Hacking
epub, mobi |eng | 2006-10-31 | Author:Steve Wozniak & Gina Smith [Wozniak, Steve & Smith, Gina]

What Was the ARPANET? Short for the Advanced Research Projects Agency Network, and developed by the U.S. Department of Defense, the ARPANET was the first operational packet-switching network that could ...
( Category: Business May 27,2014 )
azw3, epub |eng | 2013-08-03 | Author:Olson, Parmy [Olson, Parmy]

CHAPTER 19 Hacker War The victory of the PBS attack had left Topiary in a daze of newfound fame and hubris. He knew he wasn’t leading the hacks or really ...
( Category: Hacking May 26,2014 )
mobi, epub |eng | 2008-01-28 | Author:Jon Erickson

Example Internet Datagram Header Each element in the structure corresponds to the fields shown in the RFC header diagram. Since the first two fields, Version and IHL (Internet Header Length) ...
( Category: Privacy & Online Safety May 26,2014 )
epub, mobi |eng | 2013-08-04 | Author:Ryan Holiday

Let’s Get Technical The movie marketing paradigm says throw an expensive premiere and hope that translates into ticket sales come opening weekend. A growth hacker says it’s 2013 and we ...
( Category: Web Marketing May 8,2014 )
epub, pdf |eng | 2014-03-19 | Author:Kim, Peter [Kim, Peter]

Figure 66 - Mimikatz Again, it doesn’t matter how long their password is and you don’t have to even worry about the hashes. You can now take these usernames/passwords and ...
( Category: Testing April 29,2014 )
epub, pdf |eng | 2012-02-26 | Author:Michael Sikorski & Andrew Honig [Michael Sikorski]

Using Hashed Exported Names The algorithm just discussed has a weakness: It performs a strcmp against each export name until it finds the correct one. This requires that the full ...
( Category: Hacking April 5,2014 )
epub |eng | 2010-08-24 | Author:Dwivedi, Himanshu [Himanshu Dwivedi]

User supplies the challenge, which in this case is 214484840. User supplies the MD5 hash that was sniffed over the network. From Figure 5-5 we see that the hash is ...
( Category: Hacking April 5,2014 )
epub, mobi, pdf |eng | 2013-12-06 | Author:Broad, James, Bindner, Andrew & Andrew Bindner

Most transfers will fail, however, if the target name server is misconfigured. The entire name servers record set will be transferred to the local Kali Linux computer. When using this ...
( Category: Hacking April 1,2014 )
epub, pdf |eng | 2012-10-09 | Author:E. Gabriella Coleman [Coleman, E. Gabriella]

CHAPTER 4 Two Ethical Moments in Debian F/OSS projects largely take place on the Internet. Varying in size from a couple of developers to a network of over one thousand, ...
( Category: Software Development April 1,2014 )
epub |eng | 2010-10-14 | Author:Fitzgerald, Michael [Michael Fitzgerald]

See Also For a more thorough introduction to SOAP, read the SOAP v1.2 primer (Part 0): http://www.w3.org/TR/soap12-part0/ SOAP v1.2 messaging framework (Part 1), including information on the SOAP processing model ...
( Category: Client-Server Systems March 31,2014 )
epub |eng | 2014-02-23 | Author:Alcorn, Wade, Frichot, Christian, Orru, Michele & Christian Frichot & Michele Orru

Using BeEF with Metasploit Integrating BeEF and Metasploit allows you to control a browser, fingerprint it, and get as much information as you can before you try to exploit it. ...
( Category: Hacking March 30,2014 )
epub |eng | 2012-08-19 | Author:Steve Bunting

Exam Essentials Understand how EnCase organizes its workspace. Understand the Home screen and explain how to open and create cases. Explain how to add evidence or browse evidence from the ...
( Category: Security Certifications March 27,2014 )
epub, mobi |eng | 2013-07-25 | Author:Richard Bejtlich

Part IV. NSM in Action Chapter 9. NSM Operations Analysts need tools to find intruders, but methodology is more important than software. Tools collect and interpret data, but methodology provides ...
( Category: Networks March 26,2014 )
epub |eng | 2013-07-01 | Author:Wilhelm, Thomas [Wilhelm, Thomas]

TCP Scanning Most of the interesting applications from a pentest perspective use TCP to communicate across the networks, including Web servers, file transfer applications, databases, and more. There are a ...
( Category: Hacking March 26,2014 )
epub |eng | 2012-03-25 | Author:Jack Wiles & Terry Gudaitis & Jennifer Jabbusch & Russ Rogers & Sean Lowther

• Secured management interfaces for the APs, controllers, chassis hosting controllers • Strict change management policies • Monitoring and auditing configuration changes and alerts on changes • Annual or semi-annual ...
( Category: Hacking March 26,2014 )

Categories
Popular ebooks
Deep Learning with Python by François Chollet(12578)
Sass and Compass in Action by Wynn Netherland Nathan Weizenbaum Chris Eppstein Brandon Mathis(7782)
Grails in Action by Glen Smith Peter Ledbrook(7697)
Secrets of the JavaScript Ninja by John Resig Bear Bibeault(6419)
Kotlin in Action by Dmitry Jemerov(5066)
WordPress Plugin Development Cookbook by Yannick Lefebvre(3808)
Mastering Azure Security by Mustafa Toroman and Tom Janetscheck(3331)
Learning React: Functional Web Development with React and Redux by Banks Alex & Porcello Eve(3088)
Mastering Bitcoin: Programming the Open Blockchain by Andreas M. Antonopoulos(2868)
The Art Of Deception by Kevin Mitnick(2606)
Drugs Unlimited by Mike Power(2467)
Kali Linux - An Ethical Hacker's Cookbook: End-to-end penetration testing solutions by Sharma Himanshu(2314)
The Innovators: How a Group of Hackers, Geniuses, and Geeks Created the Digital Revolution by Walter Isaacson(2309)
Writing for the Web: Creating Compelling Web Content Using Words, Pictures and Sound (Eva Spring's Library) by Lynda Felder(2263)
SEO 2018: Learn search engine optimization with smart internet marketing strategies by Adam Clarke(2194)
A Blueprint for Production-Ready Web Applications: Leverage industry best practices to create complete web apps with Python, TypeScript, and AWS by Dr. Philip Jones(2188)
JavaScript by Example by S Dani Akash(2138)
DarkMarket by Misha Glenny(2083)
Wireless Hacking 101 by Karina Astudillo(2078)
Full-Stack React Projects by Shama Hoque(1991)