Category: Ebooks

Understanding the Mirai Botnet

The Mirai botnet, composed primarily of embedded and IoT devices, took the Internet by storm in late 2016 when it overwhelmed several high-profile targets with massive distributed denial-of-service (DDoS) attacks. In this paper, we...

IT Security 101: Think Like a Cybercriminal

Establishing an effective IT security system is a complex undertaking made even more difficult by the threat of new and unknown cybercriminal behavior. Don’t make things a lot easier for the bad guys just...

Linux Server Security – Hack and Defend

Learn how to attack and defend the world’s most popular web server platform. Linux Server Security: Hack and Defend presents a detailed guide for experienced admins, aspiring hackers and other IT professionals seeking a more...

[Download] DEF CON 25 talks materials

DEF CON is an annual underground computer conference held in Las Vegas, Nevada USA of networking, computer, hardware, and security experts who discuss computer and networking security. The conference contains computer hackers, network administrators, government...

Black Hat USA 2017 document downloader

Black hat is also a computer security conference held around the world to discuss computer security issues, events, and inform individuals of security threats that may be present on their computer networks. The first...

Networking For Dummies, 11th Edition

Need networking know-how, but don’t know where to turn? Whether you’re a networking administrator or an everyday computer user looking to set up a network in your home or office, Networking For Dummies seamlessly gets you connected...

Global Trends: The State of Cyber Security

  PROBLEM: Business leaders are aware of their accountability for the cybersecurity posture of their organization, but not necessarily the best ways to mitigate risk of attacks and increase resilience. SOLUTION: In this cyber security market...

Modern Binary Exploitation Course

Vulnerability research & exploit development is something totally outside the bounds of what you see in a normal computer science curriculum, but central to a lot of what we RPISEC members find ourselves doing...

Practical Malware Analysis Course

The Practical Malware Analysis (PMA) book is where many RPISEC members and alumn started. The book reads very well, is full of information, and the lab walkthroughs in the back are invaluable. We didn’t...

Exploiting Web-Based Applications

Take a deep dive into hacking web sites and web applications using the latest techniques. In this course, we will teach you the top exploits including Cross-site Scripting, Cross-site Request Forgery, and more! You’ll...

Introduction to Linux – A Hands on Guide

This guide was created as an overview of the Linux Operating System, geared toward new users as an exploration tour and getting started guide, with exercises at the end of each chapter. For more...