Security & Encryption
epub |eng | 2011-07-19 | Author:David Kennedy & Jim O'Gorman & Devon Kearns & Mati Aharoni [David Kennedy]
Figure 10-6. Multi-attack security warning We have a backup attack, however. The target clicks Run on the malicious Java applet, a Meterpreter shell begins, and the target is redirected back ...
( Category:
Security & Encryption
October 11,2017 )
epub |eng | 2012-05-09 | Author:Clifford Stoll [Stoll, Clifford]
I’d kicked over an anthill. For the next few days, I couldn’t get away from my phone. The spooks kept calling back, asking for technical details—how do you connect from ...
( Category:
True Crime
October 7,2017 )
azw3, epub, pdf |eng | 2014-11-04 | Author:Gabriella Coleman [Coleman, Gabriella]
Upon reading the article, many of the hackers, already annoyed at Brown, became infuriated, lashing out at him on #anonleaks, the channel dedicated to discussing the HBGary leaks. <tflow>: it’s ...
( Category:
Social Sciences
October 6,2017 )
epub |eng | | Author:Daniel Drescher
Changing a Reference in the Merkle Tree Figure 15-6 illustrates what happens if one not only changes details of a transaction but also changes the hash reference that points to ...
( Category:
Economics
October 4,2017 )
epub, pdf |eng | 2013-09-02 | Author:John R. Vacca
Chapter Review Questions/Exercises True/False 1. True or False? Network firewalls are a vital component for maintaining a secure environment and are often the first line of defense against attack. 2. ...
( Category:
Security & Encryption
October 3,2017 )
epub |eng | 2010-06-20 | Author:Emmanuel Goldstein [Goldstein, Emmanuel]
Dear 2600: Ive recently read that Despair, Inc. has registered the frowny emoticon :-(, copyrighted it, and is planning to sue anyone and everyone who uses the so-called frowny emoticon, ...
( Category:
Internet & Social Media
September 30,2017 )
azw3 |eng | 2014-11-18 | Author:Godfrey Nolan
import com.riis.restfulwebservice.R; import android.os.AsyncTask; import android.os.Bundle; import android.preference.PreferenceManager; import android.app.Activity; import android.app.ProgressDialog; import android.content.SharedPreferences; import android.view.View; import android.view.View.OnClickListener; import android.widget.Button; import android.widget.TextView; public class RestFulWebservice extends Activity { private String ...
( Category:
Mobile Phones, Tablets & E-Readers
September 29,2017 )
mobi, azw3, epub |eng | 2014-07-24 | Author:Natalie MacLees
Now that we've got that container, we just need to access the data that's attached to it. To do that, we'll use jQuery's data() method, and we'll use cycle.API that ...
( Category:
Web Development & Design
September 29,2017 )
epub |eng | 2011-08-30 | Author:Dafydd Stuttard & Marcus Pinto
The Attack When the assumption is explicitly stated in this way, the logic flaw becomes obvious. Of course, an ordinary user could issue a request that did not contain an ...
( Category:
Security & Encryption
September 28,2017 )
epub, mobi |eng | | Author:2015
Dshell can be installed in our lab environment by cloning the sources from GitHub at, https://github.com/USArmyResearchLab/Dshell and running install-ubuntu.py. This script will automatically download the missing packages and build the ...
( Category:
Networking & Cloud Computing
September 26,2017 )
mobi, pdf |eng | 2014-09-08 | Author:Elizabeth Woyke [Woyke, Elizabeth]
Worker dismantling toner cartridges, covered with toner, in Guiyu, China (Basel Action Network/Flickr) When Zhao first visited Guiyu in 2006, he saw another set of workers immersing those circuit boards ...
( Category:
Networking & Cloud Computing
September 22,2017 )
epub, mobi |eng | 2013-11-19 | Author:Schneier, Bruce [Schneier, Bruce]
Google's and Facebook's Privacy Illusion Originally published in Forbes, April 6, 2010 In January, Facebook CEO, Mark Zuckerberg, declared the age of privacy to be over. A month earlier, Google ...
( Category:
Networking & Cloud Computing
September 21,2017 )
mobi |eng | 2013-12-15 | Author:Bruce Schneier
Google's and Facebook's Privacy Illusion Originally published in Forbes, April 6, 2010 In January, Facebook CEO, Mark Zuckerberg, declared the age of privacy to be over. A month earlier, Google ...
( Category:
Networking & Cloud Computing
September 21,2017 )
epub |eng | 2014-08-11 | Author:Thomas, Valerie, Gardner, Bill & Valerie Thomas
Moderate Designed for organizations that are able to address more than a minimal training cycle, this cycle incorporates additional elements: ■ Biannual training sessions for all employees ■ Continual training ...
( Category:
Business Technology
September 18,2017 )
epub, mobi, pdf |eng | 2011-12-26 | Author:Nitesh Dhanjani [Dhanjani, Nitesh]
Ignoring the fact that the credentials could possibly be sent to a clear-text email account, one piece of the message is particularly interesting from a security standpoint. SalesForce.com not only ...
( Category:
Internet & Social Media
September 17,2017 )
Categories
Cryptography | Encryption |
Hacking | Network Security |
Privacy & Online Safety | Security Certifications |
Viruses |
Popular ebooks
Practical Threat Detection Engineering by Megan Roddie & Jason Deyalsingh & Gary J. Katz(6736)Effective Threat Investigation for SOC Analysts by Yahia Mostafa;(6578)
Practical Memory Forensics by Svetlana Ostrovskaya & Oleg Skulkin(6296)
Machine Learning Security Principles by John Paul Mueller(6271)
Attacking and Exploiting Modern Web Applications by Simone Onofri & Donato Onofri(5944)
Operationalizing Threat Intelligence by Kyle Wilhoit & Joseph Opacki(5904)
Solidity Programming Essentials by Ritesh Modi(4041)
Microsoft 365 Security, Compliance, and Identity Administration by Peter Rising(3678)
Operationalizing Threat Intelligence by Joseph Opacki Kyle Wilhoit(3410)
Future Crimes by Marc Goodman(3351)
Mastering Python for Networking and Security by José Manuel Ortega(3348)
Mastering Azure Security by Mustafa Toroman and Tom Janetscheck(3337)
Blockchain Basics by Daniel Drescher(3305)
Learn Computer Forensics - Second Edition by William Oettinger(3172)
Incident Response with Threat Intelligence by Roberto Martínez(2897)
Mobile App Reverse Engineering by Abhinav Mishra(2886)
Mastering Bitcoin: Programming the Open Blockchain by Andreas M. Antonopoulos(2873)
The Code Book by Simon Singh(2832)
From CIA to APT: An Introduction to Cyber Security by Edward G. Amoroso & Matthew E. Amoroso(2783)
Building a Next-Gen SOC with IBM QRadar: Accelerate your security operations and detect cyber threats effectively by Ashish M Kothekar(2758)
