Security & Encryption
epub, mobi |eng | 2016-09-14 | Author:David Thiel
Watch for Deprecated Validation Code Note that you may sometimes see the deprecated (yet more sensibly named) handleOpenURL method used in some codebases; see Listing 8-4 for an example. - ...
( Category:
Internet & Social Media
September 14,2017 )
azw3 |eng | 2014-07-21 | Author:Bommisetty, Satish & Tamma, Rohit & Mahalik, Heather [Bommisetty, Satish]
Features of Oxygen Forensic Suite The following are the features of Oxygen Forensic Suite: It supports logical acquisition. Logical acquisition recovers the active files on the device. Deleted data may ...
( Category:
Networking & Cloud Computing
September 14,2017 )
mobi, epub |eng | 2014-07-20 | Author:Satish Bommisetty & Rohit Tamma & Heather Mahalik
Oxygen Forensic Suite 2014 supported devices Oxygen Forensic Suite 2014 Version 6.1 supports logical acquisition of all iOS devices. Keep in mind that access to newer devices may require the ...
( Category:
Networking & Cloud Computing
September 14,2017 )
epub, pdf |eng | 2017-05-10 | Author:Marco Alamanni
WPA cracking with Aircrack-ng In the previous section, we have mentioned that to crack a WPA key, we must first capture the four frames related to a WPA handshake between ...
( Category:
Networking & Cloud Computing
September 13,2017 )
epub |eng | 2012-09-13 | Author:David Hucaby & Dave Garneau & Anthony Sequeira
* * * Note VPN configuration is not a subject in the FIREWALL course or exam, so the full VPN configuration will not be dealt with here. This chapter will ...
( Category:
Certification
September 13,2017 )
mobi, pdf |eng | 2014-12-30 | Author:Douglas Berdeaux
sub page{ # check for pages my $res = $ua->get("http://".$host.":".$port."/".$_[0]); if($res->is_success){ @content = split(/\015?\012/,$res->content); return $_[0]; } return 0; } END { $sock->close() if $sock; } The section portion of ...
( Category:
Programming
September 11,2017 )
epub |eng | | Author:2015
In iOS 8, the path has slightly changed to /private/var/wireless/Library/CallHistoryDB/CallHistory.storedata. Still related to the phone application, there are two other important files to analyze. The path, /private/var/mobile/Library/Preferences/com.apple.mobilephone.plist, contains DialerSavedNumber, which ...
( Category:
Mobile Phones, Tablets & E-Readers
September 11,2017 )
epub, azw3, mobi |eng | 2013-05-14 | Author:Ronald J. Deibert [Deibert, Ronald J.]
10. Fanning the Flames of Cyber Warfare Eugene Kaspersky is the CEO of the Russian-based malware and cyber-security research laboratory that bears his name, Kaspersky Lab. An outspoken, controversial, and ...
( Category:
Social Sciences
September 8,2017 )
epub |eng | 2015-09-30 | Author:Davidson-Pilon, Cameron
4.3 The Disorder of Small Numbers The Law of Large Numbers is only valid as N gets infinitely large, which is never truly attainable. While the Law is a powerful ...
( Category:
Programming
September 8,2017 )
azw3, pdf |eng | 2015-09-30 | Author:Cameron Davidson-Pilon [Davidson-Pilon, Cameron]
4.3 The Disorder of Small Numbers The Law of Large Numbers is only valid as N gets infinitely large, which is never truly attainable. While the Law is a powerful ...
( Category:
Programming
September 8,2017 )
epub, mobi |eng | | Author:2015
Wireshark's Expert Info The huge number of connection resets is another indication of a scan underway. The Warning tab under Expert Info Wireshark's Conversations TCP Conversations also provide an insight ...
( Category:
Networking & Cloud Computing
September 7,2017 )
epub |eng | 2012-05-09 | Author:Miles, Russ
See Also Recipe 16.1 explains how classes can be extended by aspects introducing new methods and attributes; OO design patterns and the benefits that those patterns can gain by using ...
( Category:
Web Development & Design
September 5,2017 )
epub |eng | 2014-09-05 | Author:Michael W. Graves
Platform as a Service PaaS puts the entire computing environment onto the Web. With SaaS, you are running an application over an Internet connection. How the application is configured is ...
( Category:
Security & Encryption
September 5,2017 )
mobi |eng | 2012-02-24 | Author:Michael Sikorski and Andrew Honig
( Category:
Security & Encryption
September 4,2017 )
epub, azw3, pdf |eng | 2017-05-22 | Author:Bruce Schneier
Designing a Block Cipher It is easy to design a block cipher. If you think of a 64-bit block cipher as a permutation of the 64-bit numbers, it is clear ...
( Category:
Security & Encryption
September 4,2017 )
Categories
Cryptography | Encryption |
Hacking | Network Security |
Privacy & Online Safety | Security Certifications |
Viruses |
Popular ebooks
Practical Threat Detection Engineering by Megan Roddie & Jason Deyalsingh & Gary J. Katz(6732)Effective Threat Investigation for SOC Analysts by Yahia Mostafa;(6574)
Practical Memory Forensics by Svetlana Ostrovskaya & Oleg Skulkin(6295)
Machine Learning Security Principles by John Paul Mueller(6264)
Attacking and Exploiting Modern Web Applications by Simone Onofri & Donato Onofri(5939)
Operationalizing Threat Intelligence by Kyle Wilhoit & Joseph Opacki(5900)
Solidity Programming Essentials by Ritesh Modi(4038)
Microsoft 365 Security, Compliance, and Identity Administration by Peter Rising(3676)
Operationalizing Threat Intelligence by Joseph Opacki Kyle Wilhoit(3409)
Future Crimes by Marc Goodman(3351)
Mastering Python for Networking and Security by José Manuel Ortega(3348)
Mastering Azure Security by Mustafa Toroman and Tom Janetscheck(3337)
Blockchain Basics by Daniel Drescher(3304)
Learn Computer Forensics - Second Edition by William Oettinger(3170)
Incident Response with Threat Intelligence by Roberto MartÃnez(2895)
Mobile App Reverse Engineering by Abhinav Mishra(2886)
Mastering Bitcoin: Programming the Open Blockchain by Andreas M. Antonopoulos(2873)
The Code Book by Simon Singh(2832)
From CIA to APT: An Introduction to Cyber Security by Edward G. Amoroso & Matthew E. Amoroso(2783)
Building a Next-Gen SOC with IBM QRadar: Accelerate your security operations and detect cyber threats effectively by Ashish M Kothekar(2752)
