![]() |
A collection of security books and tutorials.
A Buffer Overflow Study - Attacks and Defenses (2002)
Amazon Hacks - (O'reilly-August 2003) Computer Vulnerability(March 9 2000) *****proof Your Software(No Starch-2002) Credit Card Visa Hack(Cambridge Lab-2003) Ethical Hacking and Countermeasures EC Council Exam 312 50 (OSB- 2004) Google Hacking for Penetration Tester (Syngress-2005) Hack Attacks Revealed- A Complete Reference with Custom Security Hacking Toolkit (Wiley-2001) Hack IT Security Through Penetration Testing (Addison Wesley-2002) Hack Proofing Your Identity in the Information Age (Syngress-2002) Hack Proofing Your Network - Internet Tradecraft (Syngress-2000) Hacker Disassembling Uncovered (A List- 2003) Hacker's Desk Reference Hackers Beware (NewRiders -2002) Hackers Delight( Addison Wesley- 2003 ) Hacking Exposed- Network Security Secrets and Solutions (MCGraw-Hill-2001) Hacking Exposed- Web Applications (MCGraw-Hill-2002) Hacking Exposed- Windows 2003 Chapter 5 Hacking for Dummies (John Wiley-2004) Hacking for Dummies-Access to Other Peoples Systems Made Simple Hacking Guide v3.1[www.netz.ru] Hacking-The Art of Exploitation(No Starch-2003) How Thieves Targeted eBay Users but Got Stopped Instead(Interhack-June 2003) Maximum Security, 3rd Edition(Sams-April 2001) Maximum Security_-A Hackers Guide to Protect Your Internet Network Security Tools (OReilly- Apr 2005) PC Hacks(Oct 2004) PDF Hack(Aug 2004) Practical Study Remote Access (Cisco-December 22, 2003) Reversing Secrets of Reverse Engineering (Apr 2005) Spidering Hacks(O'Reilly- October 2003) Steal This Computer Book 3 What They Won't Tell You About the Internet(No Starch Press c 2003 ) Stealing the Network; How to Own the Box ( Syngress-2003) The Art of Deception by Kevin Mitnick The Art of Intrusion-The Real Stories Behind the Exploits of Hackers Intruders and Deceivers (Wiley- Feb 2005) The Complete History of Hacking The Extreme Searchers Internet Handbook A Guide for the Serious Searcher (Feb 2004) Tricks of the Internet Gurus (April 1999) Underground Hacking Madness & Obsession on the Electronic Frontier (Suelette Dreyfus & Julian Assange-2001) Web Hacking- Attacks and Defence (Pearson Education-August 08, 2002) Windows Server Hack(O'Reilly - March 2004) Windows XP Hacks (O'reilly- Auguest 2003 DOWNLOAD: 1.http://rapidshare.de/files/8426509/Books.part1.rar (Size, mb: 46.000) 2.http://rapidshare.de/files/8427811/Books.part2.rar (Size, mb: 46.000) 3.http://rapidshare.de/files/8429676/Books.part3.rar (Size, mb: 46.000) 4.http://rapidshare.de/files/8430208/Books.part4.rar (Size, mb: 17.714) Password: L33T ----------------------------------------------------- Java How To Program 6th Edition This special edition of Java How to Program is up-to-date with the Java 2 Platform Standard Edition 1.5. It covers fundamental programming topics and provides several extra chapters so readers can include or omit material as needed. KEY TOPICS: Includes Recursion and Searching and Sorting chapters. Provides extensive complete programming exercises plus "What does this program do?", "What's wrong with this program?", "Complete the program" and "Modify the program" exercises. Covers text-file processing. Features coverage of special topics, such as pre- and postconditions, invariants, testing and debugging, ethics and software engineering. Includes a CD-ROM with every copy of the book that contains: (subject to change) Java™ 2 Platform, Standard Edition 1.5; Netbeans; JCreator LE; jEdit; jGRASP; BlueJ; Source code for all the book's examples; Hyperlinks to valuable Java™ demos and Internet resources. MARKET: A useful brief reference for programmers or anyone who wants to learn more about the Java programming language. Download:http://download.hadown.com/uploadfil...8172461219.zip |
Cryptography - RSA Encryption Algorithm in a NutShell
http://rapidshare.de/files/14464822/...Shell.rar.html Type: .pdf Pages: 35 |
The Art Of Sql
