Showing posts with label Ethical Hacking Books. Show all posts
Showing posts with label Ethical Hacking Books. Show all posts

Tuesday, March 5, 2013

Dreaming in Code - Two Dozen Programmers, Three Years, 4,732 Bugs, and One Quest for Transcendent Software



Dreaming in Code - Two Dozen Programmers, Three Years, 4,732 Bugs, and One Quest for Transcendent Software (Audiobook)

Dreaming in Code - Two Dozen Programmers, Three Years, 4,732 Bugs, and One Quest for Transcendent Software (Audiobook)

2012 | 12 hours and 2 mins | ISBN: n/a , ASIN: B00AQ5DOCA | MP3 80 kbps | 434 MB

Their story takes us through a maze of dead ends and exhilarating breakthroughs as they and their colleagues wrestle not only with the abstraction of code but with the unpredictability of human behavior, especially their own. Along the way, we encounter black holes, turtles, snakes, dragons, axe-sharpening, and yak-shaving - and take a guided tour through the theories and methods, both brilliant and misguided, that litter the history of software development, from the famous "mythical man-month" to Extreme Programming.

Not just for technophiles but for anyone captivated by the drama of invention, Dreaming in Code offers a window into both the information age and the workings of the human mind.
http://rapidgator.net/file/82928141/DkJ5EO.Dreaming.in.Code.part1.rar
http://rapidgator.net/file/82928139/DkJ5EO.Dreaming.in.Code.part2.rar
http://rapidgator.net/file/82928148/DkJ5EO.Dreaming.in.Code.part3.rar
http://rapidgator.net/file/82928159/DkJ5EO.Dreaming.in.Code.part4.rar
http://rapidgator.net/file/82928085/DkJ5EO.Dreaming.in.Code.part5.rar

Mirror:
http://www.secureupload.eu/8fz0jtwd6gbt/DkJ5EO.Dreaming.in.Code.part1.rar.html
http://www.secureupload.eu/tiy0lo65btwu/DkJ5EO.Dreaming.in.Code.part2.rar.html
http://www.secureupload.eu/awjn6xo9k1s8/DkJ5EO.Dreaming.in.Code.part3.rar.html
http://www.secureupload.eu/2lcbokk2ml4k/DkJ5EO.Dreaming.in.Code.part4.rar.html
http://www.secureupload.eu/yir4ga6wm1yj/DkJ5EO.Dreaming.in.Code.part5.rar.html

Monday, March 4, 2013

Ninja Hacking: Unconventional Penetration Testing Tactics and Techniques


Ninja Hacking: Unconventional Penetration Testing Tactics and Techniques (TRUE PDF)
Ninja Hacking: Unconventional Penetration Testing Tactics and Techniques (TRUE PDF)
Publisher: S y n g r e s s 2011 | 376 Pages | ISBN: 1597495883 | PDF | 5 MB

Ever thought of using the time-tested tactics and techniques of the ancient ninja to understand the mind of today's ninja, the hacker? As a penetration tester or security consultant you no doubt perform tests both externally and internally for your clients that include both physical and technical tests.

Tuesday, January 15, 2013

Kingpin: How One Hacker Took Over the Billion-Dollar Cybercrime Underground



Kingpin: How One Hacker Took Over the Billion-Dollar Cybercrime Underground

Kingpin: How One Hacker Took Over the Billion-Dollar Cybercrime Underground
ISBN: 0307588688 | 2011 | EPUB/MOBI | 288 pages | 3 MB

Former hacker Kevin Poulsen has, over the past decade, built a reputation as one of the top investigative reporters on the cybercrime beat. In Kingpin, he pours his unmatched access and expertise into book form for the first time, delivering a gripping cat-and-mouse narrative—and an unprecedented view into the twenty-first century's signature form of organized crime.

The word spread through the hacking underground like some unstoppable new virus: Someone—some brilliant, audacious crook—had just staged a hostile takeover of an online criminal network that siphoned billions of dollars from the US economy.

