Privacy & Online Safety
epub, azw3, mobi, pdf |eng | 2014-12-15 | Author:Tyler Wrightson [Wrightson, Tyler]
Active Wireless Recon Before we know which wireless attack will be the most lucrative, we need to identify if there are any access points to target. We will perform active ...
( Category:
Hacking
December 15,2014 )
mobi, epub |eng | 2014-08-22 | Author:Thomas P. Keenan
New York City was a pioneer in the Open Data arena. In October 2009, with considerable fanfare, they released a number of municipal data sets. The next day, they had ...
( Category:
Canadian
November 23,2014 )
epub, azw3 |eng | | Author:Shane Harris
Some of the FBI’s most important intelligence targets today are Chinese cyber spies stealing intellectual property. “We do a lot of collection on China’s victimizing US companies,” says a former ...
( Category:
Privacy & Online Safety
November 18,2014 )
epub |eng | | Author:Tanner, Adam [Tanner, Adam]
Kyle Prall at the state capitol in Austin, Texas, in front of portraits of state legislators. Source: Author photo. In late 2012 Prall traveled to Las Vegas. Like so many ...
( Category:
Privacy & Surveillance
October 27,2014 )
mobi |eng | 2014-03-19 | Author:Julia Angwin
12 THE HALL OF MIRRORS When Rayne Puertos started a new job at a computer retailer in Tampa, Florida, she was not trying to hide her sexual orientation, but neither ...
( Category:
Consumer Behavior
September 2,2014 )
epub, pdf |eng | 2013-12-25 | Author:Mike Shema
Usually, services only respond to a particular protocol handshake. So, the trigger for SSL shouldn’t elicit a response from a DNS service, and the DNS trigger shouldn’t elicit a response ...
( Category:
Hacking
August 28,2014 )
mobi, epub |eng | 2008-01-28 | Author:Jon Erickson
Example Internet Datagram Header Each element in the structure corresponds to the fields shown in the RFC header diagram. Since the first two fields, Version and IHL (Internet Header Length) ...
( Category:
Privacy & Online Safety
May 26,2014 )
Silence on the Wire: A Field Guide to Passive Reconnaissance and Indirect Attacks by Zalewski Michal
azw3 |eng | 2005-04-14 | Author:Zalewski, Michal [Zalewski, Michal]
Customer Profiling and Privacy Invasion Many companies go to great lengths to gather and sell valuable information about people’s habits, preferences, and behavior. Although this information is usually used for ...
( Category:
LAN
May 26,2014 )
epub, pdf |eng | 2012-02-26 | Author:Michael Sikorski & Andrew Honig [Michael Sikorski]
Using Hashed Exported Names The algorithm just discussed has a weakness: It performs a strcmp against each export name until it finds the correct one. This requires that the full ...
( Category:
Hacking
April 5,2014 )
epub |eng | 2010-10-14 | Author:Fitzgerald, Michael [Michael Fitzgerald]
See Also For a more thorough introduction to SOAP, read the SOAP v1.2 primer (Part 0): http://www.w3.org/TR/soap12-part0/ SOAP v1.2 messaging framework (Part 1), including information on the SOAP processing model ...
( Category:
Client-Server Systems
March 31,2014 )
epub |eng | 2000-01-02 | Author:Chuck Musciano & Bill Kennedy [Musciano, Chuck & Kennedy, Bill]
9.2.2.1. The application/x-www-form-urlencoded encoding The standard encodingapplication/x-www-form-urlencodedconverts any spaces in the form values into a plus sign (+), nonalphanumeric characters into a percent sign (%) followed by two hexadecimal digits ...
( Category:
Web Design
March 31,2014 )
epub |eng | 2011-06-17 | Author:Pc User [User, Pc]
20 It is possible through a technique called cloaking, and for this reason, cloaking is possibly one of the best friends black hat SEO practitioners could ever have. In order ...
( Category:
PCs
March 26,2014 )
epub, pdf, mobi |eng | 2013-06-20 | Author:Pauli, Josh [Pauli, Josh]
Bypassing Authentication We can now construct a valid SQL statement that will execute gracefully and retrieve information that we have no right to retrieve. We know we are dealing with ...
( Category:
Hacking
March 26,2014 )
epub |eng | 2011-03-25 | Author:Martin L. Abbott & Michael T. Fisher
* * * Rule 28 has an ugly and slightly misleading and controversial title meant to provoke thought and discussion. Of course it makes sense to have a team responsible ...
( Category:
Programming
March 26,2014 )
epub, mobi |eng | 2013-07-22 | Author:Peter Loshin
Using Tails from a USB drive means: • As a writeable medium, if the USB device is large enough you can configure a persistent volume (a section of the device ...
( Category:
Network Security
March 26,2014 )
Categories
Popular ebooks
Practical Threat Detection Engineering by Megan Roddie & Jason Deyalsingh & Gary J. Katz(6696)Effective Threat Investigation for SOC Analysts by Yahia Mostafa;(6539)
Practical Memory Forensics by Svetlana Ostrovskaya & Oleg Skulkin(6256)
Machine Learning Security Principles by John Paul Mueller(6229)
Attacking and Exploiting Modern Web Applications by Simone Onofri & Donato Onofri(5899)
Operationalizing Threat Intelligence by Kyle Wilhoit & Joseph Opacki(5860)
Solidity Programming Essentials by Ritesh Modi(4011)
Microsoft 365 Security, Compliance, and Identity Administration by Peter Rising(3655)
Operationalizing Threat Intelligence by Joseph Opacki Kyle Wilhoit(3385)
Future Crimes by Marc Goodman(3346)
Mastering Python for Networking and Security by José Manuel Ortega(3344)
Mastering Azure Security by Mustafa Toroman and Tom Janetscheck(3330)
Blockchain Basics by Daniel Drescher(3294)
Learn Computer Forensics - Second Edition by William Oettinger(3149)
Mobile App Reverse Engineering by Abhinav Mishra(2880)
Incident Response with Threat Intelligence by Roberto Martínez(2870)
Mastering Bitcoin: Programming the Open Blockchain by Andreas M. Antonopoulos(2868)
The Code Book by Simon Singh(2823)
From CIA to APT: An Introduction to Cyber Security by Edward G. Amoroso & Matthew E. Amoroso(2779)
Building a Next-Gen SOC with IBM QRadar: Accelerate your security operations and detect cyber threats effectively by Ashish M Kothekar(2712)
