-
Notifications
You must be signed in to change notification settings - Fork 0
Expand file tree
/
Copy pathprogram.bib
More file actions
247 lines (215 loc) · 7.69 KB
/
program.bib
File metadata and controls
247 lines (215 loc) · 7.69 KB
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
%% This BibTeX bibliography file was created using BibDesk.
%% http://bibdesk.sourceforge.net/
%% Created for Jarrah Gosbell at 2016-08-22 19:24:01 +1000
%% Saved with string encoding Unicode (UTF-8)
@electronic{ZenOfPython,
Author = {Tim Peters},
Date-Added = {2016-08-22 09:23:23 +0000},
Date-Modified = {2016-08-22 09:23:49 +0000},
Title = {The Zen of Python}}
@article{APTMin,
Author = {Ross Brewer},
Date-Added = {2016-06-18 06:04:19 +0000},
Date-Modified = {2016-06-18 06:04:46 +0000},
Doi = {http://dx.doi.org/10.1016/S1353-4858(14)70040-6},
Issn = {1353-4858},
Journal = {Network Security},
Number = {4},
Pages = {5 - 9},
Title = {Advanced persistent threats: minimising the damage},
Url = {http://www.sciencedirect.com/science/article/pii/S1353485814700406},
Volume = {2014},
Year = {2014},
Bdsk-Url-1 = {http://www.sciencedirect.com/science/article/pii/S1353485814700406},
Bdsk-Url-2 = {http://dx.doi.org/10.1016/S1353-4858(14)70040-6}}
@article{AttackLifeCycleAPTOverview,
Author = {Ghafir, Ibrahim and P{\v{r}}enosil, V{\'a}clav and others},
Date-Added = {2016-06-18 06:02:59 +0000},
Date-Modified = {2016-06-18 06:03:32 +0000},
Journal = {International Journal of Advances in Computer Networks and Its Security (IJCNS)},
Number = {I},
Publisher = {theIRED},
Title = {Advanced Persistent Threat Attack Detection: An Overview},
Year = {2014}}
@book{ARMasm,
Author = {Pete Cockerell},
Date-Added = {2016-06-17 03:34:35 +0000},
Date-Modified = {2016-06-17 03:34:35 +0000},
Publisher = {Self Published},
Title = {ARM Assembly Language Programming}}
@book{regexTHW,
Author = {Zed. A. Shaw},
Date-Added = {2016-06-16 23:49:53 +0000},
Date-Modified = {2016-06-16 23:56:37 +0000},
Publisher = {Self Published},
Title = {Learn Regex The Hard Way},
Year = {2010}}
@manual{80386,
Author = {Intel},
Date-Added = {2016-06-16 07:21:37 +0000},
Date-Modified = {2016-06-16 07:23:00 +0000},
Organization = {Intel},
Title = {INTEL 80386 Programmers Reference Manual},
Year = {1986}}
@inproceedings{BrokenKnapsack,
Author = {A. Shamir and A. Shamir and A. Shamir and A. Shamir},
Booktitle = {Foundations of Computer Science, 1982. SFCS '08. 23rd Annual Symposium on},
Date-Added = {2016-06-15 07:24:08 +0000},
Date-Modified = {2016-06-15 07:24:32 +0000},
Doi = {10.1109/SFCS.1982.5},
Issn = {0272-5428},
Keywords = {Communication channels;Greedy algorithms;H infinity control;Mathematics;Performance analysis;Polynomials;Protection;Public key;Public key cryptography;Security},
Month = {Nov},
Pages = {145-152},
Title = {A polynomial time algorithm for breaking the basic Merkle-Hellman cryptosystem},
Year = {1982},
Bdsk-Url-1 = {http://dx.doi.org/10.1109/SFCS.1982.5}}
@book{Silence,
Author = {Michal Zalewski},
Date-Added = {2016-06-08 04:07:28 +0000},
Date-Modified = {2016-06-08 04:08:23 +0000},
Publisher = {No Starch Press},
Title = {Silence on the wire},
Year = {2005}}
@book{Hackers,
Author = {Steven Levy},
Date-Added = {2016-06-08 04:05:50 +0000},
Date-Modified = {2016-06-08 04:06:53 +0000},
Publisher = {O'Rielly},
Title = {Hackers, Heroes of the Computer Revolution},
Year = {2010}}
@book{CodeBook,
Author = {Simon Singh},
Date-Added = {2016-06-08 04:04:15 +0000},
Date-Modified = {2016-06-08 04:04:55 +0000},
Publisher = {Fourth Estate},
Title = {The Code Book},
Year = {2000}}
@book{ACrypto,
Author = {Bruce Schnier},
Date-Added = {2016-06-08 04:02:50 +0000},
Date-Modified = {2016-06-08 04:03:59 +0000},
Edition = {20th Anniversary},
Publisher = {Wiley},
Title = {Applied Cryptography},
Year = {2015}}
@book{ShellcodersHandbook,
Author = {Chris Anley and John Heasman and Felix Lindner and Gerado Richarte},
Date-Added = {2016-06-08 04:00:56 +0000},
