Thursday, December 13, 2007

Syngress - Hack Proofing your Network - Download ebook

Called "a bold, unsparing tour of information that never serves from the practical", this updated and considerably expanded bestseller will quickly achieve top shelf placement on your information security bookshelf. Hack Proofing Your Network, Second Edition shows you that the only way to stop a hacker is to think like one.
- Know the Laws of Security
- Learn the Seven Categories of Attack
- Prevent Diffing
- Learn about Standard Cryptographic Algorithms
- Understand Format String Vulnerabilities
- Read About Session Hijacking Types
- Understand the Strategic Constraints of Tunnel Design
- Hack Proof Your Hardware
- Download a Free Sniffer from the Book's Web Site



Book info:
Hack Proofing your Network
by David R. Mirza Ahmad, Ido Dubrawsky, Hal Flynn,
Joseph “Kingpin” Grand, Robert Graham, Norris L. Johnson, Jr., K2,
Dan “Effugas” Kaminsky, F. William Lynch, Steve W. Manzuik, Ryan Permeh,
Ken Pfeil, Rain Forest Puppy, Syngress Publications,
ebook format: PDF
ISBN-10: 1-928994-70-9


Download this ebook here:
Click and Download link - 7.9MB

Recommend:
Always buy original paperback edition, and experience the difference.

Read More......

Friday, November 16, 2007

EC-council - Official Ethical Hacking Courseware - Download ebook

This module attempts to bridge various aspects of ethical hacking by suggesting an approach for undertaking penetration testing. There are different ways of approaching a penetration test.
This book covers following topics in depth
- Footprinting / Information Gathering phase
- Discovery and Planning / Information Analysis phase
- Detecting a vulnerability / security loophole
- Attack / Penetration / Compromise
- Analysis of security posture / Cover up / Report
- Clean up
Download this book in digital format.




ebook info:
Ethical Hacking (EC-Council Exam 312-50): Student Courseware
by International Council of Electronic Commerce Consultants
OSB Publication
ebook format: CHM
ISBN-10: 0972936211




Download this ebook here:
Click and Download link - 14.8MB

Recommend:
Always buy original paperback edition, and experience the difference.

Read More......

Wednesday, November 14, 2007

Prentice Hall - Intrusion Detection Systems with Snort - Download ebook

Snort is an open source Network Intrusion Detection System (NIDS) which is
available free of cost. NIDS is the type of Intrusion Detection System (IDS) that is used for scanning data flowing on the network.
The book starts with an introduction to intrusion detection and related terminology.
You will learn installation and management of Snort as well as other products that work with Snort. These products include MySQL database and Analysis Control for Intrusion Database (ACID). Snort has the capability to log data collected (such as alerts and other log messages) to a database. MySQL is used as the database engine where all of this data is stored. Using Apache web server and ACID, you can analyze this data. A combinationof Snort, Apache, MySQL, and ACID makes it possible to log the intrusion.
Download the digital version of this book.




Book info:
Intrusion Detection Systems with Snort
by Rafeeq Ur Rehman
Prentice Hall publications
ebook format: PDF
ISBN-10: 0-13-140733-3




Download this ebook here:
Click and Download link

Recommend:
Always buy original paperback edition, and experience the difference.

Read More......

Friday, November 9, 2007

OReilly - Spidering Hacks - Download ebook

There comes a time when surfing just isn't enough. It may be that you get sick of checking the Amazon rank of your favourite book, or you find a stash of images or media files that you want to download or maybe you find yourself endlessly cycling through the same set of sites day in a day out looking for specific pieces of data (stock prices, weather reports, news items, knitting patterns …). When that day dawns then that's when you start looking seriously at the different spidering options that are available to do away with the drudgery or to expand your reach. It should also be a day when you reach for 'Spidering Hacks', particularly if you're a Perl user or are prepared to dive in and learn.
As already mentioned, the hacks in this book mostly use Perl, though scattered here and there you'll find some Java, Python and PHP. If you really hate Perl, then this is not the place for you. On the other hand the authors assume only a rudimentary knowledge of Perl, and there is no requirement for any knowledge of network programming of any description. After the opening chapter which gives guidance of being a going spidering citizen (i.e. how to respect the sites you are sucking data from), there is a second chapter which details how to create a spidering toolkit (i.e. how to find and install the site of modules that many of the hacks depend on).
Download this book in digital format.




Book info:
Spidering Hacks
By Tara Calishain, Kevin Hemenway
O'Reilly Publications
ebook format: CHM
ISBN-10: 0-596-00577-6




Download this ebook here:
Click and Download link - 1.4MB

Recommend:
Always buy original paperback edition, and experience the difference.

Read More......

Thursday, November 8, 2007

McGraw Hill - HackNotes Web Security Portable Reference - Download ebook

This book should serve as a reference, hopefully dog-eared and lying
next to the keyboard. It collects a lot of information from security
sites, but introduces new techniques and pointers and ties them into a
trusted methodology. Thus, the Reference Center might be sufficient for
the experienced web hacker who lives by the URL alone, as well as
someone interested in an aspect of security outside of port scanners and
canned buffer overflow exploits. Every web application is different. In
this book you will find the methods to analyze, pick apart, and secure
any application. The methodology is still there, but the focus is on tools
and techniques.
Download this book in digital format.




Book info:
HACKNOTES Web Security Portable Reference
by Mike Shema
McGraw Hill Publications
ebook format: PDF
ISBN-10: 0-07-222784-2




Download this ebook here:
Click and Download link - 2.07MB

Recommend:
Always buy original paperback edition, and experience the difference.

Read More......

Wednesday, November 7, 2007

Securing & Optimizing Linux: The Ultimate Solution - Download ebook

This 3rd edition of the very popular title "Securing & Optimizing Linux" looks for security measures that go beyond firewalls and intrusion detection systems to anticipate and protect against upcoming threats. Securing & Optimizing Linux: The Hacking Solution: A hacker's guide to protect your Linux server designed for system administrators, managers, or Linux users who wish to protect their Linux systems from unauthorized intrusions and other external attacks. This new edition contains many tips and useful information related to security and optimization to help you get complete control of what could happen on your Linux server and network.




