Security & Encryption
epub |eng | 2018-01-29 | Author:Yuri Diogenes & Erdal Ozkaya [Diogenes, Yuri]
( Category:
Operating Systems
May 11,2018 )
epub |eng | 2012-05-23 | Author:Gary M. Jackson
There are many other features of signature detection that result in only partial effectiveness at best. It is effective for what it does, but it is not effective enough. If ...
( Category:
Networking & Cloud Computing
May 10,2018 )
mobi |eng | 2011-08-15 | Author:Kevin Mitnick & William L. Simon & Steve Wozniak
I hoped they’d be really upset that I’d known not only that I was going to be raided, but exactly when. The next morning, September 30, 1992, now back in ...
( Category:
Specific Groups
May 6,2018 )
epub |eng | 2018-03-29 | Author:Tony Sangha & Bayu Wibowo [Tony Sangha]
( Category:
Networking & Cloud Computing
May 5,2018 )
epub, pdf |eng | 2018-04-30 | Author:Peter Kim [Kim, Peter]
Living Off of the Land in a Windows Domain Environment Again, in our examples below, we are going to be using PowerShell Empire. However, you can also use Metasploit, Cobalt ...
( Category:
Internet & Social Media
May 5,2018 )
epub, pdf |eng | 2018-04-20 | Author:Ritesh Modi [Ritesh Modi]
( Category:
Web Development & Design
April 26,2018 )
azw3, pdf |eng | 2016-07-06 | Author:Richard Boddington [Boddington, Richard]
The challenges facing non-forensic law enforcement agents Law enforcement field agents are often tasked to be evidence collectors. In effect, they carry out para-forensic roles because of the heavy workload ...
( Category:
Operating Systems
April 26,2018 )
mobi |eng | 2013-11-14 | Author:Michael W Lucas [Lucas, Michael W]
Environment Customization A sudo policy can do more than just allow and disallow environment variables; it can explicitly set variables. Sudoers policies let you set the user's path, and you ...
( Category:
Security & Encryption
April 25,2018 )
epub, mobi |eng | 2018-04-23 | Author:Donald A. Tevault
( Category:
Networking & Cloud Computing
April 24,2018 )
epub |eng | 2012-04-23 | Author:Andrew V. Edwards
Retail Hating Retail Sometime in the mid-1990s, retailers suffered a crisis of confidence that seems quaint in retrospect, considering the fact they ended up fiercely challenged by a robot competitor ...
( Category:
Social Sciences
April 23,2018 )
epub |eng | 2012-10-18 | Author:Wang, Shuangbao Paul, Ledley, Robert S.
6.1.1 Instruction Classifications Instructions usually contain two components: operation code (opcode) and operands. An instruction can have one opcode and zero or more operands. Some common instruction formats are shown ...
( Category:
Computer Science
April 23,2018 )
azw3, epub |eng | 2018-01-19 | Author:The Editors of TIME
$250,000 Microsoft’s top cash reward to hackers who find potent ways to sneak around existing security protections in Windows $1.6M Reward money that Mozilla, the maker of Firefox, has paid ...
( Category:
Internet & Social Media
April 22,2018 )
epub |eng | 2017-04-22 | Author:Jonathan Haun [Jonathan Haun]
( Category:
Software
April 22,2018 )
epub, pdf |eng | | Author:Henry Prunckun
7.8 Principal Concepts The principal concepts associated with this chapter are listed below. Demonstrate your understanding of each by writing a short definition or explanation in one or two sentences:critical ...
( Category:
Politics & Government
April 20,2018 )
azw3, epub |eng | 2016-05-06 | Author:Lawrence C. Miller & Peter H. Gregory [Miller, Lawrence C.]
Table 6-1 Connection-Oriented and Connectionless-Oriented Protocols Protocol Layer Type TCP (Transmission Control Protocol) 4 (Transport) Connection-oriented UDP (User Datagram Protocol) 4 (Transport) Connectionless-oriented IP (Internet Protocol) 3 (Network) Connectionless-oriented ICMP ...
( Category:
Certification
April 18,2018 )
Categories
Cryptography | Encryption |
Hacking | Network Security |
Privacy & Online Safety | Security Certifications |
Viruses |
Popular ebooks
Practical Threat Detection Engineering by Megan Roddie & Jason Deyalsingh & Gary J. Katz(6741)Effective Threat Investigation for SOC Analysts by Yahia Mostafa;(6581)
Practical Memory Forensics by Svetlana Ostrovskaya & Oleg Skulkin(6302)
Machine Learning Security Principles by John Paul Mueller(6273)
Attacking and Exploiting Modern Web Applications by Simone Onofri & Donato Onofri(5948)
Operationalizing Threat Intelligence by Kyle Wilhoit & Joseph Opacki(5908)
Solidity Programming Essentials by Ritesh Modi(4044)
Microsoft 365 Security, Compliance, and Identity Administration by Peter Rising(3683)
Operationalizing Threat Intelligence by Joseph Opacki Kyle Wilhoit(3413)
Future Crimes by Marc Goodman(3351)
Mastering Python for Networking and Security by José Manuel Ortega(3349)
Mastering Azure Security by Mustafa Toroman and Tom Janetscheck(3337)
Blockchain Basics by Daniel Drescher(3305)
Learn Computer Forensics - Second Edition by William Oettinger(3173)
Incident Response with Threat Intelligence by Roberto Martínez(2899)
Mobile App Reverse Engineering by Abhinav Mishra(2887)
Mastering Bitcoin: Programming the Open Blockchain by Andreas M. Antonopoulos(2873)
The Code Book by Simon Singh(2832)
From CIA to APT: An Introduction to Cyber Security by Edward G. Amoroso & Matthew E. Amoroso(2783)
Building a Next-Gen SOC with IBM QRadar: Accelerate your security operations and detect cyber threats effectively by Ashish M Kothekar(2764)
