white2hack 📚 – Telegram
white2hack 📚
12.4K subscribers
4.8K photos
135 videos
1.96K files
2.26K links
Кибербез. Книги, гайды, how to, ликбез. Аналитика, тренды, карьера, эвенты. Этичный хакинг и защита своих данных

🔊 Связь @w2hack_feed_bot
💬 Чат https://news.1rj.ru/str/+VdkEIWudTi5m3dsA
💡 Консультация https://forms.gle/iB9iX3BwyxJM4Ktx5
🏛 Обмен -- private --
Download Telegram
The SELINUX COLORING BOOK - It's raining cats and dogs" by Dan Walsh

A coloring book to help folks understand how SELinux works. Based on an opensource[.]com article by Dan Walsh that is available here.

Official page
GitHub

#linux #fun
😁6👍2🔥1
SELinuxColoringBook.pdf
2.3 MB
The SELINUX COLORING BOOK - It's raining cats and dogs" by Dan Walsh
👍7🔥1
Digital Forensics with Open Source Tools by Harlan Carvey, Cory Altheide, 1st Edition, 2011

Written by world-renowned forensic practitioners, this book uses the most current examination and analysis techniques in the field. It consists of 9 chapters that cover a range of topics such as:
(+) the open source examination platform;
(+) disk and file system analysis;
(+) Windows systems and artifacts;
(+) Linux systems and artifacts;
(+) Mac OS X systems and artifacts;
(+) Internet artifacts; and automating analysis and extending capabilities.

The book lends itself to use by students and those entering the field who do not have means to purchase new tools for different investigations.

#book #forensic
👍5
Digital forensics .pdf
4.2 MB
Digital Forensics with Open Source Tools by Harlan Carvey, Cory Altheide, 1st Edition, 2011
👍6
Pass The Python Interview: 69 Python Coding Questions, Solutions and Explanations by Lionel Osamba, 2023

Learn about the computer science concepts of data structures and algorithms and build implementations of each from scratch in modern Python.

Includes Python, Interview Questions, Data Structures, Big O, Recursion, Sort and Search Algorithms, and more.

#python #book #world
👍7
Pass.The.Python.Interview.pdf
13.7 MB
Pass The Python Interview: 69 Python Coding Questions, Solutions and Explanations by Lionel Osamba, 2023
👍12
Programming Linux Anti-Reversing Techniques by Jacob Baines, Leanpub book

Programming Linux Anti-Reversing Techniques teaches the reader how to code and analyze well known anti-reversing techniques for Linux. The book shows how a reverse engineer analyzes a binary using tools like IDA, Radare2, GDB, readelf, and more.

The code is presented to the reader ready to compile and analyze on their own.

#linux #reverse
👍5🔥1🤔1
Programming Linux Anti-Reversing Technique.pdf
935.3 KB
Programming Linux Anti-Reversing Techniques by Jacob Baines, Leanpub book
👍7🔥1
OpenCRE is an interactive content linking platform for uniting security standards and guidelines into one overview.

It offers easy and robust access to relevant information when designing, developing, testing, procuring and organising secure software.

Source

#useful #docs
👍5
Узнаете?😄

#fun
😁35👍8🤣2
Network Security, Firewalls, and VPNs by J. Michael Stewart, Denise Kinsey, 3rd Edition, 2020

Third Edition provides a unique, in-depth look at the major business challenges and threats that are introduced when an organization’s network is connected to the public Internet. Written by industry experts, this book provides a comprehensive explanation of network security basics, including how hackers access online networks and the use of Firewalls and VPNs to provide security countermeasures. Using examples and exercises, this book incorporates hands-on activities to prepare the reader to disarm threats and prepare for emerging technologies and future attacks.

#book #cisco
👍5
Network Security, Firewall and VPNs.pdf
26.2 MB
Network Security, Firewalls, and VPNs by J. Michael Stewart, Denise Kinsey, 3rd Edition, 2020
👍6
Malware Sandboxing (Build your own Sandbox) by Mostafa Yahia

The guide provides an introduction to both static and dynamic malware analysis tools and techniques, which can be useful for SOC analysts, information security analysts, and investigators who want to learn how to perform initial malware analysis.

By following the steps outlined in this guide, you can learn how to build your own sandbox and use various tools to analyze malware.

This knowledge can help you better understand the behavior of malware and how to detect and respond to it in a timely manner.

#malware
👍5