Privacy & Online Safety
epub |eng | 0101-01-01 | Author:Ted Claypoole [Claypoole, Ted]
At Least You Have Your Health In the United States, many of your online activities are not protected by privacy laws. The law protects only certain types of information that ...
( Category:
Telecommunications & Sensors
February 23,2017 )
epub |eng | 2015-07-17 | Author:Finn Brunton [Brunton, Finn]
4 Is Obfuscation Justified? Be fire with fire; Threaten the threatener and outface the brow. Shakespeare, King John, 1595 After a lecture on TrackMeNot,1 a member of the audience rose ...
( Category:
Civil Rights & Liberties
July 18,2016 )
epub |eng | 2013-10-24 | Author:Nitesh Dhanjani [Nitesh Dhanjani and Justin Clarke]
Scanner Design Now that we have defined the basic requirements for our scanner, we can start to develop an overview of the scanner’s overall structure. Based on our requirements, two ...
( Category:
LAN
May 11,2016 )
azw3 |eng | 2016-02-28 | Author:Datt, Samir [Datt, Samir]
The essential components of a forensic-friendly log management system include log management infrastructure and log management planning and policies. Log management infrastructure Network forensic investigations heavily rely on the logs ...
( Category:
Network Security
March 31,2016 )
mobi |eng | 2015-12-07 | Author:Kevin Donaldson
Linux Linux is an open-source operating system that is not as common as Windows or Mac. However, it is gaining popularity nowadays because of its fuss-free interface and open-source concept. ...
( Category:
Viruses
March 8,2016 )
azw3 |eng | 2015-12-07 | Author:Donaldson, Kevin [Donaldson, Kevin]
Linux Linux is an open-source operating system that is not as common as Windows or Mac. However, it is gaining popularity nowadays because of its fuss-free interface and open-source concept. ...
( Category:
Viruses
March 8,2016 )
epub |eng | 2015-12-21 | Author:Neil W. Carson [Carson, Neil W.]
War Crimes – That is exactly what it provides and users post videos they have of War Crimes they have committed. Many languages are used on its forums and there ...
( Category:
Privacy & Online Safety
March 8,2016 )
azw3 |eng | 2016-02-08 | Author:
Tip #7: Disable Java, JavaScript and Flash Remember this: Tor is not able to protect your data with active content like Flash, JavaScript, QuickTime, etc. The reason is these applications ...
( Category:
Privacy & Online Safety
March 3,2016 )
azw3, epub |eng | 2015-12-12 | Author:Witt, Ron [Witt, Ron]
A good description of these features is provided by Microsoft’s https://technet.microsoft.com/en-us/ link below. https://technet.microsoft.com/en-us/library/dn986865%28v=vs.85%29.aspx To Learn more about Windows 10 and your online services Using your device Communicating with people ...
( Category:
Windows Desktop
January 4,2016 )
azw3 |eng | 2015-11-16 | Author:Mosco, Vincent [Mosco, Vincent]
Privacy and Security Privacy and security concerns are coming together to form another question mark over the IT industry, including cloud computing and big data. In order to properly assess ...
( Category:
Communication Policy
January 3,2016 )
epub, mobi |eng | 2015-02-23 | Author:Marc Goodman [Goodman, Marc]
Hacking Hardware A much rarer breed of hacker targets the physical elements that make up a computer system, including the microchips, electronics, controllers, memory, circuits, components, transistors, and sensors—core elements ...
( Category:
Science & Technology
December 13,2015 )
epub, pdf |eng | 2015-12-22 | Author:Josiah Dykstra
Chapter 8. Digital Forensics Digital forensics holds a unique distinction among the group of cybersecurity fields in this book because it requires science. Forensic science, by definition, is the use ...
( Category:
Network Security
December 13,2015 )
epub, mobi |eng | 2015-10-15 | Author:Bobby Akart [Akart, Bobby]
PART FIVE Cyber Attacks as Acts Of War Chapter Eleven Does Cyber Vandalism fall short of An Act of War? Military and national security operations in cyberspace have made headlines ...
( Category:
Arms Control
November 9,2015 )
epub |eng | 2015-09-21 | Author:Muir, Nancy C.
( Category:
PCs
November 3,2015 )
epub, azw3 |eng | 2010-09-01 | Author:Frank Ahearn & Eileen Horan [Ahearn, Frank]
ABANDONMENT If you’re leaving a husband, wife, or kids, I hope you’re doing it the right way (if there is a right way) by finding a lawyer and giving them ...
( Category:
Network Security
October 11,2015 )
Categories
Popular ebooks
Practical Threat Detection Engineering by Megan Roddie & Jason Deyalsingh & Gary J. Katz(6326)Effective Threat Investigation for SOC Analysts by Yahia Mostafa;(6196)
Practical Memory Forensics by Svetlana Ostrovskaya & Oleg Skulkin(5895)
Machine Learning Security Principles by John Paul Mueller(5878)
Attacking and Exploiting Modern Web Applications by Simone Onofri & Donato Onofri(5536)
Operationalizing Threat Intelligence by Kyle Wilhoit & Joseph Opacki(5518)
Solidity Programming Essentials by Ritesh Modi(3834)
Microsoft 365 Security, Compliance, and Identity Administration by Peter Rising(3481)
Mastering Python for Networking and Security by José Manuel Ortega(3317)
Future Crimes by Marc Goodman(3308)
Mastering Azure Security by Mustafa Toroman and Tom Janetscheck(3307)
Blockchain Basics by Daniel Drescher(3271)
Operationalizing Threat Intelligence by Joseph Opacki Kyle Wilhoit(3190)
Learn Computer Forensics - Second Edition by William Oettinger(2987)
Mobile App Reverse Engineering by Abhinav Mishra(2862)
Mastering Bitcoin: Programming the Open Blockchain by Andreas M. Antonopoulos(2835)
The Code Book by Simon Singh(2771)
From CIA to APT: An Introduction to Cyber Security by Edward G. Amoroso & Matthew E. Amoroso(2759)
Incident Response with Threat Intelligence by Roberto Martínez(2679)
The Art Of Deception by Kevin Mitnick(2581)