Book info:
Securing and Optimizing Linux: The Ultimate Solution
by Gerhard Mourani
Open Network Architecture, Inc. Publication
ebook format: PDF
ISBN-10: 0-9688793-0-6




Download this ebook here:
Click and Download link - 6.5MB

Recommend:
Always buy original paperback edition, and experience the difference.

Read More......

Monday, November 5, 2007

Addison Wesley - Hackers Delight - Download ebook

This is a collection of small programming tricks that author have come across over many years. Most of them will work only on computers that represent integers in two's-complement form. Although a 32-bit machine is assumed when the register length is relevant, most of the tricks are easily adapted to machines with other register sizes. This book does not deal with large tricks such as sophisticated sorting and compiler optimization techniques. Rather, it deals with small tricks that usually involve individual computer words or instructions, such as counting the number of 1-bits in a word. Such tricks often use a mixture of arithmetic and logical instructions.
Download the digital version of this book.




Book info:
Hacker's Delight
By Henry S. Warren,
Addison Wesley Publications
ebook format: CHM
ISBN: 0-201-91465-4




Download this ebook here:
Click and Download link - 2.2MB

Recommend:
Always buy original paperback edition, and experience the difference.

Read More......

Sunday, November 4, 2007

Hacking Secrets Revealed - Download ebook

These are just a few of the topics that will be covered in this document:
- How “hackers” get into your system
- What tools they use
- How a hacker can effectively “Bug” your house via your
computer. (Don’t believe me, read on you’ll be very
surprised)
- What information they have access to. And why you
should try to protect yourself. (You might be surprised to
find out what they know.)
- Tips and tricks that hackers use
- How your Antivirus software alone is not enough
- What to look for if you suspect you’re being hacked
- What the greatest flaw to all computers are
And more…



Book info:
Hacking Secrets Revealed
by S&C enterprises


Download this ebook here:
Click and Download link - 504KB

Recommend:
Always buy original paperback edition, and experience the difference.

Read More......

Friday, November 2, 2007

APress - Cryptography in C and C++ - Download ebook

This book offers a comprehensive, yet relentlessly practical overview of the fundamentals of modern cryptography. Welschenbach avoids complexities by explaining cryptography and its mathematical basis in terms a programmer can easily understand. Coverage mainly focuses on the practical aspects involved in implementing public key cryptography methods, such as the RSA algorithm. It also gives both a technical overview and an implementation of the Rijndael Advanced Encryption Standard algorithm.The book includes a wide-ranging library of code in C and C++, including the RSA algorithm, completed by an extensive Test Suite that proves that the code works correctly. Readers will learn, step by step, how to implement a platform independent library for the all-important multi-precision arithmetic used in modern cryptography. This is followed by an implementation of the cryptographic algorithms themselves.
Download the digital version of this book.




Book info:
Cryptography in C and C++
by Michael Welschenbach
Apress Publications
ebook format: CHM
ISBN-10:189311595x




Download this ebook here:
Click and Download link - 3.6MB

Recommend:
Always buy original paperback edition, and experience the difference.

Read More......

Thursday, November 1, 2007

OReilly - Wireless Hacks - Download ebook

As with any new technology, buying your gear is only the first step. Understanding how to make the best use of it is another story. Wireless Hacks offers 100 industrial-strength tips about wireless networking, contributed by experts who apply what they know in the real world every day. Each Hack can be read in just a few minutes, but can save you hours of research. Inside, you will find a wealth of useful techniques for making the most out of wireless technology, including:
Written for the intermediate to advanced wireless user, Wireless Hacks is full of direct, practical, ingenious solutions to real-world networking problems. Whether your wireless network needs to extend to the edge of your office or to the other end of town, this collection of non-obvious, "from the field" techniques will show you how to get the job done.



Book info:
Wireless Hacks: 100 industrial Strength tips and tools
By Rob Flickenger
O'Reilly OPublications
ebook format: CHM
ISBN-10: 0-596-00559-8




Download this ebook here:
Click and Download link - 4.2MB

Recommend:
Always buy original paperback edition, and experience the difference.

Read More......

Tuesday, October 30, 2007

Prentice Hall - Biometrics and Network Security - Download ebook

In Biometrics for Network Security, biometrics security expert Paul Reid covers a variety of biometric options, ranging from fingerprint identification to voice verification to hand, face, and eye scanning. Approaching the subject from a practitioner's point of view, Reid describes guidelines, applications, and procedures for implementing biometric solutions for your network security systems.
Coverage includes:
- An introduction to authentication technologies and biometrics Dealing with privacy issues
- Biometric technologies, including finger, hand geometry, handwriting, iris, retina, voice, and face
- Security concerns related to biometrics, including attempts to spoof or fake results
- Deployment of biometric security systems, including vendor selection and roll out procedures
- Real-life case studies
For security, system, and network administrators and managers, as well as anyone who is interested in the application of cutting-edge biometric technology, Biometrics for Network Security will prove an indispensable addition to your library!
Download this book in digital format for free.


Book info:
Biometrics for Network Security
By Paul Reid
Prentice Hall PTR Publications
ebook format: CHM
ISBN-10: 0-13-101549-4

Download this ebook here:
Click and Download link - 1.1MB

Recommend:
Always buy original paperback edition, and experience the difference.

Read More......

Sunday, October 28, 2007

OReilly - Practical Unix and Internet Security - Download ebook

This new edition of Practical Unix & Internet Security provides detailed coverage of today's increasingly important security and networking issues. Focusing on the four most popular Unix variants today--Solaris, Mac OS X, Linux, and FreeBSD--this book contains new information on PAM (Pluggable Authentication Modules), LDAP, SMB/Samba, anti-theft technologies, embedded systems, wireless and laptop issues, forensics, intrusion detection, chroot jails, telephone scanners and firewalls, virtual and cryptographic filesystems, WebNFS, kernel security levels, outsourcing, legal issues, new Internet protocols and cryptographic algorithms, and much more.
Download the digital version of this book free below.



