Fscrack Userguide
The Art of Hacking v1.0 - Ankit Mishra
Toppling Domino - 44CON 4012
Cognitive bias ‘gives clues that help password hackers’
The problem with the real world
Phishing: How to get off the hook using Intelligent IAM
From the book: Computer Security: Principles and Practice by Stalllings and Brown CS 432/532 – Computer and Network Security Sabancı University Intrusion.
Network Security Essentials Chapter 9 Fourth Edition by William Stallings Lecture slides by Lawrie Brown.
1 Remote Power Analysis of RFID Tags Joint work with Adi Shamir yossi.oren[at]weizmann.ac.il 28/Aug/06.
Chapter 8 Intrusion Detection Intruders classes: classes: two most publicized threats to security are malware and intruders two most publicized threats.
Cryptography and Network Security Chapter 20 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.