Wiley (11-2010) | PDF | 744 pages | 0470613033 | 8.1Mb Malware Analyst's Cookbook and DVD: Tools and Techniques for Fighting Malicious Code /by Michael Ligh, Steven Adair, Blake Hartstein, and Matthew Richard . A computer forensics "how-to" for fighting malicious code and analyzing incidents With our ever-increasing reliance on computers comes an ever-growing risk
...
Read more »
|
Syngress 2010 | PDF | 442 pages | ISBN: 1597494860 | 5.3Mb A Guide to Kernel Exploitation: Attacking the Core / by Enrico Perla, Massimiliano Oldani, Graham Speake .The number of security countermeasures against user-land exploitation is on the rise. Because of this, kernel exploitation is becoming much more popular among exploit writers and attackers. Playing with the heart of
...
Read more »
|
Auerbach (8-2006) | PDF | 341 pages | 0849370582 | 2.5Mb Security in Sensor Networks /by Yang Xiao . Sensor networks differ from traditional networks in many aspects including their limited energy, memory space, and computational capability. These differentiators create unique security vulnerabilities. Security in Sensor Networks covers all aspects of the subject, serving as
...
Read more »
|
No Starch 2010 | PDF | 216 Pages | ISBN: 159327274X | 4.0Mb The Book of PF: A No-Nonsense Guide to the OpenBSD Firewall /by Peter N.M. Hansteen . OpenBSD's stateful packet filter, PF, is the heart of the OpenBSD firewall and a necessity for any admin working in a BSD environment. With a little effort and this book, you'll gain the insight needed to unlock PF's full potential. This
...
Read more »
|
O'Reilly (10-2004) | CHM | 336 pages | 0596007876 | 2.2Mb Knoppix Hacks: 100 Industrial-Strength Tips and Tools /by Kyle Rankin. Knoppix is a portable Linux distribution with a collection of hundreds of programs and utilities--a veritable Swiss Army knife in CD form. This practical and flexible Linux distribution runs on the fly from a single CD with no need to in
...
Read more »
|
O'Reilly (5-2010) | PDF | 528 pages | 1449388396 | 12.2Mb Hackers: Heroes of the Computer Revolution /by Steven Levy (Author) .This 25th anniversary edition of Steven Levy's classic book traces the exploits of the computer revolution's original hackers -- those brilliant and eccentric nerds from the late 1950s through the early '80s who took risks, be
...
Read more »
|
|