Yaksas CSC

Your Guardian in the Cyber World

  • Yaksas CSC Home
  • Home
  • About Us
    • Overview
    • Why Yakṣas?
  • Got a Question?
    • Cyber Security Basics
    • Cyber Security Education & Career
    • How to stay safe?
  • Get Invloved
    • Write for Us
    • YCSC QnA Dialogue
    • Translate Articles
  • Contact Yakṣas
  • Press Release
    • NCSAM 2015 Champion
    • STOP. THINK. CONNECT. Partner
Book Review: Red Team Development and Operations by Joe Vest and James Tubberville

Uday Mittal February 24, 2021

Book Review: Red Team Development and Operations by Joe Vest and James Tubberville

I recently picked up this book, Red Team Development and Operations by Joe Vest and James Tubberville, while searching for material to read on Red Teaming. While this is not the only book on the subject, I was intrigued by the ‘Zero-Day Edition’ (along with this content, of course). Also, it was published recently (at […]

Filed Under: Book Reviews, Good Reads, Non-Fiction Tagged With: Cybersecurity books, red teaming

Book Recommendation: The Florentine Deception

Uday Mittal September 11, 2017 Leave a Comment

Book Recommendation: The Florentine Deception

I came across The Florentine Deception in the Cybersecurity Canon List. It was listed as a gateway book for 2016. Written by, Carey Nachenberg, co-inventor of Norton Antivirus, it is a suspense thriller novel with cybersecurity as an underlying theme. It is one of those cybersecurity focused novels which amalgamate the two worlds in a […]

Filed Under: Fiction, Good Reads Tagged With: Cybersecurity books, Cybersecurity Cannon, Norton Antivirus

The Cybersecurity Canon Project

Uday Mittal August 15, 2015 Leave a Comment

The Cybersecurity Canon Project

One thing any Cyber Security Professional crave is good literature on the subject. While there are many books that cover the basics and introduce the reader to the field, there are few which have the potential to spark a debate. My search for such books led me to Cybersecurity Canon list. Cybersecurity Canon Project was […]

Filed Under: Good Reads Tagged With: Cybersecurity books, Cybersecurity Cannon, palo alto networks, Rick Howard

Good Read: The Snowden Files

Uday Mittal June 26, 2015 Leave a Comment

Good Read: The Snowden Files

When I first heard about the PRISM mass surveillance program, conducted by the United States National Security Agency (NSA), I thought it was an hoax. Primarily, because up until then that kind of stuff belonged to Hollywood movies only, at least for the uninformed me. But as the news snowballed and caught the attention of […]

Filed Under: Good Reads, Non-Fiction Tagged With: Edward Snowden, Luke Harding, Mass Surveillance, The Snowden Files

Optin Form

Search

Follow us on Twitter

My Tweets

Categories

Tags

Active directory adsecurity adsi adsisearcher adversary emulation Android attack active directory awareness blue whale challenge Certification CISSP Cloud security command and control crte crtp cyber-warfare Cyber Security Cybersecurity books Cybersecurity Cannon domain enumeration Edward Snowden forest enumeration hacker Information Security ISACA Kali Linux Mass Surveillance Mobile Security Narendra Modi NSA offensive security Online Safety Password Penetration Testing pentest poshc2 powersploit Powerview privacy red team red teaming Risk Management Social Media user enumeration Wifi

Top Posts

  • 7 Ways to Cover Your Device's Camera
    7 Ways to Cover Your Device's Camera
  • Mona.py for exploit devs: 6 must know commands
    Mona.py for exploit devs: 6 must know commands
  • Social-Engineer Toolkit: An Introduction
    Social-Engineer Toolkit: An Introduction
  • CISA: Everything You Need to Know
    CISA: Everything You Need to Know
  • Active Directory User Enumeration using PowerView
    Active Directory User Enumeration using PowerView
  • Red Team Operations Attack Lifecycle
    Red Team Operations Attack Lifecycle

© Copyright 2020 ElliteDevs · All Rights Reserved · Powered by WordPress