Fundraising September 15, 2024 – October 1, 2024 About fundraising
1
Violent Python: A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers

Violent Python: A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers

Year:
2012
Language:
english
File:
PDF, 7.83 MB
5.0 / 4.5
english, 2012
2
Practical Lock Picking - A Physical Penetration Tester's Training Guide

Practical Lock Picking - A Physical Penetration Tester's Training Guide

Year:
2010
Language:
english
File:
PDF, 19.19 MB
0 / 0
english, 2010
3
The Basics of Hacking and Penetration Testing: Ethical Hacking and Penetration Testing Made Easy

The Basics of Hacking and Penetration Testing: Ethical Hacking and Penetration Testing Made Easy

Year:
2011
Language:
english
File:
PDF, 3.74 MB
1.0 / 5.0
english, 2011
5
Buffer Overflow Attacks: Detect, Exploit, Prevent

Buffer Overflow Attacks: Detect, Exploit, Prevent

Year:
2005
Language:
english
File:
PDF, 5.38 MB
5.0 / 5.0
english, 2005
7
Secure Your Network For Free : Using Nmap, Wireshark, Snort, Nessus, and MRGT

Secure Your Network For Free : Using Nmap, Wireshark, Snort, Nessus, and MRGT

Year:
2007
Language:
english
File:
PDF, 7.20 MB
4.0 / 5.0
english, 2007
9
Reverse Engineering Code with IDA Pro

Reverse Engineering Code with IDA Pro

Year:
2008
Language:
english
File:
PDF, 3.91 MB
5.0 / 5.0
english, 2008
10
Hacking Web Apps: Detecting and Preventing Web Application Security Problems

Hacking Web Apps: Detecting and Preventing Web Application Security Problems

Year:
2012
Language:
english
File:
PDF, 14.68 MB
5.0 / 5.0
english, 2012
11
SQL Injection Attacks and Defense

SQL Injection Attacks and Defense

Year:
2009
Language:
english
File:
PDF, 3.34 MB
5.0 / 5.0
english, 2009
12
The Wireshark Field Guide: Analyzing and Troubleshooting Network Traffic

The Wireshark Field Guide: Analyzing and Troubleshooting Network Traffic

Year:
2013
Language:
english
File:
PDF, 25.24 MB
0 / 0
english, 2013
13
Black Hat Physical Device Security: Exploiting Hardware and Software

Black Hat Physical Device Security: Exploiting Hardware and Software

Year:
2005
Language:
english
File:
PDF, 78.40 MB
0 / 0
english, 2005
14
Hack the Stack: Using Snort and Ethereal to Master the 8 Layers of an Insecure Network

Hack the Stack: Using Snort and Ethereal to Master the 8 Layers of an Insecure Network

Year:
2007
Language:
english
File:
PDF, 7.19 MB
0 / 0
english, 2007
16
Cryptography for Developers

Cryptography for Developers

Year:
2006
Language:
english
File:
PDF, 4.10 MB
0 / 0
english, 2006
17
Web application vulnerabilities: detect, exploit, prevent

Web application vulnerabilities: detect, exploit, prevent

Year:
2007
Language:
english
File:
PDF, 20.90 MB
0 / 5.0
english, 2007
19
DNS Security. Defending the Domain Name System

DNS Security. Defending the Domain Name System

Year:
2016
Language:
english
File:
PDF, 5.80 MB
0 / 0
english, 2016
20
IP addressing and subnetting, including IPv6

IP addressing and subnetting, including IPv6

Year:
1999
Language:
english
File:
PDF, 1.73 MB
5.0 / 3.5
english, 1999
22
Game Console Hardware Hacking (Xbox, Playstation, Nintendo, Atari And Gamepark 32)

Game Console Hardware Hacking (Xbox, Playstation, Nintendo, Atari And Gamepark 32)

Year:
2004
Language:
english
File:
PDF, 22.75 MB
0 / 0
english, 2004
23
Google Hacking for Penetration Testers

Google Hacking for Penetration Testers

Year:
2007
Language:
english
File:
PDF, 13.67 MB
0 / 0
english, 2007
24
Business Continuity and Disaster Recovery Planning for IT Professionals

Business Continuity and Disaster Recovery Planning for IT Professionals

Year:
2014
Language:
english
File:
PDF, 6.87 MB
5.0 / 5.0
english, 2014
25
Research Methods for Cyber Security

