Saturday, September 29, 2007

Que - Certified Ethical Hacker Exam Prep - ebook Download

The CEH certification shows knowledge of network penetration testing skills. The CEH exam takes three hours and 125 questions, requiring a broad and deep knowledge of network security issues. The CEH Exam Prep is the perfect solution for this challenge, giving you the solid, in-depth coverage you'll need to score higher on the exam.
Along with the most current CEH content, the book also contains the elements that make Exam Preps such strong study aides: comprehensive coverage of exam topics, end-of-chapter review, practice questions, Exam Alerts, Fast Facts, plus an entire practice exam to test your understanding of the material. The book also features MeasureUp's innovative testing software, to help you drill and practice your way to higher scores

Download the digital version of this book.



Book info:
Certified Ethical Hacker Exam Prep
By Michael Gregg
Que Publications
ebook format: CHM
ISBN-10: 0-7897-3531-8
ISBN-13: 978-0-7897-3531-7

Download this ebook here:
Click and Download link - 8.6MB

Recommend:
Always buy original paperback edition, and experience the difference.

Read More......

Friday, September 28, 2007

Wiley - Hacking Wireless Networks for Dummies - Download ebook

Hacking Wireless Networks For Dummies - book outlines plain-English, wireless-network hacker tricks and techniques you can use to ethically hack 802.11-based wireless networks (yours or someone else’s if you’ve been given permission) and discover security vulnerabilities. By turning the tables and using ethical hacking techniques, you then have a leg up on the malicious hackers — you’ll be aware of any vulnerabilities that exist and be able to plug the holes before the bad guys have a chance to exploit them.
This book will show you quite a few of the latest tools, but an exhaustive text
covering all currently-available wireless hacking tools would require a forklift
to move, and would require you to remove all other books from your bookshelves to make room. With this many available tools, the important factor becomes learning how to use them effectively and efficiently.
Download this book in digital format.




Book info:
Hacking Wireless Networks for Dummies
by Kevin Beaver and Peter T.Davis
Wiley Publications
ebook format: PDF
ISBN-13: 978-0-7645-9730-5
ISBN-10: 0-7645-9730-2




Download this ebook here:
Click and Download link - 8.08MB

Recommend:
Always buy original paperback edition, and experience the difference.

Read More......

Thursday, September 27, 2007

Sybex - Official CEH Review Guide - download ebook

The Certified Ethical Hacker (CEH) exam was developed by the International Council of E-Commerce Consultants (EC-Council) to provide an industry-wide means of certifying the competency of security professionals. The CEH certification is granted to those who have attained the level of knowledge and troubleshooting skills needed to provide capable support in the field of computer and network security.
CEH: Official Certified Ethical Hacker Review Guide is designed to be a succinct, portable exam review guide that can be used either in conjunction with a more complete study program, computer-based training courseware, or classroom/lab environment, or as an exam review tool for those want to brush up before taking the exam.
Download the digital version of this book.




Book info:
CEH Official Certified Ethical Hacker Review Guide
by Kimberly Graves
Wiley publications
digital format: PDF
ISBN-13: 978-0-7821-4437-6




Download this ebook here:
Click and Download link - 3.3MB

Recommend:
Always buy original paperback edition, and experience the difference.

Read More......

Tuesday, September 25, 2007

McGraw Hill - Hacking Exposed - Download ebook

“The seminal book on white-hat hacking and countermeasures... Should be required reading for anyone with a server or a network to secure.” --Bill Machrone, PC Magazine
"The definitive compendium of intruder practices and tools." --Steve Steinke, Network Magazine
"For almost any computer book, you can find a clone. But not this one... A one-of-a-kind study of the art of breaking in." --UNIX Review
Here is the latest edition of international best-seller, Hacking Exposed. Using real-world case studies, renowned security experts Stuart McClure, Joel Scambray, and George Kurtz show IT professionals how to protect computers and networks against the most recent security vulnerabilities. You'll find detailed examples of the latest devious break-ins and will learn how to think like a hacker in order to thwart attacks. Coverage includes:
Code hacking methods and countermeasures
New exploits for Windows 2003 Server, UNIX/Linux, Cisco, Apache, and Web and wireless applications
Latest DDoS techniques--zombies, Blaster, MyDoom
All new class of vulnerabilities--HTTP Response Splitting.
Download the digital format of this book.




