Subcategories
JOIN NOW!
https://www.facebook.com/AvaxHomeLearning/ facebook.com/AvaxHomeLearning

Udemy - Reverse Engineering and Exploit Development (Repost)

Posted By: First1
Udemy - Reverse Engineering and Exploit Development (Repost)

Udemy - Reverse Engineering and Exploit Development (Repost)
Size: 1.41 GB | Duration: 6 hours | Video: AVC (.mp4) 1280x720 15fps | Audio: AAC 48KHz 2ch
Genre: eLearning | Language: English | +Working files

Application Penetration Testing for Security Professionals.

Android Malware (Repost)

Posted By: AvaxGenius
Android Malware (Repost)

Android Malware By Xuxian Jiang, Yajin Zhou
English | PDF | 2013 | 50 Pages | ISBN : 1461473934 | 1.6 MB

Mobile devices, such as smart phones, have achieved computing and networking capabilities comparable to traditional personal computers. Their successful consumerization has also become a source of pain for adopting users and organizations. In particular, the widespread presence of information-stealing applications and other types of mobile malware raises substantial security and privacy concerns.

Hacking Exposed Wireless, Third Edition: Wireless Security Secrets & Solutions [Repost]

Posted By: hill0
Hacking Exposed Wireless, Third Edition: Wireless Security Secrets & Solutions [Repost]

Hacking Exposed Wireless, Third Edition: Wireless Security Secrets & Solutions by Joshua Wright
English | 1 Apr. 2015 | ISBN: 0071827633 | 544 Pages | PDF (conv) | 36.47 MB

iRules: What Every Tech-Healthy Family Needs to Know About Selfies, Sexting, Gaming, and Growing Up [Audiobook]

Posted By: First1
iRules: What Every Tech-Healthy Family Needs to Know About Selfies, Sexting, Gaming, and Growing Up [Audiobook]

iRules: What Every Tech-Healthy Family Needs to Know About Selfies, Sexting, Gaming, and Growing Up [Audiobook] by Janell Burley Hofmann
English | May 21st, 2014 | ISBN: 1494552183 | MP3@64 kbps | 7 hrs 15 mins | 206.77 MB
Narrator: Carrington MacDuffie

As Janell Burley Hofmann, mother of five, wrapped her 13-year-old's iPhone on Christmas Eve, she was overwhelmed by questions: "Will my children learn to sit and wonder without Googling? Should I know their passwords for online accounts? Will they experience the value of personal connection without technology?"

Wifi Hacking : Beginner to Pro (FULL COURSE): A Guide to Pentesting Wifi

Posted By: naag
Wifi Hacking : Beginner to Pro (FULL COURSE): A Guide to Pentesting Wifi

Wifi Hacking : Beginner to Pro (FULL COURSE): A Guide to Pentesting Wifi
English | 2017 | ASIN: B0732P2BVV | 756 pages | PDF, EPUB, AZW3(conv) | 5.54 Mb

Beginning Ethical Hacking with Python [Repost]

Posted By: hill0
Beginning Ethical Hacking with Python [Repost]

Beginning Ethical Hacking with Python by Sanjib Sinha
English | 27 Dec. 2016 | ISBN: 1484225406 | 224 Pages | PDF | 3.69 MB

Learn the basics of ethical hacking and gain insights into the logic, algorithms, and syntax of Python. This book will set you up with a foundation that will help you understand the advanced concepts of hacking in the future.

From Hacking to Report Writing: An Introduction to Security and Penetration Testing [Repost]

Posted By: hill0
From Hacking to Report Writing: An Introduction to Security and Penetration Testing [Repost]

From Hacking to Report Writing: An Introduction to Security and Penetration Testing by Robert Svensson
English | 5 Nov. 2016 | ISBN: 1484222822 | 216 Pages | EPUB | 2.8 MB

Learn everything you need to know to become a professional security and penetration tester. It simplifies hands-on security and penetration testing by breaking down each step of the process so that finding vulnerabilities and misconfigurations becomes easy.

