Booting the System
In this article by William Confer and William Roberts, author of the book, Exploring SE for Android, we will learn once we have an...
iOS Security Overview
In this article by Allister Banks and Charles S. Edge, the authors of the book, Learning iOS Security, we will go through an overview of...
Puppet and OS Security Tools
In this article by Jason Slagle, author of the book Learning Puppet Security, covers using Puppet to manage SELinux and auditd. We learned a...
Security in Microsoft Azure
In this article, we highlight some security points of interest, according to the ones explained in the book Microsoft Azure Security, by Roberto Freato.
Microsoft Azure...
Securing OpenStack Networking
In this article by Fabio Alessandro Locati, author of the book OpenStack Cloud Security, you will learn about the importance of firewall, IDS, and...
OAuth 2.0 – Gaining Consent
In this article by Charles Bihis, the author of the book, Mastering OAuth 2.0, discusses the topic of gaining consent in OAuth 2.0.
OAuth 2.0...
Scraping the Web with Python – Quick Start
In this article we're going to acquire intelligence data from a variety of sources. We might interview people. We might steal files from a...
Communication and Network Security
In this article by M. L. Srinivasan, the author of the book CISSP in 21 Days, Second Edition, the communication and network security domain deals with...
Introduction to Cyber Extortion
In this article by Dhanya Thakkar, the author of the book Preventing Digital Extortion, explains how often we make the mistake of relying on...
Getting Started with Metasploit
In this article by Nipun Jaswal, the author of the book Metasploit Bootcamp, we will be covering the following topics:
Fundamentals of Metasploit
Benefits of using...