|
|
-: Hack Attacks Testing :-A
network security breach (a hack, crack, or other invasion) occurs when
unauthorized access to the network is achieved and havoc results.
The best possible defense is an offensive strategy that allows you to
regularly test your network to reveal the vulnerabilities and close the
holes before someone gets in.
Written by veteran author and security expert John Chirillo, Hack
Attacks Testing explains how to perform your own security audits.
* Paperback: 576 pages |
|
(Size :- 6.80 MB) |
|
-: Secrets Of A Super Hacker :-Here
is the most amazing book ever published on computer hacking.
Step-by-Step illustrated details on the techniques used by hackers to
get your data including :-
Guessing Passwords, Stealing Passwords,
Password Lists, Social Engineering,
Reverse Social Engineering,
Crashing Electronic Bulletin Boards,
Dummy Screens, Fake E-mail,
Trojan Horses, Viruses, Worms,
Trap Doors, And Much more.
Anyone concerned with computer security and data privacy needs to read this book. |
|
(Size :- 1.82 MB) |
|
-: Hacking GMail :-
Everything about GMail including :-
Inside GMail, Conquering GMail, Desktop Integration, GMail Power Tips,
Skinning GMail, How GMail Works, GMail & Greasemonkey, GMail
Libraries, Building API, Using GMailFS, etc……….! |
|
(Size :- 3.08 MB) |
|
-: Stealing The Network :-How
to Own a Shadow is the final book in Syngress ground breaking,
best-selling, Stealing the Network series. As with previous title, How
to Own a Shadow is a fictional story that demonstrates accurate, highly
detailed scenarios of computer intrusions and counter-strikes. Readers
will be amazed at how Knuth, Law Enforcement, and Organized crime twist
and torque everything from game stations, printers and fax machines to
service provider class switches and routers steal, deceive, and
obfuscate. From physical security to open source information gathering,
Stealing the Network: How to Own a Shadow will entertain and educate the
reader on every page. The books companion Web site will also provide
special, behind-the-scenes details and hacks for the reader to join in
the chase for Knuth. |
|
(Size :- 8.16 MB) |
|
|
-: Network Security :-
Cisco Press(March 19, 2008) CCIE Professional Development Series Network Security Technologies and Solutions
Network Security Technologies and Solutions is a comprehensive reference
to the most cutting-edge security products and methodologies available
to networking professionals today.
This book helps you understand and implement current, state-of-the-art
network security technologies to ensure secure communications throughout
the network infrastructure.
This book is part of the Cisco CCIE Professional Development Series from
Cisco Press, which offers expert-level instruction on network design,
deployment, and support methodologies to help networking professionals
manage complex networks and prepare for CCIE exams. |
|
(Size :- 26.0 MB) |
|
-: Hacker’s HandBook :-
This book is a practical guide to discovering and exploiting security
flaws in web applications. The authors explain each category of
vulnerability using real-world examples, screen shots and code extracts.
The book is extremely practical in focus, and describes in detail the
steps involved in detecting and exploiting each kind of security
weakness found within a variety of applications such as online banking,
e-commerce and other web applications. The topics covered include
bypassing login mechanisms, injecting code, exploiting logic flaws and
compromising other users. This handbook describes a proven methodology
that combines the virtues of human intelligence and computerized brute
force, often with devastating results. |
|
(Size :- 4.60 MB) |
|
-: Vulnerability Management :-
Get all the Facts and See How to Implement a Successful Vulnerability
Management Program. As a business owner, or someone responsible for
network security within your organization, you need to understand how to
prevent attacks and eliminate network weaknesses that leave your
business exposed and at risk.
Vulnerability Management for Dummies arms you with the facts and will help :-
Explain the critical need for Vulnerability Management (VM), Detail the
essential best-practice steps of a successful VM Program, Outline the
various VM Solutions – including the pros & cons of each, Highlight
the award-winning QualysGuard VM solution, Provide a 10-point checklist
for removing vulnerabilities from your key resources. |
|
(Size :- 3.71 MB) |
|
-: Hacking Windows Vista :-
Vista is the most radical revamping of Windows since 1995. However,
along with all the fantastic improvements, there are a couple of things
that likely drive you up the wall. Don\92t worry, though\97just join
forces with author Steve Sinchak and you\92ll end up feeling as though
Microsoft designed Vista just for you! He shows you how to tweak logon
screen settings, build custom Sidebar gadgets, personalize Aero Glass
with themes and visual styles, turn your PC into an HDTV media center,
fine-tune your firewall, and more…! |
|
(Size :- 17.6 MB) |
|
|
|
No comments:
Post a Comment