Search Results - ("algorithm" OR "algorithms")

Refine Results
  1. 3201

    Penetration testing : a hands-on introduction to hacking by Weidman, Georgia

    Published 2014
    Table of Contents: “…Online Password Attacks / Peter Van Eeckhoutte -- Wordlists / Peter Van Eeckhoutte -- Guessing Usernames and Passwords with Hydra / Peter Van Eeckhoutte -- Offline Password Attacks / Peter Van Eeckhoutte -- Recovering Password Hashes from a Windows SAM File / Peter Van Eeckhoutte -- Dumping Password Hashes with Physical Access / Peter Van Eeckhoutte -- LM vs. NTLM Hashing Algorithms / Peter Van Eeckhoutte -- The Trouble with LM Password Hashes / Peter Van Eeckhoutte -- John the Ripper / Peter Van Eeckhoutte -- Cracking Linux Passwords / Peter Van Eeckhoutte -- Cracking Configuration File Passwords / Peter Van Eeckhoutte -- Rainbow Tables / Peter Van Eeckhoutte -- Online Password-Cracking Services / Peter Van Eeckhoutte -- Dumping Plaintext Passwords from Memory with Windows Credential Editor / Peter Van Eeckhoutte -- Summary / Peter Van Eeckhoutte -- 10. …”
    Full text (MFA users only)
    Electronic eBook
  2. 3202

    Public safety networks from LTE to 5G by Yarali, Abdulrahman

    Published 2020
    Table of Contents: “…6.3.2 Priority Control 100 -- 6.4 Public Safety Standardization 100 -- 6.5 Flawless Mobile Broadband for Public Safety and Security 101 -- 6.6 Applications in Different Scenarios 102 -- 6.7 Public Safety Systems and Architectures 103 -- 6.7.1 Airwave 103 -- 6.7.2 LMR 104 -- 6.7.3 TETRA Security Analysis 105 -- 6.7.4 TETRA Services System 106 -- 6.7.5 The Architecture of TETRA 106 -- 6.7.5.1 The Interfaces of TETRA Network 106 -- 6.7.6 TETRA Network Components 106 -- 6.7.6.1 The Mobile Station 108 -- 6.7.6.2 TETRA Line Station 108 -- 6.7.6.3 The Switching Management Infrastructure 108 -- 6.7.6.4 Network Management Unit 108 -- 6.7.6.5 The Gateways 108 -- 6.7.6.6 How the TETRA System Operates 108 -- 6.7.7 TETRA Mobility Management 109 -- 6.7.8 The Security of TETRA Networks 109 -- 6.7.8.1 Confidentiality 109 -- 6.7.8.2 Integrity 109 -- 6.7.8.3 Reliability 109 -- 6.7.8.4 Non-repudiation 109 -- 6.7.8.5 Authentication 110 -- 6.7.9 The Process of Authentication in TETRA 110 -- 6.7.10 The Authentication Key 110 -- 6.7.11 Symmetric Key Algorithms 110 -- 6.7.12 The Process of Authentication Key Generation 111 -- 6.7.12.1 ESN (In United Kingdom) 111 -- 6.8 Emergency Services Network (ESN) in the United Kingdom 112 -- 6.8.1 Overview of the ESN 112 -- 6.8.2 The Deliverables of ESN 112 -- 6.8.3 The Main Deliverables of ESN 112 -- 6.9 SafeNet in South Korea 113 -- 6.10 FirstNet (in USA) 115 -- 6.10.1 The Benefits of FirstNet 117 -- 6.10.2 Public Safety Core of SafetyNet 117 -- 6.10.2.1 End-to-End Encryption 117 -- 6.10.3 Round the Clock Security Surveillance 118 -- 6.10.4 User Authentication 118 -- 6.10.5 Mission Critical Functionalities 118 -- 6.10.5.1 Tactical LTE Coverage 118 -- 6.11 Canadian Interoperability Technology Interest Group (CITIG) 118 -- 6.12 Centre for Disaster Management and Public Safety (CDMPS) at the University of Melbourne 119 -- 6.13 European Emergency Number Association (EENA) 120 -- 6.13.1 European Standardization Organization (ESO) 121 -- 6.13.2 Public Safety Communications -- Europe (PSCE) 121.…”
    Full text (MFA users only)
    Electronic eBook
  3. 3203

    Analyzing neural time series data : theory and practice by Cohen, Mike X., 1979-

    Published 2014
    Table of Contents: “…What Is the Surface Laplacian? -- 22.2. Algorithms for Computing the Surface Laplacian for EEG Data -- 22.3. …”
    Full text (MFA users only)
    Electronic eBook
  4. 3204

    Ocular therapeutics handbook : a clinical manual

    Published 2011
    Full text (MFA users only)
    Electronic eBook
  5. 3205

    Imaging by numbers : a historical view of the computer print

    Published 2008
    Book
  6. 3206
  7. 3207
  8. 3208

    Information evaluation

    Published 2014
    Full text (MFA users only)
    Electronic eBook
  9. 3209
  10. 3210
  11. 3211

    Telephone triage protocols for nurses by Briggs, Julie K.

    Published 2020
    Full text (MFA users only)
    Electronic eBook
  12. 3212
  13. 3213
  14. 3214
  15. 3215
  16. 3216
  17. 3217
  18. 3218
  19. 3219
  20. 3220