XML Hacks 100 Industrial-Strength Tips and Tools – Michael Fitzgerald

Image

filetype : ePUB

Descriptions :

Developers and system administrators alike are uncovering the true power of XML, the Extensible Markup Language that enables data to be sent over the Internet from one computer platform to another or one application to another and retain its original format. Flexible enough to be customized for applications as diverse as web sites, electronic data interchange, voice mail systems, wireless devices, web services, and more, XML is quickly becoming ubiquitous.

Continue reading

Advertisements

Hacking: The Art of Exploitation, 2nd Edition – Jon Erickson

Image

filetype : ePUB

Descriptions :

Hacking is the art of creative problem solving, whether that means finding an unconventional solution to a difficult problem or exploiting holes in sloppy programming. Many people call themselves hackers, but few have the strong technical foundation needed to really push the envelope.

Continue reading

The Basics of Hacking and Penetration Testing : Ethical Hacking and Penetration Testing Made Easy – Patrick Engebretson

Image

filetype : ePUB

Descriptions :

The Basics of Hacking and Penetration Testing serves as an introduction to the steps required to complete a penetration test or perform an ethical hack. You learn how to properly utilize and interpret the results of modern day hacking tools; which are required to complete a penetration test. Tool coverage will include, Backtrack Linux, Google, Whois, Nmap, Nessus, Metasploit, Netcat, Netbus, and more. A simple and clean explanation of how to utilize these tools will allow you  to gain a solid understanding of each of the four phases and prepare them to take on more in-depth texts and topics. This book includes the use of a single example (pen test target) all the way through the book which allows you to clearly see how the tools and phases relate.

  • Named a 2011 Best Hacking and Pen Testing Book by InfoSec Reviews
  • Each chapter contains hands-on examples and exercises that are designed to teach you how to interpret the results and utilize those results in later phases.
  • Writen by an author who works in the field as a Penetration Tester and who teaches Offensive Security, Penetration Testing, and Ethical Hacking, and Exploitation classes at Dakota State University.
  • Utilizes the Backtrack Linus distribution and focuses on the seminal tools required to complete a penetration test.

Read More :

Get Yours :

Get Yours NOW

Multiupfile link

The Practice of Network Security Monitoring – Richard Bejtlich

Image

Filetype : ePUB

Descriptions

Network security is not simply about building impenetrable walls — determined attackers will eventually overcome traditional defenses. The most effective computer security strategies integrate network security monitoring (NSM): the collection and analysis of data to help you detect and respond to intrusions.

Continue reading

Black Hat Python : Python Programming for Hackers and Pentesters – Justin Seitz

Image

File Type : ePUB

Descriptions

“The difference between script kiddies and professionals is the difference between merely using other people’s tools and writing your own.”
—Charlie Miller, from the Foreword

When it comes to creating powerful and effective hacking tools, Python is the language of choice for most security analysts. But just how does the magic happen?

Continue reading