Cover Book Actions
OpenSSL Cookbook - Ivan Ristic

OpenSSL CookbookIvan Ristic

A guide to the most frequently used OpenSSL features and commands, written by Ivan Ristic.Comprehensive coverage of OpenSSL installation, configuration, and key and certificate managementIncludes SSL/TLS Deployment Best Practices, a design … more

OpenSSL Cookbook
Ivan Ristic
Feisty Duck Ltd , English
OpenSSL Crypto Tools. Essent... - Jacek Artymiak

OpenSSL Crypto Tools. Essent...Jacek Artymiak

OpenSSL is the cryptographic toolkit to use when you need strong, reliable encryption. It is Open Source software, which means that any errors, backdoors, or other problems get discovered and fixed in public, which gives everyone much bette… more

OpenSSL Crypto Tools. Essential OpenSSL Crypto Skills. Ubuntu Linux Edition, 1st ed.
Jacek Artymiak
devGuide.net ltd , English
Cryptocurrencies For Beginne... - JL Hatfield

Cryptocurrencies For Beginne...JL Hatfield

So, you want to earn more money through digital currencies like Bitcoin, Dogecoin and LiteCoin? Anyone can earn through selling cryptocurrency online. You do not need to be a rocket scientist or a computer whiz in order to do it. All you ne… more

Cryptocurrencies For Beginners: Your 2015 Guide to Bitcoin Mining and PROVEN Strategies to Make Money with Cryptocurrencies.
JL Hatfield
How to Unblock Everything on... - Ankit Fadia

How to Unblock Everything on...Ankit Fadia

If you are studying in a college, working for a company or traveling to a country that has blocked access to everything cool & fun on the Internet (like Face book, YouTube, Chat and others) and made your life miserably boring for you then t… more

How to Unblock Everything on the Internet
Ankit Fadia
Guide to PC Security -

Guide to PC Security

Today, more and more people are using their computers for everything from communication to online banking and investing to shopping.As we do these things on a more regular basis, we open ourselves up to potential hackers, attackers and crac… more

Guide to PC Security
Guide to Intrusion Detection... - National Institute of Standa...

Guide to Intrusion Detection...National Institute of Standa...

Reports on Computer Systems TechnologyThe Information Technology Laboratory (ITL) at the National Institute of Standards and Technology (NIST) promotes the U.S. economy and public welfare by providing technical leadership for the nation’s m… more

Guide to Intrusion Detection and Prevention Systems (IDPS)
National Institute of Standards and Technology
LittleWhiteEbook.com , English
Instant Penetration Testing:... - Vyacheslav Fadyushin

Instant Penetration Testing:...Vyacheslav Fadyushin

In DetailPenetration testing is notoriously difficult to execute. With many different real-world scenarios to consider, and an ever growing number software and hardware to manage, testers need to be highly qualified in many fields. A contro… more

Instant Penetration Testing: Setting Up a Test Lab How-to
Vyacheslav Fadyushin
Packt Publishing , English
How To Protect Yourself From... -

How To Protect Yourself From...

You’re going to discover so many things on adware/spyware and how to avoid it! Not only will you learn all about the removal of adware/spyware… You will also learn about programs that will help you along the way!!!Here’s Just “Sneak-Peak… more

How To Protect Yourself From Adware And Spyware -The Ultimate Guide To Removing And Protecting Against Adware And Spyware On Your PC
About Encryption and Making ... - Anonymous

About Encryption and Making ...Anonymous

Encryption and cryptographic software has been used in many different ways to make systems more secure. This article discusses only a few ways that such software can make your system more secure, including:1) Encrypting your email2) Encryp… more

About Encryption and Making Your System Secure
Website Security Rules of the Road - Anonymous

Website Security Rules of the RoadAnonymous

In 2004, online consumer spending was at a record $65.1 billion. More and more people are attracted to the ease of online shopping and are spending higher amounts. Unfortunately, the chances of becoming a victim of Internet fraud are also… more

Website Security Rules of the Road
Name Rank and Social Securit... - Anonymous

Name Rank and Social Securit...Anonymous

Identity theft is the fastest growing crime in the U.S. The U.S. Secret Service has estimated that consumers nationwide lose $745 million to identity theft each year. According to the Identity Theft Resource Center, the average victim spe… more

Name Rank and Social Security Number
Recommendations for Cryptogr... - Elaine Barker, William Barke...