Book info:
Practical Unix & Internet Security, 3rd Edition
By Simson Garfinkel, Alan Schwartz, Gene Spafford
O'Reilly Publications
ebook format: CHM
ISBN-10: 0-596-00323-4

Download this ebook here:
Click and Download link - 2.5MB

Recommend:
Always buy original paperback edition, and experience the difference.

Read More......

Thursday, October 25, 2007

OReilly - IRC Hacks - Download ebook

While IRC is easy to get into and many people are happy to use it without being aware of what's happening under the hood, there are those who hunger for more knowledge, and this book is for them. Some of the world's most renowned IRC hackers have grouped together to contribute their hacks, making this book essential reading for anybody who wants to create IRC bots, tweak their IRC client, or even write their own. IRC Hacks is a collection of tips and tools that cover just about everything needed to become a true IRC master, featuring contributions from some of the most renowned IRC hackers, many of whom collaborated on IRC, grouping together to form the channel #irchacks on the freenode IRC network (irc.freenode.net). Like all of our Hacks books, there are many different ways to use IRC Hacks.
Download this book in digital version for free.



Book info:
IRC Hacks: 100 Industrial-Strength Tips & Tools
By Paul Mutton
O'Reilly Publications
ebook format: CHM
ISBN-10: 0-596-00687-X

Download this ebook here:
Click and Download link - 3.3MB

Recommend:
Always buy original paperback edition, and experience the difference.

Read More......

Monday, October 22, 2007

Syngress - Stealing the Network - Download ebook

Stealing the Network: How to Own the Box is a unique book in the fiction department. It combines stories that are fictional with technology that is real.While none of these specific events have happened, there is no reason why they could not.You could argue it provides a roadmap for criminal hackers, but I say it does something else: It provides a glimpse into the creative minds of some of today’s best hackers, and even the best hackers will tell you that the game is a mental one.The phrase “Root is a state of mind,” coined by K0resh and printed on shirts from DEF CON, sums this up nicely.While you may have the skills, if you lack the mental fortitude, you will never reach the top.This is what separates the truly elite hackers from the wannabe hackers.
Donwload this book in digital format.



Book info:
Stealing the Network: How to Own the Box
Ryan Russell Tim Mullen (Thor) FX Dan “Effugas” Kaminsky
Joe Grand Ken Pfeil Ido Durbrawsky
Mark Burnett Paul Craig
Syngress Publications
ebook format: PDF
ISBN-10: 1-931836-87-6

Download this ebook here:
Click and Download link - 4.8MB

Recommend:
Always buy original paperback edition, and experience the difference.

Read More......

Saturday, October 20, 2007

Syngress - Nokia Network Security Solutions Handbook - Download ebook

The Nokia Network Security Solutions Handbook introduces readers to both the basics and the finer points of administering, configuring, and securing the Nokia IP-series hardware appliances. It introduces readers to the different hardware models and covers the features associated with each. Installation and setup are covered in detail, as well as installation and configuration of the Check Point firewall on the Nokia system.
Readers will learn basic system administration, security, and monitoring before moving into advanced system administration concepts, as well as learning how to use Nokia's command line interface. Routing configurations and the different protocols involved are covered in detail, finishing off with a comprehensive discussion of the High-availability configuration that is Nokia's strength. The appendices include coverage of the UNIX basics which lie at the heart of the IPSO operating system and a review of the other packages available for Nokia systems (such as Perl and Bash).
Download this book in digital format.



Book info:
Nokia Network Security Solutions Handbook
by Kyle X. Hourihan, Daniel Kligerman, Tony Bautts,
Robert J. Shimonski, Kevin Greene
Syngress Publications
ebook format: PDF
ISBN-10: 1-931836-70-1

Download this ebook here:
Click and Download link - 11.2MB

Recommend:
Always buy original paperback edition, and experience the difference.

Read More......

Thursday, October 18, 2007

OReilly - Linux Security Cookbook - Download ebook

The Linux Security Cookbook includes real solutions to a wide range of targeted problems, such as sending encrypted email within Emacs, restricting access to network services at particular times of day, firewalling awebserver, preventing IP spoofing, setting up key-based SSH authentication, and much more. With over 150 ready-to-use scripts and configuration files, this unique book helps administrators and security enthusiasts secure their systems without having to look up specific syntax.



Book info:
Linux Security Cookbook
By Daniel J. Barrett, Robert G. Byrnes, Richard Silverman
O'Reilly Publications
ebook format: CHM
ISBN-10: 0-596-00391-9

Download this ebook here:
Click and Download link - 672KB

Recommend:
Always buy original paperback edition, and experience the difference.

Read More......

Tuesday, October 16, 2007

iDefense Labs - Hacking The Invisible Network - Download ebook

Several reports have discussed weakness in the Wired Equivalent Privacy (WEP) algorithm employed by 802.11x standard to encrypt wireless data. This has lead to development of automated tools, such as AirSnort and WEPCrack, that automate recovery of encryption keys. This document addresses how to find the vulnerablilities inherent in WEP algorithm, how to determine if a WLAN is vulnerable using freeware tools and most importantly how to best secure WLANs.



Book info:
Hacking the Invisible Network: Insecurities in 802.11x
by Michael Sutton
iDEFENSE Labs Publications

Download this ebook here:
Click and Download link - 336KB

Recommend:
Always buy original paperback edition, and experience the difference.

Read More......

Monday, October 15, 2007

OReilly - PDF Hacks - Download ebook

PDF Hacks is ideal for anyone who works with PDF on a regular basis. Learn how to create PDF documents that are far more powerful than simple representations of paper pages. Hacks cover the full range of PDF functionality, including generating, manipulating, annotating, and consuming PDF information. Far more than another guide to Adobe Acrobat, the book covers a variety of readily available tools for generating, deploying, and editing PDF.
PDF Hacks will show you how to create PDF documents that are far more powerful than simple representations of paper pages. The hacks in the book cover the full range of PDF functionality, from the simple to the more complex, including generating, manipulating, annotating, and consuming PDF information. You'll learn how to manage content in PDF, navigate it, and reuse it as necessary. Far more than another guide to Adobe Acrobat, the book covers a variety of readily available tools for generating, deploying, and editing PDF.



