WHAT'S NEW?
Loading...
Showing posts with label book. Show all posts
Showing posts with label book. Show all posts

Windows 8 Hacks & secrets 2013

Published: 2013 | ISBN10 1449325750 | 422 Pages | PDF |SIZE 41 MB


Book Description

Windows 8 is quite different than previous Microsoft operating systems, but it’s still eminently hackable. With this book, you’ll learn how to make a variety of modifications, from speeding up boot time and disabling the Lock screen to hacking native apps and running Windows 8 on a Mac. And that’s just the beginning. You’ll find more than 100 standalone hacks on performance, multimedia, networking, the cloud, security, email, hardware, and more. Not only will you learn how to use each hack, you’ll also discover why it works.
 Add folders and other objects to the Start screen 
 Run other Windows versions inside Windows 8 
 Juice up performance and track down bottlenecks 
 Use the SkyDrive cloud service to sync your files everywhere 
 Speed up web browsing and use other PCs on your home network 
 Secure portable storage and set up a virtual private network 
 Hack Windows 8 Mail and services such as Outlook 
 Combine storage from different devices into one big virtual disk 
 Take control of Window 8 setting with the Registr

==========================================================





Designing BSD Rootkits An Introduction to Kernel Hacking

Published: 2007 | ISBN10 1593271425 | 144 Pages | PDF |SIZE 8 MB


Book Description


Though rootkits have a fairly negative image, they can be used for both good and evil. Designing BSD Rootkits arms you with the knowledge you need to write offensive rootkits, to defend against malicious ones, and to explore the FreeBSD kernel and operating system in the process.

Organized as a tutorial, Designing BSD Rootkits will teach you the fundamentals of programming and developing rootkits under the FreeBSD operating system. Author Joseph Kong's goal is to make you smarter, not to teach you how to write exploits or launch attacks. You'll learn how to maintain root access long after gaining access to a computer and how to hack FreeBSD.

Kongs liberal use of examples assumes no prior kernel-hacking experience but doesn't water down the information. All code is thoroughly described and analyzed, and each chapter contains at least one real-world application.

Included:
- The fundamentals of FreeBSD kernel module programming
- Using call hooking to subvert the FreeBSD kernel
- Directly manipulating the objects the kernel depends upon for its internal record-keeping
- Patching kernel code resident in main memory  in other words, altering the kernel's logic while it's still running
- How to defend against the attacks described

=========================================================



Geek House - 10 Hardware Hacking Projects for Around Home

Published: 2005 | ISBN10 0764579568 | 304 Pages | PDF |SIZE 6 MB


Book Description

From the garage to the living room, Geek House provides hackers with 10 PC–based hardware hacking projects that are not for the faint of heart!


 Taking the DIY mentality to a whole new level, this book teaches techies how to hack, customize, and modify everything–from their sprinkler systems to the temperature of their barbecues

==========================================================




Brute Force Cracking the Data Encryption Standard

Published: 2005 | ISBN10 0387201092 | 283 Pages | PDF |SIZE 2 MB


Book Description

In 1996, the supposedly uncrackable US federal encryption system was broken. In this captivating and 

intriguing book, Matt Curtin charts the rise and fall 

of 
DES and chronicles the efforts of those who were determined to master it.

==========================================================



Hacking for Dummies: Test Network Security

Published: 2004 | 387 Pages | PDF |SIZE 10 MB


Book Description

A new edition of the bestselling guide-now updated to cover the latest hacks and how to prevent them!

It's bad enough when a hack occurs-stealing identities, bank accounts, and personal information. But when the hack could have been prevented by taking basic security measures-like the ones described in this book-somehow that makes a bad situation even worse. This beginner guide to hacking examines some of the best security measures that exist and has been updated to cover the latest hacks for Windows 7 and the newest version of Linux.

Offering increased coverage of Web application hacks, database hacks, VoIP hacks, and mobile computing hacks, this guide addresses a wide range of vulnerabilities and how to identify and prevent them. Plus, you'll examine why ethical hacking is oftentimes the only way to find security flaws, which can then prevent any future malicious attacks.

