Viruses
epub |eng | 2019-03-02 | Author:Jeff T. Parker
PART III Cyber Incident Response Chapter 7 The Incident Response Process Chapter 8 Determining the Impact of Incidents Chapter 9 Preparing the Incident Response Toolkit Chapter 10 Selecting the Best ...
( Category:
Network Security
March 3,2020 )
epub |eng | 2014-09-08 | Author:Brian S McWilliams [McWilliams, Brian S]
Cowles was hashing out an entirely different set of questions in his cell at the Wood County Justice Center. He was astounded that state attorneys in Florida had decided to ...
( Category:
Email Administration
March 2,2020 )
epub, pdf |eng | 2017-01-26 | Author:Sparc FLOW [FLOW, Sparc]
Sure enough, something like this shows up (after some cleaning and sorting out, of course): Psexec is a tool heavily used to execute commands on remote systems. It requires admin ...
( Category:
Hacking
March 2,2020 )
mobi, epub |eng | 2020-02-24 | Author:Dr. Chase Cunningham
( Category:
Cryptography
March 2,2020 )
epub |eng | 2020-02-21 | Author:FLOW, Sparc [FLOW, Sparc]
NODE POD PODIP SERVICE ENV FILESECRET ip-192 … api- … 10.0.2 … api-token dbCore … api-token- … ip-192 … ssp-f … 10.10. … default dbCass… default- … ip-192 … ssp-r ...
( Category:
Viruses
February 28,2020 )
epub |eng | 2019-06-05 | Author:Perry Carpenter
Media companies know this well. Netflix has a ton of variety, but it knows that you are interested in only a subset of that. YouTube has a ton of variety, ...
( Category:
Network Security
February 27,2020 )
epub |eng | 2019-12-05 | Author:Mining, Ethem [Mining, Ethem]
Command Prompts When you are interacting with the Terminal, you are using command prompts or shell prompts—you will likely see these used interchangeably as you read through various guides. When ...
( Category:
Hacking
February 25,2020 )
epub, pdf |eng | 2020-01-20 | Author:Dan Kottmann & Chris Patten & Tom Steele [Dan Kottmann]
( Category:
Testing
February 10,2020 )
epub, azw3 |eng | 2018-09-03 | Author:Hillary Sanders & Joshua Saxe [Hillary Sanders]
Now suppose you want to test the detection system’s accuracy using a set of benignware and malware. You can run the detector on each binary and keep count of which ...
( Category:
Testing
February 10,2020 )
epub |eng | 2019-12-26 | Author:Yuri Diogenes, Erdal Ozkaya
( Category:
Network Security
January 3,2020 )
mobi |eng | 2019-12-26 | Author:Erdal Ozkaya Yuri Diogenes [Yuri Diogenes, Erdal Ozkaya]
( Category:
Network Security
January 2,2020 )
epub, mobi, azw3, pdf |eng | 2018-11-29 | Author:Joshua Saxe & Hillary Sanders
Figure 7-2: Suspiciousness scores output by the hypothetical MalDetect system for individual software binaries Suspiciousness scores are informative, but in order to calculate MalDetect’s true positive rate and false positive ...
( Category:
Testing
November 30,2019 )
epub |eng | 2018-08-10 | Author:Barbosa de Azevedo, Fernando Uilherme [Barbosa de Azevedo, Fernando Uilherme]
Chapter 15: Ransomware Ransomware, sometimes called crypto viral extortion, is a form of malicious software that prevents users from accessing their personal files, usually through encryption. Hackers require that a ...
( Category:
Hacking
November 17,2019 )
epub |eng | 2019-11-04 | Author:Andy Greenberg;
* * * ■ By the end of 2017, theories of how the Shadow Brokers had pulled off their shocking theft of NSA secrets would begin to come to light, ...
( Category:
Russian & Former Soviet Union
October 31,2019 )
epub |eng | 2018-11-12 | Author:Wolf Halton
In the preceding screenshot, we can see that we have captured the Administrator login from the \\WIN10-01 workstation. This was captured when the user logged on to the domain from ...
( Category:
Network Security
October 19,2019 )
Categories
Popular ebooks
Practical Threat Detection Engineering by Megan Roddie & Jason Deyalsingh & Gary J. Katz(6327)Effective Threat Investigation for SOC Analysts by Yahia Mostafa;(6197)
Practical Memory Forensics by Svetlana Ostrovskaya & Oleg Skulkin(5896)
Machine Learning Security Principles by John Paul Mueller(5879)
Attacking and Exploiting Modern Web Applications by Simone Onofri & Donato Onofri(5537)
Operationalizing Threat Intelligence by Kyle Wilhoit & Joseph Opacki(5519)
Solidity Programming Essentials by Ritesh Modi(3835)
Microsoft 365 Security, Compliance, and Identity Administration by Peter Rising(3482)
Mastering Python for Networking and Security by José Manuel Ortega(3318)
Future Crimes by Marc Goodman(3309)
Mastering Azure Security by Mustafa Toroman and Tom Janetscheck(3309)
Blockchain Basics by Daniel Drescher(3272)
Operationalizing Threat Intelligence by Joseph Opacki Kyle Wilhoit(3191)
Learn Computer Forensics - Second Edition by William Oettinger(2988)
Mobile App Reverse Engineering by Abhinav Mishra(2863)
Mastering Bitcoin: Programming the Open Blockchain by Andreas M. Antonopoulos(2837)
The Code Book by Simon Singh(2772)
From CIA to APT: An Introduction to Cyber Security by Edward G. Amoroso & Matthew E. Amoroso(2760)
Incident Response with Threat Intelligence by Roberto Martínez(2680)
The Art Of Deception by Kevin Mitnick(2582)
