Computer Security


Ghost in the Wires: My Adventures as the World's Most Wanted Hacker
The Art of Deception: Controlling the Human Element of Security
Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon
The Cuckoo's Egg: Tracking a Spy Through the Maze of Computer Espionage
The Web Application Hacker's Handbook: Discovering and Exploiting Security Flaws
Secrets and Lies: Digital Security in a Networked World
Digital Fortress
Hacking: The Art of Exploitation w/CD
Applied Cryptography: Protocols, Algorithms, and Source Code in C
Kingpin: How One Hacker Took Over the Billion-Dollar Cybercrime Underground
Sandworm: A New Era of Cyberwar and the Hunt for the Kremlin's Most Dangerous Hackers
Hacking Exposed: Network Security Secrets & Solutions
Metasploit: The Penetration Tester's Guide
The Shellcoder's Handbook: Discovering and Exploiting Security Holes
Gray Hat Hacking : The Ethical Hacker's Handbook
There is no perfect security, only maximum temporary security
Gun Gun Febrianza

Ian Lamont
Dropbox users themselves may be the source of security problems. If you are sharing a folder with 100 users, a couple of them are bound to be using easily guessed passwords to guard their accounts (the names of pets or first-born children, 'password', etc.). Sharing links can also lead to problems, if the wrong link is shared or someone posts the link online or in some other public forum. ...more
Ian Lamont, Dropbox In 30 Minutes

More quotes...
This group is about sharing the latest and greatest innovations from Google Cloud, one of the la…more
1 member, last active one year ago
Infosec NZ reading group
1 member, last active 6 years ago