Subcategories

Gray Hat Hacking The Ethical Hackers Handbook (Repost)

Posted By: igor_lv
Gray Hat Hacking The Ethical Hackers Handbook (Repost)

Gray Hat Hacking The Ethical Hackers Handbook - Allen Harper
2011 | 3rd Edition | ISBN: 0071742557 | PDF | 720 pages | 12 Mb

Professional Rootkits

Posted By: First1
Professional Rootkits

Professional Rootkits by Ric Vieler
English | March 12th, 2007 | ISBN: 0470101547 | 359 Pages | PDF | 4.76 MB

Whether you want to learn how to develop a robust, full-featured rootkit or you're looking for effective ways to prevent one from being installed on your network, this hands-on resource provides you with the tools you'll need. Expert developer Ric Vieler walks you through all of the capabilities of rootkits, the technology they use, steps for developing and testing them, and the detection methods to impede their distribution.

Chained Exploits: Advanced Hacking Attacks from Start to Finish

Posted By: First1
Chained Exploits: Advanced Hacking Attacks from Start to Finish

Chained Exploits: Advanced Hacking Attacks from Start to Finish by Keatron Evans, Jack B. Voth, Andrew J. Whitaker
English | March 9th, 2009 | ISBN: 032149881X, 9780321498816 | 304 Pages | True PDF | 12.53 MB

The complete guide to today’s hard-to-defend chained attacks: performing them and preventing them!

How to Break Web Software: Functional and Security Testing of Web Applications and Web Services

Posted By: First1
How to Break Web Software: Functional and Security Testing of Web Applications and Web Services

How to Break Web Software: Functional and Security Testing of Web Applications and Web Services by James A. Whittaker, Mike Andrews
English | February 12th, 2006 (2008 Edition) | ISBN: 0321369440, 9780321369444 | 240 Pages | True PDF | 7.55 MB

Since its early days as an information exchange tool limited to academe, researchers, and the military, the web has grown into a commerce engine that is now omnipresent in all facets of our lifes. More websites are created daily and more applications are developed to allow users to learn, research, and purchase online.

Anti-Hacker Tool Kit, Fourth Edition [Repost]

Posted By: hill0
Anti-Hacker Tool Kit, Fourth Edition [Repost]

Anti-Hacker Tool Kit, Fourth Edition by Mike Shema
English | 16 Mar. 2014 | ISBN: 007180014X | 624 Pages | PDF | 36.19 MB

The Complete Cyber Security Course, Hacking Exposed

Posted By: igor_lv
The Complete Cyber Security Course, Hacking Exposed

The Complete Cyber Security Course, Volume I - Nathan House
2017 | ISBN: n/a | PDF | 282 pages | 40 Mb

This book is primarily intended for people taking "The Complete Cyber Security Course". It was developed based on the transcripts of course itself and as such serves to help students through the course and as a handy reminder for future use.

Building a HIPAA-Compliant Cybersecurity Program: Using NIST 800-30 and CSF to Secure Protected Health Information

Posted By: AvaxGenius
Building a HIPAA-Compliant Cybersecurity Program: Using NIST 800-30 and CSF to Secure Protected Health Information

Building a HIPAA-Compliant Cybersecurity Program: Using NIST 800-30 and CSF to Secure Protected Health Information By Eric C. Thompson
English | PDF,EPUB | 2017 | 303 Pages | ISBN : 1484230590 | 7.34 MB

Use this book to learn how to conduct a timely and thorough Risk Analysis and Assessment documenting all risks to the confidentiality, integrity, and availability of electronic Protected Health Information (ePHI), which is a key component of the HIPAA Security Rule. The requirement is a focus area for the Department of Health and Human Services (HHS) Office for Civil Rights (OCR) during breach investigations and compliance audits. This book lays out a plan for healthcare organizations of all types to successfully comply with these requirements and use the output to build upon the cybersecurity program.

Peter Engebretson, "Les bases du hacking" (repost)

Posted By: TimMa
Peter Engebretson, "Les bases du hacking" (repost)

Patrick Engebretson, "Les bases du hacking"
Pearson | 2013 | ISBN: 2744025984 | French | EPUB | 240 pages | 3.9 Mb

Créez votre propre laboratoire de hacking! Vous souhaitez, comme les hackers, apprendre à pénétrer les réseaux et les systèmes informatiques? …

Ethical Hacking: Hacking Applications

Posted By: naag
Ethical Hacking: Hacking Applications

Ethical Hacking: Hacking Applications
MP4 | Video: AVC 1280x720 | Audio: AAC 44KHz 2ch | Duration: 1 Hour | 581 MB
Genre: eLearning | Language: English

Neural Information Processing

Posted By: AvaxGenius
Neural Information Processing

Neural Information Processing: 24th International Conference, ICONIP 2017, Guangzhou, China, November 14-18, 2017, Proceedings, Part III By Derong Liu
English | PDF | 2017 | 953 Pages | ISBN : 3319700898 | 207.75 MB

The six volume set LNCS 10634, LNCS 10635, LNCS 10636, LNCS 10637, LNCS 10638, and LNCS 10639 constitues the proceedings of the 24rd International Conference on Neural Information Processing, ICONIP 2017, held in Guangzhou, China, in November 2017. The 563 full papers presented were carefully reviewed and selected from 856 submissions.

Ethical Hacking: Malware Development

Posted By: naag
Ethical Hacking: Malware Development

Ethical Hacking: Malware Development
MP4 | Video: AVC 1280x720 | Audio: AAC 44KHz 2ch | Duration: 1 Hour | 342 MB
Genre: eLearning | Language: English

Ehtical Hacking: Recon and Footprinting

Posted By: naag
Ehtical Hacking: Recon and Footprinting

Ehtical Hacking: Recon and Footprinting
MP4 | Video: AVC 1280x720 | Audio: AAC 44KHz 2ch | Duration: 1 Hour | 293 MB
Genre: eLearning | Language: English

Secure IT Systems

Posted By: AvaxGenius
Secure IT Systems

Secure IT Systems: 22nd Nordic Conference, NordSec 2017, Tartu, Estonia, November 8–10, 2017, Proceedings By Helger Lipmaa
English | PDF | 2017 | 318 Pages | ISBN : 3319702890 | 18.55 MB

This book constitutes the proceedings of the 22nd Nordic Conference on Secure IT Systems, held in Tartu, Estonia, in November 2017.

Cyber Security and Policy: A Substantive Dialogue

Posted By: First1
Cyber Security and Policy: A Substantive Dialogue

Cyber Security and Policy: A Substantive Dialogue by Andrew Colarik
English | April 10th, 2017 | ASIN: B06X9TWJ6S, ISBN: 9780994141590 | 201 Pages | EPUB | 1.34 MB

A world without the advantages and convenience provided by cyberspace and the internet of things is now unimaginable. But do we truly grasp the threats to this massive, interconnected system? And do we really understand how to secure it? After all, cyber security is no longer just a technology problem; the effort to secure systems and society are now one and the same.

Complete Wi-Fi Hacking Encyclopedia

Posted By: naag
Complete Wi-Fi Hacking Encyclopedia

Complete Wi-Fi Hacking Encyclopedia
MP4 | Video: AVC 1280x720 | Audio: AAC 44KHz 2ch | Duration: 2.5 Hours | Lec: 19 | 603 MB
Genre: eLearning | Language: English

Complete Wi-Fi Cracking course latest 2017. Based on new tools and techniques.