Security & Encryption
mobi |eng | 1994-01-01 | Author:Bruce Sterling
Computer people talk. Hackers BRAG. Phone-phreaks talk PATHOLOGICALLY—why else are they stealing phone-codes, if not to natter for ten hours straight to their friends on an opposite seaboard? Computer-literate people ...
( Category:
Internet & Social Media
February 11,2018 )
epub |eng | 2015-02-07 | Author:Daniel Regalado
Congratulations, we now have a shell with the effective uid (euid) of root. Using “return to libc” (ret2libc), we have the ability to direct application flow to other parts of ...
( Category:
Internet & Social Media
February 7,2018 )
epub |eng | 2015-02-07 | Author:Tyler Wrightson
Active Wireless Recon Before we know which wireless attack will be the most lucrative, we need to identify if there are any access points to target. We will perform active ...
( Category:
Internet & Social Media
February 7,2018 )
epub |eng | 2012-02-07 | Author:kevin mitnick [mitnick, kevin]
( Category:
Specific Groups
February 7,2018 )
epub |eng | | Author:Jeremy Wittkop
Misguided Insiders There is another group of people who believe they can take information with them that may be of benefit to them at another company, but would not cause ...
( Category:
Computer Science
January 31,2018 )
azw3 |eng | 2017-07-31 | Author:Springer, Paul [Springer, Paul]
Further Reading Allen, Paul. Idea Man: A Memoir of the Cofounder of Microsoft. New York: Portfolio, 2011. Isaacson, Walter. The Innovators: How a Group of Hackers, Geniuses, and Geeks Created ...
( Category:
Politics & Government
January 31,2018 )
azw3 |eng | 2017-08-01 | Author:Scott, James [Scott, James]
Even adversaries who lack technical skills enough to exploit metadata can use it to launch tailored attacks by contracting cyber-mercenaries on Deep Web forums. Script kiddies, cyber-jihadists, hail-mary threat actors, ...
( Category:
Security & Encryption
January 31,2018 )
epub, pdf |eng | 0101-01-01 | Author:Conrad Barski, Chris Wilmer [Conrad Barski, Chris Wilmer]
Crowley and the Unfortunate Jelly-Filled Donut Incident For the remainder of this chapter, we’ll discuss the details of elliptical curve cryptography (ECC). But before we delve into the details of ...
( Category:
Security & Encryption
January 28,2018 )
epub, pdf |eng | | Author:Malcolm W. Harkins
Structured Methods for Identifying Threat Trends To identify the real trends in emerging threats among the mass of news and speculation, we need to carefully examine the available information using ...
( Category:
Computer Science
January 27,2018 )
epub |eng | 2017-07-03 | Author:Evan Gilman
In the Beginning, There Was Nothing Many repositories begin with unsigned commits, transitioning to signed commits later on. In this brownfield case, the first commit to be signed is essentially ...
( Category:
Networking & Cloud Computing
January 27,2018 )
epub |eng | | Author:Morey J. Haber & Brad Hibbert
Redundancy of components Targeted password change events for specific locations DisadvantagesRequires an external database Redundant database configurations such as SQL Always On can be costly and require dedicated staff for ...
( Category:
Networking & Cloud Computing
January 27,2018 )
epub |eng | | Author:Benjamin Wittes [Wittes, Benjamin; Blum, Gabriella]
DIVISION OF LABOR—STATE RESPONSIBILITY FOR PRIVATE VIOLENCE So maybe, some commentators have argued, the answer to gaps in and competition over jurisdictional power lies in state accountability for private individuals’ ...
( Category:
World
January 25,2018 )
epub, mobi, pdf |eng | 2018-01-25 | Author:Al Sweigart
The hackAffine() function begins on line 25 and contains the code for decryption. It starts by printing some instructions for the user: 25. def hackAffine(message): 26. print('Hacking...') 27. 28. # ...
( Category:
Security & Encryption
January 25,2018 )
epub |eng | | Author:Chip-Hong Chang & Miodrag Potkonjak
(4) A higher value of M str indicates a greater obfuscation efficiency. As an example, consider a RTL with values N = 30, M = 100, in which a FSM ...
( Category:
Engineering
January 25,2018 )
azw3 |eng | 2017-08-21 | Author:Scott J Roberts & Rebekah Brown [Roberts, Scott J]
Gathering Information Depending on how you manage your incident-response data, it is entirely possible that the most difficult part of the Exploit phase will be finding the important bits of ...
( Category:
Computer Science
January 20,2018 )
Categories
Cryptography | Encryption |
Hacking | Network Security |
Privacy & Online Safety | Security Certifications |
Viruses |
Popular ebooks
Practical Threat Detection Engineering by Megan Roddie & Jason Deyalsingh & Gary J. Katz(6727)Effective Threat Investigation for SOC Analysts by Yahia Mostafa;(6570)
Practical Memory Forensics by Svetlana Ostrovskaya & Oleg Skulkin(6289)
Machine Learning Security Principles by John Paul Mueller(6260)
Attacking and Exploiting Modern Web Applications by Simone Onofri & Donato Onofri(5932)
Operationalizing Threat Intelligence by Kyle Wilhoit & Joseph Opacki(5894)
Solidity Programming Essentials by Ritesh Modi(4036)
Microsoft 365 Security, Compliance, and Identity Administration by Peter Rising(3673)
Operationalizing Threat Intelligence by Joseph Opacki Kyle Wilhoit(3406)
Future Crimes by Marc Goodman(3350)
Mastering Python for Networking and Security by José Manuel Ortega(3347)
Mastering Azure Security by Mustafa Toroman and Tom Janetscheck(3335)
Blockchain Basics by Daniel Drescher(3303)
Learn Computer Forensics - Second Edition by William Oettinger(3168)
Incident Response with Threat Intelligence by Roberto Martínez(2890)
Mobile App Reverse Engineering by Abhinav Mishra(2884)
Mastering Bitcoin: Programming the Open Blockchain by Andreas M. Antonopoulos(2872)
The Code Book by Simon Singh(2831)
From CIA to APT: An Introduction to Cyber Security by Edward G. Amoroso & Matthew E. Amoroso(2782)
Building a Next-Gen SOC with IBM QRadar: Accelerate your security operations and detect cyber threats effectively by Ashish M Kothekar(2748)
