Privacy & Online Safety
mobi |eng | 2015-07-06 | Author:Neil W. Carson
picsofdeadkids – That’s exactly what you think it is. It is a site that is dedicated to pictures of dead children and not just wake pictures. These are just a ...
( Category:
Privacy & Online Safety
July 9,2015 )
mobi, pdf |eng | 2007-01-15 | Author:Michael Rash
[ext_scanner]# nmap -sF -P0 -p 80 -n 71.157.X.X Starting Nmap 4.01 ( http://www.insecure.org/nmap/ ) at 2007-03-05 20:50 EST Interesting ports on 71.157.X.X: PORT STATE SERVICE 80/tcp open|filtered http Nmap finished: ...
( Category:
Networking & System Administration
June 11,2015 )
mobi, epub |eng | 2007-11-28 | Author:Rice, David [Rice, David]
To put this problem in context, when concrete is used for a roadway, it increases the speed cars are permitted to drive. When crumple zones are added to vehicles it ...
( Category:
Quality Control
June 11,2015 )
epub |eng | 2014-04-05 | Author:Nancy C. Muir
Just remember, with good password-cracking software — available for free from the web, of course —it takes only about a minute for a hacker to crack your password and potentially ...
( Category:
Privacy & Online Safety
June 6,2015 )
epub |eng | 2015-06-01 | Author:Shon Harris
A. Security parameter index B. Security ability C. Security association D. Security assistant C. Each IPSec VPN device will have at least one security association (SA) for each secure connection ...
( Category:
Encryption
June 2,2015 )
epub |eng | 2015-05-22 | Author:Mark, Bailil
Now, the part I’m interested in is highlighted above. Note that the “Received” is from kara.org at an IP that appears to be an xo.net DSL line, which does not ...
( Category:
Internet, Groupware, & Telecommunications
May 28,2015 )
epub, pdf |eng | 2015-05-14 | Author:Henderson, Lance
3.) You can "sign" any message you want over Tor or anywhere else (Freenet, for example, the highest security setting of which demands absolute trust of your friend's darknet connection) ...
( Category:
Internet, Groupware, & Telecommunications
May 25,2015 )
mobi |eng | 2015-04-18 | Author:Scott, Greg [Scott, Greg]
Jerry Barkley Friday, December 6th was another crazy Friday for Jerry Barkley. His phone started ringing at 7:30 that morning and didn’t seem to stop all day. “Why does it ...
( Category:
Technothrillers
April 27,2015 )
epub |eng | 2015-04-18 | Author:Scott, Greg
Jerry Barkley Friday, December 6th was another crazy Friday for Jerry Barkley. His phone started ringing at 7:30 that morning and didn’t seem to stop all day. “Why does it ...
( Category:
Technothrillers
April 27,2015 )
epub |eng | 2012-04-21 | Author:Sherri Davidoff & Jonathan Ham
7.7.4 Examples In this section we consider a couple of fairly simple Snort rules, examine packets that would trigger them, and then inspect the alerts that would result. Understanding how ...
( Category:
Internet, Groupware, & Telecommunications
April 22,2015 )
epub |rus | 2009-03-31 | Author:George Reese [Reese, George]
* * * As with other components in your web application architecture, putting your database in a replication architecture gives it the ability to rapidly recover from a node failure ...
( Category:
Intranets & Extranets
March 22,2015 )
mobi |eng | 2015-02-11 | Author:Mohammad Tanvir Hossain
CHAPTER 6 Who Is A HACKER? A hacker is someone who finds out the weakness in the computer system or network. The activity of a hacker can be motivated by ...
( Category:
Internet, Groupware, & Telecommunications
March 5,2015 )
epub |eng | 2014-07-24 | Author:Michael Gurnow [Gurnow, Michael]
Chapter 7 Black Rain “The immoral cannot be made moral through the use of secret law.” –Edward Snowden, public statement made during the G9 meeting, July 12, 20131 The fallout ...
( Category:
National
March 4,2015 )
mobi | | | Author:Nitesh Dhanjani
( Category:
Software Development
January 6,2015 )
epub, mobi, pdf |eng | 2014-12-04 | Author:Justin Seitz [Seitz, Justin]
Kicking the Tires Click the Extender tab in Burp, click the Add button, and use the same procedure we used for our previous extensions to get the Wordlist extension working. ...
( Category:
Viruses
December 27,2014 )
Categories
Popular ebooks
Practical Threat Detection Engineering by Megan Roddie & Jason Deyalsingh & Gary J. Katz(6326)Effective Threat Investigation for SOC Analysts by Yahia Mostafa;(6196)
Practical Memory Forensics by Svetlana Ostrovskaya & Oleg Skulkin(5895)
Machine Learning Security Principles by John Paul Mueller(5878)
Attacking and Exploiting Modern Web Applications by Simone Onofri & Donato Onofri(5536)
Operationalizing Threat Intelligence by Kyle Wilhoit & Joseph Opacki(5518)
Solidity Programming Essentials by Ritesh Modi(3834)
Microsoft 365 Security, Compliance, and Identity Administration by Peter Rising(3481)
Mastering Python for Networking and Security by José Manuel Ortega(3317)
Future Crimes by Marc Goodman(3308)
Mastering Azure Security by Mustafa Toroman and Tom Janetscheck(3307)
Blockchain Basics by Daniel Drescher(3271)
Operationalizing Threat Intelligence by Joseph Opacki Kyle Wilhoit(3190)
Learn Computer Forensics - Second Edition by William Oettinger(2987)
Mobile App Reverse Engineering by Abhinav Mishra(2862)
Mastering Bitcoin: Programming the Open Blockchain by Andreas M. Antonopoulos(2835)
The Code Book by Simon Singh(2771)
From CIA to APT: An Introduction to Cyber Security by Edward G. Amoroso & Matthew E. Amoroso(2759)
Incident Response with Threat Intelligence by Roberto Martínez(2679)
The Art Of Deception by Kevin Mitnick(2581)