Book review: For all the buzz about trendy IT techniques, data processing is still at the core of our systems, especially now that enterprises all over the world are confronted with exploding volumes of data. Database performance has become a major headache, and most IT departments believe that developers should provide simple SQL code to solve immediate problems and let DBAs tune any "bad SQL" later. In The Art of SQL, author and SQL expert Stephane Faroult argues that this "safe approach" only leads to disaster. His insightful book, named after Art of War by Sun Tzu, contends that writing quick inefficient code is sweeping the dirt under the rug. SQL code may run for 5 to 10 years, surviving several major releases of the database management system and on several generations of hardware. The code must be fast and sound from the start, and that requires a firm understanding of SQL and relational theory. The Art of SQL offers best practices that teach experienced SQL users to focus on strategy rather than specifics. Faroult's approach takes a page from Sun Tzu's classic treatise by viewing database design as a military campaign. You need knowledge, skills, and talent. Talent can't be taught, but every strategist from Sun Tzu to modern-day generals believed that it can be nurtured through the experience of others. They passed on their experience acquired in the field through basic principles that served as guiding stars amid the sound and fury of battle. This is what Faroult does with SQL. Like a successful battle plan, good architectural choices are based on contingencies. What if the volume of this or that table increases unexpectedly? What if, following a merger, the number of users doubles? What if you want to keep several years of data online? Faroult's way of looking at SQL performance may be unconventional and unique, but he's deadly serious about writing good SQL and using SQL well. The Art of SQL is not a cookbook, listing problems and giving recipes. The aim is to get you-and your manager-to raise good questions. Download link: http://rapidshare.de/files/16830744/The.Art.of.SQL.rar (1.7mb) Password: www.AvaxHome.ru ------ Ten hacker tricks to exploit SQL Server systems SQL Server runs databases for financial, bank, biotech, Ecommerce, data warehousing, scientific applications, etc. which often require huge data processing with complex formulas or algorithms. Most of this work is done with TSQL stored procedures and .NET procedures (in SQL Server 2005), however neither one of them can achieve the performance and flexibility of external procedures which are natively compiled code. http://searchsqlserver.techtarget.co...fer=SQLwnha217 |
|
_http://www.l0t3k.net/biblio/
Big collection of security docs (about a 400 MB) |
gr8 ebooks 2 download
www.vistaserver.com
www.btebook.com www.oebook.com www.wiretapped.net www.giuciao.com :rolleyes: ;) :rolleyes: ;) :cool: |
XSS Book
I guess you all know Cross-Site Scripting attacks are becoming more and more dangerous every day. In the Web 2.0 era, stealing a user cookie\session or hijacking a user browser is almost equal to compromising his box by exploiting a remote code execution vulnerability.
Computer experts say that in the not so far future, operating systems will be no more then just a web browser, all the applications a user need will be online (take Office Online for example). Therefor the phrase “XSS is the New Buffer Overflow, JavaScript Malware is the New Shell Code” is true, no wonder XSS made it the number one attack vector of 2006. So it’s about time someone will publish an XSS book :) XSS Attacks - Cross Site Scripting Attacks Exploits and Defense written by Jeremiah Grossman, Robert Hansen (RSnake), Petko D. Petkov (pdp), Anton Rager and Seth Fogie, is the first book ever made that is dedicated entirely to Cross-Site Scripting. From what we can see in the preview (Chapter 5 and the Table of Contents), this book is packed with a lot of attack techniques, covers the simplest attack to the most advanced, universal cross-site scripting attacks, XSS exploitation frameworks and a lot more :cool: For further information check out the book announcements in Jeremiah’s and RSnake’s blogs. Good luck ;) |
(IN)SECURE Magazine11
(IN)SECURE Magazine11
Issue 11 of (IN)SECURE Magazine released. In this issue:
Very interesting stuff! Download (IN)SECURE issue 11. |
