Log In
Or create an account -> 
Imperial Library
  • Home
  • About
  • News
  • Upload
  • Forum
  • Help
  • Login/SignUp

Index
 Acknowledgments  Introduction
Who Is This Book For? What’s in This Book Online Resources
1. Patching
Upgrading Third-Party Libraries and Software Library Inventory Network Inventory Patching Windows Finding Published Vulnerabilities Testing Your Patches If Patching Hurts, Do It More Often A Practical Application of Fear What’s Next?
2. Vulnerabilities
SQL Injection Cross-Site Scripting (XSS) Cross-Site Request Forgery (XSRF) Misconfiguration Suggested Reading What’s Next?
3. Cryptography
Don’t Roll Your Own Crypto Don’t Use Low-Level Crypto Libraries Evaluating Crypto Libraries Without Being a Crypto Expert Password Storage Storing Passwords When You’re the Client Minimizing the Cost of Credential Loss Keeping Passwords Hard to Predict TLS Configuration What’s Next?
4. Windows
Windows Users Login and Mimikatz Password Policy Active Directory: What Else Is It Good For? BitLocker What’s Next?
5. Phishing
Types of Phishing Attacks Social Defense Don’t DIY DNS-Based Defense Authentication-Based Defense In-Application Defense Got Phished. Now What? Wrapping Up
 Bibliography
  • ← Prev
  • Back
  • Next →
  • ← Prev
  • Back
  • Next →

Chief Librarian: Las Zenow <zenow@riseup.net>
Fork the source code from gitlab
.

This is a mirror of the Tor onion service:
http://kx5thpx2olielkihfyo4jgjqfb7zx7wxr3sd4xzt26ochei4m6f7tayd.onion