Security & Encryption
epub |eng | 2015-10-28 | Author:Russell P [P, Russell]
Note: instead of using 1=1 you can also use simply 1 or any other character Getting Passwords with SQL map: Open cmd Run, sqlmap.py -u “http://localhost/DVWA-1.0.8/vulnerabilities/sqli/?id=1&Submit=Submit#” –-dbs And sqlmap will ...
( Category:
Security & Encryption
August 21,2017 )
mobi |eng | | Author:2016
You can see that the attacker and the victim are both connected to the same wireless network and in this scenario, the default gateway is also acting as the wireless ...
( Category:
Operating Systems
August 21,2017 )
epub |eng | 2014-08-20 | Author:Glen E. Clarke & Daniel Lachance
CERTIFICATION OBJECTIVE 15.02 Types of Risk Analysis When performing a risk assessment, it is important to understand the two popular types of risk analysis—qualitative and quantitative. Qualitative is assigning a ...
( Category:
Networking & Cloud Computing
August 20,2017 )
epub, pdf |eng | 2014-05-12 | Author:Glenn Greenwald [Greenwald, Glenn]
“Upstream” collection (from fiber-optic cables) and direct collection from the servers of Internet companies (PRISM) account for most of the records gathered by the NSA. In addition to such sweeping ...
( Category:
Politics & Government
August 20,2017 )
epub, azw3 |eng | 2016-09-29 | Author:Nipun Jaswal [Jaswal, Nipun]
We set the required options and payload as windows/meterpreter/bind_tcp that denotes a direct connection to the target. Let's see what happens when we exploit the system using the exploit command: ...
( Category:
Networking & Cloud Computing
August 20,2017 )
epub |eng | 2015-11-22 | Author:Reiber, Lee [Reiber, Lee]
Collecting the Device Physically If the feature phone has been powered off and is locked or disabled, or after completing a logical extraction of the mobile device, the examiner should ...
( Category:
Mobile Phones, Tablets & E-Readers
August 20,2017 )
epub |eng | 2015-07-17 | Author:Andrei Soldatov
On the outskirts of St. Petersburg, in a glossy new business center, there is a small company named Protei. The company’s office was a bit chaotic in 2011—they had just ...
( Category:
Politics & Government
August 19,2017 )
mobi |eng | 2017-07-05 | Author:Notenboom, Leo [Notenboom, Leo]
I’ll just be a second I began writing this in a local Starbucks—a place most folks consider anything but a “secure” location. Using the coffee shop’s Wi-Fi through a VPN, ...
( Category:
Security & Encryption
August 19,2017 )
epub |eng | 2005-12-08 | Author:Kevin D. Mitnick & William L. Simon [Mitnick, Kevin D. & Simon, William L.]
Since most users choose a password that is either a name or a simple dictionary word, an attacker usually begins by setting l0phtCrack (or whatever program he's using) to perform ...
( Category:
Internet & Social Media
August 19,2017 )
epub |eng | 2017-02-16 | Author:Keijser, Jan Just
Script security and logging One of the major differences between OpenVPN 2.0 and later versions is related to the security when running scripts. With OpenVPN 2.0, all scripts were executed ...
( Category:
Networking & Cloud Computing
August 18,2017 )
epub |eng | | Author:Hitchcock, J. A. [J. A., HITCHCOCK]
Jamie Rose Bolen, killed by her neighbor Kevin Ray Underwood [Courtesy of Bonnie Kernene, mylifeofcrime.wordpress.com] Underwood after his arrest and before his eventual sentence of death [Courtesy of Purcell Police ...
( Category:
Security & Encryption
August 18,2017 )
mobi, epub, pdf |eng | 2016-10-17 | Author:Raymond Phillips
As a result of this invasion of privacy, many users are starting to look for open-source privacy tools to help them stay anonymous online. These tools are transparent and independently ...
( Category:
Administrative Law
August 17,2017 )
epub, mobi, pdf |eng | 2009-08-16 | Author:Rachel Andrew [Andrew, Rachel]
Figure 6.17. The unstyled form, ready for CSS formatting To create the style rules for this form, we must establish for the table a class that contains all the spreadsheet ...
( Category:
Internet & Social Media
August 16,2017 )
azw3 |eng | 2014-07-25 | Author:Enríquez, Rene & C., Andrés Salazar [Enríquez, Rene]
( Category:
Programming Languages
August 15,2017 )
epub, mobi |eng | 2014-07-24 | Author:Rene Enríquez & Andrés Salazar C. [Enríquez, Rene]
( Category:
Programming Languages
August 15,2017 )
Categories
Cryptography | Encryption |
Hacking | Network Security |
Privacy & Online Safety | Security Certifications |
Viruses |
Popular ebooks
Practical Threat Detection Engineering by Megan Roddie & Jason Deyalsingh & Gary J. Katz(6737)Effective Threat Investigation for SOC Analysts by Yahia Mostafa;(6578)
Practical Memory Forensics by Svetlana Ostrovskaya & Oleg Skulkin(6298)
Machine Learning Security Principles by John Paul Mueller(6271)
Attacking and Exploiting Modern Web Applications by Simone Onofri & Donato Onofri(5944)
Operationalizing Threat Intelligence by Kyle Wilhoit & Joseph Opacki(5905)
Solidity Programming Essentials by Ritesh Modi(4042)
Microsoft 365 Security, Compliance, and Identity Administration by Peter Rising(3681)
Operationalizing Threat Intelligence by Joseph Opacki Kyle Wilhoit(3411)
Future Crimes by Marc Goodman(3351)
Mastering Python for Networking and Security by José Manuel Ortega(3348)
Mastering Azure Security by Mustafa Toroman and Tom Janetscheck(3337)
Blockchain Basics by Daniel Drescher(3305)
Learn Computer Forensics - Second Edition by William Oettinger(3172)
Incident Response with Threat Intelligence by Roberto Martínez(2898)
Mobile App Reverse Engineering by Abhinav Mishra(2886)
Mastering Bitcoin: Programming the Open Blockchain by Andreas M. Antonopoulos(2873)
The Code Book by Simon Singh(2832)
From CIA to APT: An Introduction to Cyber Security by Edward G. Amoroso & Matthew E. Amoroso(2783)
Building a Next-Gen SOC with IBM QRadar: Accelerate your security operations and detect cyber threats effectively by Ashish M Kothekar(2760)