Book info:
PDF Hacks: 100 Industrial-Strength Tips & Tools
By Sid Steward
O'Reilly Publications
ebook format: CHM
ISBN-10: 0-596-00655-1


Download this ebook here:
Click and Download link - 3.6MB

Recommend:
Always buy original paperback edition, and experience the difference.

Read More......

Sunday, October 14, 2007

MS press - Security+ Certification - Download ebook

Welcome to the Security+ Certification Training Kit. This training kit introduces the basic concepts of computer security. It is designed to prepare you to take the Security+ Certification exam administered by the Computing Technology Industry Association (CompTIA). The Security+ Certification program covers the computer security technologies most commonly used today. Passing the Security+ Certification exam means you are certified as possessing the basic knowledge and skills needed to work in computer security. However, this book is not just about getting you through the exam. The lessons in these chapters also provide you with knowledge you'll use to create a more secure computing environment.



Book info:
Security+ Certification Training Kit
by Microsoft Corporation ,Andy Ruth, Kurt Hudson
Microsoft Corporation Press Publications
ebook format: CHM
ISBN-13: 9780735618220
ISBN-10: 0735618224

Download this ebook here:
Click and Download link - 1.2MB

Recommend:
Always buy original paperback edition, and experience the difference.

Read More......

Saturday, October 13, 2007

Sybex - Computer Forensics JumpStart - Download ebook

This book covers the field of computer forensics, including the basic elements, concepts, tools, and common activities that will prepare you with a solid under- standing of the field. You will be able to participate in investigations and under- stand the process of finding, collecting, and analyzing evidence. The material in this book can be applied to both criminal investigations and incident response activities. You don't have to be a member of law enforcement to benefit from the material presented here. Nontechnical people can also benefit from this book in that it covers the basic approach computer examiners take in an investigation.




Book info:
Computer Forensics JumpStart
by Michael G. Solomon, Diane Barrett and Neil Broom
Sybex Publications
ebook format: CHM
ISBN-10: 078214375x

Download this ebook here:
Click and Download link - 8.08MB

Recommend:
Always buy original paperback edition, and experience the difference.

Read More......

Thursday, October 11, 2007

Auerbach - Cyber Crime Investigators Field Guide - Download ebook

Organizations demand experts with both investigative talents and a technical knowledge of how cyberspace really works. Cyber Crime Investigator's Field Guide, Second Edition provides the investigative framework that needs to be followed, along with information about how cyberspace works and the tools that reveal the who, what, when, where, why, and how in the investigation of cyber crime. This volume offers a valuable Q&A by subject area, an extensive overview of recommended reference materials, and a detailed case study. Appendices highlight attack signatures, UNIX/Linux commands, Cisco PIX commands, port numbers targeted by trojan horses, and more.



ebook info:
Cyber Crime Investigators Field Guide
by Bruce Middleton
Auerbach - CRC Press Publications
ebook format: PDF
ISBN-10: 0-8493-1192-6

Download this ebook here:
Click and Download link - 1.6MB

Recommend:
Always buy original paperback edition, and experience the difference.

Read More......

Wednesday, October 10, 2007

Addison Wesley - Real 802.11 Security wi-fi Protected Access - Download ebook

Real 802.11 Security addresses the theory, implementations, and reality of Wi-Fi security. It provides an overview of security issues, explains how security works in Wi-Fi networks, and explores various security and authentication protocols. The book concludes with an in-depth discussion of real-world security issues and attack tools. Written by two experts in wireless security, Jon Edney and William Arbaugh, this book shows you how to stay informed and aware when making security decisions, and what steps you can take to implement the most effective, proactive wireless security now and in the future.



ebook info:
Real 802.11 Security: Wi-Fi Protected Access and 802.11i
By Jon Edney, William A. Arbaugh
Addison Wesley Publications
ebook format: CHM
ISBN-10: 0-321-13620-9

Download this ebook here:
Click and Download link - 3.06MB

Recommend:
Always buy original paperback edition, and experience the difference.

Read More......

Tuesday, October 9, 2007

Wiley - Hack Attacks Revealed - Download ebook

The primary objective of this book is to lay a solid foundation from which to explore the world of security. Simply, this book tells the truth about hacking, to bring awareness about the so-called Underground, the hacker’s community, and to provide the tools for doing so.
The book is divided into six parts:
· Part 1: In the Beginning
· Part 2: Putting It All Together
· Part 3: Uncovering Vulnerabilities
· Part 4: Hacking Security Holes
. Part 5: Vulnerability Hacking Secrets
. Part 6: The Hacker’s Toolbox
Evaluators of this book have suggested that this book it may become a required reference for managers, network administrators (CNAs, MCPs), network engineers (CNEs, MCSEs), internetworking engineers (CCNA/P, CCIEs), even interested laypeople. The material in this book will give the members in each of these categories a better understanding of how to hack their network vulnerabilities.
Download this book in digital format.



ebook info;
Hack Attacks Revealed A Complete Reference with Custom Security Hacking Toolkit
by John Chirillo
Wiley Publications
ebook format: PDF
ISBN-10: 0-471-41624-X

Download this ebook here:
Click and Download link - 7.3MB

Recommend:
Always buy original paperback edition, and experience the difference.

Read More......

Monday, October 8, 2007

Springer - Computer Viruses from Theory to Applications - Download ebook

The idea of what a virus is has a different meaning in the non-specialist’s mind, so much so that most of the time viruses are confused with the more general idea of malware (or malicious programs). The term of “virus” for computers appeared only in 1988. However, the artificial beings that are denoted by the term of virus did in fact exist many years before and their theoretical fundaments were established long before their real existence. The formal work of mathematicians during the 1930s largely contributed to the development of viruses. A number of virus writers have discovered a huge field of applications with this formalization. This fact may be less wellknown. Early viruses only put von Neumann’s theory of self-reproducing automata into application. In the same way, viral polymorphism did not appear “ex nihilo”. This book takes you through logic of some famous viruses and in way teach you what are different things that virus writers target for.
Download this book in digital format below.



ebook info:
Computer viruses: from theory to applications
by Eric Filiol
Springer Publications
ebook format: PDF
ISBN-10: 2-287-20297-8

Download this ebook here:
Click and Download link - 2.3MB

Recommend:
Always buy original paperback edition, and experience the difference.

