Hacking GPS :-
Hacking GPS shows you how to get more out of owning a GPS receiver.
Written with the Extreme Technology community in mind, this
book shows you how to do a variety of different things with
your receiver: * Build custom cabling * Protecting your GPS from the elements * Connecting your GPS to a PC or PDA * Build and mount external antennas * Load new, modified, firmware onto your device * Access secret diagnostic screens and test utilities * GPS games & much more...! If you've got a GPS and you want to be able to make the most of it then this is the book for you! | |
Download | (Size :- 8.50 MB) |
Oracle Hackers Handbook :-
While Oracle continues to improve the security features of its
product, it still has a long way to go. David Litchfield has
devoted years to relentlessly searching out the flaws in this
ubiquitous database system and creating defenses against them.
Now he offers you his complete arsenal to assess and defend
your own Oracle systems.This in-depth guide explores every technique and tool used by black hat hackers to invade and compromise Oracle. It shows you how to find the weak spots and defend them. Without that knowledge, you have little chance of keeping your databases truly secure. Discover how to deal with the security flaws revealed in the Oracle RDBMS. Explore some never-before-published forays into Oracle security holes and learn to defend them from attack. | |
Download | (Size :- 480 KB) |
Security & Cryptography :-
6th International Conference, SCN 2008, Amalfi, Italy, September
10-12, 2008, ProceedingsEditors: Rafail Ostrovsky, Roberto De Prisco and Ivan Visconti Hardcover: 423 pages Publisher: Springer; 1 edition (September 1, 2008) Language: English ISBN-10: 3540858547 ISBN-13: 978-3540858546 Format: pdf This book constitutes the refereed proceedings of the 6th International Conference on Security and Cryptology for Networks, SCN 2008, held in Amalfi, Italy, in September 2008 | |
Download | (Size :- 4.86 MB) |
Shellcoder's Handbook :-
The Shellcoders Handbook, discovering and exploiting security
holes is the second edition. It covers introduction to exploitation:
linux on x86 contains stack overflows, shellcodes, format string
bugs, heap overflows. Also for windows platform and solaris
exploitation too. OS X shellcode, cisco ios exploitaion, unix
kernel overflows, windows kernel hacking, protection mechnism
and much more.....! |
|
Download | (Size :- 2.98 MB) |
Hacking Exposed VoIP :-
This book illuminates how remote users can probe, sniff, and modify your
phones, phone switches, and networks that offer VoIP services. Most
importantly, the authors offer solutions to mitigate the risk of
deploying VoIP technologies.Block debilitating VoIP attacks by learning how to look at your network and devices through the eyes of the malicious intruder. Hacking Exposed VoIP shows you, step-by-step, how online criminals perform reconnaissance, gain access, steal data, and penetrate vulnerable systems. All hardware-specific and network-centered security issues are covered alongside detailed countermeasures, in-depth examples, and hands-on implementation techniques. Inside, you'll learn how to defend against the latest DoS, man-in-the-middle, call flooding, eavesdropping, VoIP fuzzing, signaling and audio manipulation, Voice SPAM/SPIT, and voice phishing attacks. | |
Download | (Size :- 16.3 MB) |
Google Apps Hacks :-
Can
Google applications really become an alternative to the venerable
Microsoft Office suite? Conventional wisdom may say no, but practical
wisdom says otherwise. Right now, 100,000 small businesses are currently
running trials of Google office applications. So are large corporations
such as General Electric and Proctor & Gamble. Google Apps Hacks
gets you in on the action with several ingenious ways to push Google's
web, mobile, and desktop apps to the limit.The scores of clever hacks and workarounds in this book help you get more than the obvious out of a whole host of Google's web-based applications for word processing, spreadsheets, PowerPoint-style presentations, email, calendar, and more by giving you ways to exploit the suite's unique network functionality. | |
Download | (Size :- 11.7 MB) |
Botnets: The Killer Web Applications :-
The
book begins with real world cases of botnet attacks to underscore the
need for action. Next the book will explain botnet fundamentals using
real world examples. These chapters will cover what they are, how they
operate, and the environment and technology that makes them possible.
The following chapters will analyze botnets for opportunities to detect,
track, and remove them. Then the book will describe intelligence
gathering efforts and results obtained to date. Public domain tools like
OurMon, developed by Jim Binkley of Portland State University, will be
described in detail along with discussions of other tools and resources
that are useful in the fight against Botnets.* This is the first book to explain the newest internet threat Botnets, zombie armies, bot herders, what is being done, and what you can do to protect your enterprise. * Botnets are the most complicated and difficult threat the hacker world has unleashed - read how to protect yourself. | |
Download | (Size :- 5.31 MB) |
Hacking Exposed - 6 :-
The world's bestselling computer security book--fully expanded and updated.* New chapter on hacking hardware, including lock bumping, access card cloning, RFID hacks, USB U3 exploits, and Bluetooth device hijacking * Updated Windows attacks and countermeasures, including new Vista and Server 2008 vulnerabilities and Metasploit exploits * The latest UNIX Trojan and rootkit techniques and dangling pointer and input validation exploits * New wireless and RFID security tools, including multilayered encryption and gateways * All-new tracerouting and eavesdropping techniques used to target network hardware and Cisco devices * Updated DoS, man-in-the-middle, DNS poisoning, and buffer overflow coverage * VPN and VoIP exploits, including Google and TFTP tricks, SIP flooding, and IPsec hacking * Fully updated chapters on hacking the Internet user, web hacking, and securing code | |
Download | (Size :- 7.79 MB) |