Хакинг_на_примерах_Уязвимости,_взлом,_защита,_2_е_издание.pdf
31 MB
Хакинг на примерах. Уязвимости, Взлом, Защита. 2-е издание (исправлено и дополнено), Ярошенко А. А., 2023
🔥9
The SELINUX COLORING BOOK - It's raining cats and dogs" by Dan Walsh
A coloring book to help folks understand how SELinux works. Based on an opensource[.]com article by Dan Walsh that is available here.
Official page
GitHub
#linux #fun
A coloring book to help folks understand how SELinux works. Based on an opensource[.]com article by Dan Walsh that is available here.
Official page
GitHub
#linux #fun
😁6👍2🔥1
SELinuxColoringBook.pdf
2.3 MB
The SELINUX COLORING BOOK - It's raining cats and dogs" by Dan Walsh
👍7🔥1
Digital Forensics with Open Source Tools by Harlan Carvey, Cory Altheide, 1st Edition, 2011
Written by world-renowned forensic practitioners, this book uses the most current examination and analysis techniques in the field. It consists of 9 chapters that cover a range of topics such as:
(+) the open source examination platform;
(+) disk and file system analysis;
(+) Windows systems and artifacts;
(+) Linux systems and artifacts;
(+) Mac OS X systems and artifacts;
(+) Internet artifacts; and automating analysis and extending capabilities.
The book lends itself to use by students and those entering the field who do not have means to purchase new tools for different investigations.
#book #forensic
Written by world-renowned forensic practitioners, this book uses the most current examination and analysis techniques in the field. It consists of 9 chapters that cover a range of topics such as:
(+) the open source examination platform;
(+) disk and file system analysis;
(+) Windows systems and artifacts;
(+) Linux systems and artifacts;
(+) Mac OS X systems and artifacts;
(+) Internet artifacts; and automating analysis and extending capabilities.
The book lends itself to use by students and those entering the field who do not have means to purchase new tools for different investigations.
#book #forensic
👍5
Digital forensics .pdf
4.2 MB
Digital Forensics with Open Source Tools by Harlan Carvey, Cory Altheide, 1st Edition, 2011
👍6
Pass The Python Interview: 69 Python Coding Questions, Solutions and Explanations by Lionel Osamba, 2023
Learn about the computer science concepts of data structures and algorithms and build implementations of each from scratch in modern Python.
Includes Python, Interview Questions, Data Structures, Big O, Recursion, Sort and Search Algorithms, and more.
#python #book #world
Learn about the computer science concepts of data structures and algorithms and build implementations of each from scratch in modern Python.
Includes Python, Interview Questions, Data Structures, Big O, Recursion, Sort and Search Algorithms, and more.
#python #book #world
👍7
Pass.The.Python.Interview.pdf
13.7 MB
Pass The Python Interview: 69 Python Coding Questions, Solutions and Explanations by Lionel Osamba, 2023
👍12
Programming Linux Anti-Reversing Techniques by Jacob Baines, Leanpub book
Programming Linux Anti-Reversing Techniques teaches the reader how to code and analyze well known anti-reversing techniques for Linux. The book shows how a reverse engineer analyzes a binary using tools like IDA, Radare2, GDB, readelf, and more.
The code is presented to the reader ready to compile and analyze on their own.
#linux #reverse
Programming Linux Anti-Reversing Techniques teaches the reader how to code and analyze well known anti-reversing techniques for Linux. The book shows how a reverse engineer analyzes a binary using tools like IDA, Radare2, GDB, readelf, and more.
The code is presented to the reader ready to compile and analyze on their own.
#linux #reverse
👍5🔥1🤔1
Programming Linux Anti-Reversing Technique.pdf
935.3 KB
Programming Linux Anti-Reversing Techniques by Jacob Baines, Leanpub book
👍7🔥1
Network Security, Firewalls, and VPNs by J. Michael Stewart, Denise Kinsey, 3rd Edition, 2020
Third Edition provides a unique, in-depth look at the major business challenges and threats that are introduced when an organization’s network is connected to the public Internet. Written by industry experts, this book provides a comprehensive explanation of network security basics, including how hackers access online networks and the use of Firewalls and VPNs to provide security countermeasures. Using examples and exercises, this book incorporates hands-on activities to prepare the reader to disarm threats and prepare for emerging technologies and future attacks.
#book #cisco
Third Edition provides a unique, in-depth look at the major business challenges and threats that are introduced when an organization’s network is connected to the public Internet. Written by industry experts, this book provides a comprehensive explanation of network security basics, including how hackers access online networks and the use of Firewalls and VPNs to provide security countermeasures. Using examples and exercises, this book incorporates hands-on activities to prepare the reader to disarm threats and prepare for emerging technologies and future attacks.
#book #cisco
👍5
Network Security, Firewall and VPNs.pdf
26.2 MB
Network Security, Firewalls, and VPNs by J. Michael Stewart, Denise Kinsey, 3rd Edition, 2020
👍6