Security related eBooks
Metasploit Toolkit for Penetration Testing, Exploit Development, and Vulnerability Research By David Maynor Publisher: Syngress 2007 | 350 Pages | ISBN: 1597490741 | File type: PDF | 4 mb This is the ...
( Category:Security related Date:22 Aug 2010 )
Mobility, Data Mining and Privacy: Geographic Knowledge Discovery By Fosca Giannotti, Di Follow Rules!...
( Category:Security related Date:22 Aug 2010 )
Netcat Power Tools By Jan Kanclirz Jr. Publisher: Syngress 2008 | 260 Pages | ISBN: 1597492574 | File type: PDF | 11 mb Originally released in 1996, Netcat is a netowrking program designed to read and...
( Category:Security related Date:22 Aug 2010 )
Practical Oracle Security: Your Unauthorized Guide to Relational Database Security By Josh Shaul, Aaron Ingram Publisher: Syngress 2007 | 288 Pages | ISBN: 1597491985 | File type: PDF | 4 mb This is t...
( Category:Security related Date:22 Aug 2010 )
Defend I.T.: Security by Example Publisher: Addison-Wesley Professional | ISBN: 0321197674 | edition 2004 | File type: CHM | 384 pages | 10,8 mb The battle between IT professionals and those who use t...
( Category:Security related Date:22 Aug 2010 )
Special Ops: Host and Network Security for Microsoft, UNIX, and Oracle By Erik Pace Birkholz, Stuart McClure Publisher: Syngress 2003 | 104 Pages | ISBN: 1931836698 | File type: PDF | 11 mb Special Op...
( Category:Security related Date:22 Aug 2010 )
CISSP: Certified Information Systems Security Professional Study Guide By James M. Stewart, Ed Tittel, Mike Chapple Publisher: John Wiley 2008 | 888 Pages | ISBN: 0470276886 | File type: PDF | 9 mb Co...
( Category:Security related Date:22 Aug 2010 )
Incident Response: Computer Forensics Toolkit By Douglas Schweitzer Publisher: Wiley 2003 | 360 Pages | ISBN: 0764526367 | File type: PDF | 4 mb Your in-depth guide to detecting network breaches, unco...
( Category:Security related Date:22 Aug 2010 )
Stealing the Network: How to Own a Continent Publisher: Syngress | ISBN: 1931836051 | edition 2004 | File type: CHM | 432 pages | 13,7 mb This is a book that will create enormous debate within the tec...
( Category:Security related Date:22 Aug 2010 )
Web Application Vulnerabilities: Detect, Exploit, Prevent By Steven Palmer Publisher: Syngress 2007 | 480 Pages | ISBN: 1597492094 | File type: PDF | 15 mb In this book, we aim to describe how to make...
( Category:Security related Date:21 Aug 2010 )
Rob Cameron, Brad Woodberg, Timothy Eberhard, and Patricio Giecco, "Junos Security" O’Reilly Media | 2010 | ISBN: 1449381715 | 848 pages | File type: PDF | 10,4 mb Junos® Security is the complete and ...
( Category:Security related Date:21 Aug 2010 )
Botnets: The Killer Web App Publisher: Syngress | ISBN: 1597491357 | edition 2007 | File type: PDF | 482 pages | 11,9 mb The book begins with real world cases of botnet attacks to underscore the need ...
( Category:Security related Date:19 Aug 2010 )
Media | ISBN: 0071613749 | January 26, 2009 | 720 pages | PDF | 15 MB Information: Meet the formidable demands of security in today's hyperconnected world with expert guidance from the world-renowned ...
( Category:Security related Date:17 Aug 2010 )
Enterprise Security: The Manager's Defense Guide Publisher: Addison-Wesley Professional | 2002 | ISBN: 020171972X | File type: PDF | 288 Pages | English | 2.2 mb Enterprise Security: The Manager's Def...
( Category:Security related Date:16 Aug 2010 )
Hackers Beware: The Ultimate Guide to Network Security By Eric Cole Publisher: Sams 2001 | 800 Pages | ISBN: 0735710090 | File type: PDF | 5 mb In Hackers Beware, Eric Cole succeeds in explaining how ...
( Category:Security related Date:16 Aug 2010 )