Politique | Kozure Shinbei | 1ª Temporada
Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
BeagleBone for Secret Agents
BeagleBone for Secret Agents

Browse anonymously, communicate secretly, and create custom security solutions with open source software, the BeagleBone Black, and cryptographic hardware

About This Book

  • Interface with cryptographic hardware to add security to your embedded project, securing you from external threats.
  • ...
eBay For Dummies
eBay For Dummies

The leading guide for eBay buyers and sellers, updated to give you all the essentials for buying and selling on eBay

More than 112 million people regularly use eBay. To find the best deals and make the best profits, you need the guidance in this book from eBay expert Marsha Collier! With more than half a million copies...
Python Penetration Testing Essentials
Python Penetration Testing Essentials

Employ the power of Python to get the best out of pentesting

About This Book

  • Learn to detect and avoid various types of attacks that put the privacy of a system at risk
  • Employ practical approaches to penetration testing using Python to build efficient code and eventually save time
  • ...
VPNs Illustrated : Tunnels, VPNs, and IPsec
VPNs Illustrated : Tunnels, VPNs, and IPsec

Virtual private networks (VPNs) based on the Internet instead of the traditional leased lines offer organizations of all sizes the promise of a low-cost, secure electronic network. However, using the Internet to carry sensitive information can present serious privacy and security problems. By explaining how VPNs actually...

Windows 10 Guidebook: A tour into the future of computing
Windows 10 Guidebook: A tour into the future of computing

Windows 10 is really easy to use with this guide – for Windows insiders upgrading from Windows 7 or 8.1 to Windows 10, as well as for first-time users that want to learn about the operating system basics. 
Chapters 1 and 2 present the new and changed features in Windows 10. Furthermore, we describe what you have to watch
...

Advanced Location-Based Technologies and Services
Advanced Location-Based Technologies and Services

Due to the rapid increase in the number of mobile device users worldwide, location-based services (LBSs) have become pervasive, and the demand for them will continue to grow. Exploring recent changes in the technology and its uses, Advanced Location-Based Technologies and Services takes an in-depth look at new and existing...

Database Anonymization: Privacy Models, Data Utility, and Microaggregation-based Inter-model Connections
Database Anonymization: Privacy Models, Data Utility, and Microaggregation-based Inter-model Connections

The current social and economic context increasingly demands open data to improve scientific research and decision making. However, when published data refer to individual respondents, disclosure risk limitation techniques must be implemented to anonymize the data and guarantee by design the fundamental right to privacy of the subjects the...

Google Speaks: Secrets of the World's Greatest Billionaire Entrepreneurs, Sergey Brin and Larry Page
Google Speaks: Secrets of the World's Greatest Billionaire Entrepreneurs, Sergey Brin and Larry Page
In many ways, Google is the prototype of a successful twenty-first-century company. It uses technology in new ways to make information universally accessible; promotes a corporate culture that encourages creativity among its employees; and takes its role as a corporate citizen very seriously, investing in green initiatives and developing the...
SSL and TLS: Theory and Practice (Information Security and Privacy)
SSL and TLS: Theory and Practice (Information Security and Privacy)

SSL (secure socket layer) and TLS (Transport Layer Security) are widely deployed security protocols that are used in all kinds of web-based e-commerce and e-business applications and are part of most contemporary security systems available today. This practical book provides a comprehensive introduction to these protocols, offering you a...

Managing and Mining Graph Data (Advances in Database Systems)
Managing and Mining Graph Data (Advances in Database Systems)

Managing and Mining Graph Data is a comprehensive survey book in graph data analytics. It contains extensive surveys on important graph topics such as graph languages, indexing, clustering, data generation, pattern mining, classification, keyword search, pattern matching, and privacy. It also studies a number of domain-specific...

Privacy Protection and Computer Forensics, Second Edition
Privacy Protection and Computer Forensics, Second Edition
This book deals with security from hostile computer forensics (mostly on
one’s computer, but also on one’s digital camera, fax machine, and related
computer-like electronics), as distinct from network forensics, which in this
context is snooping into users’ online activities. Computer forensics deals
with
...
Privacy and Big Data
Privacy and Big Data

Much of what constitutes Big Data is information about us. Through our online activities, we leave an easy-to-follow trail of digital footprints that reveal who we are, what we buy, where we go, and much more. This eye-opening book explores the raging privacy debate over the use of personal data, with one undeniable conclusion: once...

Result Page: 36 35 34 33 32 31 30 29 28 27 
©2018 LearnIT (support@pdfchm.net) - Privacy Policy