Cover Book Actions

Instant Penetration Testing:...Vyacheslav Fadyushin

In DetailPenetration testing is notoriously difficult to execute. With many different real-world scenarios to consider, and an ever growing number software and hardware to manage, testers need to be highly qualified in many fields. A contro… more

Instant Penetration Testing: Setting Up a Test Lab How-to
Vyacheslav Fadyushin
Packt Publishing , English

Guide to PC Security

Today, more and more people are using their computers for everything from communication to online banking and investing to shopping.As we do these things on a more regular basis, we open ourselves up to potential hackers, attackers and crac… more

Guide to PC Security

How to Unblock Everything on...Ankit Fadia

If you are studying in a college, working for a company or traveling to a country that has blocked access to everything cool & fun on the Internet (like Face book, YouTube, Chat and others) and made your life miserably boring for you then t… more

How to Unblock Everything on the Internet
Ankit Fadia

OpenSSL Crypto Tools. Essent...Jacek Artymiak

Average wait: N/A

OpenSSL is the cryptographic toolkit to use when you need strong, reliable encryption. It is Open Source software, which means that any errors, backdoors, or other problems get discovered and fixed in public, which gives everyone much bette… more

OpenSSL Crypto Tools. Essential OpenSSL Crypto Skills. Ubuntu Linux Edition, 1st ed.
Jacek Artymiak
devGuide.net ltd , English

How To Protect Yourself From...

You’re going to discover so many things on adware/spyware and how to avoid it! Not only will you learn all about the removal of adware/spyware… You will also learn about programs that will help you along the way!!!Here’s Just “Sneak-Peak… more

How To Protect Yourself From Adware And Spyware -The Ultimate Guide To Removing And Protecting Against Adware And Spyware On Your PC

Guide to Intrusion Detection...National Institute of Standa...

Reports on Computer Systems TechnologyThe Information Technology Laboratory (ITL) at the National Institute of Standards and Technology (NIST) promotes the U.S. economy and public welfare by providing technical leadership for the nation’s m… more

Guide to Intrusion Detection and Prevention Systems (IDPS)
National Institute of Standards and Technology
LittleWhiteEbook.com , English

Quantum Computing for Comput...Noson S. Yanofsky, Mirco A. ...

The multidisciplinary field of quantum computing strives to exploit some of the uncanny aspects of quantum mechanics to expand our computational horizons. Quantum Computing for Computer Scientists takes readers on a tour of this fascinating… more

Quantum Computing for Computer Scientists
Noson S. Yanofsky, Mirco A. Mannucci
Cambridge University Press , English

Name Rank and Social Securit...Anonymous

Identity theft is the fastest growing crime in the U.S. The U.S. Secret Service has estimated that consumers nationwide lose $745 million to identity theft each year. According to the Identity Theft Resource Center, the average victim spe… more

Name Rank and Social Security Number

Recommendations for Cryptogr...Elaine Barker, William Barke...

Users and developers are presented with many choices in their use of cryptographic mechanisms. Inappropriate choices may result in an illusion of security, but little or no real security for the protocol or application. The security of info… more

Recommendations for Cryptographic Key Management
Elaine Barker, William Barker, William Burr, William Polk, Miles Smid
National Institute of Standards and Technology , English

Website Security Rules of the RoadAnonymous

In 2004, online consumer spending was at a record $65.1 billion. More and more people are attracted to the ease of online shopping and are spending higher amounts. Unfortunately, the chances of becoming a victim of Internet fraud are also… more

Website Security Rules of the Road

2006 Security WatchAnonymous

There is a lot going on in the information security space. 2006 looks to be an interesting year in these regards. Below are some things to watch for in 2006, some of them are good and, unfortunately, some aren’t.

2006 Security Watch

Department of Defense Crackd...Anonymous

The top commander of the department of Defense network operations just ordered a crackdown on security. According to a recent article by NetworkWorld on January 16,2006, Lt. General Charles Croom is quoted as saying,

Department of Defense Crackdown on Secuity - 2006

Trojan HorsesAnonymous

We have all heard the term Trojan Horse, but what exactly is it? A Trojan Horse is a destructive program that masquerades as a harmless application. Unlike viruses, Trojan Horses do not replicate themselves, but they can be just as destruc… more

Trojan Horses

About Encryption and Making ...Anonymous

Encryption and cryptographic software has been used in many different ways to make systems more secure. This article discusses only a few ways that such software can make your system more secure, including:1) Encrypting your email2) Encryp… more

About Encryption and Making Your System Secure

Investigation into the Impac...Jonathan Lee Yee Shu, Jacob ...

Average wait: N/A

As information sharing becomes increasingly necessary for mission accomplishment within the Department of Defense, the rules for protecting information have tightened. The sustained and rapid advancement of information technology in the 21s… more

Investigation into the Impacts of Migration to Emergent NSA Suite B Encryption Standards
Jonathan Lee Yee Shu, Jacob Paul Venema

Secret History: The Story of...Craig P. Bauer

Most available cryptology books primarily focus on either mathematics or history. Breaking this mold, Secret History gives a thorough yet accessible treatment of both the mathematics and history of cryptology. Requiring minimal mathematical… more

Secret History: The Story of Cryptology (Discrete Mathematics and Its Applications)
Craig P. Bauer
Chapman and Hall/CRC , English

Defend Your Domain eBook - H...raimeikenn

ebooks or software by direct download using PayPal’s payment system, then you could be losing hundreds of dollars worth of sales.Perhaps you’ve noticed that your ebooks have been downloaded more times than you’ve received payment for?If so,… more

Defend Your Domain eBook - How To Protect Your Website AAA+++

Hacking: Being A Teen Hacker...Harry Hariom Choudhary

Book (Hacking: Being A Teen Hacker) overview and key Learning Points–

This work is not what most people would expect to read when they pick up a “hacking” book. Rather than showing the reader how to perform traditional penetration test a… more

Hacking: Being A Teen Hacker , The Art of Exploitation 2013 Edition , Hacker Handbook for Beginners & Teens & Stusents
Harry Hariom Choudhary
Harry (Hariom Choudhary) & Richard Pryce , English

Keep Your PC Safe From Virus...wings of success

The health of your PC is just as important as your own. A malicious viral attack could mean loss of precious data. How do you keep your PC safe and healthy? The eBook, “How To Keep Your PC Safe From Virus And Data Loss,” comprises 88 pages … more

Keep Your PC Safe From Virus And Data Loss
wings of success

WikiBooks: CryptographyWikimedia Foundation

Cryptography (or cryptology; from Greek κρυπτός, kryptos, “hidden, secret”; and γράφ, gráph, “writing”, or -λογία, -logia, respectively) is the practice and study of hiding information. Modern cryptography intersects the disciplines of math… more

WikiBooks: Cryptography
Wikimedia Foundation