The FBI rushed to launch an ambitious undercover operation aimed at tracking down this new kingpin; other agencies around the world deployed dozens of moles and double agents. Together, the cybercops lured numerous unsuspecting hackers into their clutches. . . . Yet at every turn, their main quarry displayed an uncanny ability to sniff out their snitches and see through their plots.

The culprit they sought was the most unlikely of criminals: a brilliant programmer with a hippie ethic and a supervillain's double identity. As prominent "white-hat" hacker Max "Vision" Butler, he was a celebrity throughout the programming world, even serving as a consultant to the FBI. But as the black-hat "Iceman," he found in the world of data theft an irresistible opportunity to test his outsized abilities. He infiltrated thousands of computers around the country, sucking down millions of credit card numbers at will. He effortlessly hacked his fellow hackers, stealing their ill-gotten gains from under their noses. Together with a smooth-talking con artist, he ran a massive real-world crime ring.

And for years, he did it all with seeming impunity, even as countless rivals ran afoul of police.

Yet as he watched the fraudsters around him squabble, their ranks riddled with infiltrators, their methods inefficient, he began to see in their dysfunction the ultimate challenge: He would stage his coup and fix what was broken, run things as they should be run—even if it meant painting a bull's-eye on his forehead.

Through the story of this criminal's remarkable rise, and of law enforcement's quest to track him down, Kingpin lays bare the workings of a silent crime wave still affecting millions of Americans. In these pages, we are ushered into vast online-fraud supermarkets stocked with credit card numbers, counterfeit checks, hacked bank accounts, dead drops, and fake passports. We learn the workings of the numerous hacks—browser exploits, phishing attacks, Trojan horses, and much more—these fraudsters use to ply their trade, and trace the complex routes by which they turn stolen data into millions of dollars. And thanks to Poulsen's remarkable access to both cops and criminals, we step inside the quiet, desperate arms race that law enforcement continues to fight with these scammers today.

Ultimately, Kingpin is a journey into an underworld of startling scope and power, one in which ordinary American teenagers work hand in hand with murderous Russian mobsters and where a simple Wi-Fi connection can unleash a torrent of gold worth millions.

http://uploaded.net/file/i70o7ijr/kingpin.rar
or
http://ryushare.com/949336dcc41/kingpin.rar

Hacker's Delight (2nd Edition): Collection of Programming Hacks



Hacker's Delight (2nd Edition)

Henry S. Warren, "Hacker's Delight (2nd Edition)"
English | 2012-10-05 | ISBN: 0321842685 | 512 pages | EPUB + MOBI | 44.84 mb + 41.16 mb


In Hacker’s Delight, Second Edition, Hank Warren once again compiles an irresistible collection of programming hacks: timesaving techniques, algorithms, and tricks that help programmers build more elegant and efficient software, while also gaining deeper insights into their craft. Warren’s hacks are eminently practical, but they’re also intrinsically interesting, and sometimes unexpected, much like the solution to a great puzzle. They are, in a word, a delight to any programmer who is excited by the opportunity to improve.



Extensive additions in this edition include:
- A new chapter on cyclic redundancy checking (CRC), including routines for the commonly used CRC-32 code
- A new chapter on error correcting codes (ECC), including routines for the Hamming code
- More coverage of integer division by constants, including methods using only shifts and adds
- Computing remainders without computing a quotient
- More coverage of population count and counting leading zeros
- Array population count
- New algorithms for compress and expand
- An LRU algorithm
- Floating-point to/from integer conversions
- Approximate floating-point reciprocal square root routine
- A gallery of graphs of discrete functions
- Now with exercises and answers

The Web Application Hacker's Handbook: Discovering and Exploiting Security Flaws



The Web Application Hacker's Handbook: Discovering and Exploiting Security Flaws

The Web Application Hacker's Handbook: Discovering and Exploiting Security Flaws
English | 2008 | 768 Pages | ISBN: 0470170778 | PDF | 11 MB

This book is a practical guide to discovering and exploiting security flaws in web applications. The authors explain each category of vulnerability using real-world examples, screen shots and code extracts. The book is extremely practical in focus, and describes in detail the steps involved in detecting and exploiting each kind of security weakness found within a variety of applications such as online banking, e-commerce and other web applications.


