Subcategories

Cybersecurity and Information Security at Depository Institutions : Selected Assessments

Posted By: readerXXI
Cybersecurity and Information Security at Depository Institutions : Selected Assessments

Cybersecurity and Information Security at Depository Institutions :
Selected Assessments

by Lauren Hubbard
English | 2016 | ISBN: 1634842855 | 104 Pages | PDF | 1.94 MB

Depository institutions experienced cyber attacks in recent years that are estimated to have resulted in hundreds of millions of dollars in losses.

The Ethical Hacking Starter Kit: 12 Techniques

Posted By: naag
The Ethical Hacking Starter Kit: 12 Techniques

The Ethical Hacking Starter Kit: 12 Techniques
MP4 | Video: AVC 1280x720 | Audio: AAC 44KHz 2ch | Duration: 4.5 Hours | Lec: 59 | 901 MB
Genre: eLearning | Language: English

This course is focused on practice and will help you learn the basic techniques of Ethical Hacking & Penetration Testing

Perl Hacks: Tips & Tools for Programming, Debugging, and Surviving

Posted By: viserion
Perl Hacks: Tips & Tools for Programming, Debugging, and Surviving

Damian Conway, chromatic, Curtis 'Ovid' Poe, "Perl Hacks: Tips & Tools for Programming, Debugging, and Surviving"
ISBN: 0596526741 | 2006 | PDF | 298 pages | 2 MB

Cyberspace in Peace and War

Posted By: readerXXI
Cyberspace in Peace and War

Cyberspace in Peace and War
by Martin Libicki
English | 2016 | ISBN: 1682470326 | 652 Pages | ePUB | 2.75 MB

This book is written to be a comprehensive guide to cybersecurity and cyberwar policy and strategy, developed for a one- or two-semester class for students of public policy (including political science, law, business, etc.).

How to Hack Like a PORNSTAR: A step by step process for breaking into a BANK

Posted By: AlenMiler
How to Hack Like a PORNSTAR: A step by step process for breaking into a BANK

How to Hack Like a PORNSTAR: A step by step process for breaking into a BANK by Sparc FLOW
English | 28 Jan. 2017 | ISBN: 1520478518 | 107 Pages | PDF (conv) | 2.17 MB

This is not a book about information security. Certainly not about IT. This is a book about hacking: specifically, how to infiltrate a company’s network, locate their most critical data, and make off with it without triggering whatever shiny new security tool the company wasted their budget on.

Hacking Innovation: The New Growth Model from the Sinister World of Hackers

Posted By: AlenMiler
Hacking Innovation: The New Growth Model from the Sinister World of Hackers

Hacking Innovation: The New Growth Model from the Sinister World of Hackers by Josh Linkner
English | 24 Jan. 2017 | ISBN: 1499902298 | 269 Pages | PDF (conv) | 6.43 MB

Hackers are a global fascination with cybercrime representing our single biggest threat to national security.

Hacking: A Beginners' Guide to Computer Hacking, Basic Security and Penetration Testing

Posted By: AlenMiler
Hacking: A Beginners' Guide to Computer Hacking, Basic Security and Penetration Testing

Hacking: A Beginners' Guide to Computer Hacking, Basic Security and Penetration Testing (How to hack and secure your computer for beginners, Arduino, python) by John Slavio
English | 26 Jan. 2017 | ISBN: 1520467559 | 50 Pages | PDF (conv) | 425.3 KB

This book will teach you everything you need to know about hacking, the history of hacking, the types of hacking and security measures that you should undertake.

Capture The Flag & Hacking Kioptrix Server (Alexander Lumbantobing)

Posted By: AlenMiler
Capture The Flag & Hacking Kioptrix Server (Alexander Lumbantobing)

Capture The Flag & Hacking Kioptrix Server (Alexander Lumbantobing) by Alexander Lumbantobing
English | 22 Jan. 2017 | ASIN: B01MTC12G2 | 109 Pages | PDF (conv) | 3.26 MB

This book is the result of collaborative work between "Computer Engineering Study Program - Cyber Security Research Center (CSRC), the Institute of Technology Del (IT Del)" with "Indonesian Backtrack Team (IBT)".

Hacking mit Security Onion

Posted By: roxul
Hacking mit Security Onion

Chris Sanders, Jason Smith, "Hacking mit Security Onion: Sicherheit im Netzwerk überwachen: Daten sammeln, analysieren und Angriffe rechtzeitig erkennen"
2016 | ISBN-10: 3645604960 | 560 pages | PDF | 27 MB

Defense against the Black Arts: How Hackers Do What They Do and How to Protect against It(Repost)

Posted By: Nice_smile)
Defense against the Black Arts: How Hackers Do What They Do and How to Protect against It(Repost)

Defense against the Black Arts: How Hackers Do What They Do and How to Protect against It by Jesse Varsalone
English | 2011 | ISBN: 1439821194 | 412 Pages | PDF | 47.07 MB

Ethical Hacking and Penetration Testing Guide (repost)

Posted By: roxul
Ethical Hacking and Penetration Testing Guide (repost)

Rafay Baloch, "Ethical Hacking and Penetration Testing Guide"
2014 | ISBN-10: 1482231611 | 531 pages | PDF | 22 MB

Ethical Hacking - Session Hijacking

Posted By: naag
Ethical Hacking - Session Hijacking

Ethical Hacking - Session Hijacking
MP4 | Video: AVC 1280x720 | Audio: AAC 44KHz 2ch | Duration: 1.5 Hours | Lec: 10 | 221 MB
Genre: eLearning | Language: English

Learn session hijacking techniques and countermeasures.

Certified Ethical Hacker Bootcamp CEH V9 600 Q&A (2017)

Posted By: house23
Certified Ethical Hacker Bootcamp CEH V9 600 Q&A (2017)

Certified Ethical Hacker Bootcamp CEH V9 600 Q&A (2017)
MP4 | AVC 592kbps | English | 1280x720 | 30fps | 23 hours | AAC stereo 189kbps | 4.55 GB
Genre: Video Training

Prepare for the CEH V9 Exam with our bootcamp designed exclusively to help you ace the exam. The cyber world has brought many good things along - quick and easy access to large sources of information, e-mailing, new media of advertising and electronic commerce. Just as in our physical world, the cyber world too has a dark side that revolves around criminal hackers. Irrespective of the nature and size of the organization, everyone is worried about hackers playing havoc with their site, confidential information and site. This is where the ethical hackers step in.

Best Internet Links

Posted By: Alex

Hacker, Hoaxer, Whistleblower, Spy: The Many Faces of Anonymous [Audiobook]

Posted By: IrGens
Hacker, Hoaxer, Whistleblower, Spy: The Many Faces of Anonymous [Audiobook]

Hacker, Hoaxer, Whistleblower, Spy: The Many Faces of Anonymous [Audiobook] by Gabriella Coleman
English | January 31, 2017 | ASIN: B01N9URUW7, ISBN: 1515966941, 1515916944 | M4B@64 kbps | 13 hrs 39 mins | 380 MB
Narrator: Tavia Gilbert

The Cybersecurity to English Dictionary

Posted By: AlenMiler
The Cybersecurity to English Dictionary

The Cybersecurity to English Dictionary by Raef Meeuwisse
English | 5 Feb. 2017 | ISBN: 191145210X | 69 Pages | PDF (conv) | 650.32 KB

The speed of change in the world of cybersecurity is amazing. If you attend any meeting where cybersecurity is discussed, it can be like listening to a foreign language: blue team, black hat, metamorphic malware, steganography What are these people talking about?