Security & Encryption
epub |eng | | Author:Luis Ayala
Network-based IDS detect attacks by capturing and analyzing network packets. Listening on a network segment or switch, one network-based IDS can monitor the network traffic affecting multiple hosts that are ...
( Category:
Networking & Cloud Computing
August 30,2017 )
azw3 |eng | 2015-03-27 | Author:Sharpe, Isaac [Sharpe, Isaac]
Wireless Security Guidelines In order to protect yourself from attacks targeted in a wireless fashion you need to make a few adjustments to the entire network. § SSID Solution – ...
( Category:
Internet & Social Media
August 29,2017 )
mobi |eng | 2017-01-17 | Author:Wolf Halton & Bo Weaver & Juned Ahmed Ansari & Srinivasa Rao Kotipalli & Mohammed A. Imran
( Category:
Security & Encryption
August 27,2017 )
epub |eng | 2017-01-18 | Author:Halton, Wolf & Weaver, Bo & Ansari, Juned Ahmed & Kotipalli, Srinivasa Rao & Imran, Mohammed A.
The configuration file stores all the important information related to the injection attack. The URL to be tested is the first option to be defined here. Other important options are ...
( Category:
Security & Encryption
August 27,2017 )
Building Virtual Pentesting Labs for Advanced Penetration Testing - Second Edition by Cardwell Kevin
azw3 |eng | 2016-08-30 | Author:Cardwell, Kevin [Cardwell, Kevin]
As the previous image shows, we are going to configure the Network Security Toolkit on the VMnet6 switch; this is to monitor the segment that we set up with the ...
( Category:
Networking & Cloud Computing
August 27,2017 )
epub |eng | 2015-06-20 | Author:Alex Benjamin [Benjamin, Alex]
Chapter 6: Accessing Ports Ports allow multiple services (remember the term daemon?) to share a single physical connection for communication. The best example would be allowing access to the internet. ...
( Category:
Internet & Social Media
August 26,2017 )
epub |eng | 2017-08-25 | Author:Andrew O'Hagan [Andrew O’Hagan]
THE SATOSHI AFFAIR The Raid Ten men raided a house in Gordon, a north shore suburb of Sydney, at 1.30 p.m. on Wednesday 9 December 2015. Some of the federal ...
( Category:
Security & Encryption
August 25,2017 )
Wireshark for Security Professionals: Using Wireshark and the Metasploit Framework by Jeff T. Parker
epub, mobi, azw3, pdf |eng | 2017-03-27 | Author:Jeff T. Parker
Exercises Perform two captures, one in promiscuous mode and one not in promiscuous mode. Find any packets only in the trace captured in promiscuous mode. What packet details made you ...
( Category:
Security & Encryption
August 25,2017 )
epub, mobi |eng | 2012-04-15 | Author:Seitz, Justin [Seitz, Justin]
BOOLEAN RtlFreeHeap( IN PVOID HeapHandle, IN ULONG Flags, IN PVOID HeapBase ); PVOID RtlAllocateHeap( IN PVOID HeapHandle, IN ULONG Flags, IN SIZE_T Size ); So for RtlFreeHeap we are going ...
( Category:
Internet & Social Media
August 24,2017 )
epub, mobi, pdf |eng | 2012-02-23 | Author:Sikorski, Michael & Honig, Andrew [Sikorski, Michael]
( Category:
Security & Encryption
August 24,2017 )
mobi, epub, pdf |eng | 2010-10-27 | Author:Perla, Enrico & Oldani, Massimiliano [Perla, Enrico]
It is also possible to query the state of all the kernel extensions mapped into the kernel as an unprivileged user, as well as their load address, size, and other ...
( Category:
Internet & Social Media
August 24,2017 )
epub, azw3, pdf |eng | 2015-03-14 | Author:Kai Roer [Roer, Kai]
Building your team John, the CISO of a large, multinational bank, had a team of cyber security professionals to help him tackle incidents and run their security operations. His team ...
( Category:
Computer Science
August 22,2017 )
epub |eng | 0101-01-01 | Author:2017
Script entry and appearance to victims â simple but effective. On our Kali box, we can see that we are delivering the payload and seeing the user's traffic through the ...
( Category:
Internet & Social Media
August 22,2017 )
epub |eng | 2013-11-19 | Author:Ronald J. Deibert [Deibert, Ronald J.]
10. Fanning the Flames of Cyber Warfare Eugene Kaspersky is the CEO of the Russian-based malware and cyber-security research laboratory that bears his name, Kaspersky Lab. An outspoken, controversial, and ...
( Category:
Social Sciences
August 22,2017 )
azw3, epub |eng | 2017-05-04 | Author:Arthur Salmon & Michael McLafferty & Warun Levesque [Salmon, Arthur]
( Category:
Networking & Cloud Computing
August 22,2017 )
Categories
Cryptography | Encryption |
Hacking | Network Security |
Privacy & Online Safety | Security Certifications |
Viruses |
Popular ebooks
Practical Threat Detection Engineering by Megan Roddie & Jason Deyalsingh & Gary J. Katz(6730)Effective Threat Investigation for SOC Analysts by Yahia Mostafa;(6571)
Practical Memory Forensics by Svetlana Ostrovskaya & Oleg Skulkin(6292)
Machine Learning Security Principles by John Paul Mueller(6261)
Attacking and Exploiting Modern Web Applications by Simone Onofri & Donato Onofri(5937)
Operationalizing Threat Intelligence by Kyle Wilhoit & Joseph Opacki(5897)
Solidity Programming Essentials by Ritesh Modi(4036)
Microsoft 365 Security, Compliance, and Identity Administration by Peter Rising(3674)
Operationalizing Threat Intelligence by Joseph Opacki Kyle Wilhoit(3408)
Future Crimes by Marc Goodman(3350)
Mastering Python for Networking and Security by José Manuel Ortega(3348)
Mastering Azure Security by Mustafa Toroman and Tom Janetscheck(3336)
Blockchain Basics by Daniel Drescher(3303)
Learn Computer Forensics - Second Edition by William Oettinger(3169)
Incident Response with Threat Intelligence by Roberto Martínez(2893)
Mobile App Reverse Engineering by Abhinav Mishra(2885)
Mastering Bitcoin: Programming the Open Blockchain by Andreas M. Antonopoulos(2872)
The Code Book by Simon Singh(2831)
From CIA to APT: An Introduction to Cyber Security by Edward G. Amoroso & Matthew E. Amoroso(2783)
Building a Next-Gen SOC with IBM QRadar: Accelerate your security operations and detect cyber threats effectively by Ashish M Kothekar(2749)
