Lendle

Cover Book Actions
OpenSSL Cookbook - Ivan Ristic
 

OpenSSL CookbookIvan Ristic

Average wait: N/A

A guide to the most frequently used OpenSSL features and commands, written by Ivan Ristic.Comprehensive coverage of OpenSSL installation, configuration, and key and certificate managementIncludes SSL/TLS Deployment Best Practices, a design … more

OpenSSL Cookbook
Ivan Ristic
Feisty Duck Ltd , English
Cryptocurrencies For Beginne... - JL Hatfield
 

Cryptocurrencies For Beginne...JL Hatfield

So, you want to earn more money through digital currencies like Bitcoin, Dogecoin and LiteCoin? Anyone can earn through selling cryptocurrency online. You do not need to be a rocket scientist or a computer whiz in order to do it. All you ne… more

Cryptocurrencies For Beginners: Your 2014 Guide to Bitcoin Mining and PROVEN Strategies to Make Money with Cryptocurrencies.
JL Hatfield
English
How To Protect Yourself From... -
 

How To Protect Yourself From...

You’re going to discover so many things on adware/spyware and how to avoid it! Not only will you learn all about the removal of adware/spyware… You will also learn about programs that will help you along the way!!!Here’s Just “Sneak-Peak… more

How To Protect Yourself From Adware And Spyware -The Ultimate Guide To Removing And Protecting Against Adware And Spyware On Your PC
English
OpenSSL Crypto Tools. Essent... - Jacek Artymiak
 

OpenSSL Crypto Tools. Essent...Jacek Artymiak

Average wait: N/A

OpenSSL is the cryptographic toolkit to use when you need strong, reliable encryption. It is Open Source software, which means that any errors, backdoors, or other problems get discovered and fixed in public, which gives everyone much bette… more

OpenSSL Crypto Tools. Essential OpenSSL Crypto Skills. Ubuntu Linux Edition, 1st ed.
Jacek Artymiak
devGuide.net ltd , English
Instant Penetration Testing:... - Vyacheslav Fadyushin
 

Instant Penetration Testing:...Vyacheslav Fadyushin

In DetailPenetration testing is notoriously difficult to execute. With many different real-world scenarios to consider, and an ever growing number software and hardware to manage, testers need to be highly qualified in many fields. A contro… more

Instant Penetration Testing: Setting Up a Test Lab How-to
Vyacheslav Fadyushin
Packt Publishing , English
Guide to Intrusion Detection... - National Institute of Standa...
 

Guide to Intrusion Detection...National Institute of Standa...

Reports on Computer Systems TechnologyThe Information Technology Laboratory (ITL) at the National Institute of Standards and Technology (NIST) promotes the U.S. economy and public welfare by providing technical leadership for the nation’s m… more

Guide to Intrusion Detection and Prevention Systems (IDPS)
National Institute of Standards and Technology
LittleWhiteEbook.com , English
Guide to PC Security -
 

Guide to PC Security

Today, more and more people are using their computers for everything from communication to online banking and investing to shopping.As we do these things on a more regular basis, we open ourselves up to potential hackers, attackers and crac… more

Guide to PC Security
English
How to Unblock Everything on... - Ankit Fadia
 

How to Unblock Everything on...Ankit Fadia

If you are studying in a college, working for a company or traveling to a country that has blocked access to everything cool & fun on the Internet (like Face book, YouTube, Chat and others) and made your life miserably boring for you then t… more

How to Unblock Everything on the Internet
Ankit Fadia
VIKAS PUBLISHING HOUSE PVT LTD , English
Name Rank and Social Securit... - Anonymous
 

Name Rank and Social Securit...Anonymous

Identity theft is the fastest growing crime in the U.S. The U.S. Secret Service has estimated that consumers nationwide lose $745 million to identity theft each year. According to the Identity Theft Resource Center, the average victim spe… more

Name Rank and Social Security Number
Anonymous
English
Trojan Horses - Anonymous
 

Trojan HorsesAnonymous

We have all heard the term Trojan Horse, but what exactly is it? A Trojan Horse is a destructive program that masquerades as a harmless application. Unlike viruses, Trojan Horses do not replicate themselves, but they can be just as destruc… more