Explores the malicious hackers's mindset so that you can counteract or avoid attacks completely
Covers developing strategies for reporting vulnerabilities, managing security changes, and putting anti-hacking policies and procedures in place

========================================================



Syngress SQL Injection Attacks & Defense

Published: 2012 | 576 Pages | ISBN: 1597499633 | PDF | 10MB


Book Description


SQL Injection Attacks and Defense, First Edition: Winner of the Best Book Bejtlich Read Award 
 "SQL injection is probably the number one problem for any server-side application, and this book unequaled in its coverage." -Richard Bejtlich, Tao Security blog 
 SQL injection represents one of the most dangerous and well-known, yet misunderstood, security vulnerabilities on the Internet, largely because there is no central repository of information available for penetration testers, IT security consultants and practitioners, and web/software developers to turn to for help. 
 SQL Injection Attacks and Defense, Second Edition is the only book devoted exclusively to this long-established but recently growing threat. This is the definitive resource for understanding, finding, exploiting, and defending against this increasingly popular and particularly destructive type of Internet-based attack. 
 SQL Injection Attacks and Defense, Second Edition includes all the currently known information about these attacks and significant insight from its team of SQL injection experts, who tell you about: 
 Understanding SQL Injection - Understand what it is and how it works 
 Find, confirm and automate SQL injection discovery 
 Tips and tricks for finding SQL injection within code 
 Create exploits for using SQL injection 
 Design apps to avoid the dangers these attacks 
 SQL injection on different databases 
 SQL injection on different technologies 
 SQL injection testing techniques 
 Case Studies 
 Securing SQL Server, Second Edition is the only book to provide a complete understanding of SQL injection, from the basics of vulnerability to discovery, exploitation, prevention, and mitigation measures. 
 Covers unique, publicly unavailable information, by technical experts in such areas as Oracle, Microsoft SQL Server, and MySQL -including new developments for Microsoft SQL Server 2012 (Denali). 
 Written by an established expert, author, and speaker in the field, with contributions from a team of equally renowned creators of SQL injection tools, applications, and educational materials.

Reviews:

-------------------------------------------------------------------------------
"SQL injection is probably the number one problem for any server-side application, and this book unequaled in its coverage." 
--Richard Bejtlich, Tao Security blog 

"The most stunningly impactful attacks often leverage SQL Injection vulnerabilities. This book has everything you need to fight back, from applying the core fundamentals to protecting emerging technologies against such attacks. Keep it by your bedside and distribute it within your business." 
--Nitesh Dhanjani, Executive Director at Ernst & Young LLP
-------------------------------------------------------------------------------

About the Author:

-------------------------------------------------------------------------------
Justin Clarke (CISSP, CISM, CISA, MCSE, CEH) is a cofounder and executive director of Gotham Digital Science, based in the United Kingdom. He has over ten years of experience in testing the security of networks, web applications, and wireless networks for large financial, retail, and technology clients in the United States, the United Kingdom and New Zealand.

============================================================




Hacking Exposed : Computer Forensics Secrets & Solutions

Published: 2009 | 544 Pages | ISBN: 0071626778 | PDF | 12 MB


Book Description

The latest strategies for investigating cyber-crime
Identify and investigate computer criminals of all stripes with help from this fully updated. real-world resource. Hacking Exposed Computer Forensics, Second Edition explains how to construct a high-tech forensic lab, collect prosecutable evidence, discover e-mail and system file clues, track wireless activity, and recover obscured documents. Learn how to re-create an attacker's footsteps, communicate with counsel, prepare court-ready reports, and work through legal and organizational challenges. Case studies straight from today's headlines cover IP theft, mortgage fraud, employee misconduct, securities fraud, embezzlement, organized crime, and consumer fraud cases.
Effectively uncover, capture, and prepare evidence for investigation
Store and process collected data in a highly secure digital forensic lab
Restore deleted documents, partitions, user activities, and file systems
Analyze evidence gathered from Windows, Linux, and Macintosh systems
Use the latest Web and client-based e-mail tools to extract relevant artifacts
Overcome the hacker's anti-forensic, encryption, and obscurity techniques
Unlock clues stored in cell phones, PDAs, and Windows Mobile devices
Prepare legal documents that will hold up to judicial and defense scrutiny

=========================================================



Hacking: The Art of Exploitation, 2nd Edition

Published:2012 | ePub & mobi & pdf | 488 Pages | 14 Mb


Book Description

Hacking is the art of creative problem solving, whether that means finding an unconventional solution to a difficult problem or exploiting holes in sloppy programming. Many people call themselves hackers, but few have the strong technical foundation needed to really push the envelope.

Rather than merely showing how to run existing exploits, author Jon Erickson explains how arcane hacking techniques actually work. To share the art and science of hacking in a way that is accessible to everyone, Hacking: The Art of Exploitation, 2nd Edition introduces the fundamentals of C programming from a hacker's perspective.