Read More......

Saturday, October 6, 2007

Springer - Computer Security in the 21st Century - Download ebook

Computer security has moved to the forefront of public concern in the new millennium. Hardly a day passes where newspaper headlines do not scream out worries about "phishing" , "identity theft" , "browser exploits" , "computer worms" , "computer viruses" , "online privacy" , and related concerns. The major vendor of computer operating systems has announced that computer security is now its top priority. Governments around the world, including most major governments in North America, Europe, and East Asia continue to worry about "cyber-terrorism" and "cyber-war" as active concerns. It was in this charged environment that we decided to hold a workshop in December 2003 on emerging technologies for computer security. The workshop was held in Taipei in conjunction with several other conferences (notably Asiacrypt) and featured leading researchers from the Asia-Pacific region and the United States. What followed was three days of exchange of ideas that led to a number of significant developments. This book attempts to share some of the research trends that were reflected in the best papers published at the
conference.



Book info:
Computer Security in the 21st Century
by D.T. Lee, S.P. Shieh, J.D. Tygar.
Syngress Publications
ebook format: PDF
ISBN-10: 0-387-24005-5

Download this ebook here:
Click and Download link -12.33MB

Recommend:
Always buy original paperback edition, and experience the difference.

Read More......

Saturday, September 29, 2007

Que - Certified Ethical Hacker Exam Prep - ebook Download

The CEH certification shows knowledge of network penetration testing skills. The CEH exam takes three hours and 125 questions, requiring a broad and deep knowledge of network security issues. The CEH Exam Prep is the perfect solution for this challenge, giving you the solid, in-depth coverage you'll need to score higher on the exam.
Along with the most current CEH content, the book also contains the elements that make Exam Preps such strong study aides: comprehensive coverage of exam topics, end-of-chapter review, practice questions, Exam Alerts, Fast Facts, plus an entire practice exam to test your understanding of the material. The book also features MeasureUp's innovative testing software, to help you drill and practice your way to higher scores

Download the digital version of this book.



Book info:
Certified Ethical Hacker Exam Prep
By Michael Gregg
Que Publications
ebook format: CHM
ISBN-10: 0-7897-3531-8
ISBN-13: 978-0-7897-3531-7

Download this ebook here:
Click and Download link - 8.6MB

Recommend:
Always buy original paperback edition, and experience the difference.

Read More......

Friday, September 28, 2007

Wiley - Hacking Wireless Networks for Dummies - Download ebook

Hacking Wireless Networks For Dummies - book outlines plain-English, wireless-network hacker tricks and techniques you can use to ethically hack 802.11-based wireless networks (yours or someone else’s if you’ve been given permission) and discover security vulnerabilities. By turning the tables and using ethical hacking techniques, you then have a leg up on the malicious hackers — you’ll be aware of any vulnerabilities that exist and be able to plug the holes before the bad guys have a chance to exploit them.
This book will show you quite a few of the latest tools, but an exhaustive text
covering all currently-available wireless hacking tools would require a forklift
to move, and would require you to remove all other books from your bookshelves to make room. With this many available tools, the important factor becomes learning how to use them effectively and efficiently.
Download this book in digital format.




Book info:
Hacking Wireless Networks for Dummies
by Kevin Beaver and Peter T.Davis
Wiley Publications
ebook format: PDF
ISBN-13: 978-0-7645-9730-5
ISBN-10: 0-7645-9730-2




Download this ebook here:
Click and Download link - 8.08MB

Recommend:
Always buy original paperback edition, and experience the difference.

Read More......

Thursday, September 27, 2007

Sybex - Official CEH Review Guide - download ebook

The Certified Ethical Hacker (CEH) exam was developed by the International Council of E-Commerce Consultants (EC-Council) to provide an industry-wide means of certifying the competency of security professionals. The CEH certification is granted to those who have attained the level of knowledge and troubleshooting skills needed to provide capable support in the field of computer and network security.
CEH: Official Certified Ethical Hacker Review Guide is designed to be a succinct, portable exam review guide that can be used either in conjunction with a more complete study program, computer-based training courseware, or classroom/lab environment, or as an exam review tool for those want to brush up before taking the exam.
Download the digital version of this book.




Book info:
CEH Official Certified Ethical Hacker Review Guide
by Kimberly Graves
Wiley publications
digital format: PDF
ISBN-13: 978-0-7821-4437-6




Download this ebook here:
Click and Download link - 3.3MB

Recommend:
Always buy original paperback edition, and experience the difference.

Read More......

Tuesday, September 25, 2007

McGraw Hill - Hacking Exposed - Download ebook

“The seminal book on white-hat hacking and countermeasures... Should be required reading for anyone with a server or a network to secure.” --Bill Machrone, PC Magazine
"The definitive compendium of intruder practices and tools." --Steve Steinke, Network Magazine
"For almost any computer book, you can find a clone. But not this one... A one-of-a-kind study of the art of breaking in." --UNIX Review
Here is the latest edition of international best-seller, Hacking Exposed. Using real-world case studies, renowned security experts Stuart McClure, Joel Scambray, and George Kurtz show IT professionals how to protect computers and networks against the most recent security vulnerabilities. You'll find detailed examples of the latest devious break-ins and will learn how to think like a hacker in order to thwart attacks. Coverage includes:
Code hacking methods and countermeasures
New exploits for Windows 2003 Server, UNIX/Linux, Cisco, Apache, and Web and wireless applications
Latest DDoS techniques--zombies, Blaster, MyDoom
All new class of vulnerabilities--HTTP Response Splitting.
Download the digital format of this book.




Digital eBook info:
Hacking Exposed: Network Security Secrets and Solutions
Joel Scambray, Stuart McClure, George Kurtz
Osborne/McGraw-Hill Publications
ebook format: PDF
ISBN-10: 0-07-219214-3




Download this ebook here:
Click and Download link-19.43MB

Recommend:
Always buy original paperback edition, and experience the difference.

Read More......