Download


http://uploaded.net/file/4lmygx2l/wwweb.hck.rar
or
http://ryushare.com/fefzaj0rnvdj/wwweb.hck.rar

Sunday, January 13, 2013

Hackers: Heroes of the Computer Revolution (25th Anniversary Edition)



Hackers: Heroes of the Computer Revolution (25th Anniversary Edition)

Hackers: Heroes of the Computer Revolution (25th Anniversary Edition)
Publisher: O'Reilly Media 2010 | 528 Pages | ISBN: 1449388396 | PDF | 12 MB

This 25th anniversary edition of Steven Levy’s classic book traces the exploits of the computer revolution’s original hackers — those brilliant and eccentric nerds from the late 1950s through the early ’80s who took risks, bent the rules, and pushed the world in a radical new direction. With updated material from noteworthy hackers such as Bill Gates, Mark Zukerberg, Richard Stallman, and Steve Wozniak, Hackers is a fascinating story that begins in early computer research labs and leads to the first home computers.

..
Levy profiles the imaginative brainiacs who found clever and unorthodox solutions to computer engineering problems. They had a shared sense of values, known as “the hacker ethic,” that still thrives today. Hackers captures a seminal period in recent history when underground activities blazed a trail for today’s digital world, from MIT students finagling access to clunky computer-card machines to the DIY culture that spawned the Altair and the Apple II.

==] Purchase premium accounts
in order to enjoy unlimited downloads with resuming support
 


Saturday, January 12, 2013

Design for Hackers - Reverse Engineering Beauty



Design for Hackers - Reverse Engineering Beauty

Design for Hackers - Reverse Engineering Beauty
2011 | 352 Pages | ISBN: 1119998956 | EPUB | 34 MB

The smash hit introductory design book that debuted at #18 on Amazon

Hackers are able to accomplish so much in so little time because they come from a community that's built upon sharing knowledge. When it comes to programming, they can learn whatever they need to learn by reading manuals, or simply typing in a Google search. But learning design isn't so simple.

Many design books try to teach design through lists of "do's" and "don'ts." But hackers know you need a deeper understanding of something to really do it well. Design for Hackers takes apart design by "reverse-engineering" Impressionist painting, Renaissance sculpture, the Mac OS X Aqua interface, Twitter's web interface, and much more. You'll learn about color theory, typography, proportions, and design principles. This theoretical advice is mixed with concrete, actionable advice such as suggestions for color scheme tools, and a chart of "all of the fonts you'll ever need."
By the end of the book, you'll be seeing design through new eyes.

Friday, January 11, 2013

Violent Python: A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers


http://i49.fastpic.ru/big/2012/1208/b7/3054eedf028b78bf286bd92e6a7f31b7.jpg

Violent Python: A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers By TJ O'Connor

English | November 22, 2012 | ISBN: 1597499579 | 288 pages | PDF | 8 MB

Violent Python shows you how to move from a theoretical understanding of offensive computing concepts to a practical implementation. Instead of relying on another attacker's tools, this book will teach you to forge your own weapons using the Python programming language. This book demonstrates how to write Python scripts to automate large-scale network attacks, extract metadata, and investigate forensic artifacts. It also shows how to write code to intercept and analyze network traffic using Python, craft and spoof wireless frames to attack wireless and Bluetooth devices, and how to data-mine popular social media websites and evade modern anti-virus.


- Demonstrates how to write Python scripts to automate large-scale network attacks, extract metadata, and investigate forensic artifacts.

