Learn how to build an interactive source code analytics system using Roslyn and Javascr ipt. This concise 150 page book will help you create and use practical code analysis tools utilizing the new features of Microsoft’s Roslyn compiler to understan
Metasploit Bootcamp by Nipun Jaswal English | 25 May 2017 | ASIN: B0725ZGX9H | 230 Pages | AZW3 | 16.52 MB Key Features A fast-paced guide that will quickly enhance your penetration testing skills in just 7 days Carry out penetration testing in comp
windows 内存分析的书,Memory forensics provides cutting edge technology to help investigate digital attacks Memory forensics is the art of analyzing computer memory (RAM) to solve digital crimes. As a follow-up to the best seller Malware Analyst's Cookbook
The Definitive Guide to File System Analysis: Key Concepts and Hands-on Techniques Most digital evidence is stored within the computer's file system, but understanding how file systems work is one of the most technically challenging concepts for a d
The purpose of this book is to remedy this lack of knowledge and integrate an assortment of deductive and inductive tools, techniques, and technologies for chief information officers; federal, state, local, and military law enforcement personnel; le
All you need for this book is a Linux workstation with a Python 2.7 environment and a working Internet connection. Chapter 1, Setting Up the Lab and Introduction to Python ctypes, will guide you through the installation of the additional Python modu
人工搬运的STC编码源码,做信息隐藏的可以看一下,实现了论文 Tomas Filler, Jan Judas, Jessica Fridrich "Minimizing Embedding Impact in Steganography using Trellis-Coded Quantization", Proc. SPIE, Electronic Imaging, Media Forensics and Security XII, San Jose, CA, January 18-20,
The purpose of 2017 International Conference on Security with Intelligent Computing and Big-data Services (SICBS’17 for short) with joined workshops, Workshop on Information and Communication Security Science and Engineering and Workshop on Security
Using a well-conceived incident response plan in the aftermath of an online security breach enables your team to identify attackers and learn how they operate. But, only when you approach incident response with a cyber threat intelligence mindset wi
英文高清文字版 Foreword by Charlie Miller xv Preface xvii Acknowledgments xix Chapter 1: Setting Up Your Python Environment 1 Chapter 2: The Network: Basics 9 Chapter 3: The Network: Raw Sockets and Sniffing 35 Chapter 4: Owning the Network with Scapy 47 C
What You’ll Learn Review communicating policies and requirements for use of iPhones Keep your iPhone safe in the physical world Connect to the Internet securely Explore strategies for keeping your data safe including backing up and screen locks
Abstract: In a world where security issues have been gaining growing importance, face recognition systems have attracted increasing attention in multiple application areas, ranging from forensics and surveillance to commerce and entertainment. To he