Monday, September 24, 2007

OReilly - Network Warrior - Download ebook

This book attempts to teach you what you need to know in the real world. When should you choose a layer-3 switch over a layer-2 switch? How do you tell if your network is performing as it should? How do you fix a broadcast storm? How do you know you're having one? How do you know you have a spanning-tree loop, and how do you fix it? What is a T1, or a DS3 for that matter? How do they work? In this book, you'll find the answers to all of these questions, and many, many more. Network Warrior includes configuration examples from real-world events and designs, and is littered with anecdotes from authors time in the field.
Download this book in digital format.




Book info:
Network Warrior
by Gary A. Donahue
O'Reilly Publication
ebook format: CHM
ISBN-10: 0-596-10151-1
ISBN-13: 978-0-59-610151-0




Download this ebook here:
Click and Download link - 9.3MB

Recommend:
Always buy original paperback edition, and experience the difference.

Read More......

Sunday, September 23, 2007

AList - Hacker Web Exploitation Uncovered - Download ebook

This book is about vulnerabilities in Web applications, that is, scripts and programs running on a server and available using Hypertext Transfer Protocol (HTTP). It tries to give you the most comprehensive information about common mistakes made by inexperienced Web programmers. Hackers can exploit these mistakes to obtain access to a system, gain higher privileges in it, or both. It describes common weaknesses in the writing of web pages
This book is written from both the attacker's and security specialist's perspective. Covered is detecting, investigating, exploiting, and eliminating vulnerabilities in Web applications as well as errors such as PHP source code injection, SQL injection, and XSS. The most common vulnerabilities in PHP and Perl scripts and methods of exploiting these weaknesses are described, information on writing inter site scripts and secure systems for the hosted sites, creating secure authorization systems, and bypassing authorization. Uncovered is how attackers can benefit from the hosted target and why an apparently normal-working application might be vulnerable.
Download this digital version of book.




Book info:
Hacker Web Exploitation Uncovered
by Marsel Nizamutdinov
A-LIST Publication
ebook format: CHM
ISBN-10:1931769494




Download this ebook here:
Click and Download link - 1.1MB

Recommend:
Always buy original paperback edition, and experience the difference.

Read More......

Friday, September 21, 2007

Syngress - Cyber Crime Investigations - Download ebook

The book begins with the chapter "What is Cyber Crime?" This introductory chapter describes the most common challenges faced by cyber investigators today. The following chapters discuss the methodologies behind cyber investigations; and frequently encountered pitfalls. Issues relating to cyber crime definitions, the electronic crime scene, computer forensics, and preparing and presenting a cyber crime investigation in court will be examined. Not only will these topics be generally be discussed and explained for the novice, but the hard questions the questions that have the power to divide this community will also be examined in a comprehensive and thoughtful manner.
This book will serve as a foundational text for the cyber crime community to begin to move past current difficulties into its next evolution.
* This book has been written by a retired NYPD cyber cop, who has worked many high-profile computer crime cases
* Discusses the complex relationship between the public and private sector with regards to cyber crime
* Provides essential information for IT security professionals and first responders on maintaining chain of evidence
Download this book in sigital format.




Book info:
Cyber Crime Investigations
by Anthony Reyes
Kevin O’Shea, Jim Steele, Jon R. Hansen, Captain Benjamin R. Jean, Thomas Ralph
Syngress Publication
ebook format: PDF
ISBN-10: 1-59749-133-0
ISBN-13: 978-1-59749-133-4




Download this ebook here:
Click and Download link - 8.3MB

Recommend:
Always buy original paperback edition, and experience the difference.

Read More......

Thursday, September 20, 2007

McGraw Hill - 19 Deadly Sins of Software Security - Download ebook

This book, aimed squarely at all software developers, outlines the most common and destructive coding sins and how to eradicate them from code before customers use the software. This book applies to you whether your code is written in C, C++, Java, C#, ASP, ASP.NET, Visual Basic, PHP, Perl, or JSP. It is written for Windows, Linux, Apple Mac OS X, OpenBSD, or Solaris platforms and targets rich clients, thin clients, or web users. Frankly, it doesn’t matter what operating system or programming language you use, and it doesn’t matter how secure the underlying platform is. If your code is insecure, your customers could be open to attack.
Download this book in digital format for free.




Book info:
19 Deadly Sins of Software Security: Programming Flaws and How to Fix Them
by Michael Howard, David LeBlanc and John Viega
McGraw-Hill/Osborne Publication
ebook format: CHM
ISBN-10:0072260858




Download this ebook here:
Click and Download link - 1.4MB

Recommend:
Always buy original paperback edition, and experience the difference.

Read More......

Tuesday, September 18, 2007

OReilly - Windows XP Hacks - Download ebook

This book includes 100 hacks that are useful, frequently entertaining, and will save you countless hours at the keyboard. Whether you want to speed up your PC, customize XP's interface, hack your wired and wireless network, get more out of the Web, make better use of email, use the Registry to bend the operating system to your will, or use XP for countless other useful tasks, you'll find what you're looking for here. And each hack doesn't just show you how to do something; it also teaches why it works. Each hack is a starting point, rather than an ending point, so that you can apply the knowledge you've gained to create new hacks of your own.
Download this book in digital format.




Book info:
Windows XP Hacks
By Preston Gralla
O'Reilly Publication
ebook format: CHM
ISBN-10: 0-596-00511-3




Download this ebook here:
Click and Download link - 5.4MB

Recommend:
Always buy original paperback edition, and experience the difference.

Read More......

Saturday, September 15, 2007

McGraw Hill - Anti Hacker Tool kit - Download ebook

This book aims to feature "best practices" for using security tools, giving background not only on how to use a tool but also on the underlying reasons of why and when to use a particular tool. Through the use of screenshots, code listings, example tool usage, and case studies, this book aims to show how each tool can be used in certain real-world situations that may mirror your own.
This book is divided into four parts: multifunctional tools, tools to audit systems on the network, tools to audit the network, and tools to aid in the investigation of incidents within your infrastructure. Combining the book into these four parts, you should have the proper and field-tested tools to perform
- Auditing and prevention
- Detection of incidents
- Investigations and response
- Remediation
Download this book in digital format for free.




