Ethical Hacking eBook
Hacking Exposed-5
One of the international best-selling. The book walks through how to use
the more powerful and popular hacker software, including L0phtCrack.
This new edition has been updated extensively, largely with the results
of "honeypot" exercises (in which attacks on sacrificial machines are
monitored) and Windows 2000 public security trials.
There's a lot of new stuff on e-mail worms, distributed
denial-of-service (DDoS) attacks, and attacks that involve routing
protocols.
Hacking Exposed wastes no time in explaining how to implement the
countermeasures--where they exist--that will render known attacks
ineffective
Download (18.5 MB Zip)
Computer Viruses For Dummies
It offers real, practical solutions to help ordinary users keep viruses
out of their e-mail in-boxes-and explains how to respond when one slips
through-
* In 2003, there was a major virus attack almost every month, which cost businesses worldwide an estimated $55 billion and did untold damage to home computers.
* Explains what viruses are and how they work, profiles major anti-virus software packages, shows how to keep anti-virus software updated, and helps people adopt safer computer work habits.
* The book\92s value price and compact size will make it irresistible to people who need to protect their home PC or network.
* In 2003, there was a major virus attack almost every month, which cost businesses worldwide an estimated $55 billion and did untold damage to home computers.
* Explains what viruses are and how they work, profiles major anti-virus software packages, shows how to keep anti-virus software updated, and helps people adopt safer computer work habits.
* The book\92s value price and compact size will make it irresistible to people who need to protect their home PC or network.
Download (2.33 MB Zip)
Stealing The Network
How to Own a Shadow is the final book in Syngress ground breaking,
best-selling, Stealing the Network series. As with previous title, How
to Own a Shadow is a fictional story that demonstrates accurate, highly
detailed scenarios of computer intrusions and counter-strikes.
Readers will be amazed at how Knuth, Law Enforcement, and Organized
crime twist and torque everything from game stations, printers and fax
machines to service provider class switches and routers steal, deceive,
and obfuscate.
From physical security to open source information gathering, Stealing
the Network: How to Own a Shadow will entertain and educate the reader
on every page.
The books companion Web site will also provide special,
behind-the-scenes details and hacks for the reader to join in the chase
for Knuth.
Download (8.16 MB Zip)
Gray Hat Hacking
A fantastic book for anyone looking to learn the tools and techniques needed to break in and stay in.
Very highly recommended whether you are a seasoned professional or just starting out in the security business.
Basically divided into five parts :-
Part I: Introduction to Ethical Disclosure,
Part II: Penetration Testing and Tools ,
Part III: Exploits 101,
Part IV: Vulnerability Analysis,
Part V: Malware Analysis
Part I: Introduction to Ethical Disclosure,
Part II: Penetration Testing and Tools ,
Part III: Exploits 101,
Part IV: Vulnerability Analysis,
Part V: Malware Analysis
Download (8.1 MB Zip)
Hacker's Delight
"This is the first book that promises to tell the deep, dark secrets of computer
arithmetic, and it delivers in spades. It contains every trick I knew plus many, many
more. A godsend for library developers, compiler writers, and lovers of elegant hacks,it deserves a spot on your shelf right next to Knuth."-Josh Bloch
"When I first saw the title, I figured that the book must be either a cookbook forbreaking into computers (unlikely) or some sort of compendium of little programming
tricks. It's the latter, but it's thorough, almost encyclopedic, in its coverage." -GuySteele
arithmetic, and it delivers in spades. It contains every trick I knew plus many, many
more. A godsend for library developers, compiler writers, and lovers of elegant hacks,it deserves a spot on your shelf right next to Knuth."-Josh Bloch
"When I first saw the title, I figured that the book must be either a cookbook forbreaking into computers (unlikely) or some sort of compendium of little programming
tricks. It's the latter, but it's thorough, almost encyclopedic, in its coverage." -GuySteele
This book is for anyone who wants to create efficient code. Hacker's Delight will helpyou learn to program at a higher level-well beyond what is generally taught in schools
and training courses-and will advance you substantially further than is possiblethrough ordinary self-study alone.
and training courses-and will advance you substantially further than is possiblethrough ordinary self-study alone.
Download (4.96 MB)
Hacking: the Next Generation
This book is for anyone interested in learning the techniques that the more sophisticated
attackers are using today. Other books on the topic have the habit of rehashinglegacy attack and penetration methodologies that are no longer of any use to criminals.
If you want to learn how the techniques criminals use today have evolved to containcrafty tools and procedures that can compromise a targeted individual or an enterprise,this book is for you.The new generation of attackers is aware of risks in emerging technologies and knows
how to exploit the latest platforms to the fullest extent. This book will expose the skill
set and mindset that today’s sophisticated attackers employ to abuse technology and
people so that you can learn how to protect yourself from them
how to exploit the latest platforms to the fullest extent. This book will expose the skill
set and mindset that today’s sophisticated attackers employ to abuse technology and
people so that you can learn how to protect yourself from them
Download (6.87 MB)
Wireless Kung-Fu
Download (25.3 MB)
Computer Forensics Investigating Wireless N/W & Devices
Hacking and electronic crimes sophistication has grown at an exponential rate in recent years. In fact, recent
reports have indicated that cyber crime already surpasses the illegal drug trade! Unethical hackers, better known
as black hats, are preying on information systems of government, corporate, public, and private networks and
are constantly testing the security mechanisms of these organizations to the limit with the sole aim of exploiting
them and profiting from the exercise. High-profile crimes have proven that the traditional approach to computer
security is simply not sufficient, even with the strongest perimeter, properly configured defense mechanisms such
as firewalls, intrusion detection, and prevention .
reports have indicated that cyber crime already surpasses the illegal drug trade! Unethical hackers, better known
as black hats, are preying on information systems of government, corporate, public, and private networks and
are constantly testing the security mechanisms of these organizations to the limit with the sole aim of exploiting
them and profiting from the exercise. High-profile crimes have proven that the traditional approach to computer
security is simply not sufficient, even with the strongest perimeter, properly configured defense mechanisms such
as firewalls, intrusion detection, and prevention .
Download (15.6 MB)
Learning HTML5 Game Programming
HTML5 will transform web and mobile gaming. As new browsers rapidly adopt
it, HTML5 will do everything ��legacy�� technologies such as Flash and
Silverlight have done��and much more. In Learning HTML5 Game
Programming, pioneering developer James L. Williams gives you all the
knowledge, code, and insights you��ll need to get started fast!
Download (5.0 MB)
The World of Scripting Languages
Programming Languages/Web Programming The World of Scripting Languages David Barron The explosive growth of Internet applications has seen a corresponding growth in the use and development of scripting languages.
Their power and flexibility enables even nonexpert programmers to
prototype graphical user interfaces more rapidly, end to develop
sophisticated Web-based applications. This book provides an authoritative survey of the most important scripting languages and illustrates their capabilities in a variety of domains.
2000 | 506 Pages | ISBN: 0471998869 | PDF
Download (34 MB)
Head First C
Ever wished there was an easier way to learn C from a book? Head First C is a complete learning experience that will show you how to create
programs in the C language. This book helps you learn the C language
with a unique method that goes beyond syntax and how-to manuals and
helps you understand how to be a great programmer. You'll learn key
areas such as language basics, pointers and pointer arithmetic, and
dynamic memory management, and with advanced topics such as
multi-threading and network programming, Head First C can be used as an accessible text book for a college-level course.
No comments:
Post a Comment