Viruses
azw3 |eng | 2018-12-09 | Author:Nik Alleyne [Alleyne, Nik]
Log Analysis of Compromised Domain Controller As Nakia was able to gain some intelligence about what happened from the packet analysis, she figures the logs can assist her in being ...
( Category:
Viruses
March 11,2020 )
epub |eng | 2020-03-10 | Author:Heather Linn
The most common way of getting the process memory is with Mimikatz. Mimikatz needs either SYSTEM-level privilege on a target host or the debug privilege under an Administrator account. Mimikatz ...
( Category:
Internet & Networking
March 11,2020 )
epub |eng | 2019-03-02 | Author:Jeff T. Parker
PART III Cyber Incident Response Chapter 7 The Incident Response Process Chapter 8 Determining the Impact of Incidents Chapter 9 Preparing the Incident Response Toolkit Chapter 10 Selecting the Best ...
( Category:
Network Security
March 3,2020 )
epub |eng | 2014-09-08 | Author:Brian S McWilliams [McWilliams, Brian S]
Cowles was hashing out an entirely different set of questions in his cell at the Wood County Justice Center. He was astounded that state attorneys in Florida had decided to ...
( Category:
Email Administration
March 2,2020 )
epub, pdf |eng | 2017-01-26 | Author:Sparc FLOW [FLOW, Sparc]
Sure enough, something like this shows up (after some cleaning and sorting out, of course): Psexec is a tool heavily used to execute commands on remote systems. It requires admin ...
( Category:
Hacking
March 2,2020 )
mobi, epub |eng | 2020-02-24 | Author:Dr. Chase Cunningham
( Category:
Cryptography
March 2,2020 )
epub |eng | 2020-02-21 | Author:FLOW, Sparc [FLOW, Sparc]
NODE POD PODIP SERVICE ENV FILESECRET ip-192 … api- … 10.0.2 … api-token dbCore … api-token- … ip-192 … ssp-f … 10.10. … default dbCass… default- … ip-192 … ssp-r ...
( Category:
Viruses
February 28,2020 )
epub |eng | 2019-06-05 | Author:Perry Carpenter
Media companies know this well. Netflix has a ton of variety, but it knows that you are interested in only a subset of that. YouTube has a ton of variety, ...
( Category:
Network Security
February 27,2020 )
epub |eng | 2019-12-05 | Author:Mining, Ethem [Mining, Ethem]
Command Prompts When you are interacting with the Terminal, you are using command prompts or shell prompts—you will likely see these used interchangeably as you read through various guides. When ...
( Category:
Hacking
February 25,2020 )
epub, pdf |eng | 2020-01-20 | Author:Dan Kottmann & Chris Patten & Tom Steele [Dan Kottmann]
( Category:
Testing
February 10,2020 )
epub, azw3 |eng | 2018-09-03 | Author:Hillary Sanders & Joshua Saxe [Hillary Sanders]
Now suppose you want to test the detection system’s accuracy using a set of benignware and malware. You can run the detector on each binary and keep count of which ...
( Category:
Testing
February 10,2020 )
epub |eng | 2019-12-26 | Author:Yuri Diogenes, Erdal Ozkaya
( Category:
Network Security
January 3,2020 )
mobi |eng | 2019-12-26 | Author:Erdal Ozkaya Yuri Diogenes [Yuri Diogenes, Erdal Ozkaya]
( Category:
Network Security
January 2,2020 )
epub, mobi, azw3, pdf |eng | 2018-11-29 | Author:Joshua Saxe & Hillary Sanders
Figure 7-2: Suspiciousness scores output by the hypothetical MalDetect system for individual software binaries Suspiciousness scores are informative, but in order to calculate MalDetect’s true positive rate and false positive ...
( Category:
Testing
November 30,2019 )
epub |eng | 2018-08-10 | Author:Barbosa de Azevedo, Fernando Uilherme [Barbosa de Azevedo, Fernando Uilherme]
Chapter 15: Ransomware Ransomware, sometimes called crypto viral extortion, is a form of malicious software that prevents users from accessing their personal files, usually through encryption. Hackers require that a ...
( Category:
Hacking
November 17,2019 )
Categories
Popular ebooks
Mastering Azure Security by Mustafa Toroman and Tom Janetscheck(3043)Future Crimes by Marc Goodman(3015)
Mastering Python for Networking and Security by José Manuel Ortega(2989)
Blockchain Basics by Daniel Drescher(2913)
Practical Threat Detection Engineering by Megan Roddie & Jason Deyalsingh & Gary J. Katz(2740)
Effective Threat Investigation for SOC Analysts by Yahia Mostafa;(2571)
Mastering Bitcoin: Programming the Open Blockchain by Andreas M. Antonopoulos(2531)
From CIA to APT: An Introduction to Cyber Security by Edward G. Amoroso & Matthew E. Amoroso(2500)
The Art Of Deception by Kevin Mitnick(2319)
Machine Learning Security Principles by John Paul Mueller(2311)
Practical Memory Forensics by Svetlana Ostrovskaya & Oleg Skulkin(2297)
The Code Book by Simon Singh(2237)
Attacking and Exploiting Modern Web Applications by Simone Onofri & Donato Onofri(1978)
Operationalizing Threat Intelligence by Kyle Wilhoit & Joseph Opacki(1976)
Solidity Programming Essentials by Ritesh Modi(1965)
Hands-On AWS Penetration Testing with Kali Linux by Benjamin Caudill & Karl Gilbert(1896)
Wireless Hacking 101 by Karina Astudillo(1864)
DarkMarket by Misha Glenny(1858)
Applied Network Security by Arthur Salmon & Michael McLafferty & Warun Levesque(1847)
Mobile Forensics Cookbook by Igor Mikhaylov(1821)