Recommendations for Cryptogr...Elaine Barker, William Barke...

Users and developers are presented with many choices in their use of cryptographic mechanisms. Inappropriate choices may result in an illusion of security, but little or no real security for the protocol or application. The security of info… more

Recommendations for Cryptographic Key Management
Elaine Barker, William Barker, William Burr, William Polk, Miles Smid
National Institute of Standards and Technology , English
2006 Security Watch - Anonymous

2006 Security WatchAnonymous

There is a lot going on in the information security space. 2006 looks to be an interesting year in these regards. Below are some things to watch for in 2006, some of them are good and, unfortunately, some aren’t.

2006 Security Watch
Department of Defense Crackd... - Anonymous

Department of Defense Crackd...Anonymous

The top commander of the department of Defense network operations just ordered a crackdown on security. According to a recent article by NetworkWorld on January 16,2006, Lt. General Charles Croom is quoted as saying,

Department of Defense Crackdown on Secuity - 2006
Trojan Horses - Anonymous

Trojan HorsesAnonymous

We have all heard the term Trojan Horse, but what exactly is it? A Trojan Horse is a destructive program that masquerades as a harmless application. Unlike viruses, Trojan Horses do not replicate themselves, but they can be just as destruc… more

Trojan Horses
Quantum Computing for Comput... - Noson S. Yanofsky, Mirco A. ...

Quantum Computing for Comput...Noson S. Yanofsky, Mirco A. ...

The multidisciplinary field of quantum computing strives to exploit some of the uncanny aspects of quantum mechanics to expand our computational horizons. Quantum Computing for Computer Scientists takes readers on a tour of this fascinating… more

Quantum Computing for Computer Scientists
Noson S. Yanofsky, Mirco A. Mannucci
Cambridge University Press , English
Keep Your PC Safe From Virus... - wings of success

Keep Your PC Safe From Virus...wings of success

The health of your PC is just as important as your own. A malicious viral attack could mean loss of precious data. How do you keep your PC safe and healthy? The eBook, “How To Keep Your PC Safe From Virus And Data Loss,” comprises 88 pages … more

Keep Your PC Safe From Virus And Data Loss
wings of success
All about encryption - mohit mehta

All about encryptionmohit mehta

Now a day we found “encryption” word every where, mostly while using “e-commerce” .what is encryption? It is a method which turns significant data (e.g. your bank account password) into Data with no meaning using algorithms. First it encode… more

All about encryption
mohit mehta
The Book Of Satoshi: The Col... - Phil Champagne

The Book Of Satoshi: The Col...Phil Champagne

Average wait: N/A

Have you, like the rest of the world, speculated as to the identity of Satoshi Nakamoto, anonymous creator of Bitcoin? The world’s first cryptocurrency, Bitcoin went online in 2009 and has since revolutionized our concepts of currency and … more

The Book Of Satoshi: The Collected Writings of Bitcoin Creator Satoshi Nakamoto
Phil Champagne
e53 Publishing, LLC , English
Microsoft Research Digital R... - Cory Doctorow

Microsoft Research Digital R...Cory Doctorow

The author gives a straightforward (and rather cheeky) presentation to Microsoft Research, trying to convince them to give up on digital rights management (DRM) efforts.Contents:DRM systems don’t work DRM systems are bad for society DRM sys… more

Microsoft Research Digital Rights Management (DRM) Talk
Cory Doctorow
Avalon Publishers , English