4. Block Ciphers

1 year ago 97 Views

6 Analyzing Android Applications (Part 2)

1 year ago 33 Views

4 Getting Started & 5 Leads

1 year ago 91 Views

3. Cryptographic Security

1 year ago 58 Views

Bitcoin and Blockchains

1 year ago 40 Views

Ch 18: Source Code Auditing

1 year ago 149 Views

Ch 16 & 17 Fault Injection & Fuzzing

2 years ago 165 Views

Ch 12 Attacking Users - XSS

2 years ago 205 Views

Ch 10: Attacking Back-End Components

2 years ago 204 Views

L7 64-bit Assembler

2 years ago 98 Views

4. Communication and Network Security

2 years ago 120 Views

Ch 9 Attacking Data Stores (Part 2)

2 years ago 159 Views

Ch 6: The Wild World of Windows

2 years ago 145 Views

3. Security Engineering

2 years ago 167 Views

Ch 7: Attacking Session Management

2 years ago 174 Views

3. Security Engineering

2 years ago 144 Views

Ch 6: Attacking Authentication

2 years ago 168 Views

Ch 5: Introduction to heap overflows

2 years ago 165 Views