E-Books on Hacking

Ethical Hacking eBook

 

 Hacking Exposed-5

One of the international best-selling. The book walks through how to use the more powerful and popular hacker software, including L0phtCrack. This new edition has been updated extensively, largely with the results of "honeypot" exercises (in which attacks on sacrificial machines are monitored) and Windows 2000 public security trials. There's a lot of new stuff on e-mail worms, distributed denial-of-service (DDoS) attacks, and attacks that involve routing protocols. Hacking Exposed wastes no time in explaining how to implement the countermeasures--where they exist--that will render known attacks ineffective

 Download (18.5 MB Zip)



Computer Viruses For Dummies

It offers real, practical solutions to help ordinary users keep viruses out of their e-mail in-boxes-and explains how to respond when one slips through-
* In 2003, there was a major virus attack almost every month, which cost businesses worldwide an estimated $55 billion and did untold damage to home computers.
* Explains what viruses are and how they work, profiles major anti-virus software packages, shows how to keep anti-virus software updated, and helps people adopt safer computer work habits.
* The book\92s value price and compact size will make it irresistible to people who need to protect their home PC or network.

Download (2.33 MB Zip)

 

Stealing The Network

How to Own a Shadow is the final book in Syngress ground breaking, best-selling, Stealing the Network series. As with previous title, How to Own a Shadow is a fictional story that demonstrates accurate, highly detailed scenarios of computer intrusions and counter-strikes. Readers will be amazed at how Knuth, Law Enforcement, and Organized crime twist and torque everything from game stations, printers and fax machines to service provider class switches and routers steal, deceive, and obfuscate. From physical security to open source information gathering, Stealing the Network: How to Own a Shadow will entertain and educate the reader on every page. The books companion Web site will also provide special, behind-the-scenes details and hacks for the reader to join in the chase for Knuth.

Download (8.16 MB Zip)

 

 Gray Hat Hacking

A fantastic book for anyone looking to learn the tools and techniques needed to break in and stay in. Very highly recommended whether you are a seasoned professional or just starting out in the security business. Basically divided into five parts :-
Part I: Introduction to Ethical Disclosure,
Part II: Penetration Testing and Tools ,
Part III: Exploits 101,
Part IV: Vulnerability Analysis,
Part V: Malware Analysis

Download (8.1 MB Zip)

 

 

 Hacker's Delight

"This is the first book that promises to tell the deep, dark secrets of computer
arithmetic, and it delivers in spades. It contains every trick I knew plus many, many
more. A godsend for library developers, compiler writers, and lovers of elegant hacks,it deserves a spot on your shelf right next to Knuth."-Josh Bloch
"When I first saw the title, I figured that the book must be either a cookbook forbreaking into computers (unlikely) or some sort of compendium of little programming
tricks. It's the latter, but it's thorough, almost encyclopedic, in its coverage." -GuySteele
This book is for anyone who wants to create efficient code. Hacker's Delight will helpyou learn to program at a higher level-well beyond what is generally taught in schools
and training courses-and will advance you substantially further than is possiblethrough ordinary self-study alone.

Download (4.96 MB)

Hacking: the Next Generation

This book is for anyone interested in learning the techniques that the more sophisticated
attackers are using today. Other books on the topic have the habit of rehashinglegacy attack and penetration methodologies that are no longer of any use to criminals.
If you want to learn how the techniques criminals use today have evolved to containcrafty tools and procedures that can compromise a targeted individual or an enterprise,this book is for you.The new generation of attackers is aware of risks in emerging technologies and knows
how to exploit the latest platforms to the fullest extent. This book will expose the skill
set and mindset that today’s sophisticated attackers employ to abuse technology and
people so that you can learn how to protect yourself from them

Download (6.87 MB)

 



  

   Wireless Kung-Fu

   Download (25.3 MB)










  Computer  Forensics  Investigating  Wireless N/W &  Devices

Hacking and electronic crimes sophistication has grown at an exponential rate in recent years. In fact, recent
reports have indicated that cyber crime already surpasses the illegal drug trade! Unethical hackers, better known
as black hats, are preying on information systems of government, corporate, public, and private networks and
are constantly testing the security mechanisms of these organizations to the limit with the sole aim of exploiting
them and profiting from the exercise. High-profile crimes have proven that the traditional approach to computer
security is simply not sufficient, even with the strongest perimeter, properly configured defense mechanisms such
as firewalls, intrusion detection, and prevention .

Download (15.6 MB)

 

 Learning HTML5 Game Programming

HTML5 will transform web and mobile gaming. As new browsers rapidly adopt it, HTML5 will do everything ��legacy�� technologies such as Flash and Silverlight have done��and much more. In Learning HTML5 Game Programming, pioneering developer James L. Williams gives you all the knowledge, code, and insights you��ll need to get started fast!





Download (5.0 MB)

 

 

 The World of Scripting Languages

Programming Languages/Web Programming The World of Scripting Languages David Barron The explosive growth of Internet applications has seen a corresponding growth in the use and development of scripting languages. Their power and flexibility enables even nonexpert programmers to prototype graphical user interfaces more rapidly, end to develop sophisticated Web-based applications. This book provides an authoritative survey of the most important scripting languages and illustrates their capabilities in a variety of domains. 

2000 | 506 Pages | ISBN: 0471998869 | PDF  


Download (34 MB)



 Head First C

Ever wished there was an easier way to learn C from a book? Head First C is a complete learning experience that will show you how to create programs in the C language. This book helps you learn the C language with a unique method that goes beyond syntax and how-to manuals and helps you understand how to be a great programmer. You'll learn key areas such as language basics, pointers and pointer arithmetic, and dynamic memory management, and with advanced topics such as multi-threading and network programming, Head First C can be used as an accessible text book for a college-level course.


Download (53.3 MB)

 

nmap network scanning

 

 

 

Download 

 

 

 

 

 

 

  Metasploit-penetration-testers-guide.


Download

No comments: