author:Kimberly Graves
Because DoS attacks are so powerful and can cripple a production system or network, this chapter does not include any DoS tool exercises. If you want to test the tools ...
( Category:
Internet & Social Media
March 26,2014 )
epub |eng, eng | 2012-08-22 | Author:Andy Greenberg
Hello, Scientology. We are Anonymous. Over the years, we have been watching you. Your campaigns of misinformation; suppression of dissent; your litigious nature, all of these things have caught our ...
( Category:
Hacking
March 26,2014 )
epub, pdf |eng | 2011-03-22 | Author:Tom Canavan
Incorporate these things into your plan, and schedule a disaster drill soon after to ensure that the plan has successfully been updated. The post-test review is where you formulate your ...
( Category:
Networking & Cloud Computing
March 26,2014 )
epub, pdf |eng | 2010-08-24 | Author:Himanshu Dwivedi [Himanshu Dwivedi]
IAX.Brute performs the passive dictionary attack and, using these examples, identifies the password as 123voiptest. Active Dictionary Attack In addition to passive attacks, IAX is also vulnerable to pre-computed dictionary ...
( Category:
Hacking
March 26,2014 )
Categories
Popular ebooks
Adobe Camera Raw For Digital Photographers Only by Rob Sheppard(16424)Deep Learning with Python by François Chollet(11976)
Hello! Python by Anthony Briggs(9424)
OCA Java SE 8 Programmer I Certification Guide by Mala Gupta(9389)
The Mikado Method by Ola Ellnestam Daniel Brolund(9353)
Dependency Injection in .NET by Mark Seemann(8897)
Hit Refresh by Satya Nadella(8373)
Algorithms of the Intelligent Web by Haralambos Marmanis;Dmitry Babenko(7896)
Sass and Compass in Action by Wynn Netherland Nathan Weizenbaum Chris Eppstein Brandon Mathis(7440)
Test-Driven iOS Development with Swift 4 by Dominik Hauser(7414)
Grails in Action by Glen Smith Peter Ledbrook(7333)
The Well-Grounded Java Developer by Benjamin J. Evans Martijn Verburg(7161)
The Complete Stick Figure Physics Tutorials by Allen Sarah(6675)
Secrets of the JavaScript Ninja by John Resig & Bear Bibeault(6275)
Secrets of the JavaScript Ninja by John Resig Bear Bibeault(6006)
Hadoop in Practice by Alex Holmes(5683)
Jquery UI in Action : Master the concepts Of Jquery UI: A Step By Step Approach by ANMOL GOYAL(5536)
Learning SQL by Alan Beaulieu(5465)
Weapons of Math Destruction by Cathy O'Neil(5094)
Permanent Record by Edward Snowden(5050)