Hacking
epub |eng | | Author:Leslie F. Sikos
4.4.2.4 Presence of Proof-of-Concept The presence of PoC exploits in EDB increases the likelihood of vulnerability exploitation. It can be treated as a binary feature that indicates whether a PoC ...
( Category:
Intelligence & Semantics
March 12,2020 )
azw3 |eng | 2018-12-09 | Author:Nik Alleyne [Alleyne, Nik]
Log Analysis of Compromised Domain Controller As Nakia was able to gain some intelligence about what happened from the packet analysis, she figures the logs can assist her in being ...
( Category:
Viruses
March 11,2020 )
epub |eng | | Author:Ben Buchanan
Going Public Once it had penetrated its targets, the GRU was ready to put its access to use. It already had numerous emails from Podesta and other Democratic staffers, but ...
( Category:
Hacking
March 4,2020 )
epub, pdf |eng | 2017-01-26 | Author:Sparc FLOW [FLOW, Sparc]
Sure enough, something like this shows up (after some cleaning and sorting out, of course): Psexec is a tool heavily used to execute commands on remote systems. It requires admin ...
( Category:
Hacking
March 2,2020 )
mobi, epub |eng | 2016-02-29 | Author:Scott N. Schober
____________________ QUICK TIP: Look in the mirror and make sure the hat you’re wearing is the right color or you might end up behind bars. CHAPTER 14 THE INSIDER THREAT ...
( Category:
Hacking
March 1,2020 )
epub, azw3 |eng | 2019-08-08 | Author:Jake Braun
She stood outside his door for hours. Periodically, she would come into my office and say, “Jake, I have been standing there for three hours, and he hasn’t asked for ...
( Category:
Elections
February 28,2020 )
epub |eng | 2011-02-27 | Author:Wilhelm, Thomas, Andress, Jason [Wilhelm, Thomas; Andress, Jason]
Logical Guns? From a logical perspective, we could call various forms of malware a gun, but this might be a bit of a stretch. If we were to continue with ...
( Category:
Hacking
February 28,2020 )
epub |eng | 2009-02-08 | Author:David Hawley & Raina Hawley [David Hawley]
-Q, and save your workbook. Before running this code, select the heading of your list and ensure that your list contains no blank cells. Tip Sorting your list will remove ...
( Category:
Hacking
February 28,2020 )
epub |eng | 2010-05-10 | Author:Goldstein, Emmanuel
Enough, Phiber, now tell me about the switch! OK, OK. The two most common GSM switches are the Ericsson AXE MSC, based on the AXE 10, and the Nortel DMS-MSC, ...
( Category:
Hacking
February 28,2020 )
epub |eng | 2009-04-14 | Author:Ryan Russell & Johnny Long & Timothy Mullen [Russell, Ryan & Long, Johnny & Mullen, Timothy]
In the Beginning… CHAPTER 21 497 It did not take long for her to begin the process anew with the top-tier boards, the regional and world headquarters for the groups ...
( Category:
Hacking
January 16,2020 )
epub, mobi, pdf |eng | 2019-11-29 | Author:OccupyTheWeb
Summary Linux has a number of commands to enable you to combine and compress your files for easier transfer. For combining files, tar is the command of choice, and you ...
( Category:
Hacking
November 30,2019 )
epub |eng | 2011-02-13 | Author:The Complete Series Collector's Edition [Edition, The Complete Series Collector's]
In the Beginning… CHAPTER 21 497 It did not take long for her to begin the process anew with the top-tier boards, the regional and world headquarters for the groups ...
( Category:
Hacking
June 8,2017 )
epub |eng | 2014-03-19 | Author:John Havens
I Speak H(app)y Accountability-based influence provides a language for currency that should be used in the Connected World. Once we build our own individual economies, our actions more than our ...
( Category:
Hacking
May 26,2017 )
epub, mobi |eng | 2016-03-23 | Author:Nick Cano
Hijacking a Game’s Main Thread to Execute Code Caves In some cases, injected code caves need to be in sync with the main thread of the game process. Solving this ...
( Category:
Hacking
March 24,2017 )
epub |eng, eng | 2016-12-19 | Author:Nance,Malcolm
Figure 54: Dar al-Islam (Source: TAPSTRI) Dar ul-Islam—French Publication With nine editions published by 2016, the Dar ul-Islam magazine was focused at the French speaking audience. In comparison to Dabiq, ...
( Category:
Hacking
March 22,2017 )
Categories
Popular ebooks
Practical Threat Detection Engineering by Megan Roddie & Jason Deyalsingh & Gary J. Katz(6326)Effective Threat Investigation for SOC Analysts by Yahia Mostafa;(6196)
Practical Memory Forensics by Svetlana Ostrovskaya & Oleg Skulkin(5895)
Machine Learning Security Principles by John Paul Mueller(5878)
Attacking and Exploiting Modern Web Applications by Simone Onofri & Donato Onofri(5536)
Operationalizing Threat Intelligence by Kyle Wilhoit & Joseph Opacki(5518)
Solidity Programming Essentials by Ritesh Modi(3834)
Microsoft 365 Security, Compliance, and Identity Administration by Peter Rising(3481)
Mastering Python for Networking and Security by José Manuel Ortega(3317)
Future Crimes by Marc Goodman(3308)
Mastering Azure Security by Mustafa Toroman and Tom Janetscheck(3307)
Blockchain Basics by Daniel Drescher(3271)
Operationalizing Threat Intelligence by Joseph Opacki Kyle Wilhoit(3190)
Learn Computer Forensics - Second Edition by William Oettinger(2987)
Mobile App Reverse Engineering by Abhinav Mishra(2862)
Mastering Bitcoin: Programming the Open Blockchain by Andreas M. Antonopoulos(2835)
The Code Book by Simon Singh(2771)
From CIA to APT: An Introduction to Cyber Security by Edward G. Amoroso & Matthew E. Amoroso(2759)
Incident Response with Threat Intelligence by Roberto Martínez(2679)
The Art Of Deception by Kevin Mitnick(2581)
