A Buffer Overflow Study - Attacks and Defenses (2002)
Amazon Hacks - (O'reilly-August 2003)
Computer Vulnerability(March 9 2000)
*****proof Your Software(No Starch-2002)
Credit Card Visa Hack(Cambridge Lab-2003)
Ethical Hacking and Countermeasures EC Council Exam 312 50 (OSB- 2004)
Google Hacking for Penetration Tester (Syngress-2005)
Hack Attacks Revealed- A Complete Reference with Custom Security Hacking Toolkit (Wiley-2001)
Hack IT Security Through Penetration Testing (Addison Wesley-2002)
Hack Proofing Your Identity in the Information Age (Syngress-2002)
Hack Proofing Your Network - Internet Tradecraft (Syngress-2000)
Hacker Disassembling Uncovered (A List- 2003)
Hacker's Desk Reference
Hackers Beware (NewRiders -2002)
Hackers Delight( Addison Wesley- 2003 )
Hacking Exposed- Network Security Secrets and Solutions (MCGraw-Hill-2001)
Hacking Exposed- Web Applications (MCGraw-Hill-2002)
Hacking Exposed- Windows 2003 Chapter 5
Hacking for Dummies (John Wiley-2004)
Hacking for Dummies-Access to Other Peoples Systems Made Simple
Hacking Guide v3.1[
www.netz.ru]
Hacking-The Art of Exploitation(No Starch-2003)
How Thieves Targeted eBay Users but Got Stopped Instead(Interhack-June 2003)
Maximum Security, 3rd Edition(Sams-April 2001)
Maximum Security_-A Hackers Guide to Protect Your Internet
Network Security Tools (OReilly- Apr 2005)
PC Hacks(Oct 2004)
PDF Hack(Aug 2004)
Practical Study Remote Access (Cisco-December 22, 2003)
Reversing Secrets of Reverse Engineering (Apr 2005)
Spidering Hacks(O'Reilly- October 2003)
Steal This Computer Book 3 What They Won't Tell You About the Internet(No Starch Press c 2003 )
Stealing the Network; How to Own the Box ( Syngress-2003)
The Art of Deception by Kevin Mitnick
The Art of Intrusion-The Real Stories Behind the Exploits of Hackers Intruders and Deceivers (Wiley- Feb 2005)
The Complete History of Hacking
The Extreme Searchers Internet Handbook A Guide for the Serious Searcher (Feb 2004)
Tricks of the Internet Gurus (April 1999)
Underground Hacking Madness & Obsession on the Electronic Frontier (Suelette Dreyfus & Julian Assange-2001)
Web Hacking- Attacks and Defence (Pearson Education-August 08, 2002)
Windows Server Hack(O'Reilly - March 2004)
Windows XP Hacks (O'reilly- Auguest 2003
DOWNLOAD:
1.
http://rapidshare.de/files/8426509/Books.part1.rar (Size, mb: 46.000)
2.
http://rapidshare.de/files/8427811/Books.part2.rar (Size, mb: 46.000)
3.
http://rapidshare.de/files/8429676/Books.part3.rar (Size, mb: 46.000)
4.
http://rapidshare.de/files/8430208/Books.part4.rar (Size, mb: 17.714)
Password: L33T
-----------------------------------------------------
Java How To Program 6th Edition
This special edition of Java How to Program is up-to-date with the Java 2 Platform Standard Edition 1.5. It covers fundamental programming topics and provides several extra chapters so readers can include or omit material as needed. KEY TOPICS: Includes Recursion and Searching and Sorting chapters. Provides extensive complete programming exercises plus "What does this program do?", "What's wrong with this program?", "Complete the program" and "Modify the program" exercises. Covers text-file processing. Features coverage of special topics, such as pre- and postconditions, invariants, testing and debugging, ethics and software engineering. Includes a CD-ROM with every copy of the book that contains: (subject to change) Java™ 2 Platform, Standard Edition 1.5; Netbeans; JCreator LE; jEdit; jGRASP; BlueJ; Source code for all the book's examples; Hyperlinks to valuable Java™ demos and Internet resources. MARKET: A useful brief reference for programmers or anyone who wants to learn more about the Java programming language.
Download:
http://download.hadown.com/uploadfil...8172461219.zip