Don’t Be Mocked, Secure Your System 05/12

BlackBerry Playbook – New Challenges by Yury Chemerkin This approach mainly based on examines how many differences do exist between BlackBerry OS and new BlackBerry OS based on QNX OS. It highlights whether one techniques provide more easy implementation, investigation…


Low Tech Hacking, CISSP, Network Scanning E-book 04/12

1. Look Away From the Monitor; You’re Under Attack by Low-tech and No-tech Hackers. By Eric Lahoda Reliance on highly technical defensive technology can lead to a false sense of security. A typical IT security department focuses most its attention…

Defend Yourself! Hands-on Cryptography

Defend Yourself! Hands-on Cryptography

RSA algorithm by Andrzej Chmielowiec We will explain the methods of attacking this popular public-key algorithm. Its 35-year history showed that RSA provides sufficient security only when it is implemented in accordance with the latest norms and standards. It has…


The Guide to Nmap 02/2012

Dear Hakin9 followers: This month we have decided to devote the current issue to Nmap. Some of you have most likely used Nmap sometime or another, while others use it on a daily basis for network discovery and security auditing….

Public Key Cryptostructure - Hakin9 E-book 1/2012

Public Key Cryptostructure – Hakin9 E-book 1/2012

Dear Readers. In our attempt to become more accessible to you and meet the challenges and expectations of the ever-changing tech world, this E-book is available in both .pdf and .epub formats, contained within a single .rar file. Data Encryption…


Get 20 % discount NOW!

Huge discounts on security books from Feisty Duck! Feisty Duck is providing all readers of Hakin9 with a special discount for additional 20% off our current prices. Use code HAKIN9MS for 45% off list price for ModSecurity Handbook Use code…


Review of Vulnerability Management

Review of Vulnerability Management By Aby Rao, CISSP, CISA, ITIL, Security+, ISO/IEC 20000 http://www.crcpress.com/product/isbn/9781439801505   Imagine this: You are a Security Engineer in a medium-size company and you are invited into your bosses’ office for an important one-on-one meeting. Your…


Vulnerability Management

Vulnerability Management By Park Foreman August 2009 Publisher: CRC Press http://www.crcpress.com/product/isbn/9781439801505   50% DISCOUNT for Hakin9 SUBSCRIBERS!!! To save 50% enter given below discount code, during checkout at www.crcpress.com. Description As old as the threat of danger itself, vulnerability management…