Key Logger


Download Key Logger PDF/ePub or read online books in Mobi eBooks. Click Download or Read Online button to get Key Logger book now. This website allows unlimited access to, at the time of writing, more than 1.5 million titles, including hundreds of thousands of titles in various foreign languages.

Download

101 Spy Gadgets for the Evil Genius


101 Spy Gadgets for the Evil Genius

Author: Brad Graham

language: en

Publisher: McGraw Hill Professional

Release Date: 2010-07-11


DOWNLOAD





101 projects that appeal to the spy in you Utilizing inexpensive, easily obtainable components, you can build the same information gathering, covert sleuthing devices used by your favorite film secret agent. Projects range from simple to sophisticated and come complete with a list of required parts and tools, numerous illustrations, and step-by-step assembly instructions. Projects include: scanners and radios, night vision devices, telephone devices, computer monitoring, audio eavesdropping, hidden cameras, video transmitters, and more

Ninja Hacking


Ninja Hacking

Author: Thomas Wilhelm

language: en

Publisher: Elsevier

Release Date: 2010-11-02


DOWNLOAD





Ninja Hacking offers insight on how to conduct unorthodox attacks on computing networks, using disguise, espionage, stealth, and concealment. This book blends the ancient practices of Japanese ninjas, in particular the historical Ninjutsu techniques, with the present hacking methodologies. It looks at the methods used by malicious attackers in real-world situations and details unorthodox penetration testing techniques by getting inside the mind of a ninja. It also expands upon current penetration testing methodologies including new tactics for hardware and physical attacks. This book is organized into 17 chapters. The first two chapters incorporate the historical ninja into the modern hackers. The white-hat hackers are differentiated from the black-hat hackers. The function gaps between them are identified. The next chapters explore strategies and tactics using knowledge acquired from Sun Tzu's The Art of War applied to a ninja hacking project. The use of disguise, impersonation, and infiltration in hacking is then discussed. Other chapters cover stealth, entering methods, espionage using concealment devices, covert listening devices, intelligence gathering and interrogation, surveillance, and sabotage. The book concludes by presenting ways to hide the attack locations and activities. This book will be of great value not only to penetration testers and security professionals, but also to network and system administrators as well as hackers. - Discusses techniques used by malicious attackers in real-world situations - Details unorthodox penetration testing techniques by getting inside the mind of a ninja - Expands upon current penetration testing methodologies including new tactics for hardware and physical attacks

Computer Security Literacy


Computer Security Literacy

Author: Douglas Jacobson

language: en

Publisher: CRC Press

Release Date: 2016-04-19


DOWNLOAD





Computer users have a significant impact on the security of their computer and personal information as a result of the actions they perform (or do not perform). Helping the average user of computers, or more broadly information technology, make sound security decisions, Computer Security Literacy: Staying Safe in a Digital World focuses on practica