Секреты и ложь. Безопасность данных в цифровом мире, Брюс Шнайер, 2003
В этой книге Брюс Шнайер – автор нескольких бестселлеров и признанный специалист в области безопасности и защиты информации, опираясь на собственный опыт, разрушает заблуждения многих, уверенных в конфиденциальности и неприкосновенности информации. Он разъясняет читателям, почему так сложно предотвратить доступ третьих лиц к личной цифровой информации, что нужно знать, чтобы обеспечить ее защиту, сколько средств следует выделять на обеспечение корпоративной безопасности и многое, многое другое.
#book #crypto
В этой книге Брюс Шнайер – автор нескольких бестселлеров и признанный специалист в области безопасности и защиты информации, опираясь на собственный опыт, разрушает заблуждения многих, уверенных в конфиденциальности и неприкосновенности информации. Он разъясняет читателям, почему так сложно предотвратить доступ третьих лиц к личной цифровой информации, что нужно знать, чтобы обеспечить ее защиту, сколько средств следует выделять на обеспечение корпоративной безопасности и многое, многое другое.
#book #crypto
👍4
Sekrety_i_lozh_Bezopasnost_dannykh_v_tsifrovom_mire.pdf
4 MB
Секреты и ложь. Безопасность данных в цифровом мире, Брюс Шнайер, 2003
🔥4
Пара забугорных поисковых трекеров проверенных временем! Если что-то то было когда-то слито, то это будет здесь!
BTDigg - один из лучших поисковиков
BT4G - еще одна площадка не уступающая первой
Предыдущий пост с похожими ресурсами
#useful
BTDigg - один из лучших поисковиков
BT4G - еще одна площадка не уступающая первой
Предыдущий пост с похожими ресурсами
#useful
🔥7👍1🙏1
Канал "На связи" о том как не остаться без связи в эпоху блокировок и запретов
Дополнительно:
О решение проблем с VPN
Список блокировок в РФ
#useful #privacy
Дополнительно:
О решение проблем с VPN
Список блокировок в РФ
#useful #privacy
👍4🔥2🤔1
HANDBOOK FOR SOCIAL MEDIA INVESTIGATIONS by Maltego
Standard Investigative Workflows Departing from Names, Aliases, Email Addresses, Images, and More
#OSINT
Standard Investigative Workflows Departing from Names, Aliases, Email Addresses, Images, and More
#OSINT
👍3
Maltego Handbook for Social Media Investigations.pdf
3.7 MB
HANDBOOK FOR SOCIAL MEDIA INVESTIGATIONS by Maltego
👍4🤔1
The Hitchhiker’s Guideto Online Anonymity, Version 1.1.5, June 2022 by Anonymous Planet
GitHub
Russian version of The Hitchhiker’s Guide to Online Anonymity
#book #privacy
GitHub
Russian version of The Hitchhiker’s Guide to Online Anonymity
#book #privacy
👍4
The Hitchhiker’s Guide to Online Anonymity.pdf
11.1 MB
The Hitchhiker’s Guideto Online Anonymity, Version 1.1.5, June 2022 by Anonymous Planet
👍6
Perform a web penetration test by by Moïse Mopepe, Thibaut Bonnetain, 2023
Through real-world scenarios and hands-on exercises, you'll acquire the skills necessary to protect your applications from prevalent risks like SQL injection, cross-site noscripting, and insecure server configurations. Stay one step ahead in the ever-evolving cyber landscape and emerge as the guardian of robust and resilient web systems.
Whether you're a beginner or an experienced professional, this book is your ultimate companion on the journey to becoming a web security virtuoso. Equip yourself with the knowledge and expertise to thwart cyber threats and ensure the integrity of your applications.
#book #web
Through real-world scenarios and hands-on exercises, you'll acquire the skills necessary to protect your applications from prevalent risks like SQL injection, cross-site noscripting, and insecure server configurations. Stay one step ahead in the ever-evolving cyber landscape and emerge as the guardian of robust and resilient web systems.
Whether you're a beginner or an experienced professional, this book is your ultimate companion on the journey to becoming a web security virtuoso. Equip yourself with the knowledge and expertise to thwart cyber threats and ensure the integrity of your applications.
#book #web
👍4🔥1
Perform.a.web.penetration.test.epub
7.8 MB
Perform a web penetration test by by Moïse Mopepe, Thibaut Bonnetain, 2023
❤8
SQLMAP For Dummies v2 by The AnonMatrix, 2012
This tutorial is made for explaining the usage of SQLMAP for beginners. I do know there is something called documentation (you know that -h option?), but honestly: How much wouldn't you pay to have a nice tutorial explaining how the different options relate to one another for every program there is? People will argue that skids read this to do fucked up things on the Internet and help on their epeen-ego, i am just going to state that if skids manage to run sqlmap in a cmd (windows) or terminal (linux) they should be capable of learning this no matter what, which it why i am not explaining how to run Backtrack or any other linux distro, and tell them what to write in the CMD/Terminal
#web #docs
This tutorial is made for explaining the usage of SQLMAP for beginners. I do know there is something called documentation (you know that -h option?), but honestly: How much wouldn't you pay to have a nice tutorial explaining how the different options relate to one another for every program there is? People will argue that skids read this to do fucked up things on the Internet and help on their epeen-ego, i am just going to state that if skids manage to run sqlmap in a cmd (windows) or terminal (linux) they should be capable of learning this no matter what, which it why i am not explaining how to run Backtrack or any other linux distro, and tell them what to write in the CMD/Terminal
#web #docs
🤔2👍1
Learning Kali Linux. Security Testing, Penetration Testing, and Ethical Hacking, Ric Messier, 2018
Author Ric Messier takes you through the foundations of Kali Linux and explains methods for conducting tests on networks, web applications, wireless security, password vulnerability, and more. You'll discover different techniques for extending Kali tools and creating your own toolset.
(+) Learn tools for stress testing network stacks and applications
(+) Perform network reconnaissance to determine what's available to attackers
(+) Execute penetration tests using automated exploit tools such as Metasploit
(+) Use cracking tools to see if passwords meet complexity requirements
(+) Test wireless capabilities by injecting frames and cracking passwords
(+) Assess web application vulnerabilities with automated or proxy-based tools
(+) Create advanced attack techniques by extending Kali tools or developing your own
Русский вольный перевод
#book #web #kali
Author Ric Messier takes you through the foundations of Kali Linux and explains methods for conducting tests on networks, web applications, wireless security, password vulnerability, and more. You'll discover different techniques for extending Kali tools and creating your own toolset.
(+) Learn tools for stress testing network stacks and applications
(+) Perform network reconnaissance to determine what's available to attackers
(+) Execute penetration tests using automated exploit tools such as Metasploit
(+) Use cracking tools to see if passwords meet complexity requirements
(+) Test wireless capabilities by injecting frames and cracking passwords
(+) Assess web application vulnerabilities with automated or proxy-based tools
(+) Create advanced attack techniques by extending Kali tools or developing your own
Русский вольный перевод
#book #web #kali
👍3
learningkalilinux.pdf
22.6 MB
Learning Kali Linux. Security Testing, Penetration Testing, and Ethical Hacking, Ric Messier, 2018
👍5