- Write code to intercept and analyze network traffic using Python. Craft and spoof wireless frames to attack wireless and Bluetooth devices.

- Data-mine popular social media websites and evade modern anti-virus.

Monday, January 7, 2013

Hacking Exposed: Malware & Rootkits Secrets & Solutions



Hacking Exposed: Malware & Rootkits Secrets & Solutions

Hacking Exposed: Malware & Rootkits Secrets & Solutions
Publisher: Mc//Gra//w-H//ill 2009 | 400 Pages | ISBN: 0071591184 | PDF | 11 MB

Defend against the ongoing wave of malware and rootkit assaults the failsafe Hacking Exposed way. Real-world case studies and examples reveal how today's hackers use readily available tools to infiltrate and hijack systems. Step-by-step countermeasures provide proven prevention techniques. Find out how to detect and eliminate malicious embedded code, block pop-ups and websites, prevent keylogging, and terminate rootkits. The latest intrusion detection, firewall, honeynet, antivirus, anti-rootkit, and anti-spyware technologies are covered in detail.



Download

Saturday, October 20, 2012

Rootkits for Dummies Book Download Free


http://i44.fastpic.ru/big/2012/1019/6a/0f670654a860d0439667f625ea2ae76a.jpg

Rootkits for Dummies
ISBN: 0471917109 | edition 2007 | PDF | 425 pages | 6 mb

A rootkit is a type of malicious software that gives the hacker "root" or administrator access to your network. They are activated before your system's operating system has completely booted up, making them extremely difficult to detect. Rootkits allow hackers to install hidden files, processes, and hidden user accounts. Hackers can use them to open back doors in order to intercept data from terminals, connections, and keyboards. A rootkit hacker can gain access to your systems and stay there for years, completely undetected.
DOWNLOAD LINKS

Uploaded:
http://uploaded.net/file/0sorr8te/Rootkits.for.Dummies.pdf

Extabit:
http://extabit.com/file/29fqn3torny2i/Rootkits.for.Dummies.pdf

Lumfile:
http://lumfile.com/qau3zkhw6as4/Rootkits.for.Dummies.pdf.html

Thursday, October 18, 2012

Vivek Ramachandran, "BackTrack 5 Wireless Penetration Testing Beginner's Guide"

BackTrack 5 Wireless Penetration Testing Beginner's Guide


Vivek Ramachandran, "BackTrack 5 Wireless Penetration Testing Beginner's Guide"
English | 2011-09-09 | ISBN: 1849515581 | 220 pages | PDF | 12,7 MB

Wireless has become ubiquitous in today’s world. The mobility and flexibility provided by it makes our lives more comfortable and productive. But this comes at a cost – Wireless technologies are inherently insecure and can be easily broken. BackTrack is a penetration testing and security auditing distribution that comes with a myriad of wireless networking tools used to simulate network attacks and detect security loopholes.


Backtrack 5 Wireless Penetration Testing Beginner’s Guide will take you through the journey of becoming a Wireless hacker. You will learn various wireless testing methodologies taught using live examples, which you will implement throughout this book. The engaging practical sessions very gradually grow in complexity giving you enough time to ramp up before you get to advanced wireless attacks.

This book will take you through the basic concepts in Wireless and creating a lab environment for your experiments to the business of different lab sessions in wireless security basics, slowly turn on the heat and move to more complicated scenarios, and finally end your journey by conducting bleeding edge wireless attacks in your lab.

There are many interesting and new things that you will learn in this book – War Driving, WLAN packet sniffing, Network Scanning, Circumventing hidden SSIDs and MAC filters, bypassing Shared Authentication, Cracking WEP and WPA/WPA2 encryption, Access Point MAC spoofing, Rogue Devices, Evil Twins, Denial of Service attacks, Viral SSIDs, Honeypot and Hotspot attacks, Caffe Latte WEP Attack, Man-in-the-Middle attacks, Evading Wireless Intrusion Prevention systems and a bunch of other cutting edge wireless attacks.

