4. Block Ciphers

1 year ago 101 Views

6 Analyzing Android Applications (Part 2)

1 year ago 33 Views

4 Getting Started & 5 Leads

1 year ago 91 Views

3. Cryptographic Security

1 year ago 59 Views

Bitcoin and Blockchains

1 year ago 40 Views

Ch 18: Source Code Auditing

2 years ago 149 Views

Ch 16 & 17 Fault Injection & Fuzzing

2 years ago 166 Views

Ch 12 Attacking Users - XSS

2 years ago 207 Views

Ch 10: Attacking Back-End Components

2 years ago 209 Views

L7 64-bit Assembler

2 years ago 98 Views

4. Communication and Network Security

2 years ago 121 Views

Ch 9 Attacking Data Stores (Part 2)

2 years ago 160 Views

Ch 6: The Wild World of Windows

2 years ago 147 Views

3. Security Engineering

2 years ago 167 Views

Ch 7: Attacking Session Management

2 years ago 175 Views

3. Security Engineering

2 years ago 145 Views

Ch 6: Attacking Authentication

2 years ago 168 Views

Ch 5: Introduction to heap overflows

2 years ago 166 Views