Subcategories

Ethical Hacking: SQL Injection [repost]

Posted By: naag
Ethical Hacking: SQL Injection [repost]

Ethical Hacking: SQL Injection
MP4 | AVC 316kbps | English | 1024x768 | 15fps | 5h 25mins | AAC stereo 105kbps | 629 MB
Genre: Video Training

Ethical Hacking: Reconnaissance/Footprinting (2015) [repost]

Posted By: naag
Ethical Hacking: Reconnaissance/Footprinting (2015) [repost]

Ethical Hacking: Reconnaissance/Footprinting
MP4 | AVC 90kbps | English | 1024x768 | 15fps | 3h 28mins | AAC stereo 103kbps | 500 MB
Genre: Video Training

Learn How To Create a Hacking / Penetration Testing Lab

Posted By: naag
Learn How To Create a Hacking / Penetration Testing Lab

Learn How To Create a Hacking / Penetration Testing Lab
MP4 | Video: AVC 1280x720 | Audio: AAC 44KHz 2ch | Duration: 1 Hours | Lec: 11 | 321 MB
Genre: eLearning | Language: English

Learn how to install Kali Linux, Windows and Metasploitable on a single computer inside your current operating system.

Best Internet Links

Posted By: Alex

Cybersecurity and Information Security at Depository Institutions : Selected Assessments

Posted By: readerXXI
Cybersecurity and Information Security at Depository Institutions : Selected Assessments

Cybersecurity and Information Security at Depository Institutions :
Selected Assessments

by Lauren Hubbard
English | 2016 | ISBN: 1634842855 | 104 Pages | PDF | 1.94 MB

Depository institutions experienced cyber attacks in recent years that are estimated to have resulted in hundreds of millions of dollars in losses.

The Ethical Hacking Starter Kit: 12 Techniques

Posted By: naag
The Ethical Hacking Starter Kit: 12 Techniques

The Ethical Hacking Starter Kit: 12 Techniques
MP4 | Video: AVC 1280x720 | Audio: AAC 44KHz 2ch | Duration: 4.5 Hours | Lec: 59 | 901 MB
Genre: eLearning | Language: English

This course is focused on practice and will help you learn the basic techniques of Ethical Hacking & Penetration Testing

Perl Hacks: Tips & Tools for Programming, Debugging, and Surviving

Posted By: viserion
Perl Hacks: Tips & Tools for Programming, Debugging, and Surviving

Damian Conway, chromatic, Curtis 'Ovid' Poe, "Perl Hacks: Tips & Tools for Programming, Debugging, and Surviving"
ISBN: 0596526741 | 2006 | PDF | 298 pages | 2 MB

Cyberspace in Peace and War

Posted By: readerXXI
Cyberspace in Peace and War

Cyberspace in Peace and War
by Martin Libicki
English | 2016 | ISBN: 1682470326 | 652 Pages | ePUB | 2.75 MB

This book is written to be a comprehensive guide to cybersecurity and cyberwar policy and strategy, developed for a one- or two-semester class for students of public policy (including political science, law, business, etc.).

How to Hack Like a PORNSTAR: A step by step process for breaking into a BANK

Posted By: AlenMiler
How to Hack Like a PORNSTAR: A step by step process for breaking into a BANK

How to Hack Like a PORNSTAR: A step by step process for breaking into a BANK by Sparc FLOW
English | 28 Jan. 2017 | ISBN: 1520478518 | 107 Pages | PDF (conv) | 2.17 MB

This is not a book about information security. Certainly not about IT. This is a book about hacking: specifically, how to infiltrate a company’s network, locate their most critical data, and make off with it without triggering whatever shiny new security tool the company wasted their budget on.

Hacking Innovation: The New Growth Model from the Sinister World of Hackers

Posted By: AlenMiler
Hacking Innovation: The New Growth Model from the Sinister World of Hackers

Hacking Innovation: The New Growth Model from the Sinister World of Hackers by Josh Linkner
English | 24 Jan. 2017 | ISBN: 1499902298 | 269 Pages | PDF (conv) | 6.43 MB

Hackers are a global fascination with cybercrime representing our single biggest threat to national security.

Hacking: A Beginners' Guide to Computer Hacking, Basic Security and Penetration Testing

Posted By: AlenMiler
Hacking: A Beginners' Guide to Computer Hacking, Basic Security and Penetration Testing

Hacking: A Beginners' Guide to Computer Hacking, Basic Security and Penetration Testing (How to hack and secure your computer for beginners, Arduino, python) by John Slavio
English | 26 Jan. 2017 | ISBN: 1520467559 | 50 Pages | PDF (conv) | 425.3 KB

This book will teach you everything you need to know about hacking, the history of hacking, the types of hacking and security measures that you should undertake.

Capture The Flag & Hacking Kioptrix Server (Alexander Lumbantobing)

Posted By: AlenMiler
Capture The Flag & Hacking Kioptrix Server (Alexander Lumbantobing)

Capture The Flag & Hacking Kioptrix Server (Alexander Lumbantobing) by Alexander Lumbantobing
English | 22 Jan. 2017 | ASIN: B01MTC12G2 | 109 Pages | PDF (conv) | 3.26 MB

This book is the result of collaborative work between "Computer Engineering Study Program - Cyber Security Research Center (CSRC), the Institute of Technology Del (IT Del)" with "Indonesian Backtrack Team (IBT)".

Hacking mit Security Onion

Posted By: roxul
Hacking mit Security Onion

Chris Sanders, Jason Smith, "Hacking mit Security Onion: Sicherheit im Netzwerk überwachen: Daten sammeln, analysieren und Angriffe rechtzeitig erkennen"
2016 | ISBN-10: 3645604960 | 560 pages | PDF | 27 MB

Defense against the Black Arts: How Hackers Do What They Do and How to Protect against It(Repost)

Posted By: Nice_smile)
Defense against the Black Arts: How Hackers Do What They Do and How to Protect against It(Repost)

Defense against the Black Arts: How Hackers Do What They Do and How to Protect against It by Jesse Varsalone
English | 2011 | ISBN: 1439821194 | 412 Pages | PDF | 47.07 MB

Ethical Hacking and Penetration Testing Guide (repost)

Posted By: roxul
Ethical Hacking and Penetration Testing Guide (repost)

Rafay Baloch, "Ethical Hacking and Penetration Testing Guide"
2014 | ISBN-10: 1482231611 | 531 pages | PDF | 22 MB

Ethical Hacking - Session Hijacking

Posted By: naag
Ethical Hacking - Session Hijacking

Ethical Hacking - Session Hijacking
MP4 | Video: AVC 1280x720 | Audio: AAC 44KHz 2ch | Duration: 1.5 Hours | Lec: 10 | 221 MB
Genre: eLearning | Language: English

Learn session hijacking techniques and countermeasures.