Tài liệu Thư viện số
Danh mục TaiLieu.VN
Kết quả 85-96 trong khoảng 887
Ebook OS X exploits and defense
Ebook "OS X exploits and defense" includes content: Macintosh OS X boot process and forensic software, past and current threats, malicious macs - malware and the mac, malware detection and the mac, Mac OS X for pen testers, wardriving and wireless penetration testing with OS X, security and OS X, encryption technologies and OS X.
348 p actvn 25/12/2023 52 0
Ebook How to cheat at VolP security
Ebook "How to cheat at VolP security" includes content: The hardware infrastructure, introduction to VolP security, architectures, support protocols, threats to VolP communications systems, confirm user identity, active security monitoring, logically segregate network traffic, IETF encryption solutions for VolP, skype security... and other contents.
433 p actvn 25/12/2023 34 0
Ebook Open source fuzzing tools
Ebook "Open source fuzzing tools" includes content: Introduction to vulnerability research, fuzzing—what’s that, building a fuzzing environment, open source fuzzing tools, commercial fuzzing solutions, build your own fuzzer, integration of fuzzing in the development cycle,... and other contents.
209 p actvn 25/12/2023 27 0
Ebook How to cheat at securing Linux - The perfect reference for the multitasked SysAdmin
Ebook "How to cheat at securing Linux - The perfect reference for the multitasked SysAdmin" includes content: Presenting the business case for open source software; hardening the operating system; enumeration and scanning your network, introducing intrusion detection and snort; installing and configuring snort and add ons; advanced snort deployment; network analysis, troubleshooting, and packet sniffing; basics of cryptography and encryption;...
430 p actvn 25/12/2023 31 0
Ebook "Phishing exposed" includes content: Banking on phishing, go phish, e-mail - the weapon of mass delivery; crossing the phishing line; the dark side of the web; malware, money movers, and ma bell mayhem; so long, and thanks for all the phish.
416 p actvn 25/12/2023 27 0
Ebook Buffer overflow attacks - Detect, exploit, prevent
Ebook "Buffer overflow attacks - Detect, exploit, prevent" includes content: Buffer overflows - The essentials; understanding shellcode, writing shellcode, win32 assembly, case studies, stack overflows; heap corruption; format string attacks, windows buffer overflows; case studies; finding buffer overflows in source; case studies.
521 p actvn 25/12/2023 29 0
Ebook How to cheat at windows system administration using command line scripts
Ebook "How to cheat at windows system administration using command line scripts" includes content: Getting started with command line; basic windows administration; managing windows systems and printers; working with active directory; windows networking.
481 p actvn 25/12/2023 32 0
Ebook "Kismet hacking" includes content: Introduction to wireless networking, wardriving, and kismet; basic installation; operating kismet; kismet menus; configuring the kismet server; kismet client configuration file; server.conf file advanced configuration; kismet drones, kismet and mapping, wardriving with kismet and backtrack.
254 p actvn 25/12/2023 22 0
Ebook "Mac hackers handbook" includes content: Mac OS X architecture, Mac OS X parlance, attack surface, tracing and debugging, finding bugs, reverse engineering, exploiting stack overflows, exploiting heap overflows, exploit payloads, real world exploits, injecting, hooking, and swizzling; rootkits.
387 p actvn 25/12/2023 14 0
Ebook Metasploit toolkit for penetration testing, exploit development and vulnerability research
Ebook "Metasploit toolkit for penetration testing, exploit development and vulnerability research" includes content: Introduction to metasploit; architecture, environment, and installation; metasploit framework and advanced environment configurations; advanced payloads and add on modules; adding new payloads case studies; raxnet cacti remote command execution; mercur messaging 2005 SP3 imap remote buffer overflow (cve –2006 1255); slimftpd...
290 p actvn 25/12/2023 13 0
Ebook "Software piracy exposed" includes content: Inside software piracy, the history of software piracy, the suppliers, crackers, the release, sites, the distribution chain, the piracy scene, piracy and the law, the future of piracy, closing notes.
329 p actvn 25/12/2023 17 0
Ebook Hacking aterror network - The silent threat of covert channels
Ebook "Hacking aterror network - The silent threat of covert channels" includes content: The mind of terror; unseen planning, making friends; one step closer; over the line; images of death; the real assignment; creating the code; over the edge; biding time, covert channels; facing the truth; taking command; racing the clock; losing control; heightened motivation; chasing ghosts; taking back control; vengeance for deceit; eliminating false...
400 p actvn 25/12/2023 10 0
Đăng nhập
Bộ sưu tập nổi bật
Bộ sưu tập Tài liệu học tiếng Anh
14 83009
10 19631
Bộ sưu tập Kỹ thuật viễn thông
11 16555
12 23590