Security & Encryption
epub |eng | 2010-08-24 | Author:Dwivedi, Himanshu [Himanshu Dwivedi]
User supplies the challenge, which in this case is 214484840. User supplies the MD5 hash that was sniffed over the network. From Figure 5-5 we see that the hash is ...
( Category:
Hacking
April 5,2014 )
epub, mobi, pdf |eng | 2013-12-06 | Author:Broad, James, Bindner, Andrew & Andrew Bindner
Most transfers will fail, however, if the target name server is misconfigured. The entire name servers record set will be transferred to the local Kali Linux computer. When using this ...
( Category:
Hacking
April 1,2014 )
epub, pdf |eng | 2012-10-09 | Author:E. Gabriella Coleman [Coleman, E. Gabriella]
CHAPTER 4 Two Ethical Moments in Debian F/OSS projects largely take place on the Internet. Varying in size from a couple of developers to a network of over one thousand, ...
( Category:
Software Development
April 1,2014 )
epub |eng | 2010-10-14 | Author:Fitzgerald, Michael [Michael Fitzgerald]
See Also For a more thorough introduction to SOAP, read the SOAP v1.2 primer (Part 0): http://www.w3.org/TR/soap12-part0/ SOAP v1.2 messaging framework (Part 1), including information on the SOAP processing model ...
( Category:
Client-Server Systems
March 31,2014 )
epub |eng | 2000-01-02 | Author:Chuck Musciano & Bill Kennedy [Musciano, Chuck & Kennedy, Bill]
9.2.2.1. The application/x-www-form-urlencoded encoding The standard encodingapplication/x-www-form-urlencodedconverts any spaces in the form values into a plus sign (+), nonalphanumeric characters into a percent sign (%) followed by two hexadecimal digits ...
( Category:
Web Design
March 31,2014 )
epub |eng | 2011-09-15 | Author:Craig, Terence, Ludloff, Mary E. [Terence Craig and Mary E. Ludloff]
The Consumer Financial Protection Bureau, “Know Before You Owe” The Library of Congress, “Wall Street Reform and Consumer Protection Act of 2009” U.S. Department of the Treasury, “Bureau of Consumer ...
( Category:
Electronic Data Interchange (EDI)
March 31,2014 )
epub |eng | 2014-02-23 | Author:Alcorn, Wade, Frichot, Christian, Orru, Michele & Christian Frichot & Michele Orru
Using BeEF with Metasploit Integrating BeEF and Metasploit allows you to control a browser, fingerprint it, and get as much information as you can before you try to exploit it. ...
( Category:
Hacking
March 30,2014 )
epub |eng | 2013-08-09 | Author:Hernandez, Steven [Hernandez, Steven]
Social Engineering One method of compromising a system is to befriend users to gain information; especially vulnerable are individuals with system administrator access. Social engineering is the art of getting ...
( Category:
Commerce
March 27,2014 )
epub |eng | 2012-07-31 | Author:Deviant Ollam
Techniques of tool movement Rakes and jiggler tools can be operated in a number of ways. They can be held almost perfectly horizontally and moved directly along the bottom surface ...
( Category:
Business
March 27,2014 )
epub |eng | 2012-08-19 | Author:Steve Bunting
Exam Essentials Understand how EnCase organizes its workspace. Understand the Home screen and explain how to open and create cases. Explain how to add evidence or browse evidence from the ...
( Category:
Security Certifications
March 27,2014 )
epub, mobi |eng | 2012-11-05 | Author:Ben Counter [Counter, Ben]
THE LOWER DECKS of the Cerulean Claw were a celebration of the fallen Howling Griffons. The greatest heroes were remembered in places like the Manse of Furioso, but the lower-ranked ...
( Category:
Military
March 26,2014 )
epub |eng | 2012-07-31 | Author:Deviant Ollam
How Master-Keying Works I would like to paint for you a picture of a hypothetical office. There are a number of fictional people working there every day, each with their ...
( Category:
Security & Encryption
March 26,2014 )
epub, mobi, pdf |eng | 2012-11-06 | Author:Michael Raggo & Chet Hosmer
Figure 7.2 Creating “mike.txt” in Notepad We can then of course run a directory listing to see the newly created file in our directory: D:\mike>dir Volume in drive D has ...
( Category:
Operating Systems Theory
March 26,2014 )
epub, mobi, pdf |zho | 2003-08-12 | Author:Simon Singh [Singh, Simon]
5 The Language Barrier While British codebreakers were breaking the German Enigma cipher and altering the course of the war in Europe, American codebreakers were having an equally important influence ...
( Category:
Encryption
March 26,2014 )
epub |eng | 2013-01-06 | Author:Batten, Lynn Margaret
5.3 The Elliptic Curve Factoring Scheme In this section, we describe how elliptic curves can be used to factor numbers suspected of being composite. We saw in Section 2.2 that ...
( Category:
Security & Encryption
March 26,2014 )
Categories
Cryptography | Encryption |
Hacking | Network Security |
Privacy & Online Safety | Security Certifications |
Viruses |
Popular ebooks
Practical Threat Detection Engineering by Megan Roddie & Jason Deyalsingh & Gary J. Katz(6741)Effective Threat Investigation for SOC Analysts by Yahia Mostafa;(6580)
Practical Memory Forensics by Svetlana Ostrovskaya & Oleg Skulkin(6301)
Machine Learning Security Principles by John Paul Mueller(6272)
Attacking and Exploiting Modern Web Applications by Simone Onofri & Donato Onofri(5947)
Operationalizing Threat Intelligence by Kyle Wilhoit & Joseph Opacki(5907)
Solidity Programming Essentials by Ritesh Modi(4043)
Microsoft 365 Security, Compliance, and Identity Administration by Peter Rising(3682)
Operationalizing Threat Intelligence by Joseph Opacki Kyle Wilhoit(3412)
Future Crimes by Marc Goodman(3351)
Mastering Python for Networking and Security by José Manuel Ortega(3349)
Mastering Azure Security by Mustafa Toroman and Tom Janetscheck(3337)
Blockchain Basics by Daniel Drescher(3305)
Learn Computer Forensics - Second Edition by William Oettinger(3173)
Incident Response with Threat Intelligence by Roberto Martínez(2899)
Mobile App Reverse Engineering by Abhinav Mishra(2886)
Mastering Bitcoin: Programming the Open Blockchain by Andreas M. Antonopoulos(2873)
The Code Book by Simon Singh(2832)
From CIA to APT: An Introduction to Cyber Security by Edward G. Amoroso & Matthew E. Amoroso(2783)
Building a Next-Gen SOC with IBM QRadar: Accelerate your security operations and detect cyber threats effectively by Ashish M Kothekar(2762)
