Archive for / 'EBOOKS'

January 10, 2014

EBOOKS Magazine News admin Comments Off

New WIRESHARK is out! Read our new issue and gain professional wireless hacking skills!

Dear readers, We are happy to present you completlely new issue dedicated to the most known sniffer – Wireshark. We are sure all of you know this special toll. You can use it to analyze network traffic, intrusion detection, or communication protocols development. This issue is a guidbook for all those who wants to learn […]

Read more

November 20, 2013

EBOOKS News NOTICE BOARD admin Comments Off

Become a Hacker with Password Cracking StarterKit E-Book!

Dear Readers, With this very new issue of Hakin9′s StarterKit E-BOOK we would like to give you 210 pages of knowledge about Password Cracking. It is dedicated to those who are newbies in this area and want to start their amazing adventure with hacking.With our articles written by experts you will learn how to crack […]

Read more

September 26, 2012

Don’t Be Mocked, Secure Your System 05/12

BlackBerry Playbook – New Challenges by Yury Chemerkin This approach mainly based on examines how many differences do exist between BlackBerry OS and new BlackBerry OS based on QNX OS. It highlights whether one techniques provide more easy implementation, investigation and handling or not, what common differences examiners may encounter and what they should as […]

Read more

September 21, 2012

Low Tech Hacking, CISSP, Network Scanning E-book 04/12

1. Look Away From the Monitor; You’re Under Attack by Low-tech and No-tech Hackers. By Eric Lahoda Reliance on highly technical defensive technology can lead to a false sense of security. A typical IT security department focuses most its attention on complex high-technology threats. This attention becomes a distraction from other significant low-tech or no-tech […]

Read more

September 5, 2012

Defend Yourself! Hands-on Cryptography

RSA algorithm by Andrzej Chmielowiec We will explain the methods of attacking this popular public-key algorithm. Its 35-year history showed that RSA provides sufficient security only when it is implemented in accordance with the latest norms and standards. It has been the object of extensive cryptanalytic research. The attempts at cracking RSA led to the […]

Read more

August 31, 2012

Malware: From Basic Cleaning to Analysing 03/2012

Malware discovery and protection Khaled Mahmoud Abd El Kader Very often people call everything that corrupts their system a virus, not aware of what viruses mean or do. This paper systematically gives an introduction to different varieties of beasts that come under the wide umbrella called malware, their distinguishing features, prerequisites for malware analysis and […]

Read more

August 21, 2012

The Guide to Nmap 02/2012

Dear Hakin9 followers: This month we have decided to devote the current issue to Nmap. Some of you have most likely used Nmap sometime or another, while others use it on a daily basis for network discovery and security auditing. Besides those functions, there are many more useful options that come with this utility. Our […]

Read more

July 30, 2012

Public Key Cryptostructure – Hakin9 E-book 1/2012

Dear Readers. In our attempt to become more accessible to you and meet the challenges and expectations of the ever-changing tech world, this E-book is available in both .pdf and .epub formats, contained within a single .rar file. Data Encryption Software by Hans Fouche The need for encryption has existed ever since man has learned […]

Read more

December 5, 2011

Get 20 % discount NOW!

Huge discounts on security books from Feisty Duck! Feisty Duck is providing all readers of Hakin9 with a special discount for additional 20% off our current prices. Use code HAKIN9MS for 45% off list price for ModSecurity Handbook Use code HAKIN9AS for 60% off list price for Apache Security Feisty Duck (https://www.feistyduck.com) is an independent […]

Read more

November 10, 2011

Machine Learning Forensics for Law Enforcement, Security, and Intelligence

ISBN: 978-1439860694 RRP: $69.95 The first time that I quickly browsed through this book, I thought that maybe I was reading this in a slightly different language as there were new acronyms and different ways of thinking on how to process information for me to learn By the time I was finished my head was […]

Read more

September 26, 2011

Review of Vulnerability Management

Review of Vulnerability Management By Aby Rao, CISSP, CISA, ITIL, Security+, ISO/IEC 20000 http://www.crcpress.com/product/isbn/9781439801505   Imagine this: You are a Security Engineer in a medium-size company and you are invited into your bosses’ office for an important one-on-one meeting. Your boss breaks the news that you have been entrusted with the job of starting a […]

Read more

September 25, 2011

Vulnerability Management

Vulnerability Management By Park Foreman August 2009 Publisher: CRC Press http://www.crcpress.com/product/isbn/9781439801505   50% DISCOUNT for Hakin9 SUBSCRIBERS!!! To save 50% enter given below discount code, during checkout at www.crcpress.com. Description As old as the threat of danger itself, vulnerability management (VM) has been the responsibility of leaders in every human organization, from tribes and fiefdoms […]

Read more

IT MAGAZINES: Hakin9 Magazine | Pentest Magazine | eForensics Magazine | Software Developer's Journal | Hadoop Magazine | Java Magazine
IT Blogs: Hakin9 Magazine Blog | Pentest Magazine Blog | eForensics Magazine Blog | Software Developer's Journal Blog | Hadoop Magazine Blog | Java Magazine Blog
IT ONLINE COURSES: Pentest Laboratory
JOB OFFERS FOR IT SPECIALIST: Jobs on Hakin9 Magazine | Jobs on Pentest Magazine | Jobs on eForensics Magazine | Jobs on Software Developer's Journal | Jobs on Java Magazine | Jobs on Hadoop Magazine
Hakin9 Media Sp. z o.o. Sp. komandytowa ul. Postępu 17D, 02-676 Warszawa