Security related eBooks
CEH V5 Instructor Slides Part 1/3 PDF | 12.5 13Mb | Publisher: EC-Council | Rapidshare.com NO MIRRORS! as soon as I upload the rest of the files, I will post here in Avaxhome and add to the rapidshare...
( Category:Security related Date:12 Mar 2008 )
The Shellcoder's Handbook: Discovering and Exploiting Security Holes, 2nd Edition by Chris Anley / John Heasman / Felix Linder / Gerardo Richarte, Wiley | ISBN10: 047008023X | 2 edition (August 20, 20...
( Category:Security related Date:12 Mar 2008 )
Scott Firestone, Thiya Ramalingam, Steve Fry, "Voice and Video Conferencing Fundamentals" Cisco Press | ISBN 1587052687 | March 16, 2007 | 408 Page | CHM | 4.5Mb As audio and video conferencing move r...
( Category:Security related Date:12 Mar 2008 )
Real World Linux Security (2nd Edition) Publisher: Prentice Hall | Author(s): Bob Toxen | ISBN: 0130464562 | Release Date: 13 November 2002 | 1.8 Mb | Page: 848 | rapidshare Linux is a solid operating...
( Category:Security related Date:12 Mar 2008 )
Securing LINUX Step by Step Publisher: SANS Institute | Author(s):David Ranch Lee Brotzman | ISBN: 0967299209 | Release Date: 30 July 1999 | Page: 120 | 1.4 Mb | rapidshare The subtitle says it all: `...
( Category:Security related Date:12 Mar 2008 )
Malicious Cryptography: Exposing Cryptovirology , by Adam Young Sons | PDF | 2.4 M (unpacks to 30 M !) | 416 pp | RapidShare Trojans, viruses ands all that - on a higher professional level. Discover h...
( Category:Security related Date:12 Mar 2008 )
Writing Security Tools and Exploits December 21, 2005 | ISBN: 1597499978 | 664 pages | December 21, 2005 | PDF | 6 M Writing Security Tools and Exploits will be the foremost authority on vulnerability...
( Category:Security related Date:12 Mar 2008 )
by Mark Last Artifical Intelligence)" World Scientific Publishing | ISBN: 9812564934 | 2005. | 184 p. | RARed PDF 8.57Mb The Internet, or the ARPANET in its original name, was a remarkable idea. The N...
( Category:Security related Date:12 Mar 2008 )
Chris Butler et al, IT Security Interviews Exposed: Secrets to Landing Your Next Information Security Job Wiley | ISBN: 0471779873 | July 23, 2007 | 218 pages | PDF | 1.7 Mb Technology professionals s...
( Category:Security related Date:12 Mar 2008 )
David Hawley / Raina Hawley, Excel Hacks: Tips & Tools for Streamlining Your Spreadsheets O'Reilly Media | ISBN: 0596528345 | 2 edition (June 20, 2007) | 386 pages | PDF | 6 Mb Millions of users creat...
( Category:Security related Date:12 Mar 2008 )
Djamel Khadraoui, Francine Herrmann, "Advances in Enterprise Information Technology Security" IGI Global | ISBN 1599040905 | May 31, 2007 | 368 Page | PDF | 5.1Mb Advances in Enterprise Information Te...
( Category:Security related Date:12 Mar 2008 )
Lex de Haan, Toon Koppelaars, "Applied Mathematics for Database Professionals" Apress | ISBN-10: 1590597451 | June 21, 2007 | 376 pages | PDF | 2.4Mb Relational databases hold data, right? They indeed...
( Category:Security related Date:12 Mar 2008 )
James Foster, "Metasploit Toolkit for Penetration Testing, Exploit Development, and Vulnerability Research" Syngress | ISBN-10: 1597490741 | September 1, 2007 | 352 pages | PDF | 3.6Mb This is the fir...
( Category:Security related Date:12 Mar 2008 )
"Security Power Tools" O'Reilly Media, Inc. | ISBN: 0596009631 | August 27, 2007 | PDF | 856 pages | 9070 KB What if you could sit down with some of the most talented security engineers in the world a...
( Category:Security related Date:12 Mar 2008 )
Timothy Stapko "Practical Embedded Security: Building Secure Resource-Constrained Systems (Embedded Technology)" Newnes (August 24, 2007) | ISBN:0750682159 | 480 Page | PDF | 7.2 M The great strides m...
( Category:Security related Date:12 Mar 2008 )