Networking category: 4555 books

Cover of Chinese Cyber Espionage: A Complementary Method to Aid PLA Modernization - Hacker Groups, Hactivists, PLA Modernization, Information Warfare Militias, Document 27 Blueprint, Military Platforms
by Progressive Management
Language: English
Release Date: October 4, 2016

This important report has been professionally converted for accurate flowing-text e-book format reproduction. In 2013, Mandiant published a report linking one People's Liberation Army (PLA) unit to the virtual exploitation of 11 modern U.S. military platforms. In the last two decades, Chinese...
Cover of Getting to Yes with China in Cyberspace
by Scott Warren Harold, Martin C. Libicki, Astrid Stuth Cevallos
Language: English
Release Date: March 22, 2016

This study explores U.S. policy options for managing cyberspace relations with China via agreements and norms of behavior. It considers two questions: Can negotiations lead to meaningful agreement on norms? If so, what does each side need to be prepared to exchange in order to achieve an acceptable...
Cover of Evaluation in the Crowd. Crowdsourcing and Human-Centered Experiments

Evaluation in the Crowd. Crowdsourcing and Human-Centered Experiments

Dagstuhl Seminar 15481, Dagstuhl Castle, Germany, November 22 – 27, 2015, Revised Contributions

by
Language: English
Release Date: September 27, 2017

As the outcome of the Dagstuhl Seminar 15481 on Crowdsourcing and Human-Centered Experiments, this book is a primer for computer science researchers who intend to use crowdsourcing technology for human centered experiments. The focus of this Dagstuhl seminar, held in Dagstuhl Castle in November...
Cover of Big Data Forensics Learning Hadoop Investigations
by Joe Sremack
Language: English
Release Date: August 24, 2015

Perform forensic investigations on Hadoop clusters with cutting-edge tools and techniquesAbout This BookIdentify, collect, and analyze Hadoop evidence forensicallyLearn about Hadoop’s internals and Big Data file storage conceptsA step-by-step guide to help you perform forensic analysis using...
Cover of Bitcoin: The Ultimate A - Z Of Profitable Bitcoin Trading & Mining Guide Exposed!
by Scott Green
Language: English
Release Date: November 19, 2014

How does the bitcoin protocol work? A person cannot mix indefinite bitcoins. The bitcoin protocol states that there will only be twenty-one million bitcoins to be produced by the miners. These bitcoins will then be subdivided into smaller bits. The smallest bit is called ‘satoshi’ named...
Cover of Predictive Computing and Information Security
by P.K. Gupta, Vipin Tyagi, S.K. Singh
Language: English
Release Date: September 27, 2017

This book describes various methods and recent advances in predictive computing and information security. It highlights various predictive application scenarios to discuss these breakthroughs in real-world settings. Further, it addresses state-of-art techniques and the design, development and innovative...
Cover of Computational Science and Its Applications – ICCSA 2016

Computational Science and Its Applications – ICCSA 2016

16th International Conference, Beijing, China, July 4-7, 2016, Proceedings, Part V

by
Language: English
Release Date: June 30, 2016

The five-volume set LNCS 9786-9790 constitutes the refereed proceedings of the 16th International Conference on Computational Science and Its Applications, ICCSA 2016, held in Beijing, China, in July 2016. The 239 revised full papers and 14 short papers presented at 33 workshops were carefully...
Cover of Conquer the Web

Conquer the Web

The Ultimate Cybersecurity Guide

by Nick Wilding, Tim Mitchell, Maureen Kendal
Language: English
Release Date: June 30, 2018

This is the ultimate guide to protect your data on the web. From passwords to opening emails, everyone knows what they should do but do you do it? 'A must read for anyone looking to upskill their cyber awareness,' Steve Durbin, Managing Director, Information Security Forum Tons of malicious...
Cover of Managing Cybersecurity Risk

Managing Cybersecurity Risk

Cases Studies and Solutions

by Jonathan Reuvid
Language: English
Release Date: February 28, 2018

The first edition, published November 2016, was targeted at the directors and senior managers of SMEs and larger organisations that have not yet paid sufficient attention to cybersecurity and possibly did not appreciate the scale or severity of permanent risk to their businesses.  The book...
Cover of The Age of You

The Age of You

How to Understand and Benefit from Social Media and the Connected Society

by Stein Arne Nistad
Language: English
Release Date: April 12, 2013

The Age of You is the story about a new society, where we break away from the established rules regarding communication, relationships and the way we do business. It`s also a story about a major shift: we increasingly take control over our personal and commercial relationships. We alone decide who...
Cover of Metasploit

Metasploit

The Penetration Tester's Guide

by David Kennedy, Devon Kearns, Mati Aharoni
Language: English
Release Date: July 15, 2011

The Metasploit Framework makes discovering, exploiting, and sharing vulnerabilities quick and relatively painless. But while Metasploit is used by security professionals everywhere, the tool can be hard to grasp for first-time users. Metasploit: The Penetration Tester's Guide fills this gap by teaching...
Cover of Ubuntu 18.04 LTS Server: Administration and Reference
by Richard Petersen
Language: English
Release Date: June 30, 2018

This book is designed as an Ubuntu 18.04 LTS Server administration and reference source, covering the Ubuntu servers and their support applications. Server tools are covered as well as the underlying configuration files and system implementations. The emphasis is on what administrators will need to...
Cover of Securing Email Communication: How to Protect Your Correspondence from Wiretapping Using Free Tools
by Slava Gomzin
Language: English
Release Date: June 7, 2012

Booklet for anyone who wants to keep their email correspondence private and protect it from unauthorized access. Step-by-step guide explains how to ensure security of email communication by utilizing existing technology. Topics include: review of security features such as Authentication, Integrity,...
Cover of SSH Mastery

SSH Mastery

OpenSSH, PuTTY, Tunnels, and Keys - 2nd edition

by Michael W. Lucas
Language: English
Release Date: February 7, 2018

The seminal text on SSH, newly revised and updated! Secure Shell (SSH) lets sysadmins securely manage remote systems. It’s powerful, complicated, and confusing. Lose the confusion. SSH Mastery: OpenSSH, PuTTY, Tunnels and Keys rescues you from sifting through decades of obsolete...
First 76 77 78 79 80 81 8283 84 85 86 87 88 Last
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy