Arka Kapı Dergi 10.Sayı

%24
0,49 USD
0,65 USD
Stock code
9772017201810
Warranty Period
24 Month
Price
0,65 USD
Back Door Magazine Issue 10

Burak Köse from the Uzman Coin team wrote for you what happened in the cryptocurrency world in the fall: It awaits you with dates, news headlines and summary information! Tayfur Özkara from the Cyber Field team was at the STMCTF 2019 CAPTURE THE FLAG event this time. He wrote about that atmosphere for those who could not go or see it, information that will satisfy your curiosity, and a nice field news with comments from the contestants awaits you! While technical issues always come to mind when it comes to cybersecurity, Utku Şen wrote a great article on cybersecurity, privacy and freedom, specifically for states and societies, by looking from a different perspective: Is Turkey Importing Digital Dystopia from China? Don't miss the article! Why and how do states monitor their people, under what conditions is this acceptable, what were the methods of yesterday, what are the ones today, what will be the results, the approach of the USA, what is China's policy, this and many other questions, where you can find the answers to this wonderful article written for you by Utku Şen, Is Turkey Importing Digital Dystopia from China? The article is waiting for you! In the article called Not Password, Password, Zarola Instead of Password! written by Alper Atmaca from the Free Software Association, you will meet Zarola, learn when and where it should be used and how it is used, and an article that you can read in one go! :) Numan Özdemir, who discusses the browsers that are always on our bedside and the actions of agents who are always waiting for an opportunity to monitor us, added malicious codes to a "safe" extension, hid them and published them in his article called Attackers May Be Monitoring Your Browser: Agents in Our Browsers! The result: It became a "safe" extension that acts as a keylogger, we say don't miss it! :)A great mobile forensics article by Emre Çelikkol, specifically for iOS 13, Mobile Forensic vs “IOS 13!” is waiting for you! A great article where you can see with examples how successful Cellebrite and Magnet, two big companies that have proven themselves in mobile forensics, are in iOS 13! An article that covers in detail the attacks that can be called the plague of the sector, DDoS attacks, in the article called Bizimkisi bir DDoS Hikâyesi, where you can find DDoS types, precautions, sample DDoS cases from the past to the present, a very nice article that everyone interested should read, written by Serhan W. Bahar for you! Mertcan Coşkuner, one of the cyber security writers of the Middle East, wrote the article called Android and Reflection Usage for you, which deals with reflection, which is frequently encountered in malware reviews and mobile penetration tests, a great article that you can read in one breath, don't miss it! :) In today's world where servers, TVs, cars are hacked, can satellites be hacked, if so, how? What are the types of satellites, how are signal analyses done, can I hack a satellite from my home? Murat Şişman wrote this great article for you where you can find answers to many questions and much more: Can Satellites Be Hacked? Have you ever thought about the security of containers, whose awareness and use are increasing day by day? The first part of the article series called Docker-Container Security, written by Ayşenur Burak, is in this issue, it is a very nice article that is like a guide for beginners, don't miss it! The importance of intelligence in both defense and attack lines is obvious. Halit İnce, who started an article series with this perspective, discussed OSINT (Open Source Intelligence) - Domain Names in this issue. The first part of a nice article series that starts with what is OSINT and continues with operational security, and should not be missed by those interested, awaits you! In the previous issue of the Forensic article series, the subject of this issue by Forensic Computer Forensics Engineer İbrahim Baloğlu, who covered Windows Forensics, was RDP FORENSIC. Baloğlu, who covers the RDP Protocol, network connection, log structure, authentication, event keys in detail, explains in detail how RDP analysis is done, if you will enjoy reading this article! In the article titled From Social Media to Cryptocurrency: Facebook's Libra, written by journalist Sayyara Mammadova, many questions about Facebook and Libra such as whether Facebook will control the Libra network or not, parallel money, what Libra is actually trying to do, are answered! The subject of this issue of the article series titled Cyber Security for Journalists, started by Eren Talha Altun, was open source intelligence (specifically for journalists). A very nice article where you can see the types of intelligence, what are the ready and free tools and even how to use them is waiting for you! The article titled Taking Back the Web from the Giants! written by the incorrigible student, Ziyahan Albeniz, was written for you, let's take back the Web from the Giants! Our last question for this issue: What Happens If Robots Are Hacked? Will they take over the world, demand ransom, commit murder or the opposite? What Happens If Robots Are Hacked? written by Sadullah Ali Aslan is waiting for you! Muhammed Hilmi Koca is here with a new list that he compiled as a result of great effort with his reading list for software developers! The new concepts explained by the Cyber Dictionary team are included in the dictionary section at the end of our magazine.

CONTENTSDecember-January '19-20 Cyber Security & IT EventsCryptocurrency NewsCyber Field - STMCTF 2019 CAPTURE THE FLAG • Tayfur ÖzkaraIs Turkey Importing Digital Dystopia from China? • Utku ŞenNot Password, Password, Instead of Password, Zarola! • Alper AtmacaAttackers May Be Watching Your Browser: Agents in Our Browser • Numan ÖzdemirMobile Forensic vs “IOS 13!” • Emre ÇelikkolOurs is a DDoS Story • Serhan W. BaharUsing Android and Reflection • Mertcan CoflkunerCan Satellites Be Hacked? • Murat ŞişmanDocker-Container Security - Part I • Ayşenur BurakOSINT Open Source Intelligence Series Part 1: Domain Names • Halit İnceRDP FORENSIC • İbrahim BaloğluFrom Social Media to Cryptocurrency: Facebook's Libra • Sayyara MammadovaOpen Source Intelligence for Journalists • Eren Talha AltunTaking Back the Web from the Giants! • Ziyahan AlbenizWhat Happens If Robots Are Hacked? • Sadullah Ali AslanReading List for Software Developers • Muhammed Hilmi KocaSiber Sözlük

Be the first to review this product!
Price information, pictures, product descriptions and other issues that you find inadequate points you can send us using the suggestion form.
Thank you for your comments and suggestions.
Arka Kapı Dergi 10.Sayı Dozens of Turkish books in the fields of informatics, education and engineering are just a click away! Programming, coding, software, technology, hacker, maker books | 9772017201810
Arka Kapı Dergi 10.Sayı

Recommend

*
*
*
IdeaSoft® | E-Ticaret paketleri ile hazırlanmıştır.