Security & Encryption
azw3 |eng | 2011-12-15 | Author:Vivek Ramachandran
In the next exercise, we will look at how to crack a WPA PSK wireless network. The exact same steps will be involved in cracking a WPA2-PSK network using CCMP(AES) ...
( Category:
Linux & UNIX Administration
December 4,2014 )
epub, mobi, azw3 |eng | 2014-11-18 | Author:Brian Krebs [Krebs, Brian]
Severa Cosma ran his stock spam business in tandem with that of another cybercrook, a hacker who uses the nickname “Severa.” This spammer was named as a defendant in an ...
( Category:
Hacking
November 26,2014 )
epub, azw3 |eng | | Author:Gabriella Coleman
Upon reading the article, many of the hackers, already annoyed at Brown, became infuriated, lashing out at him on #anonleaks, the channel dedicated to discussing the HBGary leaks. <tflow>: it’s ...
( Category:
Anarchism
November 24,2014 )
mobi, epub |eng | 2014-08-22 | Author:Thomas P. Keenan
New York City was a pioneer in the Open Data arena. In October 2009, with considerable fanfare, they released a number of municipal data sets. The next day, they had ...
( Category:
Canadian
November 23,2014 )
epub, mobi, azw3 |eng | 2014-11-10 | Author:Kim Zetter [Zetter, Kim]
* * * 1 John Arquilla and David Ronfeldt, “Cyberwar Is Coming!” published by RAND in 1993 and reprinted as chapter 2 in Arquilla and Ronfeldt’s book In Athena’s Camp: ...
( Category:
Specific Topics
November 19,2014 )
epub, azw3 |eng | | Author:Shane Harris
Some of the FBI’s most important intelligence targets today are Chinese cyber spies stealing intellectual property. “We do a lot of collection on China’s victimizing US companies,” says a former ...
( Category:
Privacy & Online Safety
November 18,2014 )
epub |eng | 2008-01-02 | Author:Emmett Dulaney [Dulaney, Emmett]
■ Risk assessment BIA includes evaluating the critical functions of the organization. This information is used to make informed decisions about how to deal with outages should they occur. Risk ...
( Category:
Security Certifications
November 11,2014 )
epub, pdf |deu | 2011-11-10 | Author:Bowden, Mark
8 Ein weiterer großer Sieg Teamwork – vor allem anderen müsst ihr an das Teamwork denken! Ihr müsst als Einheit funktionieren – in jedem Moment. The X-Men Chronicles Bisher war ...
( Category:
Viruses
November 4,2014 )
epub |eng | 2013-09-10 | Author:Derrick Rountree & Ileana Castrillo
Attaching an EBS Volume Since the HTML pages to be served from the Web portal need to be persistent, it is required to create an EBS volume for holding the ...
( Category:
Network Security
October 27,2014 )
epub |eng | | Author:Tanner, Adam [Tanner, Adam]
Kyle Prall at the state capitol in Austin, Texas, in front of portraits of state legislators. Source: Author photo. In late 2012 Prall traveled to Las Vegas. Like so many ...
( Category:
Privacy & Surveillance
October 27,2014 )
mobi |eng | 2005-01-02 | Author:Kevin Mitnick [Mitnick, Kevin]
They discovered a live network jack, presumably for the convenience of company personnel who wanted to be able to access the corporate network during meetings. Plugging in an Ethernet cable ...
( Category:
Hacking
October 13,2014 )
epub |eng | 2002-12-31 | Author:Hervie Haufler
Winning at Moscow, Stalingrad and Kursk When, despite warnings, the Russian armies had been surprised and shattered during the opening phases of the war, Moscow's intelligence cadres could do little ...
( Category:
Security & Encryption
September 16,2014 )
mobi |eng | 2014-03-19 | Author:Julia Angwin
12 THE HALL OF MIRRORS When Rayne Puertos started a new job at a computer retailer in Tampa, Florida, she was not trying to hide her sexual orientation, but neither ...
( Category:
Consumer Behavior
September 2,2014 )
epub, pdf |eng | 2013-12-25 | Author:Mike Shema
Usually, services only respond to a particular protocol handshake. So, the trigger for SSL shouldn’t elicit a response from a DNS service, and the DNS trigger shouldn’t elicit a response ...
( Category:
Hacking
August 28,2014 )
epub, mobi |eng | 2010-11-24 | Author:Christopher Hadnagy [Hadnagy, Christopher]
Chapter 6 Influence: The Power of Persuasion If you would persuade, you must appeal to interest rather than intellect. —Benjamin Franklin The epigraph sums up this entire chapter. You might ...
( Category:
Hacking
August 27,2014 )
Categories
Cryptography | Encryption |
Hacking | Network Security |
Privacy & Online Safety | Security Certifications |
Viruses |
Popular ebooks
Practical Threat Detection Engineering by Megan Roddie & Jason Deyalsingh & Gary J. Katz(6732)Effective Threat Investigation for SOC Analysts by Yahia Mostafa;(6577)
Practical Memory Forensics by Svetlana Ostrovskaya & Oleg Skulkin(6295)
Machine Learning Security Principles by John Paul Mueller(6267)
Attacking and Exploiting Modern Web Applications by Simone Onofri & Donato Onofri(5942)
Operationalizing Threat Intelligence by Kyle Wilhoit & Joseph Opacki(5903)
Solidity Programming Essentials by Ritesh Modi(4040)
Microsoft 365 Security, Compliance, and Identity Administration by Peter Rising(3678)
Operationalizing Threat Intelligence by Joseph Opacki Kyle Wilhoit(3409)
Future Crimes by Marc Goodman(3351)
Mastering Python for Networking and Security by José Manuel Ortega(3348)
Mastering Azure Security by Mustafa Toroman and Tom Janetscheck(3337)
Blockchain Basics by Daniel Drescher(3305)
Learn Computer Forensics - Second Edition by William Oettinger(3171)
Incident Response with Threat Intelligence by Roberto Martínez(2897)
Mobile App Reverse Engineering by Abhinav Mishra(2886)
Mastering Bitcoin: Programming the Open Blockchain by Andreas M. Antonopoulos(2873)
The Code Book by Simon Singh(2832)
From CIA to APT: An Introduction to Cyber Security by Edward G. Amoroso & Matthew E. Amoroso(2783)
Building a Next-Gen SOC with IBM QRadar: Accelerate your security operations and detect cyber threats effectively by Ashish M Kothekar(2755)
