Книги по взлому, безопасности, сетям, Wap

pariman

ex-Team DUMPz
Местный
Регистрация
10 Мар 2004
Сообщения
1,715
Реакции
999
Credits
0
Absolute Beginner's Guide to Wi-Fi Wireless Networking
by Harold Davis

0789731150.01._PE32_SCMZZZZZZZ_.jpg


Publisher: Que
ISBN: 0-7897-3115-0,
312 Pages, April 2004

Book Description
WiFi is one of the fastest growing technologies of all time and everyone is interested in learning how to use it. This book makes all the information about WiFi, including the standards and protocols, and how they relate easy to understand. This book covers everything about WiFi, from what to look for how to set up a users computer with WiFi to finding hotspots and access points. Users will be able to configure a home network and share internet connections quickly and easily. And all important security issues are covered so that a user is less exposed to threats.

Download:
http://rapidshare.de/files/1422560/ABGWi-FiWN.zip.html
 

pariman

ex-Team DUMPz
Местный
Регистрация
10 Мар 2004
Сообщения
1,715
Реакции
999
Credits
0
Computer Network & Internet Security
by Brett C. Tjaden

1887902635.01._SCLZZZZZZZ_.jpg


Paperback: 200 pages
Publisher: ABF Content; 1st edition (February 15, 2001)
ISBN: 1887902635

Download:
http://rapidshare.de/files/1424139/CN_IS.zip.html

=========================

Cyber Adversary Characterization: Auditing the Hacker Mind
by Tom Parker, Marcus Sachs, Eric Shaw, Ed Stroz, Matthew G. Devost.

1931836116.01._SCLZZZZZZZ_.jpg


Publisher: Syngress
ISBN: 1-931836-11-6,
356 Pages, June 2004.

Download:
http://rapidshare.de/files/1424178/CACAHM.zip.html
 
Последнее редактирование модератором:

tosa

Турист
Регистрация
26 Авг 2005
Сообщения
7
Реакции
0
Credits
14
Помогите найти книгу (на любом языке):

RUS:
Скляров Д. Искусство защиты и взлома информации

ENG:
Dmitry Sklyarov. Hidden Keys to Software Break-Ins and Unauthorized Entry.

PLS!!!
 

okun

Местный
Регистрация
3 Май 2005
Сообщения
2,042
Реакции
2,996
Credits
0
Honeypots for Windows

1590593359.01.lzzzzzzz.jpg


Roger A. Grimes
ISBN 1590593359

The Book will cover installing, configuring, and maintaining security Honeypots on Windows platforms. The Book will specifically cover the popular open source Honeypot product called honeyd, and summarize other commercial Honeypot solutions. There are no computer security books covering Honeypots (or IDSs) as they run on Windows platforms.

If you're a developer who's tired of reading Unix and Linux documentation and newsgroup letters to get information on building and maintaining a Windows-based Honeypot, then this book is for you. No longer will you have to rummage through Unix-only advice and utilities to extract information relevant to your Windows deployment. This insightful guide will teach you special tricks and provide troubleshooting tips to help you efficiently run and maintain a Windows-based Honeypot.

Target audience: Windows network and security administrators; intrusion detection software users; subscribers to Honeypot mailing list; readers of other author’s Honeypot books - all are very Unix-centric.

Для просмотра ссылки Войди или Зарегистрируйся. (16821460 Bytes) netz.ru
 

okun

Местный
Регистрация
3 Май 2005
Сообщения
2,042
Реакции
2,996
Credits
0
Network Security Tools
By Justin Clarke, Nitesh Dhanjani

nst4da.jpg


Publisher: O'Reilly
Pub Date: April 2005
ISBN: 0-596-00794-9
Pages: 352

This concise, high-end guide shows experienced administrators how to customize and extend popular open source security tools such as Nikto, Ettercap, and Nessus. It also addresses port scanners, packet injectors, network sniffers, and web assessment tools. Network Security Tools is the one resource you want at your side when locking down your network.

