Discover the best Security books and stories. Read Security books and stories your like for free with a free account.
The online removal process of your personal information, such as a home address or telephone number, is usually quite ea
126 114 678KB Read more
You are about to undertake a journey into the mysterious world of cryptography. If you are like me, and you find the exp
186 44 8MB Read more
Follow the clues, track down the bad actors trying to access your systems, and uncover the chain of evidence left by eve
110 70 23MB Read more
Learn how to use Ghidra to analyze your code for potential vulnerabilities and examine both malware and network threats
130 95 46MB Read more
119 45 23MB Read more
This book provides a holistic overview of current state of the art and practice in malware research as well as the chall
125 107 52MB Read more
151 68 26MB Read more
This practical book introduces open-source intelligence (OSINT) and explores how it can be executed in different intelli
128 80 15MB Read more
Electronic Access Control, Second Edition provides the latest advice on how to interface systems from multiple Electroni
123 76 16MB Read more
Master the skills you need to conduct a successful digital investigation with Nelson/Phillips/Steuart's GUIDE TO CO
221 97 43MB Read more
This book proposes robust solutions for securing a network against intrusions for data privacy and safety. It includes t
124 48 11MB Read more
120 31 35MB Read more
Secure your Amazon Web Services (AWS) infrastructure with permission policies, key management, and network security, whi
366 33 34MB Read more
RedTech Hacking Shop Ideal para quienes tienen en sus manos la poderosa piña Mark V y desean aprender a usar esta herram
132 83 71MB Read more
The best collection of hardware gadgets for Red Team hackers, pentesters and security researchers! It covers more than o
120 23 12MB Read more
Learn the basics of the WiFi Pineapple 7th Gen: Mark VII / Enterprise — from Campaigns and Reports to Recon and the Pine
112 66 54MB Read more
The USB Rubber Ducky is a keystroke injection tool disguised as a generic flash drive. Computers recognize it as a regul
132 45 18MB Read more
Learn the essentials of Ethernet hotplug attacks, network scanning, and payload management with the Shark Jack. Includes
128 113 19MB Read more
Learn the essentials of covert video interception with the Screen Crab.
103 18 838KB Read more
Learn the essentials of Ethernet man-in-the-middle attacks, reverse shells and VPN tunneling with the Packet Squirrel. I
125 23 21MB Read more
Learn the essentials of the LAN Turtle in this guide to the Remote Access Toolkit. From Setup to the module system and s
124 85 1018KB Read more
Learn the essentials of keylogging, keystroke injection, payload match/trigger logic and best practices with the Key Cro
108 10 12MB Read more
Bash Bunny: A Guide to the HotPlug Attack Platform, version 22.03. Learn the essentials of hotplug attacks and automat
116 104 31MB Read more
128 95 12MB Read more