Privacy & Online Safety
epub |eng | | Author:Dafydd Stuttard, Marcus Pinto

Chapter 11 Attacking Application Logic 427 The vulnerability arose from the same kind of mistake as in the error message example described previously: the application was using static storage to ...
( Category: Privacy & Online Safety February 29,2020 )
epub |eng | 2019-06-05 | Author:Perry Carpenter

Media companies know this well. Netflix has a ton of variety, but it knows that you are interested in only a subset of that. YouTube has a ton of variety, ...
( Category: Network Security February 27,2020 )
epub |eng | | Author:Nora A. Draper

Personal Branding: Building the Brand Called You In 1997, the business and innovation magazine Fast Company ran a cover story titled “A Brand Called You.” In the article, Tom Peters ...
( Category: Privacy & Surveillance February 27,2020 )
epub |eng | 2019-12-05 | Author:Mining, Ethem [Mining, Ethem]

Command Prompts When you are interacting with the Terminal, you are using command prompts or shell prompts—you will likely see these used interchangeably as you read through various guides. When ...
( Category: Hacking February 25,2020 )
epub |eng | 2018-12-07 | Author:Ginger Gorman

Back at home, forty-eight hours later, I’m telling another friend of mine. A writer. A white feminist, like me. ‘Fuck off, troll,’ she says, furious. My husband’s response is different. ...
( Category: Violence in Society February 21,2020 )
epub |eng | 2020-01-24 | Author:Wagner, Alex & Wagner, Alex [Wagner, Alex]

Chapter 12 IOS Architecture Basics Once you get into an Apple environment, it's very restrictive. Yet, Apple controlling both hardware and software, it does lead to better controls all around. ...
( Category: Hacking February 16,2020 )
epub |eng | 2019-12-26 | Author:Yuri Diogenes, Erdal Ozkaya

( Category: Network Security January 3,2020 )
mobi |eng | 2019-12-26 | Author:Erdal Ozkaya Yuri Diogenes [Yuri Diogenes, Erdal Ozkaya]

( Category: Network Security January 2,2020 )
epub |eng | 2018-06-21 | Author:Gus Khawaja [Gus Khawaja]

( Category: Privacy & Online Safety December 27,2019 )
epub |eng | 2018-08-10 | Author:Barbosa de Azevedo, Fernando Uilherme [Barbosa de Azevedo, Fernando Uilherme]

Chapter 15: Ransomware Ransomware, sometimes called crypto viral extortion, is a form of malicious software that prevents users from accessing their personal files, usually through encryption. Hackers require that a ...
( Category: Hacking November 17,2019 )
epub |eng | 2019-04-29 | Author:Benjamin Caudill & Karl Gilbert [Benjamin Caudill]

( Category: LAN November 12,2019 )
epub |eng | 2018-04-30 | Author:Erdal Ozkaya [Ozkaya, Erdal]

( Category: Testing September 5,2019 )
epub |eng | 2019-08-26 | Author:Frank Abagnale

Rootkits: This is a collection of malicious and clandestine computer software that gives unauthorized users or criminals access to a computer and areas of its software system. It’s often installed ...
( Category: Retirement Planning August 28,2019 )
epub |eng | 2019-06-14 | Author:Walker, Brian [Walker, Brian]

Chapter 5: Initiating Breach Protocol So, let’s say the worst case scenario happens. You wake up one day preparing for work but your phone cannot stop ringing. Notifications keep dropping ...
( Category: Cryptography August 19,2019 )