If you were ever curious about what wireless security and hacking was all about, then this book will get you started by providing you with the knowledge and practical know-how to become a wireless hacker.

Hands-on practical guide with a step-by-step approach to help you get started immediately with Wireless Penetration Testing

What you will learn from this book :

-Create a Wireless Lab for conducting experiments
-Monitor the air and sniff wireless packets
-Bypass WLAN authentication mechanism
-Crack WEP/WPA/WPA2 encryption mechanisms
-Break into a WLAN network using infrastructure flaws
-Break into a Wireless client such as a laptop
-Advanced attacks such as Man-in-the-Middle attacks and Evading WIPS
-Conduct wireless penetration test in a methodical way

Penetration Testing with BackTrack 4

BackTrack 4: Assuring Security by Penetration Testing
BackTrack 4: Assuring Security by Penetration Testing
P-ckt P-blishing (April 2011) | ISBN: 1849513945 | PDF + EPUB | 392 pages | 22.1 MB

BackTrack is a penetration testing and security auditing platform with advanced tools to identify, detect, and exploit any vulnerabilities uncovered in the target network environment. Applying appropriate testing methodology with defined business objectives and a scheduled test plan will result in robust penetration testing of your network.


BackTrack 4: Assuring Security by Penetration Testing is a fully focused, structured book providing guidance on developing practical penetration testing skills by demonstrating the cutting-edge hacker tools and techniques in a coherent step-by-step strategy. It offers all the essential lab preparation and testing procedures to reflect real-world attack scenarios from your business perspective in today’s digital age.

The authors’ experience and expertise enables them to reveal the industry’s best approach for logical and systematic penetration testing.

The first and so far only book on BackTrack OS starts with lab preparation and testing procedures, explaining the basic installation and configuration set up, discussing types of penetration testing (black-box and white-box), uncovering open security testing methodologies, and proposing the BackTrack specific testing process. The authors discuss a number of security assessment tools necessary to conduct penetration testing in their respective categories (target scoping, information gathering, discovery, enumeration, vulnerability mapping, social engineering, exploitation, privilege escalation, maintaining access, and reporting), following the formal testing methodology. Each of these tools is illustrated with real-world examples to highlight their practical usage and proven configuration techniques. The authors also provide extra weaponry treasures and cite key resources that may be crucial to any professional penetration tester.

This book serves as a single professional, practical, and expert guide to developing hardcore penetration testing skills from scratch. You will be trained to make the best use of BackTrack OS either in a commercial environment or an experimental test bed.

A tactical example-driven guide for mastering the penetration testing skills with BackTrack to identify, detect, and exploit vulnerabilities at your digital doorstep.

What you will learn from this book :

Initiate the BackTrack OS environment in your test lab by installing, configuring, running, and updating its core system components
Draw a formal BackTrack testing methodology
Scope your target with definitive test requirements, limitations, and business objectives, and schedule the test plan
Gain practical experience with a number of security tools from BackTrack logically divided into sub-categories of testing methodology
Practice the process of reconnaissance, discovery, enumeration, vulnerability mapping, social engineering, exploitation, privilege escalation, and maintaining access to your target for evaluation purposes
Document, report, and present your verified test results to the relevant authorities in a formal reporting structure
Assess the various technologies comprising your target information system’s environment, such as web applications, network administration servers, workstations, Cisco devices, firewalls, load balancers, routers, switches, intrusion detection and prevention devices, and many more
Examine and research the vulnerability in greater detail before attempting to exploit it by taking control of the target, thus reducing any false positives
Exploit human vulnerability by wrapping yourself with the art of deception to acquire the target

Approach

Written as an interactive tutorial, this book covers the core of BackTrack with real-world examples and step-by-step instructions to provide professional guidelines and recommendations to you. The book is designed in a simple and intuitive manner, which allows you to explore the whole BackTrack testing process or study parts of it individually.

