Security & Encryption
azw3, epub, pdf |eng | 2017-06-08 | Author:Keith Martin [Martin, Keith]
Compare this approach with the dynamic password schemes discussed in this chapter, from a: (a) security perspective; (b) efficiency perspective; (c) business perspective (costs, processes, and business relationships). 22. Our ...
( Category:
Security & Encryption
January 19,2018 )
epub |eng | 2017-12-13 | Author:Akash Mahajan
The reporting also can be customized as per the requirements using the available options: The preceding options are very important while scanning critical infrastructure. These options are to ensure we ...
( Category:
Networking & Cloud Computing
January 19,2018 )
epub, pdf |eng | 2005-01-18 | Author:Brian Carrier
Table 10.8 ASCII values for the characters in our example LFN. For clarity, we will do this whole thing in binary instead of constantly translating. The first step is to ...
( Category:
Security & Encryption
January 18,2018 )
epub |eng | 2017-12-15 | Author:Igor Mikhaylov
Clouds are Alternative Data Sources In this chapter, we'll cover the following recipes: Using Cloud Extractor to extract data from Android devices from the cloud Using Electronic Evidence Examiner to ...
( Category:
Mobile Phones, Tablets & E-Readers
January 18,2018 )
epub, azw3 |eng | 2017-06-28 | Author:Daniel Dieterle [Dieterle, Daniel]
Conclusion In this chapter, we covered turning our smartphone into a HID attack device. We saw how our phone can be configured to send any Windows based commands to the ...
( Category:
Security & Encryption
January 18,2018 )
azw3 |eng | 2017-07-24 | Author:Johansen, Gerard [Johansen, Gerard]
Command-line tools There are several command-line tools that can be utilized during the analysis of network packet captures. During more in-depth or lengthy incident response engagements, analysts may gather several ...
( Category:
Security & Encryption
January 18,2018 )
epub |eng | 2017-07-18 | Author:Jason Andress,Ryan Linn & Ryan Linn [Неизв.]
Control Statements We now have some basics down for dealing with PHP pages. So, let’s work through some conditionals and loops so that we can create more interesting code. We ...
( Category:
Programming
January 18,2018 )
azw3, pdf, epub |eng | 2017-07-24 | Author:Gerard Johansen [Johansen, Gerard]
Command-line tools There are several command-line tools that can be utilized during the analysis of network packet captures. During more in-depth or lengthy incident response engagements, analysts may gather several ...
( Category:
Security & Encryption
January 18,2018 )
epub, mobi, azw3 |eng | 2018-01-18 | Author:James Forshaw
Figure 7-5: ECB encryption of a bitmap image Cipher Block Chaining Another common mode of operation is Cipher Block Chaining (CBC), which is more complex than ECB and avoids its ...
( Category:
Internet & Social Media
January 18,2018 )
azw3 |eng | 2017-10-01 | Author:Karina Astudillo [Astudillo, Karina]
To sum up, if we plan to execute an extensive key attack on one or more WPA/WPA2 wireless networks whose respective handshakes we have captured, a database should be generated ...
( Category:
Internet & Social Media
January 17,2018 )
azw3 |eng | 2016-07-28 | Author:Kaushik, Anshul [Kaushik, Anshul]
Before starting the jail breaking process make sure that your battery is 100 percent charged & your device has at least 2gb free space. There are certain other things which ...
( Category:
Internet & Social Media
January 14,2018 )
epub |eng | 2016-01-28 | Author:Vince Reynolds [Reynolds, Vince]
Influence and Persuasion Apart from the four basic psychological tactics mentioned previously, there are other psychological techniques involved in social engineering. These include influence and persuasion. Social engineering psychology, just ...
( Category:
Internet & Social Media
January 14,2018 )
epub, pdf |eng | 2016-09-15 | Author:Jeff Simon & Hacking [Simon, Jeff]
Manual Penetration Tests You will run manual tests most of the time. Here, you will use your tools, skills, and knowledge to find the weaknesses of a network. Manual tests ...
( Category:
Internet & Social Media
January 14,2018 )
epub |eng | 2013-06-24 | Author:Fernandez-Buglioni, Eduardo
[Bha04] proves security properties of combinations of WS-TRUST and WS-Secure conversation to implement secure sessions. The WS-Trust specification was created as part of the Global XML Web Services Architecture (GXA) ...
( Category:
Programming
January 14,2018 )
mobi, epub, azw3 |eng | 2015-01-09 | Author:Sean Murphy
NOTE Depending on the type of exploit or attack, the incident response team will tailor its actions. If the incident is entirely internal (a lost removable media), certain actions are ...
( Category:
Hardware & DIY
January 14,2018 )
Categories
Cryptography | Encryption |
Hacking | Network Security |
Privacy & Online Safety | Security Certifications |
Viruses |
Popular ebooks
Practical Threat Detection Engineering by Megan Roddie & Jason Deyalsingh & Gary J. Katz(6725)Effective Threat Investigation for SOC Analysts by Yahia Mostafa;(6568)
Practical Memory Forensics by Svetlana Ostrovskaya & Oleg Skulkin(6288)
Machine Learning Security Principles by John Paul Mueller(6258)
Attacking and Exploiting Modern Web Applications by Simone Onofri & Donato Onofri(5932)
Operationalizing Threat Intelligence by Kyle Wilhoit & Joseph Opacki(5891)
Solidity Programming Essentials by Ritesh Modi(4033)
Microsoft 365 Security, Compliance, and Identity Administration by Peter Rising(3672)
Operationalizing Threat Intelligence by Joseph Opacki Kyle Wilhoit(3404)
Future Crimes by Marc Goodman(3350)
Mastering Python for Networking and Security by José Manuel Ortega(3346)
Mastering Azure Security by Mustafa Toroman and Tom Janetscheck(3335)
Blockchain Basics by Daniel Drescher(3303)
Learn Computer Forensics - Second Edition by William Oettinger(3168)
Incident Response with Threat Intelligence by Roberto Martínez(2890)
Mobile App Reverse Engineering by Abhinav Mishra(2884)
Mastering Bitcoin: Programming the Open Blockchain by Andreas M. Antonopoulos(2872)
The Code Book by Simon Singh(2830)
From CIA to APT: An Introduction to Cyber Security by Edward G. Amoroso & Matthew E. Amoroso(2782)
Building a Next-Gen SOC with IBM QRadar: Accelerate your security operations and detect cyber threats effectively by Ashish M Kothekar(2747)
