Security & Encryption
mobi, epub, pdf |eng | 2011-12-09 | Author:Jeffrey Carr
Protecting against 0day exploits There is simply no specific defense against 0day exploits. Each 0day exploit is unique, and only the attacker knows the full details of the 0day vulnerability. ...
( Category:
Privacy & Online Safety
March 25,2014 )
mobi, epub |eng | 2010-08-09 | Author:Richard A. Clarke
OVERALL CYBER WAR STRENGTH Nation: U.S. Cyber Offense: 8 Cyber Dependence: 2 Cyber Defense: 1 Total: 11 Nation: Russia Cyber Offense: 7 Cyber Dependence: 5 Cyber Defense: 4 Total: 16 ...
( Category:
Hacking
March 25,2014 )
mobi, epub, pdf |eng | 2010-12-21 | Author:Christopher Hadnagy
Chapter 6 Influence: The Power of Persuasion If you would persuade, you must appeal to interest rather than intellect. —Benjamin Franklin The epigraph sums up this entire chapter. You might ...
( Category:
Hacking
March 25,2014 )
mobi, pdf |eng | 2007-02-27 | Author:Kimberly Graves
Dsniff is a collection of tools used for network auditing and penetration testing. Dsniff, filesnarf, mailsnarf, msgsnarf, urlsnarf, and WebSpy passively monitor a network for interesting data such as passwords, ...
( Category:
Internet & Social Media
March 25,2014 )
mobi |eng | 2002-01-02 | Author:Kevin D. Mitnick; William L. Simon; Steve Wozniak
chapter 11 Combining Technology and Social Engineering A social engineer lives by his ability to manipulate people into doing things that help him achieve his goal, but success often also ...
( Category:
Hacking
March 25,2014 )
mobi, epub |eng | 2012-02-14 | Author:Bruce Schneier
In 2011, the pharmaceutical giant Glaxo Smith-Kline was fined $750 million for marketing drugs manufactured in a Puerto Rican plant whose managers ignored numerous FDA letters warning that products were ...
( Category:
Sociology
March 25,2014 )
mobi, epub, pdf |eng | 2012-06-04 | Author:Olson, Parmy [Olson, Parmy]
LulzSec, as hackers, were in very new territory. Stealing data was one thing, but announcing it through Twitter so the press could report on it was odd. Topiary volunteered to ...
( Category:
Hacking
March 25,2014 )
mobi, pdf |eng | 0101-01-01 | Author:Menn, Joseph [Menn, Joseph]
ANDY HAD PICKED THE RIGHT RAID to go on. Denis Stepanov, arrested by another team in St. Petersburg, was surly and misleading from the first interview. The twenty-three-year-old, who worked ...
( Category:
Espionage
March 25,2014 )
mobi, epub, pdf |eng | 0101-01-01 | Author:Poulsen, Kevin [Poulsen, Kevin]
21 Master Splyntr aking up one oor of a lime-green o ce building on the bank of the Monongahela River, the National Cyber Forensics and Training Alliance was far removed ...
( Category:
Hacking
March 25,2014 )
epub |eng | 2012-03-24 | Author:Cao, Zhenfu [Cao, Zhenfu]
We get the plaintext from Equation (4.25). We can find that m’1 = m1, which shows the correctness of our implementation. Note that m2, m3, …, m7 can be computed ...
( Category:
Security & Encryption
March 25,2014 )
mobi, azw3 |eng | 2011-08-15 | Author:Kevin Mitnick & Steve Wozniak & William L. Simon
I booked into a small motel just down the street, afraid to stay in my own apartment. I didn’t sleep very well and was awake early, tossing and turning. Tuesday ...
( Category:
Crime & Criminals
March 25,2014 )
mobi, epub, pdf |eng | 2013-12-26 | Author:Beaver, Kevin.; Davis, Peter T. [Beaver, Kevin.; Davis, Peter T.]
Chapter 10: Still at War 171 3. Select the directory where you want to install the program. Use the default unless you have a compelling reason not to do so. ...
( Category:
LAN
March 25,2014 )
epub |eng | 2010-04-20 | Author:Richard A. Clarke & Robert K. Knake [Clarke, Richard A. & Knake, Robert K.]
6. NO, I THOUGHT YOU WERE DOING IT Change, however, is coming. Like the United States, more and more nations are establishing offensive cyber war organizations. U.S. Cyber Command also ...
( Category:
Hacking
March 25,2014 )
mobi, epub |eng | 2010-01-25 | Author:Menn, Joseph [Menn, Joseph]
When the “technician” knocked at the door and Maksakov opened it in a shirt and shorts, the officers barged in. Two forced Maksakov back to his bedroom while the others ...
( Category:
Espionage
March 25,2014 )
epub, azw3, pdf |eng | 0101-01-01 | Author:Bruce Schneier [Schneier, Bruce]
$10,000, and the chance of her getting caught and fined is 10%, then any fine over $100,000 will keep her cooperating (assuming she’s rational and that losing $100,000 matters to ...
( Category:
Cryptography
March 25,2014 )
Categories
Cryptography | Encryption |
Hacking | Network Security |
Privacy & Online Safety | Security Certifications |
Viruses |
Popular ebooks
Practical Threat Detection Engineering by Megan Roddie & Jason Deyalsingh & Gary J. Katz(6733)Effective Threat Investigation for SOC Analysts by Yahia Mostafa;(6577)
Practical Memory Forensics by Svetlana Ostrovskaya & Oleg Skulkin(6296)
Machine Learning Security Principles by John Paul Mueller(6269)
Attacking and Exploiting Modern Web Applications by Simone Onofri & Donato Onofri(5942)
Operationalizing Threat Intelligence by Kyle Wilhoit & Joseph Opacki(5903)
Solidity Programming Essentials by Ritesh Modi(4040)
Microsoft 365 Security, Compliance, and Identity Administration by Peter Rising(3678)
Operationalizing Threat Intelligence by Joseph Opacki Kyle Wilhoit(3409)
Future Crimes by Marc Goodman(3351)
Mastering Python for Networking and Security by José Manuel Ortega(3348)
Mastering Azure Security by Mustafa Toroman and Tom Janetscheck(3337)
Blockchain Basics by Daniel Drescher(3305)
Learn Computer Forensics - Second Edition by William Oettinger(3171)
Incident Response with Threat Intelligence by Roberto Martínez(2897)
Mobile App Reverse Engineering by Abhinav Mishra(2886)
Mastering Bitcoin: Programming the Open Blockchain by Andreas M. Antonopoulos(2873)
The Code Book by Simon Singh(2832)
From CIA to APT: An Introduction to Cyber Security by Edward G. Amoroso & Matthew E. Amoroso(2783)
Building a Next-Gen SOC with IBM QRadar: Accelerate your security operations and detect cyber threats effectively by Ashish M Kothekar(2756)