Research Methods for Cyber Security

Year:
2017
Language:
english
File:
PDF, 10.28 MB
0 / 0
english, 2017
26
Targeted Cyber Attacks. Multi-staged Attacks Driven by Exploits and Malware

Targeted Cyber Attacks. Multi-staged Attacks Driven by Exploits and Malware

Year:
2014
Language:
english
File:
PDF, 5.51 MB
0 / 5.0
english, 2014
28
Android Forensics: Investigation, Analysis and Mobile Security for Google Android

Android Forensics: Investigation, Analysis and Mobile Security for Google Android

Year:
2011
Language:
english
File:
PDF, 39.01 MB
0 / 4.0
english, 2011
30
How to Define and Build an Effective Cyber Threat Intelligence Capability

How to Define and Build an Effective Cyber Threat Intelligence Capability

Year:
2014
Language:
english
File:
PDF, 3.33 MB
0 / 0
english, 2014
32
Ninja Hacking: Unconventional Penetration Testing Tactics and Techniques

Ninja Hacking: Unconventional Penetration Testing Tactics and Techniques

Year:
2010
Language:
english
File:
PDF, 9.85 MB
0 / 0
english, 2010
33
Metrics and Methods for Security Risk Management

Metrics and Methods for Security Risk Management

Year:
2010
Language:
english
File:
PDF, 6.15 MB
0 / 0
english, 2010
35
Managed Code Rootkits: Hooking into Runtime Environments

Managed Code Rootkits: Hooking into Runtime Environments

Year:
2010
Language:
english
File:
PDF, 5.56 MB
5.0 / 5.0
english, 2010
37
Hack Proofing Your Wireless Network

Hack Proofing Your Wireless Network

Year:
2002
Language:
english
File:
PDF, 5.94 MB
0 / 0
english, 2002
39
Scripting VMware: Power Tools for Automating Virtual Infrastructure Administration

Scripting VMware: Power Tools for Automating Virtual Infrastructure Administration

Year:
2007
Language:
english
File:
PDF, 5.01 MB
0 / 0
english, 2007
41
Business Continuity and Disaster Recovery Planning for IT Professionals

Business Continuity and Disaster Recovery Planning for IT Professionals

Year:
2007
Language:
english
File:
PDF, 5.73 MB
0 / 0
english, 2007
42
Google Hacking for Penetration Testers, Volume 2

Google Hacking for Penetration Testers, Volume 2

Year:
2007
Language:
english
File:
PDF, 15.27 MB
0 / 0
english, 2007
43
Hacking the Code: ASP.NET Web Application Security

Hacking the Code: ASP.NET Web Application Security

Year:
2004
Language:
english
File:
CHM, 4.82 MB
0 / 0
english, 2004
44
The Basics of Information Security: Understanding the Fundamentals of InfoSec in Theory and Practice

The Basics of Information Security: Understanding the Fundamentals of InfoSec in Theory and Practice

Year:
2011
Language:
english
File:
PDF, 2.83 MB
0 / 5.0
english, 2011
45
Simple Steps to Data Encryption: A Practical Guide to Secure Computing

Simple Steps to Data Encryption: A Practical Guide to Secure Computing

Year:
2013
Language:
english
File:
PDF, 6.57 MB
0 / 5.0
english, 2013
46
Perfect Passwords: Selection, Protection, Authentication

Perfect Passwords: Selection, Protection, Authentication

Year:
2005
Language:
english
File:
PDF, 1.80 MB
0 / 0
english, 2005
47
Penetration Tester’s Open Source Toolkit

Penetration Tester’s Open Source Toolkit

Year:
2016
Language:
english
File:
PDF, 30.45 MB
0 / 5.0
english, 2016
48
The Basics of Digital Forensics: The Primer for Getting Started in Digital Forensics

The Basics of Digital Forensics: The Primer for Getting Started in Digital Forensics

Year:
2012
Language:
english
File:
PDF, 6.69 MB
5.0 / 5.0
english, 2012
49
Identity and Access Management: Business Performance Through Connected Intelligence

Identity and Access Management: Business Performance Through Connected Intelligence

Year:
2013
Language:
english
File:
PDF, 165.70 MB
0 / 0
english, 2013