 |
|
|
|
 Hacking Exposed Malware & Rootkits
Malware. In my almost 15 years in information security, malware has become the most powerful tool in a cyber attacker’s arsenal. From sniffing financial records and stealing keystrokes to peer-to-peer networks and auto updating functionality, malware has become the key component in almost all successful attacks. This has not always been... |  |  How Do Hybrid Cars Work? (Science in the Real World)In recent years, there has been much concern about the world's reliance on nonrenewable resources, such as oil. Scientists are attempting to decrease our dependency on oil - something cars require to work. Hybrid cars, which run on alternative energy sources like sunlight, corn, and biofuels, may be the key to using less oil. "How Do Hybrid... |  |  Kingpin: How One Hacker Took Over the Billion-Dollar Cybercrime Underground
Former hacker Kevin Poulsen has, over the past decade, built a reputation as one of the top investigative reporters on the cybercrime beat. In Kingpin, he pours his unmatched access and expertise into book form for the first time, delivering a gripping cat-and-mouse narrative—and an unprecedented view into the twenty-first... |
|
|
|
|
|
Result Page: 8 7 6 5 4 3 2 1 |