Digital eBook info:
Hacking Exposed: Network Security Secrets and Solutions
Joel Scambray, Stuart McClure, George Kurtz
Osborne/McGraw-Hill Publications
ebook format: PDF
ISBN-10: 0-07-219214-3




Download this ebook here:
Click and Download link-19.43MB

Recommend:
Always buy original paperback edition, and experience the difference.

Read More......

Monday, September 24, 2007

OReilly - Network Warrior - Download ebook

This book attempts to teach you what you need to know in the real world. When should you choose a layer-3 switch over a layer-2 switch? How do you tell if your network is performing as it should? How do you fix a broadcast storm? How do you know you're having one? How do you know you have a spanning-tree loop, and how do you fix it? What is a T1, or a DS3 for that matter? How do they work? In this book, you'll find the answers to all of these questions, and many, many more. Network Warrior includes configuration examples from real-world events and designs, and is littered with anecdotes from authors time in the field.
Download this book in digital format.




Book info:
Network Warrior
by Gary A. Donahue
O'Reilly Publication
ebook format: CHM
ISBN-10: 0-596-10151-1
ISBN-13: 978-0-59-610151-0




Download this ebook here:
Click and Download link - 9.3MB

Recommend:
Always buy original paperback edition, and experience the difference.

Read More......

Sunday, September 23, 2007

AList - Hacker Web Exploitation Uncovered - Download ebook

This book is about vulnerabilities in Web applications, that is, scripts and programs running on a server and available using Hypertext Transfer Protocol (HTTP). It tries to give you the most comprehensive information about common mistakes made by inexperienced Web programmers. Hackers can exploit these mistakes to obtain access to a system, gain higher privileges in it, or both. It describes common weaknesses in the writing of web pages
This book is written from both the attacker's and security specialist's perspective. Covered is detecting, investigating, exploiting, and eliminating vulnerabilities in Web applications as well as errors such as PHP source code injection, SQL injection, and XSS. The most common vulnerabilities in PHP and Perl scripts and methods of exploiting these weaknesses are described, information on writing inter site scripts and secure systems for the hosted sites, creating secure authorization systems, and bypassing authorization. Uncovered is how attackers can benefit from the hosted target and why an apparently normal-working application might be vulnerable.
Download this digital version of book.




Book info:
Hacker Web Exploitation Uncovered
by Marsel Nizamutdinov
A-LIST Publication
ebook format: CHM
ISBN-10:1931769494




Download this ebook here:
Click and Download link - 1.1MB

Recommend:
Always buy original paperback edition, and experience the difference.

Read More......

Friday, September 21, 2007

Syngress - Cyber Crime Investigations - Download ebook

The book begins with the chapter "What is Cyber Crime?" This introductory chapter describes the most common challenges faced by cyber investigators today. The following chapters discuss the methodologies behind cyber investigations; and frequently encountered pitfalls. Issues relating to cyber crime definitions, the electronic crime scene, computer forensics, and preparing and presenting a cyber crime investigation in court will be examined. Not only will these topics be generally be discussed and explained for the novice, but the hard questions the questions that have the power to divide this community will also be examined in a comprehensive and thoughtful manner.
This book will serve as a foundational text for the cyber crime community to begin to move past current difficulties into its next evolution.
* This book has been written by a retired NYPD cyber cop, who has worked many high-profile computer crime cases
* Discusses the complex relationship between the public and private sector with regards to cyber crime
* Provides essential information for IT security professionals and first responders on maintaining chain of evidence
Download this book in sigital format.




