Computers & Technology
epub |eng | 2013-08-11 | Author:Karl E Wiegers & Joy Beatty

Games people play with priorities The knee-jerk response to a request for customers to set priorities sometimes is, “I need all these features. Just make it happen.” They feel that ...
( Category: Management & Leadership March 26,2014 )
epub |eng | 2012-04-30 | Author:Jesmond Allen & James Chudley

Figure 13-2: Usability testing in action In this example, I would give users the simple task of researching and attempting to purchase a new camera online having deliberately recruited people ...
( Category: Book Design March 26,2014 )
epub, pdf |eng | 2012-11-28 | Author:Preston Gralla [Preston Gralla]

Note Note: Many routers ship with a default channel of 6, so if you’re using that channel, you’re most likely to run into interference from nearby Wi-Fi networks. How you ...
( Category: Microsoft Windows Registry March 26,2014 )
epub |eng | 2012-11-09 | Author:Kenneth Tam & Martín H. Hoz Salvador & Ken McAlpine & Rick Basile & Bruce Matsugu & Josh More

The above result indicates that there is connectivity to both the Internet to one of the FDN servers. The name service.fortiguard.net has several IP addresses associated to it, so every ...
( Category: Computers & Technology March 26,2014 )
epub, pdf |eng | 2013-06-20 | Author:Pauli, Josh [Pauli, Josh]

Bypassing Authentication We can now construct a valid SQL statement that will execute gracefully and retrieve information that we have no right to retrieve. We know we are dealing with ...
( Category: Hacking March 26,2014 )
epub, pdf |eng | 2010-08-31 | Author:Wallace Wang [Wallace Wang]

Figure 13-1. A WHOIS search can reveal the true owner behind charity domain names. Even if you find a valid charity, be careful of their privacy policies. To earn additional ...
( Category: Business Technology March 26,2014 )
epub |eng | 2011-03-25 | Author:Martin L. Abbott & Michael T. Fisher

* * * Rule 28 has an ugly and slightly misleading and controversial title meant to provoke thought and discussion. Of course it makes sense to have a team responsible ...
( Category: Programming March 26,2014 )
epub |eng | 2013-07-22 | Author:Peter Loshin

Using Tails from a USB drive means: • As a writeable medium, if the USB device is large enough you can configure a persistent volume (a section of the device ...
( Category: Network Security March 26,2014 )
epub, pdf |eng | 2012-08-27 | Author:Mike Shema

Protecting Information Compromising the information in a database is not the only goal of an attacker, but it surely exists as a major one. Many methods are available to protect ...
( Category: Hacking March 26,2014 )
epub, pdf |eng | 2012-11-22 | Author:Derrick Rountree

3.2.1. Using OpenID The OpenID process starts with user registration. The user must choose an OpenID provider with whom to register. There are several OpenID providers available including Facebook, Google, ...
( Category: Network Security March 26,2014 )
epub, mobi, pdf |eng | 2012-11-19 | Author:Matthew Metheny

Table 6.5 Key Process Activities—Step 3 Table 6.6 Key Process Activities—Step 4 Both NIST and the ISO/IEC processes address the ongoing communications and sharing of risk-related information with decision makers ...
( Category: Cloud Computing March 26,2014 )
epub, pdf |eng | 2010-05-17 | Author:Kimberly Graves

Because DoS attacks are so powerful and can cripple a production system or network, this chapter does not include any DoS tool exercises. If you want to test the tools ...
( Category: Internet & Social Media March 26,2014 )
epub |eng, eng | 2012-08-22 | Author:Andy Greenberg

Hello, Scientology. We are Anonymous. Over the years, we have been watching you. Your campaigns of misinformation; suppression of dissent; your litigious nature, all of these things have caught our ...
( Category: Hacking March 26,2014 )
epub, pdf |eng | 2011-03-22 | Author:Tom Canavan

Incorporate these things into your plan, and schedule a disaster drill soon after to ensure that the plan has successfully been updated. The post-test review is where you formulate your ...
( Category: Networking & Cloud Computing March 26,2014 )
epub, pdf |eng | 2010-08-24 | Author:Himanshu Dwivedi [Himanshu Dwivedi]

IAX.Brute performs the passive dictionary attack and, using these examples, identifies the password as 123voiptest. Active Dictionary Attack In addition to passive attacks, IAX is also vulnerable to pre-computed dictionary ...
( Category: Hacking March 26,2014 )