+

Tagged With / 'CIA'

August 24, 2011

9781597496278_Faircloth

Penetration Tester’s Open Source Toolkit, Third Edition

Penetration Tester’s Open Source Toolkit, Third Edition By Jeremy Faircloth Publisher: Syngress July 2011 U.S., August 2011 EMEA www.syngress.com Description Great commercial penetration testing tools can be very expensive and sometimes hard to use or of questionable accuracy. This book helps solve both of these problems. The open source, no-cost penetration testing tools presented do […]

Read more

August 24, 2011

9781597495745

Review of Managed Code Rootkits

Managed Code Rootkits: Hooking into Runtime Environments By Aby Rao, CISSP, CISA, Security+, ITIL-F, ISO/IEC 20000, Project+ www.syngress.com   I must admit that I didn’t know a whole lot about rootkit attacks, other than what I had read for my CISSP exam. Being a web application security analyst, I seldom deal with these types of […]

Read more

August 23, 2011

9781439824993

Security Patch Management

Security Patch Management By Felicia Nicastro April  2011 Publisher: CRC Press http://www.crcpress.com/product/isbn/9781439824993   50% DISCOUNT for Hakin9 SUBSCRIBERS!!! To save 50% enter given below discount code, during checkout at www.crcpress.com. Although the patch management process is neither exceedingly technical nor extremely complicated, it is still perceived as a complex issue that’s often left to the […]

Read more

August 23, 2011

freecover

Practical Eavesdropping of Control Data From EPC Gen2 Queries With a Programmable RFID Toolkit

READ THE WHOLE ARTICLE Like in many other emerging technologies, security threats can target the unprotected wireless channel used between RFID readers and tags to exchange information. We present a practical eavesdropping attack to capture control data exchanged between a standard EPC Gen2 reader and a series of EPC Gen2 tags. We assume that the attacker […]

Read more

August 23, 2011


Data Protection in the Financial Services Sector 2011

Data Protection in the Financial Services Sector 2011 (DPFS) is the only global summit of its kind providing incisive, niche information to financial services professionals with responsibility for data protection in a unique, interactive format.           This year’s event will provide quality information and guidance through:  Workshops Facilitated networking session Q&A […]

Read more

August 23, 2011

DDOS Attacks

Hakin9 StarterKit 2/2011 – DDOS Attacks

The DDOS, a New „Old” Type of Attack! by Orlando Pivi In this article, Orlando presents the DDoS attack structure and the Botnet structure . He will explore DDoS attack, the Botnet prevention and the DoS defense systems. He discovers what the mainly motivations pushing hackers to commit criminals act with Botnets and DoS is. […]

Read more

August 23, 2011


ISWEC 2012

Infosecurity World Exhibition & Conference 2012 is the world’s fully integrated trade show targeted exclusively towards the information security industry whilst incorporating three specialized showcases; Data Storage Showcase 2012, Cloud Computing Showcase 2012, and Software Development Showcase 2012. This event is also due to run concurrently with the InfoSec Asia 2012 conference. Date  of the […]

Read more

August 20, 2011

NOTICE BOARD admin Comments Off
BAHA_logo

Bay Area Hacker’s Association

Are you looking for more security information? The Bay Area Hacker’s Association has recently been founded in the Bay Area. Our group gives presentations and facilitates discussions about computer security. We meet in San Francisco, every second Sunday at 2pm, at the Noisebridge hackerspace (2169 Mission Street). We also have an open mailing list that […]

Read more

August 19, 2011

9780849379413

Security of Mobile Communications

Security of Mobile Communications Noureddine Boudriga July 2009 Publisher: CRC Press http://www.crcpress.com/product/isbn/9780849379413   50% DISCOUNT for Hakin9 SUBSCRIBERS!!! To save 50% enter given below discount code, during checkout at www.crcpress.com. Description The explosive demand for mobile communications is driving the development of wireless technology at an unprecedented pace. Unfortunately, this exceptional growth is also giving […]

Read more

August 17, 2011

cover yury

To Get Round To The Heart Of Fortress

READ THE WHOLE ARTICLE Cybercrime is becoming a growing threat to society. The thefts of information, crashing a website or manipulating online payment traffic are also increasing. Many organizations offer various services in the battle against digital crime, such as network or data monitors and extractions tools. It is interesting mainly to authorities and financial […]

Read more

August 17, 2011


Are We Ready For Digital Evidence?

Are we ready for digital evidence? It’s a question that we need to ask more often as crimes will inevitably include forensic evidence gathered from a computer or other digital device on a more consistent basis. Similarly, we still live in a world where we think the computer and what we do on it or […]

Read more

August 17, 2011


Forensic Improvisation

Forensic Improvisation is the concept to capture important intelligence using the available tools at hand and not necessarily the desired toolset. Think of it as guerrilla forensics without the idea of warfare. There is a myriad of ready to burn LiveCD/DVD/USB forensic toolsets that suit the job nicely but that would require training, planning and […]

Read more

IT MAGAZINES: Hakin9 Magazine | Pentest Magazine | eForensics Magazine | Software Developer's Journal | Hadoop Magazine | Java Magazine
IT Blogs: Hakin9 Magazine Blog | Pentest Magazine Blog | eForensics Magazine Blog | Software Developer's Journal Blog | Hadoop Magazine Blog | Java Magazine Blog
IT ONLINE COURSES: Pentest Laboratory
JOB OFFERS FOR IT SPECIALIST: Jobs on Hakin9 Magazine | Jobs on Pentest Magazine | Jobs on eForensics Magazine | Jobs on Software Developer's Journal | Jobs on Java Magazine | Jobs on Hadoop Magazine
Hakin9 Media Sp. z o.o. Sp. komandytowa ul. Postępu 17D, 02-676 Warszawa