Security related eBooks
Writing Security Tools and Exploits December 21, 2005 | ISBN: 1597499978 | 664 pages | December 21, 2005 | PDF | 6 M Writing Security Tools and Exploits will be the foremost authority on vulnerability...
( Category:Security related Date:12 Mar 2008 )
by Mark Last Artifical Intelligence)" World Scientific Publishing | ISBN: 9812564934 | 2005. | 184 p. | RARed PDF 8.57Mb The Internet, or the ARPANET in its original name, was a remarkable idea. The N...
( Category:Security related Date:12 Mar 2008 )
Chris Butler et al, IT Security Interviews Exposed: Secrets to Landing Your Next Information Security Job Wiley | ISBN: 0471779873 | July 23, 2007 | 218 pages | PDF | 1.7 Mb Technology professionals s...
( Category:Security related Date:12 Mar 2008 )
David Hawley / Raina Hawley, Excel Hacks: Tips & Tools for Streamlining Your Spreadsheets O'Reilly Media | ISBN: 0596528345 | 2 edition (June 20, 2007) | 386 pages | PDF | 6 Mb Millions of users creat...
( Category:Security related Date:12 Mar 2008 )
Djamel Khadraoui, Francine Herrmann, "Advances in Enterprise Information Technology Security" IGI Global | ISBN 1599040905 | May 31, 2007 | 368 Page | PDF | 5.1Mb Advances in Enterprise Information Te...
( Category:Security related Date:12 Mar 2008 )
Lex de Haan, Toon Koppelaars, "Applied Mathematics for Database Professionals" Apress | ISBN-10: 1590597451 | June 21, 2007 | 376 pages | PDF | 2.4Mb Relational databases hold data, right? They indeed...
( Category:Security related Date:12 Mar 2008 )
James Foster, "Metasploit Toolkit for Penetration Testing, Exploit Development, and Vulnerability Research" Syngress | ISBN-10: 1597490741 | September 1, 2007 | 352 pages | PDF | 3.6Mb This is the fir...
( Category:Security related Date:12 Mar 2008 )
"Security Power Tools" O'Reilly Media, Inc. | ISBN: 0596009631 | August 27, 2007 | PDF | 856 pages | 9070 KB What if you could sit down with some of the most talented security engineers in the world a...
( Category:Security related Date:12 Mar 2008 )
Timothy Stapko "Practical Embedded Security: Building Secure Resource-Constrained Systems (Embedded Technology)" Newnes (August 24, 2007) | ISBN:0750682159 | 480 Page | PDF | 7.2 M The great strides m...
( Category:Security related Date:12 Mar 2008 )
Geek Squad Manuals - Leaked 6 PDFs | 7.4 Mb | BURN OR EAT THIS DOCUMENT AFTER READING Description: -Camcorder Training -CIA Handbook -Double Agent Handbook -Data Backup Checklist -Voip Training -Wifi ...
( Category:Security related Date:12 Mar 2008 )
Giampaolo Bella, "Formal Correctness of Security Protocols (Information Security and Cryptography)" Springer; 1 edition (February 2007) | ISBN:3540681345 | 287 pages | PDF | 1,6 M Computer network sec...
( Category:Security related Date:12 Mar 2008 )
Eccouncil - Certified Ethical Hacker v5 Instructor Slides | 59.8 M Students will also learn about Intrusion Detection, Policy Creation, Social Engineering, DDoS Attacks, Buffer Overflows and Virus cre...
( Category:Security related Date:12 Mar 2008 )
Network Security: A Beginner's Guide Osborne/McGraw-Hill | ISBN: 0072133244 | 400 pages | May 7, 2001 | PDF | 8 M All companies rely on some security mechanisms to ensure their corporate privacy and i...
( Category:Security related Date:12 Mar 2008 )
CEH V5 Instructor Slides Part 3/3 PDF | 14.3 Mb | Publisher: EC-Council | Rapidshare.com NO MIRRORS !!!!!!!!!!!!!!!!!! NO MIRRORS !!!!!!!!!!!!!!!!!! 0-day! This is the last part of the III parts for t...
( Category:Security related Date:12 Mar 2008 )
Hackers: Heroes of the Computer Revolutio Delta | ISBN: 0385312105 | 456 pages | November 1, 1985 | PDF | 2 M Steven Levy's classic book explains why the misuse of the word "hackers" to describe compu...
( Category:Security related Date:12 Mar 2008 )