Viruses
epub |eng | 2019-09-19 | Author:Michael Born
( Category:
Linux & UNIX Administration
October 12,2019 )
epub |eng | 2017-05-15 | Author:Richard Greene & Rachel Robison-Greene
Only Light Your Torch If There Is No Recourse So far, my friend, you’ve seen two roads. The one road was paved by Edmund Burke, who many regard as the ...
( Category:
Hacking
August 2,2019 )
epub |eng | 2018-12-20 | Author:Dr. Michael C Redmond PhD [Redmond PhD, Dr. Michael C]
Preparations Before an Event or Incident ❖ Application Security It is essential to segregate conflicting duties and protect sensitive information through appropriate security principles for applications. Process & Systems Integrity ...
( Category:
Viruses
July 11,2019 )
epub |eng | 2019-06-24 | Author:Peter Yaworski [Peter Yaworski]
( Category:
Testing
June 23,2019 )
epub |eng | 2018-10-30 | Author:Reginald Wong [Reginald Wong]
( Category:
Viruses
June 20,2019 )
epub |eng | 2019-04-05 | Author:Menn, Joseph;
Laird also inspired what many independent security experts consider the best model for researching and exposing government use of the internet for repression: the Citizen Lab, at the University of ...
( Category:
Viruses
June 9,2019 )
epub |eng | 2018-12-17 | Author:Stanley Siegel & Chris Williams & Scott Donaldson [Stanley Siegel]
Guarding Against Counterfeit E-Mails and Secure E-Mail Because e-mail protocols are inherently insecure, it may be possible for attackers to generate and send counterfeit e-mails. Counterfeit e-mails may appear to ...
( Category:
Hacking
May 6,2019 )
epub |eng | 2019-02-14 | Author:Roman Zabicki [Roman Zabicki]
( Category:
Hacking
May 3,2019 )
epub, azw3 |eng | 2019-05-06 | Author:Sergey Bratus & Eugene Rodionov & Alex Matrosov [Sergey Bratus]
( Category:
Testing
May 2,2019 )
epub |eng | 2017-05-14 | Author:Richard Greene,Rachel Robison-Greene
Only Light Your Torch If There Is No Recourse So far, my friend, you’ve seen two roads. The one road was paved by Edmund Burke, who many regard as the ...
( Category:
Technothrillers
April 10,2019 )
azw3, epub, pdf |eng | 2015-07-15 | Author:Piyush Verma
OS fingerprinting attempts OS fingerprinting is the technique where an attacker tries to identify the operating system running on the target machine(s). An attacker can perform either passive or active ...
( Category:
Network Security
April 4,2019 )
epub |eng | 2019-03-15 | Author:Eric O'Neill
At FBI HQ, the walls essentially did have eyes and ears. I’d have to ask Garcia to work some magic to make this evening disappear. When the hallway quieted, I ...
( Category:
Russian & Former Soviet Union
March 29,2019 )
epub |eng | 2019-01-31 | Author:Preston Miller
Writing Excel spreadsheets – xlsx_writer.py The xlsx_writer.py script contains the logic for creating an excel document containing our processed UserAssist values. In addition to this, this script also creates an ...
( Category:
Network Security
March 11,2019 )
epub |eng | 2012-02-23 | Author:Michael Sikorski [Michael Sikorski and Andrew Honig]
( Category:
Hacking
March 8,2019 )
epub |eng | 2019-03-03 | Author:Jack Caravelli
Artificial Intelligence Technologies 1 £250,233 Cold Atoms and Molecules 2 £1,614,066 Complexity Science 1 £84,126 Condensed Matter: Electronic Structure 5 £1,567,387 Light Matter Interaction and Optical Phenomena 2 £1,976,911 Optical ...
( Category:
Viruses
March 4,2019 )
Categories
Popular ebooks
Practical Threat Detection Engineering by Megan Roddie & Jason Deyalsingh & Gary J. Katz(6327)Effective Threat Investigation for SOC Analysts by Yahia Mostafa;(6197)
Practical Memory Forensics by Svetlana Ostrovskaya & Oleg Skulkin(5896)
Machine Learning Security Principles by John Paul Mueller(5879)
Attacking and Exploiting Modern Web Applications by Simone Onofri & Donato Onofri(5537)
Operationalizing Threat Intelligence by Kyle Wilhoit & Joseph Opacki(5519)
Solidity Programming Essentials by Ritesh Modi(3835)
Microsoft 365 Security, Compliance, and Identity Administration by Peter Rising(3482)
Mastering Python for Networking and Security by José Manuel Ortega(3318)
Future Crimes by Marc Goodman(3309)
Mastering Azure Security by Mustafa Toroman and Tom Janetscheck(3309)
Blockchain Basics by Daniel Drescher(3272)
Operationalizing Threat Intelligence by Joseph Opacki Kyle Wilhoit(3191)
Learn Computer Forensics - Second Edition by William Oettinger(2988)
Mobile App Reverse Engineering by Abhinav Mishra(2863)
Mastering Bitcoin: Programming the Open Blockchain by Andreas M. Antonopoulos(2837)
The Code Book by Simon Singh(2772)
From CIA to APT: An Introduction to Cyber Security by Edward G. Amoroso & Matthew E. Amoroso(2760)
Incident Response with Threat Intelligence by Roberto Martínez(2680)
The Art Of Deception by Kevin Mitnick(2582)
