-
Archives
- August 2024
- January 2024
- December 2023
- September 2023
- July 2023
- March 2023
- August 2022
- January 2022
- October 2021
- October 2020
- May 2020
- March 2020
- November 2018
- September 2017
- October 2016
- December 2015
- September 2015
- January 2015
- November 2014
- July 2014
- April 2014
- March 2014
- December 2013
- November 2013
- October 2013
- September 2013
- July 2013
- June 2013
- May 2013
- April 2013
- March 2013
- November 2012
- October 2012
- July 2012
- June 2012
- April 2012
- February 2012
- January 2012
- December 2011
- November 2011
- October 2011
- September 2011
- July 2011
- June 2011
- May 2011
- April 2011
- March 2011
- February 2011
- January 2011
- December 2010
- November 2010
- October 2010
- September 2010
- August 2010
- July 2010
- June 2010
- May 2010
- March 2010
- February 2010
- January 2010
- December 2009
- November 2009
-
Meta
Category Archives: Books
The Ten Top Computer Science Papers You Must Read
Alan Turing (1937) On Computable Numbers, with an Application to the Entscheidungsproblem Vannevar Bush (1945) As We May Think Claude Elwood Shannon (1948) A Mathematical Theory of Communication Alan Turing (1950) COMPUTING MACHINERY AND INTELLIGENCE THOMAS J. McCABE (1976) A … Continue reading
Posted in Books, Business, Security, Technology
Tagged Book, Computer Science, CyberSecurity, Information Security, Software Security
Leave a comment
Book Review: PoC||GTFO
Yes, I’m back to blogging and doing a book review. I guess better late than never 🙂 This time I’m reviewing the holy hacker book: International Journal of Proof-of-Concept or Get The Fuck Out (PoC||GTFO, ISBN-13: 978-1-59327-880-9). The book sums … Continue reading
Posted in Books, Pentest, Privacy, Security, Technology
Tagged Book, exploit, Information Security, Penetration Testing, Poc||GTFO, Software Security
2 Comments
Book Review: iOS Hacker’s Handbook
I have been wanting to read this book for a long time, finally I managed to make time and I have to admit that it has exceeded my expectations. This magnificent work written by reputed experts in iOS, one of … Continue reading
Posted in Books, Pentest, Security, Technology
Tagged apple, Application Security, Book, exploit, Fuzzing, iOS, Penetration Testing, Reverse Engineering, Smartphone
Leave a comment
Book Review: Mob Rules. What the Mafia Can Teach the Legitimate Businessman
While reading the book synopsis, we realize that this is not the typical book of how to succeed in business. Written by Louis Ferrante, former mobster of the Gambino family and converted writer, compare us the structure of the mafia … Continue reading
Book Review: The IDA Pro Book, 2nd edition
If you like reverse engineering and want to learn all the secrets of IDA Pro, this is your book. This work written by Chris Eagle, a top expert on the subject, reveals the power of the best tool for reverse … Continue reading
Posted in Books, Pentest, Security, Technology
Tagged Application Security, Book, Book Review, RE, Reverse Engineering, Reversing, Software Security
Leave a comment
Book Review Week: Practical Lock Picking: A Physical Penetration Tester’s Training Guide
[Español] Nuestras habilidades ofensivas no están completas sin algo de conocimiento sobre seguridad fÃsica y este libro rellena ese vacÃo. Practical Lock Picking: A Physical Penetration Tester’s Training Guide (ISBN-13: 978-1597496117) escrito por Deviant Ollam, todo un maestro en la … Continue reading
Posted in Books, Hacking, Pentest, Security, Technology
Tagged attack vector, Book, hacker, Information Security, LockPicking, Penetration Testing
Leave a comment
Book Review Week: Hacking Exposed Malware & Rootkits
[Español] Este libro de la mÃtica serie Hacking Exposed está orientado al tema del malware y rootkits, en concreto su identificación y eliminación a lo largo de sus tres apartados, que se dividen en once capÃtulos y un estupendo apéndice. … Continue reading
Posted in Books, Hacking, Pentest, Security, Technology
Tagged attack vector, Book, exploit, Information Security, malware, Penetration Testing, Rootkits, Software Security
Leave a comment
Book Review Week: A Guide to Kernel Exploitation: Attacking the Core
[Español] Con cada nueva versión los sistemas operativos incorporan mejores defensas a nivel de usuario dificultando su explotación y por ello los atacantes han enfocado sus esfuerzos al núcleo (kernel), una temática desconocida para muchos pero la llegada de este … Continue reading
Posted in Books, Hacking, Pentest, Security, Technology
Tagged attack vector, Book, exploit, Information Security, Penetration Testing, Software Security
Leave a comment
Book Review Week: Rootkits: Subverting the Windows Kernel
[Español] El arte de los rootkits es fascinante y este libro nos adentra en este arte de forma amena a lo largo de sus diez capÃtulos con diferentes ejemplos para crear poderosos rootkits en Windows. Rootkits: Subverting the Windows Kernel … Continue reading
Posted in Books, Hacking, Pentest, Security, Technology
Tagged Book, Cyber Wars, Information Security, Information Warfare, malware, Penetration Testing, Rootkits, Software Security
Leave a comment
Book Review Week: Fuzzing for Software Security Testing and Quality Assurance
[Español] Fuzzing es posiblemente el método más utilizado hoy en dÃa para buscar vulnerabilidades y este libro nos demuestra cómo hacerlo a lo largo de sus nueve capÃtulos. Fuzzing for Software Security Testing and Quality Assurance (ISBN-13: 978-1596932142) está escrito … Continue reading
Posted in Books, Hacking, Pentest, SDL, Security, Technology
Tagged attack vector, Book, Fuzzing, Information Security, Penetration Testing, SDL, Software Security
Leave a comment