Book info:
Anti-Hacker Tool Kit, Third Edition
by Mike Shema, Chris Davis, Aaron Philipp and David Cowen
McGraw-Hill/Osborne Publications
ebook format: CHM
ISBN-10:0072262877




Download this ebook here:
Click and Download link - 36.1MB

Recommend:
Always buy original paperback edition, and experience the difference.

Read More......

Thursday, September 13, 2007

OReilly - Google Hacks - Download ebook

A large part of Google Hacks concerns itself with the Google API (the collection of capabilities that Google exposes for use by software) and other programmers' resources. For example, the authors include a simple Perl application that queries the Google engine with terms specified by the user. They also document XooMLe, which delivers Google results in XML form. In brief, this is the best compendium of Google's lesser-known capabilities available anywhere, including the Google site itself. --David Wall
Topics covered: How to get the most from the Google search engine by using its Web-accessible features (including product searches, image searches, news searches, and newsgroup searches) and the large collection of desktop-resident toolbars available, as well as its advanced search syntax. Other sections have to do with programming with the Google API and simple "scrapes" of results pages, while further coverage addresses how to get your Web page to feature prominently in Google keyword searches
Download this book in digital format.




Book info:
Google Hacks
By Tara Calishain, Rael Dornfest
O'Reilly Publication
ebook format: CHM
ISBN-10: 0-596-00447-8




Download this ebook here:
Click and Download link - 2.6MB

Recommend:
Always buy original paperback edition, and experience the difference.

Read More......

Saturday, September 8, 2007

hackin9 - Dangerous Google Searching for secrets - Download ebook

Google serves some 80 percent of all search queries on the Internet, making it by far the most popular search engine. Its popularity is due not only to excellent search effectiveness, but also extensive querying capabilities. However, we should also remember that the Internet is a highly dynamic medium, so the results presented by Google are not always up-to-date – some search results might be stale, while other relevant resources might not yet have been visited by Googlebot (the automatic script that browses and indexes Web resources for Google).Tables in this book presents a summary of the most important and most useful query operators along with their descriptions, while Figures shows document locations referred to by the operators when applied to Web searches. Of course, this is just a handful of examples – skillful Google querying can lead to much more interesting results. Hunting for Prey Google makes it possible to reach not just publicly available Internet resources, but also some that should never have been revealed.
Download this ebook for free.



Book info:
Dangerous Google - Sarching for secrets
by Michal Piotrowski
This article has been published in issue 4/2005 of the hakin9 magazine.

Download this ebook here:
Click and Download link - 1.7MB

Recommend:
Always buy original paperback edition, and experience the difference.

Read More......

A Wesley - Find The Bug A Book Of Incorrect Programs - Download ebook

Bug hunting is an art, and you need to be a master. Get Find the Bug, and you'll become one. Long-time Microsoft programmer Adam Barr presents 50 programs, each with exactly one bug. Your assignment: find it. As you do, Barr will teach you how to "think like your processor"... anticipating exactly how code will behave, even without running it. You'll learn better ways to read code, understand it -- and above all, improve it. Whether you're building new systems or maintaining someone else's, you'll find bugs earlier, faster, with less frustration... and write cleaner code to begin with.
- Presents "bugged" programs in C, Java, Python, Perl, and x86 assembly language, with carefully explained solutions
- Includes language overviews to help you debug all 50 examples, even if you don't know the language
- Shows how to look past the "surface" of code to uncover its hidden internal logic
Offers practical guidance on analyzing programs, including specific inputs to test
- Presents a wide range of realistic bugs, with no phony "gotchas"
- Draws on the types of coding and debugging challenges Microsoft uses to interview new programmers
- An indispensable resource for working programmers, maintainers, testers, quality specialists, and everyone involved in code reviews
Download this book in digital format.




Book info:
Find the Bug A Book of Incorrect Programs
By Adam Barr
Addison Wesley Professional Publication
ebook format: CHM
ISBN-10: 0-321-22391-8




Download this ebook here:
Click and Download link - 413KB

Recommend:
Always buy original paperback edition, and experience the difference.

Read More......

Friday, September 7, 2007

Syngress - Mission Critical Internet Security - Download ebook

The growth of the Internet and its reach into the fabric of business and personal life has outdistanced most organizations' ability to protect the confidentiality and integrity of information. The increased exposure and the constant escalation of threats to network security have increased the need for effective controls that can restore availability, confidentiality, and integrity to information systems. Mission Critical! Internet Security shows how security can be provided in TCP/IP at any layer, and outlines the advantages and disadvantages of each approach. This book will answer the questions you have about Internet Security, including:
- If I use protocol switching on my network, what protocol should I use in place of IP?
- Should I be placing my VPN gateway at the same level as my firewall?
- Can I use IPSec to secure communications with my Win 9x machines?
- Are there back doors in PGP?
- Would a firewall or other security product interfere with the IDS?
- How does SOCKS Proxy differ from WinSock Proxy?
- I am setting up my outbound access control lists to specify which traffic I will permit users to use.
- How do I know which TCP or UDP port a particular application uses?
Download this book in digital format.




Book info:
Mission Critical Internet Security
by Bradley Dunsmore, Jeffrey Brown, Michael Cross
Technical editor: Stace Cunningham
Syngress Publication
ebook format: PDF
ISBN-10: 1928994202
ISBN-13: 978-1928994206




Download this e-book here:
Click and Download link - 3.67MB

Recommend:
Always buy original paperback edition, and experience the difference.

Read More......

Monday, September 3, 2007

Addison Wesley - File System Forensic Analysis - Download ebook

Understanding how file systems work is one of the most technically challenging concepts for a digital investigator because there exists little documentation. Now, security expert Brian Carrier has written the definitive reference for everyone who wants to understand and be able to testify about how file system analysis is performed. Carrier begins with an overview of investigation and computer foundations and then gives an authoritative, comprehensive, and illustrated overview of contemporary volume and file systems: Crucial information for discovering hidden evidence, recovering deleted data, and validating your tools. Along the way, he describes data structures, analyzes example disk images, provides advanced investigation scenarios, and uses today's most valuable open source file system analysis tools—including tools he personally developed. Coverage includes in fact everything that an forensic analysts would be interested in knowing in depth.
Download this book in digital format.