Book info:
Cyber Crime Investigations
by Anthony Reyes
Kevin O’Shea, Jim Steele, Jon R. Hansen, Captain Benjamin R. Jean, Thomas Ralph
Syngress Publication
ebook format: PDF
ISBN-10: 1-59749-133-0
ISBN-13: 978-1-59749-133-4




Download this ebook here:
Click and Download link - 8.3MB

Recommend:
Always buy original paperback edition, and experience the difference.

Read More......

Thursday, September 20, 2007

McGraw Hill - 19 Deadly Sins of Software Security - Download ebook

This book, aimed squarely at all software developers, outlines the most common and destructive coding sins and how to eradicate them from code before customers use the software. This book applies to you whether your code is written in C, C++, Java, C#, ASP, ASP.NET, Visual Basic, PHP, Perl, or JSP. It is written for Windows, Linux, Apple Mac OS X, OpenBSD, or Solaris platforms and targets rich clients, thin clients, or web users. Frankly, it doesn’t matter what operating system or programming language you use, and it doesn’t matter how secure the underlying platform is. If your code is insecure, your customers could be open to attack.
Download this book in digital format for free.




Book info:
19 Deadly Sins of Software Security: Programming Flaws and How to Fix Them
by Michael Howard, David LeBlanc and John Viega
McGraw-Hill/Osborne Publication
ebook format: CHM
ISBN-10:0072260858




Download this ebook here:
Click and Download link - 1.4MB

Recommend:
Always buy original paperback edition, and experience the difference.

Read More......

Tuesday, September 18, 2007

OReilly - Windows XP Hacks - Download ebook

This book includes 100 hacks that are useful, frequently entertaining, and will save you countless hours at the keyboard. Whether you want to speed up your PC, customize XP's interface, hack your wired and wireless network, get more out of the Web, make better use of email, use the Registry to bend the operating system to your will, or use XP for countless other useful tasks, you'll find what you're looking for here. And each hack doesn't just show you how to do something; it also teaches why it works. Each hack is a starting point, rather than an ending point, so that you can apply the knowledge you've gained to create new hacks of your own.
Download this book in digital format.




Book info:
Windows XP Hacks
By Preston Gralla
O'Reilly Publication
ebook format: CHM
ISBN-10: 0-596-00511-3




Download this ebook here:
Click and Download link - 5.4MB

Recommend:
Always buy original paperback edition, and experience the difference.

Read More......

Saturday, September 15, 2007

McGraw Hill - Anti Hacker Tool kit - Download ebook

This book aims to feature "best practices" for using security tools, giving background not only on how to use a tool but also on the underlying reasons of why and when to use a particular tool. Through the use of screenshots, code listings, example tool usage, and case studies, this book aims to show how each tool can be used in certain real-world situations that may mirror your own.
This book is divided into four parts: multifunctional tools, tools to audit systems on the network, tools to audit the network, and tools to aid in the investigation of incidents within your infrastructure. Combining the book into these four parts, you should have the proper and field-tested tools to perform
- Auditing and prevention
- Detection of incidents
- Investigations and response
- Remediation
Download this book in digital format for free.




Book info:
Anti-Hacker Tool Kit, Third Edition
by Mike Shema, Chris Davis, Aaron Philipp and David Cowen
McGraw-Hill/Osborne Publications
ebook format: CHM
ISBN-10:0072262877




Download this ebook here:
Click and Download link - 36.1MB

Recommend:
Always buy original paperback edition, and experience the difference.

Read More......

Thursday, September 13, 2007

OReilly - Google Hacks - Download ebook

A large part of Google Hacks concerns itself with the Google API (the collection of capabilities that Google exposes for use by software) and other programmers' resources. For example, the authors include a simple Perl application that queries the Google engine with terms specified by the user. They also document XooMLe, which delivers Google results in XML form. In brief, this is the best compendium of Google's lesser-known capabilities available anywhere, including the Google site itself. --David Wall
Topics covered: How to get the most from the Google search engine by using its Web-accessible features (including product searches, image searches, news searches, and newsgroup searches) and the large collection of desktop-resident toolbars available, as well as its advanced search syntax. Other sections have to do with programming with the Google API and simple "scrapes" of results pages, while further coverage addresses how to get your Web page to feature prominently in Google keyword searches
Download this book in digital format.




