Security & Encryption
epub |eng | 2014-09-22 | Author:Josh Datko [Datko, Josh]
In the FPS_CryptoCape.ino file, this is accomplished by setting digital output 2 as an output and then pulling the line low. When a fingerprint is recognized, the pin is configured ...
( Category:
Software Development
April 4,2019 )
azw3, epub, pdf |eng | 2015-07-15 | Author:Piyush Verma
OS fingerprinting attempts OS fingerprinting is the technique where an attacker tries to identify the operating system running on the target machine(s). An attacker can perform either passive or active ...
( Category:
Network Security
April 4,2019 )
epub |eng | 2013-05-28 | Author:Brian Svidergol & Robbie Allen
Using a command-line interface The following command creates an AD integrated reverse zone: > dnscmd <DNSServerName> /zoneadd <ZoneName> /DsPrimary Using PowerShell The following PowerShell command will create an Active Directory−integrated ...
( Category:
Networks
April 1,2019 )
mobi, epub |eng | 2010-08-15 | Author:Rob Cameron, Brad Woodberg, Patricio Giecco, Timothy Eberhard, and James Quinn
Drop-Packet Drop-Packet will drop an individual offending packet, but not the rest of the session. Typically, you want to use the Drop-Connection action when malicious activity is detected on a ...
( Category:
Network Security
April 1,2019 )
epub |eng | 2019-03-15 | Author:Eric O'Neill
At FBI HQ, the walls essentially did have eyes and ears. I’d have to ask Garcia to work some magic to make this evening disappear. When the hallway quieted, I ...
( Category:
Russian & Former Soviet Union
March 29,2019 )
epub |eng | 2014-06-04 | Author:Phil Champagne [Champagne, Phil]
* * * Re: Stealing Coins Posted by knightmb, July 25, 2010, 07:34:42 PM * * * Very nice. *another reason why I love open source* As I understand it ...
( Category:
Software Development
March 23,2019 )
epub |eng | | Author:Jacob G. Oakley
Types of Findings Now to cover the meat of the report, which includes the findings themselves and how best to communicate them to the customer. It is important to understand ...
( Category:
Security & Encryption
March 20,2019 )
epub |eng | 2019-01-31 | Author:Preston Miller
Writing Excel spreadsheets – xlsx_writer.py The xlsx_writer.py script contains the logic for creating an excel document containing our processed UserAssist values. In addition to this, this script also creates an ...
( Category:
Network Security
March 11,2019 )
epub |eng | 2019-01-29 | Author:Peter Lipovyanov
DTube takes decentralized social media a step further. It is a video sharing and streaming platform, similar to YouTube, built as an application on the Steem blockchain. The principles it ...
( Category:
Encryption
March 11,2019 )
epub |eng | | Author:Adrian Pruteanu
Since this is a custom TCP protocol, we have to intercept the traffic using Wireshark or tcpdump, as opposed to Burp or ZAP. With Wireshark running, we can capture and ...
( Category:
Hacking
March 11,2019 )
epub |eng | 2019-01-29 | Author:Koshik Raj
Digital assets and identity Digital assets are programmable assets that exist in digital format. These assets can have their own value (digital tokens) or could virtually represent existing physical assets ...
( Category:
Encryption
March 11,2019 )
epub |eng | 2012-02-23 | Author:Michael Sikorski [Michael Sikorski and Andrew Honig]
( Category:
Hacking
March 8,2019 )
epub |eng | 2019-02-05 | Author:Erdal Ozkaya
Simple Mail Transfer Protocol Simple Mail Transfer Protocol (SMTP) is used for email purposes by many organizations. This protocol was added to the internet and it quickly became the simplest ...
( Category:
Privacy & Online Safety
March 8,2019 )
epub |eng | 2019-03-03 | Author:Jack Caravelli
Artificial Intelligence Technologies 1 £250,233 Cold Atoms and Molecules 2 £1,614,066 Complexity Science 1 £84,126 Condensed Matter: Electronic Structure 5 £1,567,387 Light Matter Interaction and Optical Phenomena 2 £1,976,911 Optical ...
( Category:
Viruses
March 4,2019 )
epub |eng | | Author:Nihad A. Hassan
Encrypted Hard Drive Sometimes, we may face a situation when we need to acquire a hard drive while it is protected with encryption (FDE). As we have already mentioned in ...
( Category:
Hacking
March 1,2019 )
Categories
Cryptography | Encryption |
Hacking | Network Security |
Privacy & Online Safety | Security Certifications |
Viruses |
Popular ebooks
Practical Threat Detection Engineering by Megan Roddie & Jason Deyalsingh & Gary J. Katz(6718)Effective Threat Investigation for SOC Analysts by Yahia Mostafa;(6563)
Practical Memory Forensics by Svetlana Ostrovskaya & Oleg Skulkin(6284)
Machine Learning Security Principles by John Paul Mueller(6252)
Attacking and Exploiting Modern Web Applications by Simone Onofri & Donato Onofri(5927)
Operationalizing Threat Intelligence by Kyle Wilhoit & Joseph Opacki(5885)
Solidity Programming Essentials by Ritesh Modi(4029)
Microsoft 365 Security, Compliance, and Identity Administration by Peter Rising(3669)
Operationalizing Threat Intelligence by Joseph Opacki Kyle Wilhoit(3401)
Future Crimes by Marc Goodman(3349)
Mastering Python for Networking and Security by José Manuel Ortega(3346)
Mastering Azure Security by Mustafa Toroman and Tom Janetscheck(3335)
Blockchain Basics by Daniel Drescher(3303)
Learn Computer Forensics - Second Edition by William Oettinger(3165)
Incident Response with Threat Intelligence by Roberto Martínez(2886)
Mobile App Reverse Engineering by Abhinav Mishra(2884)
Mastering Bitcoin: Programming the Open Blockchain by Andreas M. Antonopoulos(2872)
The Code Book by Simon Singh(2830)
From CIA to APT: An Introduction to Cyber Security by Edward G. Amoroso & Matthew E. Amoroso(2782)
Building a Next-Gen SOC with IBM QRadar: Accelerate your security operations and detect cyber threats effectively by Ashish M Kothekar(2741)