Book info:
File System Forensic Analysis
By Brian Carrier
Addison Wesley Professional Publication
ebook format: CHM
ISBN-10: 0-32-126817-2




Download this ebook here:
Click and Download link - 3.9 MB

Recommend:
Always buy original paperback edition, and experience the difference.

Read More......

Addison Wesley - The Art of Computer Virus Research and Defense - Download ebook

Symantec's chief antivirus researcher has written the definitive guide to contemporary virus threats, defense techniques, and analysis tools. Unlike most books on computer viruses, The Art of Computer Virus Research and Defense is a reference written strictly for white hats: IT and security professionals responsible for protecting their organizations against malware. Peter Szor systematically covers everything you need to know, including virus behavior and classification, protection strategies, antivirus and worm-blocking techniques, and much more.
Szor presents the state-of-the-art in both malware and protection, providing the full technical detail that professionals need to handle increasingly complex attacks. Along the way, he provides extensive information on code metamorphism and other emerging techniques, so you can anticipate and prepare for future threats.
Download this book in digital format.




Book info:
The Art of Computer Virus Research and Defense
by Peter Szor
Addison Wesley Publication
ebook format: CHM
ISBN-10: 0-321-30454-3




Download this ebook here:
Click and Download - 6.7MB

Recommend:
Always buy original paperback edition, and experience the difference.

Read More......

Saturday, September 1, 2007

Prentice Hall - Security in Computing 4th edition - Download

For years, IT and security professionals and students have turned to Security in Computing as the definitive guide to information about computer security attacks and countermeasures. In their new fourth edition, Charles P. Pfleeger and Shari Lawrence Pfleeger have thoroughly updated their classic guide to reflect today's newest technologies, standards, and trends.
Security in Computing, Fourth Edition, goes beyond technology, covering crucial management issues faced in protecting infrastructure and information. This edition contains an all-new chapter on the economics of cybersecurity, explaining ways to make a business case for security investments. Another new chapter addresses privacy--from data mining and identity theft, to RFID and e-voting.
Download this book in digital format.




Book info:
Security in Computing, Fourth Edition
By Charles P. Pfleeger - Pfleeger Consulting Group, Shari Lawrence Pfleeger - RAND Corporation
...............................................
Publisher: Prentice Hall
Pub Date: October 13, 2006
Print ISBN-10: 0-13-239077-9
Print ISBN-13: 978-0-13-239077-4
Pages: 880




Download this ebook here:
Click and Download link - 8.1MB

Recommend:
Always buy original paperback edition, and experience the difference.

Read More......

Friday, August 31, 2007

CRC press - Information Security management Handbook - Download

The landscape of information security has changed. The bad news: It is more nebulous than ever before. No longer can chief information security officers work solely within the confines of their organizations’security policies or their industry-specific regulatory mandates and feel comfortable that the depth and efficacy of their program will not be second guessed. As current events unfold, established institutions such as Bank of America, Lexis-Nexis, and Choicepoint watch as their reputations come into question and their names are plastered on the front pages of the national media. Regardless of the incidental details, be they business process fraud or third-party errors and omissions, all of the events to date have been publicized as “security breaches.” Read about this and more in this book.
Download this book in digital format.




Book info:
Information Security Management Handbook, fifth edition, volume 3
by Harold F. Tipton, Micki Krause
Auerbach Publication
ISBN-10: 0-8493-9561-5
ISBN-13: 978-0-8493-9561-1




Download this ebook here:
Click and Download Link - 8.4 MB

Recommend:
Always buy original paperback edition, and experience the difference.

Read More......

Sunday, August 26, 2007

Wiley - CISSP preparation guide - Download

The need to protect information resources has produced a demand for information systems security professionals. Along with this demand came a need to ensure that these professionals possess the knowledge to perform the required job functions. To address this need, the Certified Information Systems Security Professional (CISSP) certification was developed. This certification guarantees to all parties that the certified individual meets standard criteria of knowledge and continues to upgrade that knowledge in the field of information systems security. The CISSP initiative also serves to enhance the recognition and reputation of the field of information security. This book discuses all the essentials concepts of security in considerable depth. This book is must read for all those trying for (ISC)2 certification.
Download this book in digital format.




Book info:
The CISSP prep guide: mastering the ten domains of computer security
Ronald L. Krutz,
Russell Dean Vines.
John Wiley & sons Inc. Publishing
ISBN 0-471-41356-9




Download this ebook and get ready for certification.
Click and Download - 5.92MB

Recommend:
Always buy original paperback edition, and experience the difference.

Read More......

Saturday, August 25, 2007

Que - Exam Cram 2 CISSP practice questions - Download

The aim of this book is to provide you with practice questions complete with answers an explanations that will help you learn, drill and review for CISSP certification exam.
Topics covered:
Access Control, Telecommunications and Network security, Physical Security, Cryptography, Security Management, law Investigation and ethics, Operations Security, Security Architecture and models, Application Security, Business Continuity and planning.
Download this book in digital format.




Book info:
Exam Cram 2 - CISSP practice questions
by Michael Gregg
Que Publication
ISBN: 0-7897-3305-6




Download this ebook here:
Click and Download - 1.2MB

Recommend:
Always buy original paperback edition, and experience the difference.

Read More......

Wiley - Integarted Auditing of ERP Systems - Download

Enterprise Resource Planning (ERP) System implementation is both an art and science that consists of planning, implementation, and ongoing maintenance. This methodology is designed to automate the drudgery of implementation and provide organized approaches to problem solving by listing, diagramming, and documenting all steps. Structured methodologies help to standardize and systemize ERP implementation and maintenance by approaching them as an engineering discipline rather than as whims of individual software developers. It is essential to understand structured methodologies in the implementation of ERP systems.
Download this book in digital format.




Book info:
Integrated auditing of ERP systems
by Yusufali F. Musaji.
John Wiley & Sons Inc. Publishing
ISBN 0-471-23518-0




Download this ebook:
Click and Download - 2.91MB

Recommend:
Always buy original paperback edition, and experience the difference.

Read More......