Security & Encryption
mobi, azw3, epub |eng | 2011-01-25 | Author:Singh, Simon [Singh, Simon]
5 The Language Barrier While British codebreakers were breaking the German Enigma cipher and altering the course of the war in Europe, American codebreakers were having an equally important influence ...
( Category:
Cryptography
March 25,2014 )
mobi, epub, pdf |eng | 2011-12-09 | Author:Jeffrey Carr
Protecting against 0day exploits There is simply no specific defense against 0day exploits. Each 0day exploit is unique, and only the attacker knows the full details of the 0day vulnerability. ...
( Category:
Privacy & Online Safety
March 25,2014 )
mobi, epub |eng | 2010-08-09 | Author:Richard A. Clarke
OVERALL CYBER WAR STRENGTH Nation: U.S. Cyber Offense: 8 Cyber Dependence: 2 Cyber Defense: 1 Total: 11 Nation: Russia Cyber Offense: 7 Cyber Dependence: 5 Cyber Defense: 4 Total: 16 ...
( Category:
Hacking
March 25,2014 )
mobi, epub, pdf |eng | 2010-12-21 | Author:Christopher Hadnagy
Chapter 6 Influence: The Power of Persuasion If you would persuade, you must appeal to interest rather than intellect. —Benjamin Franklin The epigraph sums up this entire chapter. You might ...
( Category:
Hacking
March 25,2014 )
mobi, pdf |eng | 2007-02-27 | Author:Kimberly Graves
Dsniff is a collection of tools used for network auditing and penetration testing. Dsniff, filesnarf, mailsnarf, msgsnarf, urlsnarf, and WebSpy passively monitor a network for interesting data such as passwords, ...
( Category:
Internet & Social Media
March 25,2014 )
mobi |eng | 2002-01-02 | Author:Kevin D. Mitnick; William L. Simon; Steve Wozniak
chapter 11 Combining Technology and Social Engineering A social engineer lives by his ability to manipulate people into doing things that help him achieve his goal, but success often also ...
( Category:
Hacking
March 25,2014 )
mobi, epub |eng | 2012-02-14 | Author:Bruce Schneier
In 2011, the pharmaceutical giant Glaxo Smith-Kline was fined $750 million for marketing drugs manufactured in a Puerto Rican plant whose managers ignored numerous FDA letters warning that products were ...
( Category:
Sociology
March 25,2014 )
mobi, epub, pdf |eng | 2012-06-04 | Author:Olson, Parmy [Olson, Parmy]
LulzSec, as hackers, were in very new territory. Stealing data was one thing, but announcing it through Twitter so the press could report on it was odd. Topiary volunteered to ...
( Category:
Hacking
March 25,2014 )
mobi, pdf |eng | 0101-01-01 | Author:Menn, Joseph [Menn, Joseph]
ANDY HAD PICKED THE RIGHT RAID to go on. Denis Stepanov, arrested by another team in St. Petersburg, was surly and misleading from the first interview. The twenty-three-year-old, who worked ...
( Category:
Espionage
March 25,2014 )
mobi, epub, pdf |eng | 0101-01-01 | Author:Poulsen, Kevin [Poulsen, Kevin]
21 Master Splyntr aking up one oor of a lime-green o ce building on the bank of the Monongahela River, the National Cyber Forensics and Training Alliance was far removed ...
( Category:
Hacking
March 25,2014 )
epub |eng | 2012-03-24 | Author:Cao, Zhenfu [Cao, Zhenfu]
We get the plaintext from Equation (4.25). We can find that m’1 = m1, which shows the correctness of our implementation. Note that m2, m3, …, m7 can be computed ...
( Category:
Security & Encryption
March 25,2014 )
mobi, azw3 |eng | 2011-08-15 | Author:Kevin Mitnick & Steve Wozniak & William L. Simon
I booked into a small motel just down the street, afraid to stay in my own apartment. I didn’t sleep very well and was awake early, tossing and turning. Tuesday ...
( Category:
Crime & Criminals
March 25,2014 )
mobi, epub, pdf |eng | 2013-12-26 | Author:Beaver, Kevin.; Davis, Peter T. [Beaver, Kevin.; Davis, Peter T.]
Chapter 10: Still at War 171 3. Select the directory where you want to install the program. Use the default unless you have a compelling reason not to do so. ...
( Category:
LAN
March 25,2014 )
epub |eng | 2010-04-20 | Author:Richard A. Clarke & Robert K. Knake [Clarke, Richard A. & Knake, Robert K.]
6. NO, I THOUGHT YOU WERE DOING IT Change, however, is coming. Like the United States, more and more nations are establishing offensive cyber war organizations. U.S. Cyber Command also ...
( Category:
Hacking
March 25,2014 )
mobi, epub |eng | 2010-01-25 | Author:Menn, Joseph [Menn, Joseph]
When the “technician” knocked at the door and Maksakov opened it in a shirt and shorts, the officers barged in. Two forced Maksakov back to his bedroom while the others ...
( Category:
Espionage
March 25,2014 )
Categories
Cryptography | Encryption |
Hacking | Network Security |
Privacy & Online Safety | Security Certifications |
Viruses |
Popular ebooks
Mastering Azure Security by Mustafa Toroman and Tom Janetscheck(3050)Future Crimes by Marc Goodman(3026)
Mastering Python for Networking and Security by José Manuel Ortega(3003)
Blockchain Basics by Daniel Drescher(2928)
Practical Threat Detection Engineering by Megan Roddie & Jason Deyalsingh & Gary J. Katz(2851)
Effective Threat Investigation for SOC Analysts by Yahia Mostafa;(2683)
Mastering Bitcoin: Programming the Open Blockchain by Andreas M. Antonopoulos(2539)
From CIA to APT: An Introduction to Cyber Security by Edward G. Amoroso & Matthew E. Amoroso(2510)
Machine Learning Security Principles by John Paul Mueller(2415)
Practical Memory Forensics by Svetlana Ostrovskaya & Oleg Skulkin(2404)
The Art Of Deception by Kevin Mitnick(2325)
The Code Book by Simon Singh(2250)
Attacking and Exploiting Modern Web Applications by Simone Onofri & Donato Onofri(2088)
Operationalizing Threat Intelligence by Kyle Wilhoit & Joseph Opacki(2078)
Solidity Programming Essentials by Ritesh Modi(2014)
Hands-On AWS Penetration Testing with Kali Linux by Benjamin Caudill & Karl Gilbert(1919)
Wireless Hacking 101 by Karina Astudillo(1873)
DarkMarket by Misha Glenny(1865)
Applied Network Security by Arthur Salmon & Michael McLafferty & Warun Levesque(1855)
Mobile Forensics Cookbook by Igor Mikhaylov(1828)