Security & Encryption
epub, pdf |eng | 2014-11-17 | Author:Brian Krebs [Krebs, Brian]
Severa Cosma ran his stock spam business in tandem with that of another cybercrook, a hacker who uses the nickname “Severa.” This spammer was named as a defendant in an ...
( Category:
Industries
November 22,2017 )
epub |eng | | Author:Samee U. Khan & Albert Y. Zomaya
( Category:
Networking & Cloud Computing
November 22,2017 )
epub, mobi |eng | 2011-09-09 | Author:2011 [2011]
98 Chapter 3 Case stUdIes: the sYstem Figure 3 .5 selecting syskey Decoder In Cain tools menu Figure 3 . 6 boot key selected When the Syskey Decoder dialog appears, ...
( Category:
Programming
November 20,2017 )
epub |eng | 2017-09-15 | Author:Laura Bell
Don’t forget to review configuration directives and tests: this is an important part of your code base, and needs to be treated like other code. Code reviews and static analysis ...
( Category:
Programming
November 16,2017 )
mobi, epub |eng | | Author:2015
We did not get a hit for smith, but perhaps others will confirm during this attack. Before we write our script, you need to know the different error or control ...
( Category:
Programming Languages
November 15,2017 )
epub |eng | 2012-07-02 | Author:Sean Bodmer [Bodmer, Sean]
In January 2002, Bill Gates, the then CEO of Microsoft, declared that Microsoft would secure all its products and services, and initiated a massive training and quality control program. Just ...
( Category:
Networking & Cloud Computing
November 11,2017 )
epub, pdf |eng | 2013-03-26 | Author:Mark Rhodes-Ousley
Wireless Intrusion Detection and Prevention The preceding points notwithstanding, intrusion detection on wireless networks should always cover the data-link layer. The principles of intrusion detection are outlined in Chapter 18. ...
( Category:
Programming
November 10,2017 )
epub |eng | 2015-10-15 | Author:Akart, Bobby [Akart, Bobby]
PART FIVE Cyber Attacks as Acts Of War Chapter Eleven Does Cyber Vandalism fall short of An Act of War? Military and national security operations in cyberspace have made headlines ...
( Category:
Politics & Government
November 8,2017 )
epub, mobi |eng | 2011-05-28 | Author:Hank Taggart [Taggart, Hank]
Don’t underestimate the value of setting up these eBay and PayPal accounts now, while you still can. It may be sooner than you think before all anonymous prepaid debit card ...
( Category:
Politics & Government
November 8,2017 )
mobi |eng | 2011-09-09 | Author:Ramachandran, Vivek [Ramachandran, Vivek]
In the next exercise, we will look at how to crack a WPA PSK wireless network. The exact same steps will be involved in cracking a WPA2-PSK network using CCMP(AES) ...
( Category:
Networking & Cloud Computing
November 6,2017 )
mobi |eng | 2010-11-29 | Author:Hadnagy, Christopher & Wilson, Paul [Hadnagy, Christopher]
Influence and persuasion can be broken down into five important aspects, as discussed in the following sections. The Five Fundamentals of Influence and Persuasion The five fundamentals of persuasion are ...
( Category:
Internet & Social Media
November 6,2017 )
azw3 |eng | 2016-06-29 | Author:Russell, Brian & Duren, Drew Van [Russell, Brian]
Using validated cryptographic implementations is an excellent practice overall, but do it smartly and don't assume that certain cryptographic modules that would seem to meet all of the functional and ...
( Category:
Mobile Phones, Tablets & E-Readers
November 6,2017 )
azw3 |eng | 2017-04-21 | Author:Shah, Dhruv & Girdhar, Ishan [Shah, Dhruv]
Similarly, you will need to include all the API keys here in recon-ng if you want to gather information from these sources. In the next recipe, we will learn how ...
( Category:
Operating Systems
November 6,2017 )
azw3, epub |eng | 2016-03-30 | Author:Gallagher, Scott [Gallagher, Scott]
Container images/runtime This part of the guide contains both the information for securing the container images as well as the container runtime. The first part contains images, cover base images, ...
( Category:
Operating Systems
November 6,2017 )
azw3 |eng | 2017-09-01 | Author:Maymi, Fernando & Chapman, Brent [Maymi, Fernando]
Forensic Duplicators Forensic duplicators are systems that copy data from a source to a destination while ensuring that not even a single bit gets altered in the process. What sets ...
( Category:
Security & Encryption
November 4,2017 )
Categories
Cryptography | Encryption |
Hacking | Network Security |
Privacy & Online Safety | Security Certifications |
Viruses |
Popular ebooks
Practical Threat Detection Engineering by Megan Roddie & Jason Deyalsingh & Gary J. Katz(6730)Effective Threat Investigation for SOC Analysts by Yahia Mostafa;(6571)
Practical Memory Forensics by Svetlana Ostrovskaya & Oleg Skulkin(6292)
Machine Learning Security Principles by John Paul Mueller(6261)
Attacking and Exploiting Modern Web Applications by Simone Onofri & Donato Onofri(5937)
Operationalizing Threat Intelligence by Kyle Wilhoit & Joseph Opacki(5897)
Solidity Programming Essentials by Ritesh Modi(4036)
Microsoft 365 Security, Compliance, and Identity Administration by Peter Rising(3674)
Operationalizing Threat Intelligence by Joseph Opacki Kyle Wilhoit(3408)
Future Crimes by Marc Goodman(3350)
Mastering Python for Networking and Security by José Manuel Ortega(3348)
Mastering Azure Security by Mustafa Toroman and Tom Janetscheck(3336)
Blockchain Basics by Daniel Drescher(3303)
Learn Computer Forensics - Second Edition by William Oettinger(3169)
Incident Response with Threat Intelligence by Roberto Martínez(2893)
Mobile App Reverse Engineering by Abhinav Mishra(2885)
Mastering Bitcoin: Programming the Open Blockchain by Andreas M. Antonopoulos(2872)
The Code Book by Simon Singh(2831)
From CIA to APT: An Introduction to Cyber Security by Edward G. Amoroso & Matthew E. Amoroso(2783)
Building a Next-Gen SOC with IBM QRadar: Accelerate your security operations and detect cyber threats effectively by Ashish M Kothekar(2749)