Who this book is written for

If you are an IT security professional or network administrator who has a basic knowledge of Unix/Linux operating systems including awareness of information security factors, and you want to use BackTrack for penetration testing, then this book is for you.

Wednesday, October 10, 2012

The Guide to Backtrack – Hakin9 on Demand


hakin9 on demand 03/12 backtrack
Android Exploitation with Metasploit
by Aditya Gupta
In this article, we will be looking into the practical usage of Backtrack, and its tools. The article is divided into three sections – Android Exploitation through Metasploit, Nikto Vulnerability Scanner and w3af. The reader is expected to have basic knowledge of Backtrack and familiar with common web application vulnerabilities.
Use Metasploit in Backtrack 5
by Johan Loos
Metasploit comes in several flavors: Metasploit framework, Metasploit community edition, Metasploit pro. In Backtrack 5, Metasploit framework is installed by default. Metasploit framework provides you with information on security vulnerabilities which can be used to exploit a system. Penetration testers can also use this tool to launch manual or automated scans.
BackTrack 5 Toolkit Tutorial
by Vikas Kumar
BackTrack provides users with easy access to a comprehensive and large collection of security-related tools ranging from port scanners to password crackers. Support for Live CD and Live USB functionality allows users to boot BackTrack directly from portable media without requiring installation though permanent installation to hard disk is also an option.
Defending Layer 2 Attacks
by Nayan Sanchania
Security has been a major concern in today’s computer networks. There has been various exploits of attacks against companies, many of the attacks cost companies their reputation and cost them millions of pounds. Many attacks are implemented using inside knowledge from previous and even current employees.
BackTrack 5: The Ultimate Security Toolkit
by Steve Myers
In the security world today, a security professional relies heavily on knowing the right tools for the job, and knowing how to use these tools. There are hundreds of tools available and the list of tools is constantly changing and growing. For security assessments and penetration testing, there are very few toolkits as actively supported and all-encompassing as BackTrack 5.
Backtrack 5 Practical Applications And Use Cases
by Nicholas Popovich
This article breaks down what Backtrack Linux is, with a brief description and history. Then, we’ll explore a sampling of some of the many tools that are packaged within Backtrack Linux and provide use cases along with step-by-step tutorials to demonstrate some of the more common tasks that Backtrack is used to perform. Finally, we’ll see how most of the tools and techniques that Backtrack is designed to facilitate can be used by the many different roles in the IT security field.
How Exposed To Hackers Is the WordPress Website You Built
by Alex Kah
WordPress is likely the most popular website framework used on the web today. With over 65 million downloads and a very active community you can accomplish many goals with ease using WordPress.
Become Quieter with a Little Help from BT
by Dusko Pijetlovic
When you are faced with a task of testing your production environment and strengthening your defenses, your choice of the tool is easy. Instead of concentrating on collecting penetration (pen) testing tools, just head to BackTrack website and download an image of one of the most popular white hat penetration testing and security auditing platforms. It’s #7 on the sectools.org Top 125 Security Tools list.
BackTracking in Wifi Country
by Dennis King
The BackTrack 5 distribution continues to be the “go to” tool in a security professional’s arsenal. With the latest release, “Revolution,” the Backtrack development team delivers a kit you can use anywhere on both light and heavy duty security tasks.

hakin9 on demand 03/12 backtrackhakin9 on demand 03/12 backtrack - Hakin9 Teasers 
hakin9 on demand 03/12 backtrack




Follow the steps below to download the magazine:
  1. Register, accept the Disclaimer and choose subscription option.
    Attention!
    By choosing the Free Account option you will only be able to download the teaser of each issue.
  2. Verify your account using the verification link sent to your email address.
  3. Check the password sent on your email address and use it to log in.
  4. Click the download button to get the issue.