Для просмотра ссылки Войди или Зарегистрируйся. (1344564 Bytes) netz.ru
 

piatak

Турист
Регистрация
10 Дек 2005
Сообщения
18
Реакции
1
Credits
32
karpinskiy1 написал(а):
Вот KiN залил, pабираем:

KIN, какими правами нужно обладать что-бы скачивать?

сорри поспешил, Эта ошибка есть сообщение о том, что необходимо ввести пароль.
 
Последнее редактирование модератором:

MOCKuT

Местный
Регистрация
26 Ноя 2003
Сообщения
792
Реакции
958
Credits
170
Cryptography - An End-to-End Systems Approach to Elliptic Curve Cryptography.pdf
Cryptography - An Introduction To Cryptography.pdf
Cryptography - Block Ciphers And Cryptanalysis.pdf
Cryptography - Body of Secrets.pdf
Cryptography - CISSP Study Guide On Cryptography.pdf
Cryptography - Cloning and Cryptography with Quantum Continuous Variables.pdf
Cryptography - Codierungstheorie und Kryptographie.pdf
Cryptography - Coding and Cryptography.pdf
Cryptography - CRISIS - Cryptography's Role in Securing the Information Society.pdf
Cryptography - Cryptographic Token Interface Standard - RSA Labs.pdf
Cryptography - Cryptography And Data Security.pdf
Cryptography - Detecting Steganographic Content on the Internet.pdf
Cryptography - Einfuhrung in die Kryptographie.pdf
Cryptography - Elliptic Curves and Cryptography.pdf
Cryptography - Exposing Cryptovirology.pdf
Cryptography - Factoring Large Numbers with the TWIRL device.pdf
Cryptography - Foundations of Cryptography.pdf
Cryptography - GPG Crypto From Gnu Manual.pdf
Cryptography - Handbook Of Applied Cryptography (old).pdf
Cryptography - Handbook Of Applied Cryptography.pdf
Cryptography - High-Speed RSA Implementation.pdf
Cryptography - Informationstheorie Codierung und Kryptographie.pdf
Cryptography - Intro To Cryptography.pdf
Cryptography - Key Agreement and Key Transport Using Elliptic Curve Cryptography.pdf
Cryptography - Kryptologie - Eine Einfuhrung.pdf
Cryptography - Lecture Notes on Cryptography.pdf
Cryptography - New Encryption Technologies for Communications Designers.pdf
Cryptography - Number Theory An Related Alghoritm In Cryptography.pdf
Cryptography - Practical Cryptography.pdf
Cryptography - RAS Suggestion to Random Number Generation in Software.pdf
Cryptography - Rechtsfragen der Kryptographie und der digitalen Signatur.pdf
Cryptography - Report Advanced Cryptography Standard AES.pdf
Cryptography - RSA Encryption Algorithm in a Nut Shell.pdf
Cryptography - RSA Hardware Implementation.pdf
Cryptography - RSA Labs FAQ 4.0.pdf
Cryptography - tecCHANNEL - Kryptographie Grundlagen.pdf
Cryptography - Theory And Practice.pdf
Cryptography - Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems.pdf
Cryptography - Twenty Years of Attacks on the RSA Cryptosystem.pdf
Cryptography, C - Applied Cryptography 2nd Edition Protocols, Algorthms, And Source Code In C.pdf
Cryptography, Java - Introduction To Cryptography With Java Applets.pdf
Cryptography, Java - Java Cryptography.pdf

File size: 61.6 Mb
File ID: 6546909
Download Link: Для просмотра ссылки Войди или Зарегистрируйся
 

z0id

Местный
Регистрация
18 Апр 2005
Сообщения
389
Реакции
183
Credits
0
Google Hacking for Penetration Testers
by Johnny Long, Ed Skoudis (Foreword), Alrik van Eijkelenborg (Editor)

Для просмотра ссылки Войди или Зарегистрируйся

Product Details:

Author: Johnny Long, Foreword by Ed Skoudis
Paperback: 528 pages
Publisher: Syngress; 1 edition (June 1, 2001)
Language: English
ISBN: 1931836361
Product Dimensions: 9.1 x 7.1 x 1.2 inches
Shipping Weight: 1.8 pounds.

