Log In
Or create an account -> 
Imperial Library
  • Home
  • About
  • News
  • Upload
  • Forum
  • Help
  • Login/SignUp

Index
Cover Title Page Table of Contents Foreword Introduction 1 What Type of Hacker Are You?
Most Hackers Aren’t Geniuses Defenders Are Hackers Plus Hackers Are Special Hackers Are Persistent Hacker Hats
2 How Hackers Hack
The Secret to Hacking Hacking Ethically
3 Profile: Bruce Schneier
For More Information on Bruce Schneier
4 Social Engineering
Social Engineering Methods Social Engineering Defenses
5 Profile: Kevin Mitnick
For More Information on Kevin Mitnick
6 Software Vulnerabilities
Number of Software Vulnerabilities Why Are Software Vulnerabilities Still a Big Problem? Defenses Against Software Vulnerabilities Perfect Software Won’t Cure All Ills
7 Profile: Michael Howard
For More Information on Michael Howard
8 Profile: Gary McGraw
For More Information on Gary McGraw
9 Malware
Malware Types Number of Malware Programs Mostly Criminal in Origin Defenses Against Malware
10 Profile: Susan Bradley
For More Information on Susan Bradley
11 Profile: Mark Russinovich
For More on Mark Russinovich
12 Cryptography
What Is Cryptography? Why Can’t Attackers Just Guess All the Possible Keys? Symmetric Versus Asymmetric Keys Popular Cryptography Hashes Cryptographic Uses Cryptographic Attacks
13 Profile: Martin Hellman
For More Information on Martin Hellman
14 Intrusion Detection/APTs
Traits of a Good Security Event Message Advanced Persistent Threats (APTs) Types of Intrusion Detection Intrusion Detection Tools and Services
15 Profile: Dr. Dorothy E. Denning
For More Information on Dr. Dorothy E. Denning
16 Profile: Michael Dubinsky
For More Information on Michael Dubinsky
17 Firewalls
What Is a Firewall?
18 Profile: William Cheswick
For More Information on William Cheswick
19 Honeypots
What Is a Honeypot? Interaction Why Use a Honeypot? Catching My Own Russian Spy Honeypot Resources to Explore
20 Profile: Lance Spitzner
For More Information on Lance Spitzner
21 Password Hacking
Authentication Components Hacking Passwords Password Defenses
22 Profile: Dr. Cormac Herley
For More Information on Dr. Cormac Herley
23 Wireless Hacking
The Wireless World Types of Wireless Hacking Some Wireless Hacking Tools Wireless Hacking Defenses
24 Profile: Thomas d’Otreppe de Bouvette
For More Information on Thomas d’Otreppe de Bouvette
25 Penetration Testing
My Penetration Testing Highlights How to Be a Pen Tester
26 Profile: Aaron Higbee
For More Information on Aaron Higbee
27 Profile: Benild Joseph
For More Information on Benild Joseph
28 DDoS Attacks
Types of DDoS Attacks DDoS Tools and Providers DDoS Defenses
29 Profile: Brian Krebs
For More Information on Brian Krebs
30 Secure OS
How to Secure an Operating System Security Consortiums
31 Profile: Joanna Rutkowska
For More Information on Joanna Rutkowska
32 Profile: Aaron Margosis
For More Information on Aaron Margosis
33 Network Attacks
Types of Network Attacks Network Attack Defenses
34 Profile: Laura Chappell
For More Information on Laura Chappell
35 IoT Hacking
How Do Hackers Hack IoT? IoT Defenses
36 Profile: Dr. Charlie Miller
For More Information on Dr. Charlie Miller
37 Policy and Strategy
Standards Policies Procedures Frameworks Regulatory Laws Global Concerns Systems Support
38 Profile: Jing de Jong‐Chen
For More Information on Jing de Jong‐Chen
39 Threat Modeling
Why Threat Model? Threat Modeling Models Threat Actors
40 Profile: Adam Shostack
For More Information on Adam Shostack
41 Computer Security Education
Computer Security Training Topics Training Methods
42 Profile: Stephen Northcutt
For More Information on Stephen Northcutt
43 Privacy
Privacy Organizations Privacy‐Protecting Applications
44 Profile: Eva Galperin
For More Information on Eva Galperin
45 Patching
Patching Facts Common Patching Problems
46 Profile: Window Snyder
For More Information on Window Snyder
47 Writing as a Career
Computer Security Writing Outlets Professional Writing Tips
48 Profile: Fahmida Y. Rashid
For More Information on Fahmida Y. Rashid
49 Guide for Parents with Young Hackers
Signs Your Kid Is Hacking Not All Hacking Is Bad How to Turn Around Your Malicious Hacker
50 Hacker Code of Ethics
Hacker Code of Ethics
End User License Agreement
  • ← Prev
  • Back
  • Next →
  • ← Prev
  • Back
  • Next →

Chief Librarian: Las Zenow <zenow@riseup.net>
Fork the source code from gitlab
.

This is a mirror of the Tor onion service:
http://kx5thpx2olielkihfyo4jgjqfb7zx7wxr3sd4xzt26ochei4m6f7tayd.onion