Viruses
azw3 |eng | 2016-02-28 | Author:Datt, Samir [Datt, Samir]
The essential components of a forensic-friendly log management system include log management infrastructure and log management planning and policies. Log management infrastructure Network forensic investigations heavily rely on the logs ...
( Category:
Network Security
March 31,2016 )
epub, mobi |eng | | Author:Fred Kaplan
* * * The pivotal moment in this shift occurred at NSA headquarters on Friday, October 24, 2008. At two-thirty that afternoon, a team of SIGINT analysts noticed something strange ...
( Category:
Viruses
March 14,2016 )
mobi |eng | 2015-12-07 | Author:Kevin Donaldson
Linux Linux is an open-source operating system that is not as common as Windows or Mac. However, it is gaining popularity nowadays because of its fuss-free interface and open-source concept. ...
( Category:
Viruses
March 8,2016 )
azw3 |eng | 2015-12-07 | Author:Donaldson, Kevin [Donaldson, Kevin]
Linux Linux is an open-source operating system that is not as common as Windows or Mac. However, it is gaining popularity nowadays because of its fuss-free interface and open-source concept. ...
( Category:
Viruses
March 8,2016 )
epub |eng | 2015-06-28 | Author:Johnson, Dale
Notify User: Notify your user if a message or file is found with a threat. You can use the same variables we listed under the administrator notification. Web Reputation Rules: ...
( Category:
Windows Desktop
December 14,2015 )
epub, pdf |eng | 2015-12-22 | Author:Josiah Dykstra
Chapter 8. Digital Forensics Digital forensics holds a unique distinction among the group of cybersecurity fields in this book because it requires science. Forensic science, by definition, is the use ...
( Category:
Network Security
December 13,2015 )
epub, mobi, pdf |eng | 2015-11-10 | Author:Karina Astudillo B. [B., Karina Astudillo]
Figure 114 – Options to interact with the session Selecting the active session we can interact with it through different actions. Although the option for gathering information (Collect Data System) ...
( Category:
Hacking
December 2,2015 )
epub |eng | 2014-10-30 | Author:Nestler, Vincent & Harrison, Keith & Hirsch, Matthew & Conklin, Wm. Arthur
Note If you are using virtual machines and have the ability to create snapshots, now would be a good time to take another one. At this point, if you have ...
( Category:
Network Security
August 17,2015 )
epub |eng | 2015-02-27 | Author:Santhosh Sivarajan [Sivarajan, Santhosh]
The printer driver security and installation As a next step, you need to ensure the printer driver security on a print server. On Windows Server 2012, it is recommended to ...
( Category:
Viruses
July 20,2015 )
mobi |eng | 2007-01-15 | Author:W. Curtis Preston
Making the CD or DVD image bootable... Copying the remainder of the backup to the CD or DVD file system... Creating Rock Ridge format image: /mkcd/cd_images/cd_image_295108.vol2 Running mkisofs ... . ...
( Category:
Disaster & Recovery
June 11,2015 )
epub |eng | 2015-06-01 | Author:Shon Harris
A. Security parameter index B. Security ability C. Security association D. Security assistant C. Each IPSec VPN device will have at least one security association (SA) for each secure connection ...
( Category:
Encryption
June 2,2015 )
epub |eng | 2011-09-27 | Author:Bowden, Mark [Bowden, Mark]
Within a week, Rick’s efforts pointed them to a distinct source. Most of the hits, 391 domain names corresponding with Conficker’s random lists, were “clearly coincidental,” Phil wrote an excited ...
( Category:
History
March 6,2015 )
epub, mobi, pdf |eng | 2014-12-04 | Author:Justin Seitz [Seitz, Justin]
Kicking the Tires Click the Extender tab in Burp, click the Add button, and use the same procedure we used for our previous extensions to get the Wordlist extension working. ...
( Category:
Viruses
December 27,2014 )
epub |eng | 2015-01-09 | Author:Daniel Regalado & Shon Harris & Allen Harper & Chris Eagle & Jonathan Ness & Branko Spasojevic & Ryan Linn & Stephen Sims [Regalado, Daniel]
Congratulations, we now have a shell with the effective uid (euid) of root. Using “return to libc” (ret2libc), we have the ability to direct application flow to other parts of ...
( Category:
Encryption
December 15,2014 )
epub, mobi, azw3 |eng | 2014-11-18 | Author:Brian Krebs [Krebs, Brian]
Severa Cosma ran his stock spam business in tandem with that of another cybercrook, a hacker who uses the nickname “Severa.” This spammer was named as a defendant in an ...
( Category:
Hacking
November 26,2014 )
Categories
Popular ebooks
Practical Threat Detection Engineering by Megan Roddie & Jason Deyalsingh & Gary J. Katz(6327)Effective Threat Investigation for SOC Analysts by Yahia Mostafa;(6197)
Practical Memory Forensics by Svetlana Ostrovskaya & Oleg Skulkin(5896)
Machine Learning Security Principles by John Paul Mueller(5879)
Attacking and Exploiting Modern Web Applications by Simone Onofri & Donato Onofri(5537)
Operationalizing Threat Intelligence by Kyle Wilhoit & Joseph Opacki(5519)
Solidity Programming Essentials by Ritesh Modi(3835)
Microsoft 365 Security, Compliance, and Identity Administration by Peter Rising(3482)
Mastering Python for Networking and Security by José Manuel Ortega(3318)
Future Crimes by Marc Goodman(3309)
Mastering Azure Security by Mustafa Toroman and Tom Janetscheck(3309)
Blockchain Basics by Daniel Drescher(3272)
Operationalizing Threat Intelligence by Joseph Opacki Kyle Wilhoit(3191)
Learn Computer Forensics - Second Edition by William Oettinger(2988)
Mobile App Reverse Engineering by Abhinav Mishra(2863)
Mastering Bitcoin: Programming the Open Blockchain by Andreas M. Antonopoulos(2837)
The Code Book by Simon Singh(2772)
From CIA to APT: An Introduction to Cyber Security by Edward G. Amoroso & Matthew E. Amoroso(2760)
Incident Response with Threat Intelligence by Roberto Martínez(2680)
The Art Of Deception by Kevin Mitnick(2582)