Tuesday, October 2, 2012

Hacker's Delight by Henry S. Warren


Henry S. Warren, «Hacker's Delight»

Henry S. Warren, «Hacker's Delight»
ISBN: 0201914654 | edition 2002 | CHM | 320 pages | 2 mb

This is the first book that promises to tell the deep, dark secrets of computer arithmetic, and it delivers in spades. It contains every trick I knew plus many, many more. A godsend for library developers, compiler writers, and lovers of elegant hacks, it deserves a spot on your shelf right next to Knuth.

http://uploaded.net/file/afoir9kn/_0201914654_28179629.chm
or
http://lumfile.com/1xa95t5re26n/0201914654_(1796).chm.html

Wednesday, September 5, 2012

Teri Bidwell, Michael Cross, Ryan Russell - Hack Proofing Your Identity

Hack Proofing Your Identity

Teri Bidwell, Michael Cross, Ryan Russell - Hack Proofing Your Identity
Published: 2002-06-15 | ISBN: 1931836515 | PDF | 512 pages | 8.89 MB

Identity-theft is the fastest growing crime in America, affecting approximately 900,000 new victims each year. Protect your assets and personal information online with this comprehensive guide.
Hack Proofing Your Identity will provide readers with hands-on instruction for how to secure their personal information on multiple devices. It will include simple measures as well as advanced techniques gleaned from experts in the field who have years of experience with identity theft and fraud. This book will also provide readers with instruction for identifying cyber-crime and the different ways they can report it if it occurs.

Hot Topic. Hack Proofing Your Identity will provide readers with both simple and advanced steps they can take to protect themselves from cyber-crime.

Expert Advice. This book will present security measures gathered from experts in both the federal government and the private sector to help secure your personal information and assets online.

Unique Coverage. Hack Proofing Your Identity will be the only book to include security measure for multiple devices like laptops, PDAs and mobile phones to allow users to protect themselves while taking advantage of the newest ways to access the Internet.

The Code Book - How to Make It, Break It, Hack It, Crack It

The Code Book - How to Make It, Break It, Hack It, Crack It

The Code Book - How to Make It, Break It, Hack It, Crack It
ISBN: 0385730624 | 272 | PDF | 272 pages | 2,6 MB

Calling upon accounts of political intrigue and tales of life and death, author Simon Singh tells history's most fascinating story of deception and cunning: the science of cryptography--the encoding and decoding of private information. Based on The Code Book: The Science of Secrecy from Ancient Egypt to Quantum Cryptography, this version has been abridged and slightly simplified for a younger audience. None of the appeal for curious problem-solving minds has been lost, though. From Julius Caesar to the 10th-century Arabs; from Mary Queen of Scots to "Alice and Bob"; from the Germans' Enigma machine to the Navajo code talkers in World War II, Singh traces the use of code to protect--and betray--secrecy. Moving right into the present, he describes how the Information Age has provided a whole new set of challenges for cryptographers. How private are your e-mail communications? How secure is sending your credit card information over the Internet? And how much secrecy will the government tolerate? Complex but highly accessible, The Code Book will make readers see the past--and the future--in a whole new light.

Wednesday, April 25, 2012

Information Security: A Manager's Guide to Thwarting Data Thieves and Hackers


Information Security: A Manager's Guide to Thwarting Data Thieves and Hackers

Information Security: A Manager's Guide to Thwarting Data Thieves and Hackers
English | ISBN: 0313345589 | 2008 | 188 pages | EPUB | 0,1 MB
 
Organizations with computer networks, Web sites, and employees carrying laptops and Blackberries face an array of security challenges. Among other things, they need to keep unauthorized people out of the network, thwart Web site hackers, and keep data safe from prying eyes or criminal hands. This book provides a high-level overview of these challenges and more. But it is not for the hard-core IT security engineer who works full time on networks. Instead, it is aimed at the nontechnical executive with responsibility for ensuring that information and assets stay safe and private. Written by a practicing information security officer, Philip Alexander, the book contains the latest information and arms readers with the knowledge they need to make better business decisions.
 