The included LiveCD provides a complete Linux programming and debugging environment-all without modifying your current operating system. Use it to follow along with the book's examples as you fill gaps in your knowledge and explore hacking techniques on your own. Get your hands dirty debugging code, overflowing buffers, hijacking network communications, bypassing protections, exploiting cryptographic weaknesses, and perhaps even inventing new exploits. This book will teach you how to:

- Program computers using C, assembly language, and shell scripts
- Corrupt system memory to run arbitrary code using buffer overflows and format strings
- Inspect processor registers and system memory with a debugger to gain a real understanding of what is happening
- Outsmart common security measures like nonexecutable stacks and intrusion detection systems
- Gain access to a remote server using port-binding or connect-back shellcode, and alter a server's logging behavior to hide your presence
- Redirect network traffic, conceal open ports, and hijack TCP connections

Crack encrypted wireless traffic using the FMS attack, and speed up brute-force attacks using a password probability matrix
Hackers are always pushing the boundaries, investigating the unknown, and evolving their art. Even if you don't already know how to program, Hacking: The Art of Exploitation, 2nd Edition will give you a complete picture of programming, machine architecture, network communications, and existing hacking techniques. Combine this knowledge with the included Linux environment, and all you need is your own creativity.

=========================================================


Hacking Exposed 7 : Network Security Secrets & Solutions

Published: 2012 | ISBN: 0071780289 | 768 pages | EPUB | 45 MB


Book Description

The latest tactics for thwarting digital attacks

“Our new reality is zero-day, APT, and state-sponsored attacks. Today, more than ever, security professionals need to get into the hackerâ?™s mind, methods, and toolbox to successfully deter such relentless assaults. This edition brings readers abreast with the latest attack vectors and arms them for these continually evolving threats.” --Brett Wahlin, CSO, Sony Network Entertainment

“Stop taking punches--letâ?™s change the game; itâ?™s time for a paradigm shift in the way we secure our networks, and Hacking Exposed 7 is the playbook for bringing pain to our adversaries.” --Shawn Henry, former Executive Assistant Director, FBI

Bolster your systemâ?™s security and defeat the tools and tactics of cyber-criminals with expert advice and defense strategies from the world-renowned Hacking Exposed team. Case studies expose the hackerâ?™s latest devious methods and illustrate field-tested remedies. Find out how to block infrastructure hacks, minimize advanced persistent threats, neutralize malicious code, secure web and database applications, and fortify UNIX networks. Hacking Exposed 7: Network Security Secrets & Solutions contains all-new visual maps and a comprehensive “countermeasures cookbook.”
Obstruct APTs and web-based meta-exploits
Defend against UNIX-based root access and buffer overflow hacks
Block SQL injection, spear phishing, and embedded-code attacks
Detect and terminate rootkits, Trojans, bots, worms, and malware
Lock down remote access using smartcards and hardware tokens
Protect 802.11 WLANs with multilayered encryption and gateways
Plug holes in VoIP, social networking, cloud, and Web 2.0 services
Learn about the latest iPhone and Android attacks and how to protect yourself.

==============================================




Reto Meier - Professional Android 2 Application Development

Published: 2010-03-01 | ISBN: 0470565527 | PDF | 576 pages | 17 MB

Book Description

Build unique mobile applications with the latest Android SDK
Written by an Android authority, this up-to-date resource shows you how to leverage the features of Android 2 to enhance existing products or create innovative new ones. Serving as a hands-on guide to building mobile apps using Android, the book walks you through a series of sample projects that introduces you to Android's new features and techniques. Using the explanations and examples included in these pages, you'll acquire the foundation needed to write compelling mobile applications that use Android, along with the flexibility to quickly adapt to future enhancements.
Professional Android 2 Application Development:
Reviews Android as a development platform and¿best practices for mobile development
Provides an in-depth look at the Android application components
Details creating layouts and Views to produce compelling resolution independent user interfaces
Examines Intents and Content Providers for sharing data
Introduces techniques for creating map-based applications and using location-based services such as GPS
Looks at how to create and use background Services, Notifications, and Alarms
Demonstrates how to create interactive homescreen components
Explores the Bluetooth, telephony, and networking APIs
Examines using hardware, including the camera and sensors such as the compass and accelerometers.

About the Author

Reto Meier the tech lead for the Android Developer Relations team at Google and I wrote Professional Android 4 Application Development.

Reto Meier currently living in Los Altos California, but I'm from Perth Western Australia originally and spent 6 years living and working in London.