CEH V9 : Certified Ethical Hacker Version 9 Practice Tests

Posted By: readerXXI
CEH V9 : Certified Ethical Hacker Version 9 Practice Tests

CEH V9 : Certified Ethical Hacker Version 9 Practice Tests
by Raymond Blockmon
English | 2016 | ISBN: 1119252156 | 192 Pages | True PDF | 25 MB

Blockchain Technology And Hacking: Digital Economy Financial Framework With Blockchain And Beginners Guide To Learn Hacking

Posted By: naag
Blockchain Technology And Hacking: Digital Economy Financial Framework With Blockchain And Beginners Guide To Learn Hacking

Blockchain Technology And Hacking: Digital Economy Financial Framework With Blockchain And Beginners Guide To Learn Hacking Computers and Mobile Hacking (Hacking Freedom and Data Driven Book 12)
English | 2017 | ASIN: B07221VJ1S | 179 pages | PDF + EPUB | 3.73 Mb

This is a 3 book bundle related to Blockchain, hacking computers and hacking mobile devices, apps, and game consoles!

Hacking: The Complete Beginner’s Guide To Computer Hacking

Posted By: naag
Hacking: The Complete Beginner’s Guide To Computer Hacking

Hacking: The Complete Beginner’s Guide To Computer Hacking: Your Guide On How To Hack Networks and Computer Systems, Information Gathering, Password Cracking, … Internet Security, Cracking, Sniffing, Tor)
English | 2017 | ASIN: B0721YV4M3 | 110 pages | AZW3/PDF/EPUB (conv) | 1.65 Mb

Do you want to understand how hacking works?

The Best of 2600: A Hacker Odyssey (repost)

Posted By: libr
The Best of 2600: A Hacker Odyssey (repost)

Emmanuel Goldstein, "The Best of 2600: A Hacker Odyssey"
English | 2008-07-21 | ISBN: 0470294191 | 888 pages | PDF | 4,5 MB

Pekka Himanen, "L'etica hacker e lo spirito dell'età dell'informazione"

Posted By: TimMa
Pekka Himanen, "L'etica hacker e lo spirito dell'età dell'informazione"

Pekka Himanen, "L'etica hacker e lo spirito dell'età dell'informazione"
Feltrinelli | 2007 | ISBN: 8807817454 | Italian | PDF | 172 pages | 2.4 MB

Gli hacker non sono soltanto i pirati che rubano in maniera fraudolenta dati o inventano infernali virus che rovinano i computer, ma sono anche coloro che, grazie allo sforzo collettivo e alla condivisione dei propri saperi, costruiscono strumenti tecnologici innovativi. …

Hacking: Learn fast Hack to hack, strategies and hacking methods, Penetration testing Hacking Book and Black Hat Hacking

Posted By: naag
Hacking: Learn fast Hack to hack, strategies and hacking methods, Penetration testing Hacking Book and Black Hat Hacking

Hacking: Learn fast Hack to hack, strategies and hacking methods, Penetration testing Hacking Book and Black Hat Hacking (17 Most Dangerous Hacking Attacks 4)
English | 2017 | ISBN-10: 1548121916 | 156 pages | PDF/EPUB (conv) | 4.24 Mb

Behind The Mask: An Inside Look At Anonymous

Posted By: First1
Behind The Mask: An Inside Look At Anonymous

Behind The Mask: An Inside Look At Anonymous by Commander X
English | November 28th, 2016 | ISBN: 9781370336319 | 228 Pages | EPUB | 5.33 MB

A decade after Anonymous first appeared, it has grown from a small band of hacktivists to a Global Collective with organized National Cells in half the countries on Earth and 2.5 million dedicated participants worldwide.

Cyber Dragon: Inside China's Information Warfare and Cyber Operations

Posted By: readerXXI
Cyber Dragon: Inside China's Information Warfare and Cyber Operations

Cyber Dragon:
Inside China's Information Warfare and Cyber Operations

by Dean Cheng
English | 2017 | ISBN: 1440835640 | 302 Pages | PDF | 2.45 MB