Tutorials
Tutorials
-
Maltego and advanced exploit writing: The PDF tutorial collection
Right from how to write advanced custom exploits to perform reconnaissance using Maltego, you can find it all in this comprehensive PDF tutorial collection. Continue Reading
-
Apache Hadoop FAQ for BI professionals
Want to explore how Apache Hadoop can aid your BI / DW efforts? Get the most common questions about Hadoop answered in this tutorial. Continue Reading
-
Snowflake schema illustrated
Snowflake schema has emerged as a popular schema amongst database and data warehouse design professionals. Learn Snowflake in depth in this tutorial. Continue Reading
-
The present NAS market: What does it hold for the future?
This Essential Guide examines the NAS market to see what type of NAS is right for you and how that will change in the coming years. Continue Reading
-
Maltego user guide part 2: Infrastructural reconnaissance
This part of our Maltego tutorial details how you can use the multi-faceted tool for infrastructural aspects of information gathering. Continue Reading
-
Data backup solutions: Backing up virtual machines gains ground
Server virtualisation has made an impact on the state of data backup, leading to advancements in the enterprise and midrange backup markets, changes in the way VMware APIs work with backup, and more. Continue Reading
-
Windows Azure Guide part 2: Scaling hosted applications
Scaling hosted applications on the Windows Azure cloud enables adjustment of virtual machine counts. Our Windows Azure guide’s second part shows you how. Continue Reading
-
Burp Suite Tutorial PDF compendium: WebApp tester’s ready reference
Our Burp Suite tutorial PDF compendium is a collection of our Burp Suite guides in PDF format made available to you for free offline reference. Continue Reading
-
LEED certification insights for data center professionals
The best way to minimize your data center’s energy needs and costs is to obtain LEED-India certification. Know how you can get one for your own data center. Continue Reading
-
Infosecurity 2012 Europe: Conference news and highlights
Get the latest news and important research from the Infosecurity 2012 Europe conference, including coverage on security threats and data breaches. Continue Reading
-
Privacy and electronic communications regulations: Guide to EU cookie compliance
Get advice for implementing PECR regulations requiring website owners to request users’ permission to place a tracking cookie. Continue Reading
-
Exploit development tutorial - Part Deux
In our exploit development tutorial’s second part, we examine how you can write exploits in PERL. Then we see how to port exploits by scripting in Ruby. Continue Reading
-
Sandboxing for secure app development: Adobe Reader’s ‘protected mode’
As sandboxing emerges as an answer to legacy codebases with multiple vulnerabilities, we dissect Adobe Reader X’s sandbox to understand how sandboxing works. Continue Reading
-
Exploit writing tutorial: Part 1
In the first part of our exploit writing tutorial, we take a look at the fine art of vulnerability discovery, fuzzing and usable techniques. Continue Reading
-
IT in Europe, Security Edition: Smartphone security issues
How can security teams manage devices they don’t control? Find out how to manage smartphone and tablet security threats. Continue Reading
