Security & Encryption
pdf |en | | Author: Tharrmashastha SAPV, Debajyoti Bera, Arpita Maitra, Subhamoy Maitra
( Category:
Networking
July 3,2023 )
epub |eng | 2023-07-06 | Author:Mike Chapple & David Seidl [Mike Chapple]
Zero-Day Attacks Sophisticated attackers often conduct their own security vulnerability research in an attempt to discover vulnerabilities that are not known to other attackers or cybersecurity teams. After they uncover ...
( Category:
Viruses
June 28,2023 )
azw3, epub, pdf |eng | 2020-07-20 | Author:Connor Wallace [Wallace, Connor]
On the social networking website. On the website that spoofs the familiar sites with a different address. In the instant message application. On our cell phone etc. What Does a ...
( Category:
Online Safety & Piracy
June 27,2023 )
epub |eng | 2023-06-15 | Author:Dr. Ahmed Hashem El Fiky [Fiky, Dr. Ahmed Hashem El]
Configuring a Nessus vulnerability scan policy Scan policies are basically a set of scanning instructions. Scan policies tell the scanner what duties to complete and how to complete them. You ...
( Category:
Viruses & Malware
June 27,2023 )
epub |eng | 2022-11-10 | Author:David Pointcheval [Pointcheval, David]
( Category:
Cryptography
June 26,2023 )
pdf | | 0101-01-01 | Author:Zamzar
( Category:
Cryptography
June 24,2023 )
pdf | | 0101-01-01 | Author:Unknown
( Category:
Networking
June 22,2023 )
pdf | | 2022-12-13 | Author:Hemang Doshi
( Category:
Privacy & Online Safety
June 22,2023 )
epub |eng | 2022-09-07 | Author:Howard E. Poston, III [Poston, Howard E.]
Attacking the Blockchain Network Blockchain networks can be attacked in a few different ways. The impacts of these attacks range from disruptions and degraded performance to the potential for double-spends ...
( Category:
Viruses
June 14,2023 )
epub |eng | 2022-10-19 | Author:Thomas Kranz; [Kranz, Thomas]
Moats around the castle (usually filled with water or nasty wooden spikes) Multiple fortified internal structures (e.g., stables, grain storage, barracks) Inner walls around some of the more important fortified ...
( Category:
Viruses
June 13,2023 )
epub |eng | 2023-06-07 | Author:Chris Hughes;Tony Turner;Steve Springett; & Tony Turner [Hughes, Chris & Turner, Tony]
Dependencies The CIS guide recognizes the fundamental role dependencies play in the software supply chain. There is an emphasis on the reality that dependencies generally come from third-party sources such ...
( Category:
Privacy & Online Safety
June 13,2023 )
epub |eng | 2021-10-05 | Author:Chris Peiris & Binil Pillai & Abbas Kudrati [Peiris, Chris & Pillai, Binil & Kudrati, Abbas]
Prerequisites If you don't have an account, visit https://aws.amazon.com and choose Create an AWS Account. As a best practice, you should also create an AWS Identity and Access Management (IAM) ...
( Category:
Encryption
June 11,2023 )
epub |eng | 2023-06-15 | Author:Jitender Narula & Atul Narula [Narula, Jitender & Narula, Atul]
Figure 8.23: ImportSampleDLL code The resulting executable (ImportSampleDLL.exe) will list our SampleDLL.dll in Import Directory. Import Directory is an array of the IMAGE_IMPORT_DESCRIPTOR structure. Each structure is 20 bytes in ...
( Category:
Viruses & Malware
June 1,2023 )
pdf | | 2023-02-17 | Author:Unknown
( Category:
Cryptography
May 29,2023 )
epub |eng | 2022-08-20 | Author:Jacob Chance [Chance, Jacob]
12 LYNCH âWhat is he doing?â âHeâs signing,â Ricky explains, as if I'm serious. âBruno will translate when heâs finished.â âNo, I mean what the fuck is he doing? Because ...
( Category:
Privacy & Online Safety
May 27,2023 )
Categories
Cryptography | Encryption |
Hacking | Network Security |
Privacy & Online Safety | Security Certifications |
Viruses |
Popular ebooks
Mastering Azure Security by Mustafa Toroman and Tom Janetscheck(3050)Future Crimes by Marc Goodman(3025)
Mastering Python for Networking and Security by José Manuel Ortega(3003)
Blockchain Basics by Daniel Drescher(2928)
Practical Threat Detection Engineering by Megan Roddie & Jason Deyalsingh & Gary J. Katz(2849)
Effective Threat Investigation for SOC Analysts by Yahia Mostafa;(2681)
Mastering Bitcoin: Programming the Open Blockchain by Andreas M. Antonopoulos(2539)
From CIA to APT: An Introduction to Cyber Security by Edward G. Amoroso & Matthew E. Amoroso(2510)
Machine Learning Security Principles by John Paul Mueller(2415)
Practical Memory Forensics by Svetlana Ostrovskaya & Oleg Skulkin(2404)
The Art Of Deception by Kevin Mitnick(2325)
The Code Book by Simon Singh(2250)
Attacking and Exploiting Modern Web Applications by Simone Onofri & Donato Onofri(2087)
Operationalizing Threat Intelligence by Kyle Wilhoit & Joseph Opacki(2078)
Solidity Programming Essentials by Ritesh Modi(2013)
Hands-On AWS Penetration Testing with Kali Linux by Benjamin Caudill & Karl Gilbert(1919)
Wireless Hacking 101 by Karina Astudillo(1872)
DarkMarket by Misha Glenny(1865)
Applied Network Security by Arthur Salmon & Michael McLafferty & Warun Levesque(1855)
Mobile Forensics Cookbook by Igor Mikhaylov(1828)