Security & Encryption
mobi, epub |eng | | Author:2016
Like with pipes, SELinux denials will also reveal the type of UNIX domain socket used: avc: denied { connectto } for pid=2597 comm="nginx" path="/home/git/gitlab/tmp/sockets/gitlab.socket" scontext=system_u:system_r:httpd_t:s0 tcontext=system_u:system_r:initrc_t:s0 tclass=unix_stream_socket permissive=0 avc: denied ...
( Category:
Operating Systems
April 7,2018 )
epub |eng | 2017-04-07 | Author:Springer, Paul J.; Springer, Paul J.;
Further Reading Allen, Paul. Idea Man: A Memoir of the Cofounder of Microsoft. New York: Portfolio, 2011. Isaacson, Walter. The Innovators: How a Group of Hackers, Geniuses, and Geeks Created ...
( Category:
Encyclopedias & Subject Guides
April 7,2018 )
epub |eng | 2012-04-06 | Author:Jim Taylor, Ph.D.
Coach Good Decision Making You can help your children learn good decision-making skills by coaching them through decisions. Help them answer the key questions I offered here and take thoughtful ...
( Category:
Family Relationships
April 6,2018 )
epub |eng | 2013-04-06 | Author:Neil Bergman & MIKE STANFIELD & JASON ROUSE & JOEL SCAMBRAY
Figure 5-4 SMSZombie becoming a device administrator Now that the malware is installed, it sends an SMS message back to a hard-coded phone number stating whether the device is rooted ...
( Category:
Security & Encryption
April 6,2018 )
epub |eng | | Author:Edward J. M. Colbert & Alexander Kott
Cognitive Understand performance trade-offs of organizational goals Focus effort on identified critical assets and services Establish decision making protocols or aids to select recovery options Review management response and decision ...
( Category:
Hardware & DIY
April 6,2018 )
mobi |eng | 2014-02-24 | Author:Wade Alcorn & Christian Frichot & Michele Orru
Using BeEF with Metasploit Integrating BeEF and Metasploit allows you to control a browser, fingerprint it, and get as much information as you can before you try to exploit it. ...
( Category:
Internet & Social Media
April 5,2018 )
epub | | 2016-07-01 | Author:Douglas W. Hubbard & Richard Seiersen
Avoiding “Over-Decomposition” The threat skill level example just mentioned may or may not be a good decomposition depending on your situation. If it meets Howard’s criteria and it actually reduces ...
( Category:
Education & Reference
April 5,2018 )
mobi, epub |eng | 2009-08-20 | Author:Justin Seitz [Seitz, Justin]
PVOID RtlAllocateHeap( IN PVOID HeapHandle, IN ULONG Flags, IN SIZE_T Size ); So for RtlFreeHeap we are going to trap all three arguments, and for RtlAllocateHeap we are going to ...
( Category:
Internet & Social Media
April 5,2018 )
mobi |eng | 2014-01-16 | Author:Jay Jacobs & Bob Rudis
Considerations in a Data Collection Framework Generating data manually from a process has several pitfalls, and if that process isn't approached carefully, it can produce shaky data and probably several ...
( Category:
Security & Encryption
April 5,2018 )
epub |eng | | Author:2016
( Category:
Operating Systems
April 4,2018 )
epub |eng | | Author:Jordan Schroeder
Customize Customize awareness material as closely as you can to the department, role, or person. A 2014 Ponemon Research Institute and Security Innovation study (Ponemon, 2014) included a startling fact: ...
( Category:
Networking & Cloud Computing
April 4,2018 )
azw3, pdf |eng | 2017-09-11 | Author:Jeff Stokes & Manuel Singer & Richard Diver [Stokes, Jeff]
If you are using a domain join capable Windows 10 version like Pro, for Workstation, Enterprise or Education, you can define all these and even more fine granular settings by ...
( Category:
Operating Systems
April 3,2018 )
azw3, epub, pdf |eng | 2017-05-07 | Author:J. Turing
HOW TO CHOOSE A STRONG PASSWORD One of the biggest takeaways you should gain from this book should be the suggestion that it’s wise to consider the use of a ...
( Category:
Security & Encryption
April 3,2018 )
azw3, epub |eng | 2017-06-12 | Author:Mohandes Brokamany
Virtual Private Networks (VPNs) What Is a VPN, Why Would I need one and what is VPN service providers ©DFR, 2017 All rights reserved. No part of the publication may ...
( Category:
Security & Encryption
April 3,2018 )
azw3, epub, pdf |eng | 2017-05-04 | Author:Alex Wagner
Chapter 11 – The level of hackers When thinking about hackers don’t just fill your mind with notorious figures like underworld criminals. Taking down an entire network or a company ...
( Category:
Internet & Social Media
April 3,2018 )
Categories
Cryptography | Encryption |
Hacking | Network Security |
Privacy & Online Safety | Security Certifications |
Viruses |
Popular ebooks
Practical Threat Detection Engineering by Megan Roddie & Jason Deyalsingh & Gary J. Katz(6724)Effective Threat Investigation for SOC Analysts by Yahia Mostafa;(6566)
Practical Memory Forensics by Svetlana Ostrovskaya & Oleg Skulkin(6287)
Machine Learning Security Principles by John Paul Mueller(6257)
Attacking and Exploiting Modern Web Applications by Simone Onofri & Donato Onofri(5929)
Operationalizing Threat Intelligence by Kyle Wilhoit & Joseph Opacki(5890)
Solidity Programming Essentials by Ritesh Modi(4032)
Microsoft 365 Security, Compliance, and Identity Administration by Peter Rising(3671)
Operationalizing Threat Intelligence by Joseph Opacki Kyle Wilhoit(3403)
Future Crimes by Marc Goodman(3350)
Mastering Python for Networking and Security by José Manuel Ortega(3346)
Mastering Azure Security by Mustafa Toroman and Tom Janetscheck(3335)
Blockchain Basics by Daniel Drescher(3303)
Learn Computer Forensics - Second Edition by William Oettinger(3167)
Incident Response with Threat Intelligence by Roberto Martínez(2889)
Mobile App Reverse Engineering by Abhinav Mishra(2884)
Mastering Bitcoin: Programming the Open Blockchain by Andreas M. Antonopoulos(2872)
The Code Book by Simon Singh(2830)
From CIA to APT: An Introduction to Cyber Security by Edward G. Amoroso & Matthew E. Amoroso(2782)
Building a Next-Gen SOC with IBM QRadar: Accelerate your security operations and detect cyber threats effectively by Ashish M Kothekar(2746)
