Computers & Technology
epub, pdf |eng | 2010-08-24 | Author:Himanshu Dwivedi [Himanshu Dwivedi]
IAX.Brute performs the passive dictionary attack and, using these examples, identifies the password as 123voiptest. Active Dictionary Attack In addition to passive attacks, IAX is also vulnerable to pre-computed dictionary ...
( Category:
Hacking
March 26,2014 )
epub, mobi, pdf |eng | 2013-04-23 | Author:Jared Cohen & Eric Schmidt [Cohen, Jared & Schmidt, Eric]
Sudden access to technology does not in and of itself enable radicalized individuals to become cyber terrorists. There is a technical skills barrier that, to date, has forestalled an explosion ...
( Category:
Specific Topics
March 26,2014 )
epub |eng | 2013-03-26 | Author:Fortnow, Lance [Fortnow, Lance]
The Gödel Letter In 1956 Kurt Gödel wrote a letter to John von Neumann, one of the pioneers of computer science and many other fields. In this letter (written in ...
( Category:
Linear Programming
March 26,2014 )
epub |eng | 2009-03-25 | Author:Morgan, George G.
Federal-Land States Records The Public Lands in the Federal-Land States were distributed in a variety of ways over different time periods. Others were auctioned or sold by lottery. Initial sales ...
( Category:
Genealogy
March 26,2014 )
epub |eng | 2010-06-07 | Author:Tom Bissell [Bissell, Tom]
( Category:
Games & Strategy Guides
March 26,2014 )
epub |eng | 2011-12-04 | Author:Mott, Tony [Mott, Tony]
2000s SSX Tricky Original release date : 2001 Platform : Various Developer : Electronic Arts Genre : Sports Wintry counterparts to the mega-popular Tony Hawk’s Pro Skater series, the SSX ...
( Category:
Game Design
March 26,2014 )
epub |eng | | Author:Lori Andrews
Even if we specifically designate our social network pages as private, social network sites do a particularly bad job of protecting privacy. In 2011, Joanne Kuzma of the University of ...
( Category:
Social Media
March 26,2014 )
epub |eng | 2013-01-16 | Author:Evgeny Morozov
Against Technological Defeatism Viewed in the abstract, it may seem that the tides of digital preemption, situational crime prevention, and reputation-based controls are unstoppable and irreversible. Information is everywhere, and ...
( Category:
Social Media
March 26,2014 )
epub |eng | 2012-11-08 | Author:Steve Winterfeld
Physical Warfare Cyber warfare can have great impact on the way physical war is waged. Given that even strictly physical warfare, in the sense of boots on the ground, depends ...
( Category:
Network Security
March 26,2014 )
epub, mobi |eng | 2012-11-19 | Author:Stephen D. Gantz & Daniel R. Philpott
Relevant Source Material Several NIST Special Publications and Federal Information Processing Standards provide guidance, recommendations, and instructions relevant to the development of system security plans and their use in support ...
( Category:
Network Security
March 26,2014 )
epub |eng | 2012-12-09 | Author:Brett Shavers
Figure 1.8 Spreadsheet timeline example with USB device data. Because a spreadsheet timeline can contain millions of rows of data, analysts may simply underutilize this method of analysis fearing being ...
( Category:
Computer Science
March 26,2014 )
epub |eng | 2012-12-09 | Author:Brett Shavers
Fig. 1.8 Extrapolation of graphics taken from Fig. 1.6 comparing the content of graphics on a computer system. As easy it may be for you to visualize the data that ...
( Category:
Computers & Technology
March 26,2014 )
epub |eng | 2011-12-10 | Author:EC-Council [EC-Council]
5-10 Chapter 5 Copyright © by All rights reserved. Reproduction is strictly prohibited Figure 5-3 This reverse trace can identify an attacker, even when using reflectors. logs, an investigator can ...
( Category:
Networks
March 26,2014 )
epub, mobi |eng | 2011-09-05 | Author:Joel Brenner
WIKILEAKS’S STATEMENT of purpose is high-minded. In its view, “principled leaking” changes history for the better, and “transparency in government activities leads to reduced corruption, better government and stronger democracies.” ...
( Category:
Social Aspects
March 26,2014 )
epub, pdf |eng | 2012-12-05 | Author:Winston Chang [Winston Chang]
axis.title.x X-axis label appearance element_text() axis.title.y Y-axis label appearance element_text() axis.text Appearance of tick labels on both axes element_text() axis.text.x X-axis tick label appearance element_text() axis.text.y Y-axis tick label appearance ...
( Category:
Data Modeling & Design
March 26,2014 )
Categories
Popular ebooks
Adobe Camera Raw For Digital Photographers Only by Rob Sheppard(16424)Deep Learning with Python by François Chollet(11976)
Hello! Python by Anthony Briggs(9424)
OCA Java SE 8 Programmer I Certification Guide by Mala Gupta(9390)
The Mikado Method by Ola Ellnestam Daniel Brolund(9353)
Dependency Injection in .NET by Mark Seemann(8897)
Hit Refresh by Satya Nadella(8373)
Algorithms of the Intelligent Web by Haralambos Marmanis;Dmitry Babenko(7896)
Sass and Compass in Action by Wynn Netherland Nathan Weizenbaum Chris Eppstein Brandon Mathis(7440)
Test-Driven iOS Development with Swift 4 by Dominik Hauser(7415)
Grails in Action by Glen Smith Peter Ledbrook(7333)
The Well-Grounded Java Developer by Benjamin J. Evans Martijn Verburg(7162)
The Complete Stick Figure Physics Tutorials by Allen Sarah(6677)
Secrets of the JavaScript Ninja by John Resig & Bear Bibeault(6275)
Secrets of the JavaScript Ninja by John Resig Bear Bibeault(6006)
Hadoop in Practice by Alex Holmes(5684)
Jquery UI in Action : Master the concepts Of Jquery UI: A Step By Step Approach by ANMOL GOYAL(5536)
Learning SQL by Alan Beaulieu(5466)
Weapons of Math Destruction by Cathy O'Neil(5096)
Permanent Record by Edward Snowden(5051)