1
by Stapleton, Jeffrey James
Published 2014
Auerbach
... the essentials. Security without Obscurity: A Guide to Confidentiality, Authentication, and Integrity fills...

2
Published 2020
Edward Elgar Publishing
Table of Contents: ... Case and Peter Pelzer -- 7 markets and machines: The magic of predicting, obscuring and securing value...

3
by Grimes, Roger A.
Published 2021
John Wiley & Sons, Inc.
Table of Contents: ... Are Reactive Sheep -- Security Theater -- Security by Obscurity -- MFA Will Cause Slowdowns -- MFA Will Cause...

4
by Dang, Bruce, Gazet, Alexandre, Bachaalany, Elias
Published 2014
Wiley
Table of Contents: ... Security by Obscurity; A Survey of Deobfuscation Techniques; The Nature of Deobfuscation: Transformation...

5
by Hill, Alison C.
Published 2016
Wiley
Table of Contents: ...; The universal truth; Your values- from obscure to clear; Explore your unique blend; Identify your values; Listen...

6
by Barnett, Ryan C.
Published 2013
Wiley Pub., Inc.
Table of Contents: ...: Obscuring Sensitive Data in Logs...

7
by Ahmad, David R. Mirza
Published 2002
Syngress
Table of Contents: ...It Must Undergo an Independent Security Audit</br><br> Security through Obscurity Does Not Work</br...

8
by Bruen, Garth O.
Published 2015
John Wiley and Sons, Inc.
Table of Contents: ... -- 2.6.8 Obscure, Archaic, and Obsolete WHOIS Services 104 -- References 105 -- 3 Research...

9
by Warden, Pete
Published 2011
O'Reilly
... programmers see it as intimidating and obscure. This video master class shows you how to build simple...

10
by Forta, Ben
Published 2000
SAMS
.... Readers will also learn about some of the more obscure items that could be needed in their use of WML/WAP...

11
by Curry, Ben
Published 2013
Sams
... quickly, reliably, and well. No obscure settings, abstract theory, or hype... just help you can really...

12
by Bonner, William
Published 2007
John Wiley & Sons
... explained not by dry statistics and obscure theories but by the metaphors and analogies of literature. Here...

13
by Aivaliotis, Dimitri
Published 2016
Packt Publishing
.... Tune NGINX for various situations, improve your NGINX experience with some of the more obscure...

14
by Sun, Andrew
Published 1999
O'Reilly
... was an obscure protocol called PPP. PPP isn't talked about as much as TCP and IP, but it plays a crucial role...

15
by Loza, Mireya
Published 2016
The University of North Carolina Press
... romanticized image of braceros as a family-oriented, productive, legal workforce has obscured the real, diverse...

16
by Hardy, Alyssa
Published 2023
Tantor Media, Inc.
... to work with. Worn Out exposes the complicity of celebrities whose endorsements obscure the exploitation...

17
by Hindmarch-Watson, Katie
Published 2020
University of California Press
... obscured the labor involved in the smooth operation of the network, much as our reliance on social media...

18
by Burnett, Mark
Published 2006
Syngress
... passwords littered with obscure characters and random numerals. Every computer user must face the problems...

19
by Schroder, Carla
Published 2008
O'Reilly
... not tax your patience with endless ramblings and meanderings into theory and obscure RFCs...

20
by McDowall, John D.
Published 2019
Apress