Security & Encryption
epub |eng | 2011-07-28 | Author:Kevin D. Mitnick
Chapter 11 Combining Technology and Social Engineering A social engineer lives by his ability to manipulate people into doing things that help him achieve his goal, but success often also ...
( Category:
Networking & Cloud Computing
September 4,2017 )
epub, mobi |eng | 2010-09-28 | Author:Michael Ligh & Steven Adair & Blake Hartstein & Matthew Richard
HANDLE hDupHandle; BOOL bStatus = FALSE; HANDLE hProc = OpenProcess(PROCESS_DUP_HANDLE, FALSE, dwPid); if (hProc != NULL) { if (DuplicateHandle(hProc, (HANDLE)dwHval, GetCurrentProcess(), &hDupHandle, 0, FALSE, DUPLICATE_SAME_ACCESS|DUPLICATE_CLOSE_SOURCE)) { if (CloseHandle(hDupHandle)) { bStatus ...
( Category:
Security & Encryption
September 4,2017 )
epub, pdf |eng | 2014-02-17 | Author:Adam Shostack
Social Security Numbers and Other National Identity Numbers This section reviews risks associated with the United States social security number (SSN). Over the last five to ten years, the use ...
( Category:
Security & Encryption
September 4,2017 )
epub, mobi |eng | 2014-11-03 | Author:Niels Ferguson & Bruce Schneier & Tadayoshi Kohno
The lemma is a statement of fact. The proof argues why the lemma is true. The little square box signals the end of the proof. Mathematicians love to use lots ...
( Category:
Security & Encryption
September 4,2017 )
epub |eng | 2014-07-01 | Author:Michael Hale Ligh & Andrew Case & Jamie Levy & AAron Walters
Figure 14-4: WinLister on a live machine shows the IE window properties The next image in Figure 14-5 shows a similar situation, but this time the IE process is in ...
( Category:
Security & Encryption
September 4,2017 )
epub, azw3, mobi, pdf |eng | 2014-02-19 | Author:Dieterle, Daniel [Dieterle, Daniel]
Use “sessions -i” and the session number to connect to any of the sessions. Once connected, you can use any of the built in Meterpreter commands, or use Linux commands ...
( Category:
Security & Encryption
September 3,2017 )
epub |eng | 2013-09-02 | Author:Keith Barker & Scott Morris
* * * Verifying the Firewall You can verify the firewall from both the CCP and the command line. In the video bonus material included with this book, there is ...
( Category:
Certification
September 2,2017 )
epub, mobi |eng | | Author:2015
WPA cracking with Aircrack-ng In the previous section, we have mentioned that to crack a WPA key, we must first capture the four frames related to a WPA handshake between ...
( Category:
Networking & Cloud Computing
September 2,2017 )
epub |eng | 2015-03-14 | Author:Jennifer Golbeck
Figure 14.3 Malcom's Tumblr blog. Hashtags Hashtags are used very frequently within Tumblr. Figure 14.3 shows a couple on the photo Malcom has posted. Since photos are a very common ...
( Category:
Internet & Social Media
September 1,2017 )
epub |eng | 2013-10-03 | Author:Joe Kissell [Joe Kissell]
Software Licenses Many apps require a license key or serial number, and 1Password makes a great storage place for all those licenses (Figure 18). Even though they may not be ...
( Category:
Security & Encryption
September 1,2017 )
epub, mobi |eng | 2013-05-29 | Author:Joe Kissell [Joe Kissell]
So, my professional opinion: you have better things to worry about. Handle Security Questions Earlier, in Understanding Security Questions and Reset Procedures, I talked about the security questions you may ...
( Category:
Security & Encryption
September 1,2017 )
epub |eng | 2015-07-31 | Author:Cramer, Ronald & Damgård, Ivan Bjerre & Nielsen, Jesper Buus
( Category:
Security & Encryption
September 1,2017 )
epub |eng | 2015-07-01 | Author:Cordova, Aaron & Rinaldi, Billie & Wall, Michael
Secondary Indexing Applications that use a single table and employ a simple access pattern are among the most scalable, consistent, and fast. This type of design can serve in a ...
( Category:
Security & Encryption
September 1,2017 )
epub |eng | 2017-02-26 | Author:Joshua Cody [Cody, Joshua]
First Steps with TOR By this time, you have already opted for one option, either the TOR browser or the Mozilla add-on counterpart, to navigate anonymously. You also know the ...
( Category:
Security & Encryption
September 1,2017 )
mobi |eng | 2012-01-16 | Author:Kevin D. Freeman [Freeman, Kevin D.]
And indeed, in the lead-up to September 2008, there was intense and focused investment in the commodity markets both directly and via proxies coming from oil producers and sovereign wealth ...
( Category:
Politics & Government
August 31,2017 )
Categories
Cryptography | Encryption |
Hacking | Network Security |
Privacy & Online Safety | Security Certifications |
Viruses |
Popular ebooks
Practical Threat Detection Engineering by Megan Roddie & Jason Deyalsingh & Gary J. Katz(6732)Effective Threat Investigation for SOC Analysts by Yahia Mostafa;(6574)
Practical Memory Forensics by Svetlana Ostrovskaya & Oleg Skulkin(6295)
Machine Learning Security Principles by John Paul Mueller(6264)
Attacking and Exploiting Modern Web Applications by Simone Onofri & Donato Onofri(5939)
Operationalizing Threat Intelligence by Kyle Wilhoit & Joseph Opacki(5900)
Solidity Programming Essentials by Ritesh Modi(4038)
Microsoft 365 Security, Compliance, and Identity Administration by Peter Rising(3676)
Operationalizing Threat Intelligence by Joseph Opacki Kyle Wilhoit(3409)
Future Crimes by Marc Goodman(3351)
Mastering Python for Networking and Security by José Manuel Ortega(3348)
Mastering Azure Security by Mustafa Toroman and Tom Janetscheck(3337)
Blockchain Basics by Daniel Drescher(3305)
Learn Computer Forensics - Second Edition by William Oettinger(3170)
Incident Response with Threat Intelligence by Roberto Martínez(2895)
Mobile App Reverse Engineering by Abhinav Mishra(2886)
Mastering Bitcoin: Programming the Open Blockchain by Andreas M. Antonopoulos(2873)
The Code Book by Simon Singh(2832)
From CIA to APT: An Introduction to Cyber Security by Edward G. Amoroso & Matthew E. Amoroso(2783)
Building a Next-Gen SOC with IBM QRadar: Accelerate your security operations and detect cyber threats effectively by Ashish M Kothekar(2752)
