Wow! eBook The best eBook site ever!

Data Hiding 0

Data Hiding

As data hiding detection and forensic techniques have matured, people are creating more advanced stealth methods for spying, corporate espionage, terrorism, and cyber warfare all to avoid detection. Data Hiding provides an exploration into the present...

Information Security Risk Assessment Toolkit 0

Information Security Risk Assessment Toolkit

In order to protect company’s information assets such as sensitive customer records, health care records, etc., the security practitioner first needs to find out: what needs protected, what risks those assets are exposed to, what controls...

Client-Side Attacks and Defense 0

Client-Side Attacks and Defense

Individuals wishing to attack a company’s network have found a new path of least resistance-the end user. A client- side attack is one that uses the inexperience of the end user to create a foothold in...

The Hacker’s Guide to OS X 0

The Hacker’s Guide to OS X

Written by two experienced penetration testers the material presented discusses the basics of the OS X environment and its vulnerabilities. Including but limited to; application porting, virtualization utilization and offensive tactics at the kernel, OS and...

The Basics of Cyber Warfare 0

The Basics of Cyber Warfare

The Basics of Cyber Warfare provides readers with fundamental knowledge of cyber war in both theoretical and practical aspects. This book explores the principles of cyber warfare, including military and cyber doctrine, social engineering, and offensive...

Practical Lock Picking, 2nd Edition 0

Practical Lock Picking, 2nd Edition

Practical Lock Picking, 2nd Edition is presented with rich, detailed full-color diagrams and includes easy-to-follow lessons that allow even beginners to acquire the knowledge they need quickly. Everything from straightforward lock picking to quick-entry techniques like...

The Basics of Digital Forensics 0

The Basics of Digital Forensics

The Basics of Digital Forensics provides a foundation for people new to the digital forensics field. This book teaches you how to conduct examinations by discussing what digital forensics is, the methodologies used, key technical concepts...