Date-Modified = {2016-06-08 05:10:24 +0000},
Edition = {Second},
Publisher = {Wiley},
Title = {The Shellcoder's Handbook},
Year = {2007}}
@book{playbook,
Author = {Peter Kim},
Date-Added = {2016-06-08 02:58:28 +0000},
Date-Modified = {2016-06-08 02:59:32 +0000},
Publisher = {Secure Planet LLC},
Title = {The Hacker' Playbook 2},
Year = {2015}}
@book{pentestingLabs,
Author = {Kevin Cardwell},
Date-Added = {2016-06-06 07:01:55 +0000},
Date-Modified = {2016-06-06 07:02:44 +0000},
Publisher = {PACKT Publishing},
Title = {Building Virtual Pentesting Labs for Advanced Penetration Testing.},
Year = {2014}}
@book{CTFBlueprints,
Author = {Cameron Buchanan},
Date-Added = {2016-06-06 07:00:47 +0000},
Date-Modified = {2016-06-06 07:01:54 +0000},
Publisher = {PACKT Publishing},
Title = {Kali Linux CTF Blueprints},
Year = {2014}}
@book{MSFU,
Author = {Various},
Date-Added = {2016-05-25 04:58:51 +0000},
Date-Modified = {2016-05-25 05:01:29 +0000},
Publisher = {Offensive Security},
Title = {Metasploit Unleashed},
Year = {2011}}
@book{PythonBoringStuff,
Author = {Al Sweigart},
Date-Added = {2016-05-16 07:31:07 +0000},
Date-Modified = {2016-05-16 07:32:31 +0000},
Keywords = {ISBN=978-1-59327-599-0},
Publisher = {No Starch Press},
Title = {Automate the Boring Stuff With Python},
Year = {2015}}
@book{LinuxIntro,
Annote = {http://www.tldp.org/LDP/intro-linux/html/},
Author = {Machtelt Garrels},
Date-Added = {2016-04-27 21:57:03 +0000},
Date-Modified = {2016-04-27 22:03:11 +0000},
Edition = {1.30},
Publisher = {The Linux Documentation Project},
Title = {Introduction to Linux},
Year = {2010}}
@book{ICND1,
Author = {Wendell Odom},
Date-Added = {2016-04-15 05:56:58 +0000},
Date-Modified = {2016-04-15 06:01:22 +0000},
Publisher = {Cisco Press},
Series = {CCNA Official Cert Library},
Title = {Official Cert Guide Cisco CCENT/CCNA ICND1 100-101},
Year = {2013}}
@conference{JSProgrammingLanguage,
Author = {Douglas Crockford},
Booktitle = {The JavaScript Programming Language},
Date-Added = {2016-04-08 06:30:44 +0000},
Date-Modified = {2016-04-08 06:32:50 +0000},
Title = {The JavaScript Programming Language},
Year = {2007}}
@book{WSUG,
Author = {Ulf Lamping, Richard Sharpe, Ed Warnicke},
Date-Added = {2016-02-14 23:09:20 +0000},
Date-Modified = {2016-02-14 23:11:09 +0000},
Edition = {3.2},
Publisher = {Wireshark.org},
Title = {Wireshark Users Guide},
Year = {2014}}
@book{EffectivePS,
Address = {https://rkeithhill.wordpress.com/2009/03/08/effective-windows-powershell-the-free-ebook/},
Author = {Keith Hill},
Date-Added = {2016-02-10 17:00:36 +0000},
Date-Modified = {2016-06-21 01:16:56 +0000},
Publisher = {Self Published},
Title = {Effective Windows PowerShell},
Year = {2009}}
@book{NmapBook,
Address = {https://nmap.org/book/},
Author = {Gordon Fyodor Lyon},
Date-Added = {2016-01-17 07:41:30 +0000},
Date-Modified = {2016-01-17 07:43:51 +0000},
Publisher = {Nmap Project},
Title = {Nmap Network Scanning},
Year = {2009}}
@book{Radare2,
Author = {Maijin},
Date-Added = {2016-01-13 23:50:09 +0000},
Date-Modified = {2016-01-13 23:53:40 +0000},
Publisher = {gitbooks.io},
Title = {The Radare2 Book},
Year = {2015}}
@techreport{FedoraSecGuide,
Author = {Johnray Fuller and John Ha and David O'Brien and Scott Radvan and Eric Christensen and Adam Ligas and Murray McAllister and Scott Radvan and Daniel Walsh and Dominick Grift and Eric Paris and James Morris},
Date-Modified = {2016-01-13 02:34:06 +0000},
Institution = {Fedora Project},
Read = {0},
Title = {{Security Guide} A Guide to Securing Fedora Linux},
Url = {https://docs.fedoraproject.org/en-US/Fedora/19/html/Security_Guide/},
Urldate = {2016-01-08},
Year = {2015},
Bdsk-Url-1 = {https://docs.fedoraproject.org/en-US/Fedora/19/html/Security_Guide/}}
@book{HackingAOE,
Author = {Jon Erickson},
Publisher = {No Starch Press},
Title = {{Hacking} The Art of Exploitation},
Volume = 2,
Year = 2008}
@book{CLICrashCourse,
Author = {Zed. A. Shaw},
Publisher = {inculate.me},
Title = {The Command Line Crash Course},
Year = 2010}