Security & Encryption
azw3, epub, mobi |eng | 2017-02-13 | Author:Mitnick, Kevin [Mitnick, Kevin]
I’ll bet there are some photos that you now don’t want online. Chances are you won’t be able to take them all back, even if you could delete them from ...
( Category:
Privacy & Online Safety
May 1,2017 )
epub, azw3 |eng | 2016-10-17 | Author:Raymond Phillips [Phillips, Raymond]
As a result of this invasion of privacy, many users are starting to look for open-source privacy tools to help them stay anonymous online. These tools are transparent and independently ...
( Category:
Civil Law
April 16,2017 )
epub |eng | | Author:Tony Campbell
Edward Snowden Edward Snowden was employed by the National Security Agency (NSA) as a computer systems consultant, with administrator-level privileges to the NSA’s internal network. For whatever reason, and there ...
( Category:
Maintenance, Repair & Upgrading
April 7,2017 )
epub, mobi |eng | 2016-03-23 | Author:Nick Cano
Hijacking a Game’s Main Thread to Execute Code Caves In some cases, injected code caves need to be in sync with the main thread of the game process. Solving this ...
( Category:
Hacking
March 24,2017 )
epub |eng, eng | 2016-12-19 | Author:Nance,Malcolm
Figure 54: Dar al-Islam (Source: TAPSTRI) Dar ul-Islam—French Publication With nine editions published by 2016, the Dar ul-Islam magazine was focused at the French speaking audience. In comparison to Dabiq, ...
( Category:
Hacking
March 22,2017 )
epub |eng | | Author:Sanjib Sinha
Understanding Classes and Objects You cannot understand theory unless you implement that concept into the real world. Let us see what we have learned. 1. Classes are when you create ...
( Category:
Hacking
March 21,2017 )
epub |eng | 2015-03-09 | Author:Benjamin Wittes & Gabriella Blum [Wittes, Benjamin]
( Category:
National & International Security
March 9,2017 )
mobi, azw3, pdf |eng | 2017-01-01 | Author:Giulio D'Agostino
If you see any error at this stage move to the bottom of the page for troubleshooting tips. The -wep makes it clear to wifite that you want to hack ...
( Category:
Networking & System Administration
February 25,2017 )
epub |eng | 0101-01-01 | Author:Ted Claypoole [Claypoole, Ted]
At Least You Have Your Health In the United States, many of your online activities are not protected by privacy laws. The law protects only certain types of information that ...
( Category:
Telecommunications & Sensors
February 23,2017 )
epub |eng | | Author:Kunal Relan
Installing Charles Proxy is a pretty easy job and it is available for all platforms, as it is built on Java. Charles Proxy is available at http://charlesproxy.com/download . Once you ...
( Category:
Software Development
January 8,2017 )
epub |eng | | Author:Bill Gertz
6 ISLAMIC TERROR When Jihad Johnny Comes Marching Home The struggle with revolutionary Islam will only be won when the West begins to methodically analyze the ideological religion that empowers ...
( Category:
National
January 8,2017 )
epub |eng | | Author:Frank M. Groom, Kevin Groom & Stephan S. Jones
Figure 14.4 Two main goals of issuing denial-of-service attacks. Stopping Services Locally, these attacks are focused on process crashing and forcing system reconfiguration. Remotely, the attacks are predominantly focused on ...
( Category:
Networks
December 11,2016 )
epub |eng | | Author:Melvin B. Greer & Kevin L. Jackson
Cloud Strategy by digitalized base (CSA) 8.3 HEALTHCARE 8.3.1 Vertical View Healthcare cybersecurity is lagging behind other sectors. ABI Research says hospitals, clinics, trusts, and insurers are constantly under attack ...
( Category:
Network Security
December 9,2016 )
epub |eng | 2014-07-18 | Author:Akhgar, Babak, Staniforth, Andrew, Bosco, Francesca & Andrew Staniforth & Francesca Bosco
As the UNODC (2011) report notes, domestic laws in the South Asia region lack a shared understanding of trafficking. The most commonly applied definition is the one adopted by the ...
( Category:
Network Security
December 6,2016 )
epub |eng | | Author:Raymond Pompon
Software should be capable of producing human-readable configuration information for audit and configuration review Manufacturer must disclose all maintenance and administrative access modes including any “developer backdoors” or automated callbacks ...
( Category:
Security & Encryption
November 5,2016 )
Categories
Cryptography | Encryption |
Hacking | Network Security |
Privacy & Online Safety | Security Certifications |
Viruses |
Popular ebooks
Practical Threat Detection Engineering by Megan Roddie & Jason Deyalsingh & Gary J. Katz(6741)Effective Threat Investigation for SOC Analysts by Yahia Mostafa;(6580)
Practical Memory Forensics by Svetlana Ostrovskaya & Oleg Skulkin(6301)
Machine Learning Security Principles by John Paul Mueller(6272)
Attacking and Exploiting Modern Web Applications by Simone Onofri & Donato Onofri(5947)
Operationalizing Threat Intelligence by Kyle Wilhoit & Joseph Opacki(5907)
Solidity Programming Essentials by Ritesh Modi(4043)
Microsoft 365 Security, Compliance, and Identity Administration by Peter Rising(3682)
Operationalizing Threat Intelligence by Joseph Opacki Kyle Wilhoit(3412)
Future Crimes by Marc Goodman(3351)
Mastering Python for Networking and Security by José Manuel Ortega(3349)
Mastering Azure Security by Mustafa Toroman and Tom Janetscheck(3337)
Blockchain Basics by Daniel Drescher(3305)
Learn Computer Forensics - Second Edition by William Oettinger(3173)
Incident Response with Threat Intelligence by Roberto Martínez(2899)
Mobile App Reverse Engineering by Abhinav Mishra(2886)
Mastering Bitcoin: Programming the Open Blockchain by Andreas M. Antonopoulos(2873)
The Code Book by Simon Singh(2832)
From CIA to APT: An Introduction to Cyber Security by Edward G. Amoroso & Matthew E. Amoroso(2783)
Building a Next-Gen SOC with IBM QRadar: Accelerate your security operations and detect cyber threats effectively by Ashish M Kothekar(2762)