==============================================




 Grey Hat Hacking 2nd Edition
 Mc--aw-Hill Osborne Media

2nd Edition | ISBN: 0071495681 | PDF | 550 pages | 11.2 MB

Book Description

“A fantastic book for anyone looking to learn the tools and techniques needed to break in and stay in.” –Bruce Potter, Founder, The Shmoo Group

“Very highly recommended whether you are a seasoned professional or just starting out in the security business.” –Simple Nomad, Hacker

Prevent catastrophic network attacks by exposing security flaws, fixing them, and ethically reporting them to the software author. Fully expanded to cover the hacker's latest devious methods, Gray Hat Hacking: The Ethical Hacker's Handbook, Second Edition lays out each exploit alongside line-by-line code samples, detailed countermeasures, and moral disclosure procedures. Find out how to execute effective penetration tests, use fuzzers and sniffers, perform reverse engineering, and find security holes in Windows and Linux applications. You'll also learn how to trap and autopsy stealth worms, viruses, rootkits, adware, and malware.
Implement vulnerability testing, discovery, and reporting procedures that comply with applicable laws
Learn the basics of programming, stack operations, buffer overflow and heap vulnerabilities, and exploit development
Test and exploit systems using Metasploit and other tools
Break in to Windows and Linux systems with perl scripts, Python scripts, and customized C programs
Analyze source code using ITS4, RATS, FlawFinder, PREfast, Splint, and decompilers
Understand the role of IDA Pro scripts, FLAIR tools, and third-party plug-ins in discovering software vulnerabilities
Reverse-engineer software using decompiling, profiling, memory monitoring, and data flow analysis tools
Reveal client-side web browser vulnerabilities with MangleMe, AxEnum, and AxMan
Probe Windows Access Controls to discover insecure access tokens, security descriptors, DACLs, and ACEs
Find and examine malware and rootkits using honeypots, honeynets, and Norman SandBox technology

 About the Author

Shon Harris, MCSE, CISSP, is the president of Logical Security, an educator, and a security consultant.

Allen Harper, CISSP, is the president and owner of n2netsecurity, Inc., in North Carolina.

Chris Eagle is the associate chairman of the Computer Science Department at the Naval Postgraduate School (NPS) in Monterey, California.


==============================================
























Add caption





Download Part-1

Download Part-2

Download Part-3

Download Part-4

Download Part-5

Download Part-6


================================================
new link of part 3
================================================
















The Definitive Guide to HTML & CSS--Fully Updated
Written by a Web development expert, the fifth edition of this trusted resource has been thoroughly revised and reorganized to address HTML5, the revolutionary new Web standard. The book covers all the elements supported in today's Web browsers--from the standard (X)HTML tags to the archaic and proprietary tags that may be encountered.
HTML & CSS: The Complete Reference, Fifth Edition contains full details on CSS 2.1 as well as every proprietary and emerging CSS3 property currently supported. Annotated examples of correct markup and style show you how to use all of these technologies to build impressive Web pages. Helpful appendixes cover the syntax of character entities, fonts, colors, and URLs. This comprehensive reference is an essential tool for professional Web developers.
Master transitional HTML 4.01 and XHTML 1.0 markup
Write emerging standards-based markup with HTML5
Enhance presentation with Cascading Style Sheets (CSS1 and CSS 2.1)
Learn proprietary and emerging CSS3 features
Learn how to read (X)HTML document type definitions (DTDs)
Apply everything in an open standards-focused fashion
Thomas A. Powell is president of PINT, Inc. (pint.com), a nationally recognized Web agency. He developed the Web Publishing Certificate program for the University of California, San Diego Extension and is an instructor for the Computer Science Department at UCSD. He is the author of the previous bestselling editions of this book and Ajax: The Complete Reference, and co-author of JavaScript: The Complete Reference.








1- for download click here

2- for download click here






















.net is the world's best-selling magazine for web designers and developers. Every issue boasts more than 30 pages of tutorials, covering topics such as CSS, PHP, Flash, javascript and web graphics.









1- for download click here

2- for download click here

3- for download click here



















This is the online version of The C Book, second edition by Mike Banahan, Declan Brady and Mark Doran, originally published by Addison Wesley in 1991. This version is made freely available.

While this book is no longer in print, its content is still very relevant today. The C language is still popular, particularly for open source software and embedded programming. We hope this book will be useful, or at least interesting, to people who use C.








1- for download click here

2- for download click here





























Easily create website pages use of adobe dreamvweaver the book/video help for dreamweaver use....




Create a Simple but State-of-the-Art Website
The advent of HTML5 has opened up new frontiers in the world of web design, and in this course you’ll learn how to exploit the power of HTML5 to make the best-looking, smoothest-functioning, and easiest-to-use web pages possible. After getting an overview of HTML and CSS concepts, you’ll work along with author and trainer Sally Cox to create an entire blog site from scratch. Starting with the concept, you’ll proceed to build a wireframe and add text, images, a header, a nav bar, an interactive form, and even multimedia content. Along the way you’ll learn about the new tags in HTML5 and get lots of tips on web design, such as which graphic formats to use and the best way to save your graphics for the web.
This Learn by Video workshop teaches you the fundamentals of web design with HTML5, from the basic concepts and terminology all the way to the finished site.









torrent link
for download click here