Manuales. Parte II (Xclusive!)
Posted by
ax3L
CATEGORIAS:
Manuales
Jon Erickson - Hacking The Art Of Exploitation (No Starch Press, 2003)
Hacking: The Art of Exploitation
by Jon Erickson
ISBN:1593270070
No Starch Press © 2003 (241 pages)
This text introduces the spirit and theory of hacking as well as the science behind it all; it also provides some core techniques and tricks of hacking so you can think like a hacker, write your own hacks or thwart potential system attacks.
by Jon Erickson
ISBN:1593270070
No Starch Press © 2003 (241 pages)
This text introduces the spirit and theory of hacking as well as the science behind it all; it also provides some core techniques and tricks of hacking so you can think like a hacker, write your own hacks or thwart potential system attacks.
Tamaño de fichero: 1.38 MB
Idioma: inglés
Password:ax3l
Web Hacking: Attacks and Defense
By Stuart McClure, Saumil Shah, Shreeraj Shah
Publisher: Addison Wesley
Pub Date: August 08, 2002
ISBN: 0-201-76176-9
Pages: 528
Ripped by Caudex 2003
By Stuart McClure, Saumil Shah, Shreeraj Shah
Publisher: Addison Wesley
Pub Date: August 08, 2002
ISBN: 0-201-76176-9
Pages: 528
Ripped by Caudex 2003
Web Hacking informs from the trenches. Experts show you how to connect the dots--how to put the stages of a Web hack together so you can best defend against them. Written for maximum brain absorption with unparalleled technical content and battle-tested analysis, Web Hacking will help you combat potentially costly security threats and attacks.
Tamaño de fichero: 6.475 MB
Idioma: inglés
Password: ax3l
Security Warrior
By Anton Chuvakin, Cyrus Peikari
Publisher: O'Reilly
Pub Date: January 2004
ISBN: 0-596-00545-8
Pages: 552
By Anton Chuvakin, Cyrus Peikari
Publisher: O'Reilly
Pub Date: January 2004
ISBN: 0-596-00545-8
Pages: 552
What's the worst an attacker can do to you? You'd better find out, right? That's what Security Warrior teaches you. Based on the principle that the only way to defend yourself is to understand your attacker in depth, Security Warrior reveals how your systems can be attacked. Covering everything from reverse engineering to SQL attacks, and including topics like social engineering, antiforensics, and common attacks against UNIX and Windows systems, this book teaches you to know your enemy and how to be prepared to do battle.
Tamaño de fichero: 4.615 MB
Idioma: inglés
Password: ax3l
Buscas un programa y no lo encuentras? Pidelo , posteando en blog o en tag y te lo conseguimos!
Subscribe to:
Post Comments (Atom)
Post a Comment