nformation security ebooks collection
English | Collection Books | 19 Book | PDF | 268.07 Mb
Information security ebooks exploit writing, using tools, networking fundamentals.
CEH Official Certified Ethical Hacker Review Guide
Expl0itg.Sw.How.2.Brk.C0d3
Hack The Stack - Using Snort And Ethereal To Master The 8 Layers Of An Insecure Network (2006)
Hacking Exposed Computer Forensics Computer Forensics Secrets & Solutions
Malicious.Cryptography.Exposing.Cryptovirology
Metasploit Toolkit for Penetration Testing, Exploit Development, and Vulnerability Research
Nmap in the Enterprise Your Guide to Network Scanning
Penetration Tester's Open Source Toolkit, Vol. 2
programming spider
Snort 2.1 Intrusion Detection
Wicked Cool Shell Scripts - 101 Scripts For Linux, Mac OS X, And Unix Systems (2004)
writing_security_tools_and_exploits
Addison.Wesley.Professional Rootkits.Subverting.the.Windows.Kernel Jul.2005
Gray Hat Hacking Second Edition
Hacking The Art of Exploitation 2nd Feb.2008
Handbook of Applied Cryptography
Malicious Bots
remote_BOF_explanation
Syngress - Sockets, Shellcode, Porting & Coding - Reverse Engineering Exploits And Tool Coding For Security Professionals
http://www.filesonic.com/file/2932828915
OR
http://www.wupload.com/file/1877247831
Aucun commentaire:
Enregistrer un commentaire