Trojan Horses
Anonymous
English
Website Security Rules of the Road - Anonymous
 

Website Security Rules of the RoadAnonymous

In 2004, online consumer spending was at a record $65.1 billion. More and more people are attracted to the ease of online shopping and are spending higher amounts. Unfortunately, the chances of becoming a victim of Internet fraud are also… more

Website Security Rules of the Road
Anonymous
English
Department of Defense Crackd... - Anonymous
 

Department of Defense Crackd...Anonymous

The top commander of the department of Defense network operations just ordered a crackdown on security. According to a recent article by NetworkWorld on January 16,2006, Lt. General Charles Croom is quoted as saying,

Department of Defense Crackdown on Secuity - 2006
Anonymous
English
About Encryption and Making ... - Anonymous
 

About Encryption and Making ...Anonymous

Encryption and cryptographic software has been used in many different ways to make systems more secure. This article discusses only a few ways that such software can make your system more secure, including:1) Encrypting your email2) Encryp… more

About Encryption and Making Your System Secure
Anonymous
English
2006 Security Watch - Anonymous
 

2006 Security WatchAnonymous

There is a lot going on in the information security space. 2006 looks to be an interesting year in these regards. Below are some things to watch for in 2006, some of them are good and, unfortunately, some aren’t.

2006 Security Watch
Anonymous
English
Recommendations for Cryptogr... - Elaine Barker, William Barke...
 

Recommendations for Cryptogr...Elaine Barker, William Barke...

Users and developers are presented with many choices in their use of cryptographic mechanisms. Inappropriate choices may result in an illusion of security, but little or no real security for the protocol or application. The security of info… more

Recommendations for Cryptographic Key Management
Elaine Barker, William Barker, William Burr, William Polk, Miles Smid
National Institute of Standards and Technology , English
Hacking: Being A Teen Hacker... - Harry Hariom Choudhary
 

Hacking: Being A Teen Hacker...Harry Hariom Choudhary

Book (Hacking: Being A Teen Hacker) overview and key Learning Points–

This work is not what most people would expect to read when they pick up a “hacking” book. Rather than showing the reader how to perform traditional penetration test a… more

Hacking: Being A Teen Hacker , The Art of Exploitation 2013 Edition , Hacker Handbook for Beginners & Teens & Stusents
Harry Hariom Choudhary
Harry (Hariom Choudhary) & Richard Pryce , English
Keep Your PC Safe From Virus... - wings of success
 

Keep Your PC Safe From Virus...wings of success

The health of your PC is just as important as your own. A malicious viral attack could mean loss of precious data. How do you keep your PC safe and healthy? The eBook, “How To Keep Your PC Safe From Virus And Data Loss,” comprises 88 pages … more

Keep Your PC Safe From Virus And Data Loss
wings of success
English
Microsoft Research Digital R... - Cory Doctorow
 

Microsoft Research Digital R...Cory Doctorow

The author gives a straightforward (and rather cheeky) presentation to Microsoft Research, trying to convince them to give up on digital rights management (DRM) efforts.Contents:DRM systems don’t work DRM systems are bad for society DRM sys… more

Microsoft Research Digital Rights Management (DRM) Talk
Cory Doctorow
Avalon Publishers , English
WikiBooks: Cryptography - Wikimedia Foundation
 

WikiBooks: CryptographyWikimedia Foundation

Cryptography (or cryptology; from Greek κρυπτός, kryptos, “hidden, secret”; and γράφ, gráph, “writing”, or -λογία, -logia, respectively) is the practice and study of hiding information. Modern cryptography intersects the disciplines of math… more

WikiBooks: Cryptography
Wikimedia Foundation
English
Quantum Computing for Comput... - Noson S. Yanofsky, Mirco A. ...
 

Quantum Computing for Comput...Noson S. Yanofsky, Mirco A. ...

The multidisciplinary field of quantum computing strives to exploit some of the uncanny aspects of quantum mechanics to expand our computational horizons. Quantum Computing for Computer Scientists takes readers on a tour of this fascinating… more

Quantum Computing for Computer Scientists
Noson S. Yanofsky, Mirco A. Mannucci
Cambridge University Press , English