http://ryushare.com/dbbbe22de96/0313345589_InformSecur.epub

The Web Application Hacker's Handbook 2nd Edition


The Web Application Hacker's Handbook 2nd Edition
The Web Application Hacker's Handbook 2nd Edition
PDF | ISBN-10: 1118026470 | 13.52 MB
Description:
Web applications are the front door to most organizations, exposing them to attacks that may disclose personal information, execute fraudulent transactions, or compromise ordinary users. This practical book has been completely updated and revised to discuss the latest step-by-step techniques for attacking and defending the range of ever-evolving web applications. You'll explore the various new technologies employed in web applications that have appeared since the first edition and review the new attack techniques that have been developed, particularly in relation to the client side.

Reveals how to overcome the new technologies and techniques aimed at defending web applications against attacks that have appeared since the previous edition
Discusses new remoting frameworks, HTML5, cross-domain integration techniques, UI redress, framebusting, HTTP parameter pollution, hybrid file attacks, and more
Features a companion web site hosted by the authors that allows readers to try out the attacks described, gives answers to the questions that are posed at the end of each chapter, and provides a summarized methodology and checklist of tasks
Focusing on the areas of web application security where things have changed in recent years, this book is the most current resource on the critical topic of discovering, exploiting, and preventing web application security flaws.


The Web Application Hacker's Handbook 2nd Edition


Extabit Links
http://extabit.com/file/27b35hpppeysb


Rapidgator mirror
http://rapidgator.net/file/6004359

Gray Hat Hacking The Ethical Hackers Handbook (3rd edition)


Gray Hat Hacking

Allen Harper, Shon Harris, Jonathan Ness, Chris Eagle, Gideon Lenkey, Terron Williams - Gray Hat Hacking The Ethical Hackers Handbook (3rd edition)
Published: 2011-01-06 | ISBN: 0071742557 | PDF | 720 pages | 13.47 MB


THE LATEST STRATEGIES FOR UNCOVERING TODAY'S MOST DEVASTATING ATTACKS
Thwart malicious network intrusion by using cutting-edge techniques for finding and fixing security flaws. Fully updated and expanded with nine new chapters, Gray Hat Hacking: The Ethical Hacker's Handbook, Third Edition details the most recent vulnerabilities and remedies along with legal disclosure methods. Learn from the experts how hackers target systems, defeat production schemes, write malicious code, and exploit flaws in Windows and Linux systems. Malware analysis, penetration testing, SCADA, VoIP, and Web security are also covered in this comprehensive resource.
Download

http://letitbit.net/download/84924.866471694c7b8cac6a56f6bf6234/2012-04-19-16-0071742557.pdf.html

or

http://vip-file.com/downloadlib/413697571636099584-84924.866471694c7b8cac6a56f6bf6234/2012-04-19-16-0071742557.pdf.html

The Basics of Hacking and Penetration Testing


The Basics of Hacking and Penetration Testing
The Basics of Hacking and Penetration Testing
PDF | ISBN-10: 1597496553 | 180 pages | 3.74 MB
Description:
The Basics of Hacking and Penetration Testing serves as an introduction to the steps required to complete a penetration test or perform an ethical hack. You learn how to properly utilize and interpret the results of modern day hacking tools; which are required to complete a penetration test. Tool coverage will include, Backtrack Linux, Google, Whois, Nmap, Nessus, Metasploit, Netcat, Netbus, and more. A simple and clean explanation of how to utilize these tools will allow you to gain a solid understanding of each of the four phases and prepare them to take on more in-depth texts and topics. This book includes the use of a single example (pen test target) all the way through the book which allows you to clearly see how the tools and phases relate.


The Basics of Hacking and Penetration Testing


Extabit Links
http://extabit.com/file/27b35fypankc7


Rapidgator mirror
http://rapidgator.net/file/7113468