Book info:
Google Hacks
By Tara Calishain, Rael Dornfest
O'Reilly Publication
ebook format: CHM
ISBN-10: 0-596-00447-8




Download this ebook here:
Click and Download link - 2.6MB

Recommend:
Always buy original paperback edition, and experience the difference.

Read More......

Saturday, September 8, 2007

hackin9 - Dangerous Google Searching for secrets - Download ebook

Google serves some 80 percent of all search queries on the Internet, making it by far the most popular search engine. Its popularity is due not only to excellent search effectiveness, but also extensive querying capabilities. However, we should also remember that the Internet is a highly dynamic medium, so the results presented by Google are not always up-to-date – some search results might be stale, while other relevant resources might not yet have been visited by Googlebot (the automatic script that browses and indexes Web resources for Google).Tables in this book presents a summary of the most important and most useful query operators along with their descriptions, while Figures shows document locations referred to by the operators when applied to Web searches. Of course, this is just a handful of examples – skillful Google querying can lead to much more interesting results. Hunting for Prey Google makes it possible to reach not just publicly available Internet resources, but also some that should never have been revealed.
Download this ebook for free.



Book info:
Dangerous Google - Sarching for secrets
by Michal Piotrowski
This article has been published in issue 4/2005 of the hakin9 magazine.

Download this ebook here:
Click and Download link - 1.7MB

Recommend:
Always buy original paperback edition, and experience the difference.

Read More......

A Wesley - Find The Bug A Book Of Incorrect Programs - Download ebook

Bug hunting is an art, and you need to be a master. Get Find the Bug, and you'll become one. Long-time Microsoft programmer Adam Barr presents 50 programs, each with exactly one bug. Your assignment: find it. As you do, Barr will teach you how to "think like your processor"... anticipating exactly how code will behave, even without running it. You'll learn better ways to read code, understand it -- and above all, improve it. Whether you're building new systems or maintaining someone else's, you'll find bugs earlier, faster, with less frustration... and write cleaner code to begin with.
- Presents "bugged" programs in C, Java, Python, Perl, and x86 assembly language, with carefully explained solutions
- Includes language overviews to help you debug all 50 examples, even if you don't know the language
- Shows how to look past the "surface" of code to uncover its hidden internal logic
Offers practical guidance on analyzing programs, including specific inputs to test
- Presents a wide range of realistic bugs, with no phony "gotchas"
- Draws on the types of coding and debugging challenges Microsoft uses to interview new programmers
- An indispensable resource for working programmers, maintainers, testers, quality specialists, and everyone involved in code reviews
Download this book in digital format.




Book info:
Find the Bug A Book of Incorrect Programs
By Adam Barr
Addison Wesley Professional Publication
ebook format: CHM
ISBN-10: 0-321-22391-8




Download this ebook here:
Click and Download link - 413KB

Recommend:
Always buy original paperback edition, and experience the difference.

Read More......

Friday, September 7, 2007

Syngress - Mission Critical Internet Security - Download ebook

The growth of the Internet and its reach into the fabric of business and personal life has outdistanced most organizations' ability to protect the confidentiality and integrity of information. The increased exposure and the constant escalation of threats to network security have increased the need for effective controls that can restore availability, confidentiality, and integrity to information systems. Mission Critical! Internet Security shows how security can be provided in TCP/IP at any layer, and outlines the advantages and disadvantages of each approach. This book will answer the questions you have about Internet Security, including:
- If I use protocol switching on my network, what protocol should I use in place of IP?
- Should I be placing my VPN gateway at the same level as my firewall?
- Can I use IPSec to secure communications with my Win 9x machines?
- Are there back doors in PGP?
- Would a firewall or other security product interfere with the IDS?
- How does SOCKS Proxy differ from WinSock Proxy?
- I am setting up my outbound access control lists to specify which traffic I will permit users to use.
- How do I know which TCP or UDP port a particular application uses?
Download this book in digital format.