Contents of this Book:

1. Google Searching Basics
2. Advanced Operators
3. Google Hacking Basics
4. Preassesssment
5. Network Mapping
6. Locating Exploits and Finding Targets
7. Ten Simple Security Searches That Work
8. Tracking Down Web Servers, Login Portals, and Network Hardware
9. Usernames, Passwords, and Secret Stuff, Oh My!
10. Document Grinding and Database Digging
11. Protecting Yourself from Google Hackers
12. Automating Google Searches
13. Professional Security Testing
14. An Introduction to Web Application Security

Format: PDF
(~10Mb)

Для просмотра ссылки Войди или Зарегистрируйся
 
Последнее редактирование модератором:
M

mrli

Слезно разыскиваю, если видел кто или ухватить успел....
поделитесь porfavoure.... заклацаю "спасибами"

Title :Sockets, Shellcode, Porting, and Coding : Reverse Engineering Exploits and Tool Coding for Security Professionals
Publisher: Syngress; 1 edition (April 12, 2005)
Language: English
ISBN: 1597490059
 

lordv

Местный
Регистрация
26 Окт 2004
Сообщения
31
Реакции
4
Credits
40
Defend I.T.Security by Example

33eccbc5.jpg


_http://rapidshare.de/files/17237987/Defend.zip.html
 
  • Like
Реакции: tmak
M

mrli

Rootkits : Subverting the Windows Kernel

Всем привет, недавно искал пару книжек на тему безопасности, очень помог этот форум и здешние люди. Спасибо, теперь поделюсь тем что накопал.

Инфо от Амазона:
Paperback: 352 pages
Publisher: Addison-Wesley Professional (July 22, 2005)
Language: English
ISBN: 0321294319

Для просмотра ссылки Войди или Зарегистрируйся
По просьбе, обновляю ссылку:
Для просмотра ссылки Войди или Зарегистрируйся
 
Последнее редактирование модератором:

Slu

Турист
Регистрация
18 Фев 2005
Сообщения
9
Реакции
0
Credits
16
n0n написал(а):
Home Networking Bible
by Sue Plumley

homenetworkingbible5da.gif



Paperback: 765 pages
Publisher: John Wiley & Sons; 2 edition (February 9, 2004)
ISBN: 0764544160
Product Dimensions: 9.2 x 7.3 x 1.7 inches
Shipping Weight: 2.6 pounds.



Book Info
Designed to help home networkers plan and prepare for networks, purchase the appropriate equipment and software, install the networking equipment, and make it work with Windows 95 or 98. Softcover. --This text refers to an out of print or unavailable edition of this title.

Product Description:
Everything you need to know to set up a home network

Is a home network for you? This comprehensive guide covers everything from deciding what type of network meets your needs to setting up the hardware and software, connecting different operating systems, installing the necessary applications, managing the network, and even adding home entertainment devices. Fully updated with new material on all the latest systems and methods, it·s just what you need to set up your network and keep it running safely and successfully.

Inside, you·ll find complete coverage of home networking
  • Compare the advantages and disadvantages of wired and wireless networks
  • Understand how to choose between workgroup and client/server networking
  • Learn how to install and set up cables and routers and how to install and configure networking software
  • Share files, printers, and a single Internet connection
  • Back up files and secure your network
  • Set up your own home intranet and understand the technologies involved in creating a Web page
  • Manage your network and learn to use tools for locating and repairing problems
  • Expand your home network to include your digital camera, scanner, TV, sound system, and even game consoles
  • Explore SmartHome technology that allows you to automate various household functions
  • Investigate how your network can enable tele-commuting and other remote access capabilities


Подробнее
Для просмотра ссылки Войди или Зарегистрируйся

Качаем
Для просмотра ссылки Войди или Зарегистрируйся
5.3 Mb

Скажите, пожалуйста, а как скачать книгу? FTP не пускает :( Заранее спасибо
 

pariman

ex-Team DUMPz
Местный
Регистрация
10 Мар 2004
Сообщения
1,715
Реакции
999
Credits
0
Slu написал(а):
Скажите, пожалуйста, а как скачать книгу? FTP не пускает Заранее спасибо
Да, фтп работает не для всех :). Постараюсь залить