Anonymous Connections Based on Onion Routing: A Review and a Visualization Tool by AlQahtani (2015)

Anonymity of persons and services on the Internet has been an area of growing interest in academia and industry. In this paper, we review work on visualization tools for teaching information security and assurance. [Read More]

Smart Contract Development With Solidity and Ethereum: Building Smart Contracts Blockchain by Akhil Mittal (2020)

Create, develop and deploy a Smart Contract with easeKEY FEATURESáÊ Familiarize yourself with Blockchain terminology and its conceptsáÊ Understand and implement the Cryptography basic principlesáÊ Understand the life cycle of an Ethereum TransactionÊáÊ Explore and work with Dapps on Ethereum. [Read More]

The IoT Hacker's Handbook by Aditya Gupta (2019)

The IoT Hacker’s Handbook Take a practioner’s approach in analyzing the Internet of Things (IoT) devices and the security issues facing an IoT architecture. You’ll review the architecture’s central components, from hardware communication interfaces, such as UARTand SPI, to radio protocols, such as BLE or ZigBee. [Read More]

Identifying Malicious Code Through Reverse Engineering by Abhishek Singh (2009)

Identifying Malicious Code Through Reverse Engineering Attacks take place everyday with computers connected to the internet, because of worms, viruses or due to vulnerable software. These attacks result in a loss of millions of dollars to businesses across the world. [Read More]

Improving your Penetration Testing Skills by Abhinav Singh (2019)

Improving your Penetration Testing Skills Evade antiviruses and bypass firewalls with the most widely used penetration testing frameworks Key FeaturesGain insights into the latest antivirus evasion techniques Set up a complete pentesting environment using Metasploit and virtual machines Discover a variety of tools and techniques that can be used with Kali LinuxBook DescriptionPenetration testing or ethical hacking is a legal and foolproof way to identify vulnerabilities in your system. [Read More]

The role of crypto-currency in cybercrime by Aaron Higbee (2018)

The role of crypto-currency in cybercrime. The first crypto-currency appeared in 2009 when Bitcoin was born. Since then, numerous others have entered the market. The market for crypto-currencies has been incredibly volatile and, at its peak in 2017, one bitcoin was worth over $11,200, although it is now suffering from sustained losses in 2018. [Read More]

Reverse Engineering: Recent Advances and Applications by A. C. Telea (2012)

Reverse Engineering: Recent Advances and Applications Reverse engineering encompasses a wide spectrum of activities aimed at extracting information on the function, structure, and behavior of man-made or natural artifacts. Increases in data sources, processing power, and improved data mining and processing algorithms have opened new fields of application for reverse engineering. [Read More]

Machine Learning for Dummies by John Paul Mueller (2021)

One of Mark Cuban’s top reads for better understanding A.I. (inc.com, 2021) Your comprehensive entry-level guide to machine learning While machine learning expertise doesn’t quite mean you can create your own Turing Test-proof android—as in the movie Ex Machina—it is a form of artificial intelligence and one of the most exciting technological means of identifying opportunities and solving problems fast and on a large scale. [Read More]