Book info:
Mission Critical Internet Security
by Bradley Dunsmore, Jeffrey Brown, Michael Cross
Technical editor: Stace Cunningham
Syngress Publication
ebook format: PDF
ISBN-10: 1928994202
ISBN-13: 978-1928994206




Download this e-book here:
Click and Download link - 3.67MB

Recommend:
Always buy original paperback edition, and experience the difference.

Read More......

Monday, September 3, 2007

Addison Wesley - File System Forensic Analysis - Download ebook

Understanding how file systems work is one of the most technically challenging concepts for a digital investigator because there exists little documentation. Now, security expert Brian Carrier has written the definitive reference for everyone who wants to understand and be able to testify about how file system analysis is performed. Carrier begins with an overview of investigation and computer foundations and then gives an authoritative, comprehensive, and illustrated overview of contemporary volume and file systems: Crucial information for discovering hidden evidence, recovering deleted data, and validating your tools. Along the way, he describes data structures, analyzes example disk images, provides advanced investigation scenarios, and uses today's most valuable open source file system analysis tools—including tools he personally developed. Coverage includes in fact everything that an forensic analysts would be interested in knowing in depth.
Download this book in digital format.




Book info:
File System Forensic Analysis
By Brian Carrier
Addison Wesley Professional Publication
ebook format: CHM
ISBN-10: 0-32-126817-2




Download this ebook here:
Click and Download link - 3.9 MB

Recommend:
Always buy original paperback edition, and experience the difference.

Read More......

Addison Wesley - The Art of Computer Virus Research and Defense - Download ebook

Symantec's chief antivirus researcher has written the definitive guide to contemporary virus threats, defense techniques, and analysis tools. Unlike most books on computer viruses, The Art of Computer Virus Research and Defense is a reference written strictly for white hats: IT and security professionals responsible for protecting their organizations against malware. Peter Szor systematically covers everything you need to know, including virus behavior and classification, protection strategies, antivirus and worm-blocking techniques, and much more.
Szor presents the state-of-the-art in both malware and protection, providing the full technical detail that professionals need to handle increasingly complex attacks. Along the way, he provides extensive information on code metamorphism and other emerging techniques, so you can anticipate and prepare for future threats.
Download this book in digital format.




Book info:
The Art of Computer Virus Research and Defense
by Peter Szor
Addison Wesley Publication
ebook format: CHM
ISBN-10: 0-321-30454-3




Download this ebook here:
Click and Download - 6.7MB

Recommend:
Always buy original paperback edition, and experience the difference.

Read More......

Saturday, September 1, 2007

Prentice Hall - Security in Computing 4th edition - Download

For years, IT and security professionals and students have turned to Security in Computing as the definitive guide to information about computer security attacks and countermeasures. In their new fourth edition, Charles P. Pfleeger and Shari Lawrence Pfleeger have thoroughly updated their classic guide to reflect today's newest technologies, standards, and trends.
Security in Computing, Fourth Edition, goes beyond technology, covering crucial management issues faced in protecting infrastructure and information. This edition contains an all-new chapter on the economics of cybersecurity, explaining ways to make a business case for security investments. Another new chapter addresses privacy--from data mining and identity theft, to RFID and e-voting.
Download this book in digital format.




Book info:
Security in Computing, Fourth Edition
By Charles P. Pfleeger - Pfleeger Consulting Group, Shari Lawrence Pfleeger - RAND Corporation
...............................................
Publisher: Prentice Hall
Pub Date: October 13, 2006
Print ISBN-10: 0-13-239077-9
Print ISBN-13: 978-0-13-239077-4
Pages: 880




Download this ebook here:
Click and Download link - 8.1MB

Recommend:
Always buy original paperback edition, and experience the difference.

Read More......