Security & Encryption
azw3 |eng | 2011-12-15 | Author:Vivek Ramachandran

In the next exercise, we will look at how to crack a WPA PSK wireless network. The exact same steps will be involved in cracking a WPA2-PSK network using CCMP(AES) ...
( Category: Linux & UNIX Administration December 4,2014 )
epub, mobi, azw3 |eng | 2014-11-18 | Author:Brian Krebs [Krebs, Brian]

Severa Cosma ran his stock spam business in tandem with that of another cybercrook, a hacker who uses the nickname “Severa.” This spammer was named as a defendant in an ...
( Category: Hacking November 26,2014 )
epub, azw3 |eng | | Author:Gabriella Coleman

Upon reading the article, many of the hackers, already annoyed at Brown, became infuriated, lashing out at him on #anonleaks, the channel dedicated to discussing the HBGary leaks. <tflow>: it’s ...
( Category: Anarchism November 24,2014 )
mobi, epub |eng | 2014-08-22 | Author:Thomas P. Keenan

New York City was a pioneer in the Open Data arena. In October 2009, with considerable fanfare, they released a number of municipal data sets. The next day, they had ...
( Category: Canadian November 23,2014 )
epub, mobi, azw3 |eng | 2014-11-10 | Author:Kim Zetter [Zetter, Kim]

* * * 1 John Arquilla and David Ronfeldt, “Cyberwar Is Coming!” published by RAND in 1993 and reprinted as chapter 2 in Arquilla and Ronfeldt’s book In Athena’s Camp: ...
( Category: Specific Topics November 19,2014 )
epub, azw3 |eng | | Author:Shane Harris

Some of the FBI’s most important intelligence targets today are Chinese cyber spies stealing intellectual property. “We do a lot of collection on China’s victimizing US companies,” says a former ...
( Category: Privacy & Online Safety November 18,2014 )
epub |eng | 2008-01-02 | Author:Emmett Dulaney [Dulaney, Emmett]

■ Risk assessment BIA includes evaluating the critical functions of the organization. This information is used to make informed decisions about how to deal with outages should they occur. Risk ...
( Category: Security Certifications November 11,2014 )
epub, pdf |deu | 2011-11-10 | Author:Bowden, Mark

8 Ein weiterer großer Sieg Teamwork – vor allem anderen müsst ihr an das Teamwork denken! Ihr müsst als Einheit funktionieren – in jedem Moment. The X-Men Chronicles Bisher war ...
( Category: Viruses November 4,2014 )
epub |eng | 2013-09-10 | Author:Derrick Rountree & Ileana Castrillo

Attaching an EBS Volume Since the HTML pages to be served from the Web portal need to be persistent, it is required to create an EBS volume for holding the ...
( Category: Network Security October 27,2014 )
epub |eng | | Author:Tanner, Adam [Tanner, Adam]

Kyle Prall at the state capitol in Austin, Texas, in front of portraits of state legislators. Source: Author photo. In late 2012 Prall traveled to Las Vegas. Like so many ...
( Category: Privacy & Surveillance October 27,2014 )
mobi |eng | 2005-01-02 | Author:Kevin Mitnick [Mitnick, Kevin]

They discovered a live network jack, presumably for the convenience of company personnel who wanted to be able to access the corporate network during meetings. Plugging in an Ethernet cable ...
( Category: Hacking October 13,2014 )
epub |eng | 2002-12-31 | Author:Hervie Haufler

Winning at Moscow, Stalingrad and Kursk When, despite warnings, the Russian armies had been surprised and shattered during the opening phases of the war, Moscow's intelligence cadres could do little ...
( Category: Security & Encryption September 16,2014 )
mobi |eng | 2014-03-19 | Author:Julia Angwin

12 THE HALL OF MIRRORS When Rayne Puertos started a new job at a computer retailer in Tampa, Florida, she was not trying to hide her sexual orientation, but neither ...
( Category: Consumer Behavior September 2,2014 )
epub, pdf |eng | 2013-12-25 | Author:Mike Shema

Usually, services only respond to a particular protocol handshake. So, the trigger for SSL shouldn’t elicit a response from a DNS service, and the DNS trigger shouldn’t elicit a response ...
( Category: Hacking August 28,2014 )
epub, mobi |eng | 2010-11-24 | Author:Christopher Hadnagy [Hadnagy, Christopher]

Chapter 6 Influence: The Power of Persuasion If you would persuade, you must appeal to interest rather than intellect. —Benjamin Franklin The epigraph sums up this entire chapter. You might ...
( Category: Hacking August 27,2014 )