Hacking and security - 70 books
Addison-Wesley Professional.Honeypots- Tracking Hackers.pdf
Wiley.The Database Hacker's Handbook- Defending Database Servers.chm John Wiley & Sons.Hacking GMail (ExtremeTech).pdf Hacking.Guide.V3.1.pdf A-List Publishing.Hacker Linux Uncovered.chm Hacker'S.Delight.chm Hacker.Bibel.[278.kB_www.netz.ru].pdf HackerHighSchool.pdf Hacker's Desk Reference.pdf Hackers Beware Defending Your Network From The Wiley Hacker.pdf Addison Wesley - Hackers Delight 2002.pdf addison wesley - web hacking - attacks and defense.chm Addison Wesley, The Outlook Answer Book Useful Tips Tricks And Hacks (2005) Bbl Lotb.chm Anti-Hacker ToolKit - McGraw Hill 2E 2004.chm Auerbach.Pub.The.Hackers.Handbook.The.Strategy.Beh ind.Breaking.into.and.Defending.Networks.Nov.2003. eBook-DDU.pdf ceh-official-certified-ethical-hacker-review-guide-exam-312-50.9780782144376.27422.pdf ebook.oreilly.-.windows.xp.hacks.sharereactor.chm For.Dummies.Hacking.for.Dummies.Apr.2004.eBook-DDU.pdf For.Dummies.Hacking.Wireless.Networks.For.Dummies. Sep.2005.eBook-DDU.pdf Hack_Attacks_Revealed_A_Complete_Reference_With_Cu stom_Security_Hacking_Toolkit.chm hacker-disassembling-uncovered.9781931769228.20035.chm Hacking Cisco Routers.pdf Hacking the Code - ASP.NET Web Application Security Cookbook (2004) .chm John.Wiley.and.Sons.Hacking.Windows.XP.Jul.2004.eB ook.pdf John.Wiley.and.Sons.The.Art.of.Intrusion.The.Real. Stories.Behind.the.Exploits.of.Hackers.Intruders.a nd.Deceivers.Feb.2005.ISBN0764569597.pdf Jon.Erickson.Hacking.The.Art.Of.Exploitation.No.St arch.Press.2003.chm Linux-Server.Hacks-OReilly.pdf McGraw Hill - Web Applications (Hacking Exposed).pdf McGraw.Hill.HackNotes.Linux.and.Unix.Security.Port able.Reference.eBook-DDU.pdf McGraw.Hill.HackNotes.Network.Security.Portable.Re ference.eBook-DDU.pdf McGraw.Hill.HackNotes.Web.Security.Portable.Refere nce.eBook-DDU.pdf McGraw.Hill.HackNotes.Windows.Security.Portable.Re ference.eBook-DDU.pdf OReilly - Flickr Hacks Tips and Tools for Sharing Photos Online (Feb 2006).chm Oreilly Access Hacks Apr 2005.chm OReilly,.Digital.Video.Hacks.(2005).DDU.LotB.chm oreilly,.visual.studio.hacks.(2005).ddu.lotb.chm Oreilly.Amazon.Hacks.eBook.LiB.chm oreilly.firefox.hacks.ebook-lib.chm OReilly.Google.Hacks.2nd.Edition.Dec.2004.ISBN0596 008570.chm OReilly.Google.Maps.Hacks.Jan.2006.chm Oreilly.Linux.Desktop.Hacks.Mar.2005.eBook-LiB.chm OReilly.Linux.Server.Hacks.Volume.Two.Dec.2005.chm OReilly.Network.Security.Hacks.chm OReilly.PayPal.Hacks.Sep.2004.eBook-DDU.chm OReilly.PC.Hacks.Oct.2004.eBook-DDU.chm OReilly.Perl.Hacks.Tips.and.Tools.for.Programming. Debugging.and.Surviving.May.2006.chm OReilly.Skype.Hacks.Tips.and.Tools.for.Cheap.Fun.I nnovative.Phone.Service.Dec.2005.chm OReilly.Statistics.Hacks.May.2006.chm OReilly.Ubuntu.Hacks.Tips.and.Tools.for.Exploring. Using.and.Tuning.Linux.Jun.2006.chm OReilly.VoIP.Hacks.Tips.and.Tools.for.Internet.Tel ephony.Dec.2005.chm oreilly.windows.xp.hacks.2nd.edition.feb.2005.lib. chm OReilly.Word.Hacks.Oct.2004.eBook-DDU.chm prentice hall - pipkin - halting the hacker- a practical guide to computer security, 2nd edition.chm Que - UNIX Hints Hacks.chm Que.Certified.Ethical.Hacker.Exam.Prep.Apr.2006.ch m Syngress - Hack Proofing Linux (2001).pdf Syngress - Hack Proofing Your Identity in the Information Age - 2002.pdf Syngress -- Hack Proofing Your Wireless Network.pdf Syngress.Hacking.a.Terror.Network.Nov.2004.ISBN192 8994989.pdf the-database-hackers-handbook-defending-database-servers.9780764578014.25524.chm Websters.New.World.Websters.New.World.Hacker.Dicti onary.Sep.2006.pdf Wiley.Hacking.Firefox.More.Than.150.Hacks.Mods.and .Customizations.Jul.2005.eBook-DDU.pdf Wiley.Hacking.Google.Maps.and.Google.Earth.Jul.200 6.pdf Wiley.Hacking.GPS.Mar.2005.ISBN0764598805.pdf Wiley.Lifehacker.Dec.2006.pdf Код:
http://hackingandsecurity.com/hacks/ |
Malicious Web Servers
Behind the Scenes of Malicious Web Servers
Цитата:
Код:
http://www.honeynet.org/papers/wek/KYE-Behind_the_Scenes_of_Malicious_Web_Servers.pdfКод:
http://www.honeynet.org/papers/wek/KYE-Behind_the_Scenes_of_Malicious_Web_Servers.htm |
| Время: 13:35 |