|
|
|
|
|
Reverse Engineering Code with IDA Pro
If you want to master the art and science of reverse engineering code with IDA Pro for security R&D or software debugging, this is the book for you. Highly organized and sophisticated criminal entities are constantly developing more complex, obfuscated, and armored viruses, worms, Trojans, and botnets. IDA Pros interactive interface and... | | Certified Ethical Hacker (CEH) Foundation Guide
Prepare for the CEH training course and exam by gaining a solid foundation of knowledge of key fundamentals such as operating systems, databases, networking, programming, cloud, and virtualization. Based on this foundation, the book moves ahead with simple concepts from the hacking world. The Certified Ethical Hacker (CEH) Foundation... | | Next Generation Red Teaming
Red Teaming is can be described as a type of wargaming.In private business, penetration testers audit and test organization security, often in a secretive setting. The entire point of the Red Team is to see how weak or otherwise the organization’s security posture is. This course is particularly suited to CISO’s and CTO’s... |
|
The Science of Solar System Ices (Astrophysics and Space Science Library)
The role of laboratory research and simulations in advancing our understanding of solar system ices (including satellites, KBOs, comets, and giant planets) is becoming increasingly important. Understanding ice surface radiation processing, particle and radiation penetration depths, surface and subsurface chemistry, morphology, phases,... | | Coding for Penetration Testers: Building Better Tools
My Dear Reader,
This wretched war, the gravest threat humankind has ever faced, is not going well at all.We have suffered major setbacks, as our ruthless adversary has conquered vast territories, leaving little ground controlled by our ragtag band of rebels. Our few surviving generals blame the lack of skills in our fighting... | | |
|
|
|
Result Page: 12 11 10 9 8 7 6 5 4 3 2 1 |