+

Archive for / 'EBOOKS'



July 28, 2011


Defense Against the Black Arts: How Hackers Do What They Do and How to Protect Against It

Defense Against the Black Arts: How Hackers Do What They Do and How to Protect Against It By Jesse Varsalone and Matthew McFadden September 2011 Publisher: CRC Press http://www.crcpress.com/product/isbn/9781439821190 50% DISCOUNT for Hakin9 SUBSCRIBERS!!! To save 50% enter given below discount code, during checkout at www.crcpress.com. Description As technology has developed, computer hackers have become increasingly sophisticated, […]

Read more


July 28, 2011


The Security Risk Assessment Handbook

The Security Risk Assessment Handbook: A Complete Guide for Performing Security Risk Assessments By Douglas Landoll May 2011 Publisher: CRC Press http://www.crcpress.com/product/isbn/9781439821480 50% DISCOUNT for Hakin9 SUBSCRIBERS!!! To save 50% enter given below discount code, during checkout at www.crcpress.com. Description Picking up where its bestselling predecessor left off, The Security Risk Assessment Handbook: A Complete Guide […]

Read more


July 28, 2011


Machine Learning Forensics for Law Enforcement, Security and Intelligence

Machine Learning Forensics for Law Enforcement, Security and Intelligence By Jesus Mena Publisher: CRC Press June 2011 http://www.crcpress.com/product/isbn/9781439860694 50% DISCOUNT for Hakin9 SUBSCRIBERS!!! To save 50% enter given below discount code, during checkout at www.crcpress.com. Description The book is a practical guide on how to conduct forensic investigations using self-organizing clustering map (SOM) neural networks, text […]

Read more


July 27, 2011


The Basics of Hacking and Penetration Testing

The Basics of Hacking and Penetration Testing By Patrick Engebretson Publisher: Syngress July 2011 U.S., September 2011 EMEA www.syngress.com Description The Basics of Hacking and Penetration Testingserves as an introduction to the steps required to complete a penetration test or perform an ethical hack. You learn how to properly utilize and interpret the results of […]

Read more


July 24, 2011


Managed Code Rootkits

Managed Code Rootkits By Erez Metula Publisher: Syngress November 2010 U.S.,  December EMEA www.syngress.com Description Imagine being able to change the languages for the applications that a computer is running and taking control over it. That is exactly what managed code rootkits can do when they are placed within a computer. This new type of rootkit […]

Read more


July 23, 2011


Review of Practical Lock Picking

Review of Practical Lock Picking A Physical Penetration Tester’s Training Guide By Michael Munty www.syngress.com   Some of you are likely to be thinking what does Lock Picking have to do with IT Security but you need to think from a slightly different angle. All those physical security assessments are more than likely to involve […]

Read more


July 3, 2011


Practical Lock Picking

Practical Lock Picking By Deviant Ollam Publisher: Syngress August  2010 U.S.,  September 2011 EMEA www.syngress.com Description For the first time, Deviant Ollam, one of the security industry’s best-known lockpicking teachers, has assembled an instructional manual geared specifically toward penetration testers. Unlike other texts on the subject (which tend to be either massive volumes detailing every […]

Read more


July 2, 2011


Review of Web Application Obfuscation

Review of Web Application Obfuscation By Aby Rao, MS, CISSP, Security+, ITIL-F, ISO/IEC 20000, Project+ Principal, Verve Security (http://www.vervesecurity.com) www.syngress.com   Obfuscation – the act or an instance of making something obscure, dark, or difficult to understand It’s quite uncommon for a technical book to have such a “heavy” word in its title. Please don’t […]

Read more


July 2, 2011


Web Application Obfuscation

Web Application Obfuscation By Mario Heiderich, Eduardo Alberto Vela Nava, Gareth Heyes, David Lindsay Publisher: Syngress December 2010 U.S.,  January 2011 EMEA www.syngress.com Description Web applications are used every day by millions of users, which is why they are one of the most popular vectors for attackers. Obfuscation of code has allowed hackers to take […]

Read more


July 1, 2011


Cyber Warfare

Cyber Warfare By Jason Andress, Steve Winterfeld Publisher: Syngress June U.S. 2011,  July EMEA www.syngress.com Description Cyber Warfare explores the battlefields, participants and the tools and techniques used during today’s digital conflicts. The concepts discussed in this book will give those involved in information security at all levels a better idea of how cyber conflicts […]

Read more


June 21, 2011


A Guide to Kernel Exploitation

A Guide to Kernel Exploitation By Enrico Perla, Massimiliano Oldani Publisher: Syngress September 2010 U.S.,  October 2011 EMEA www.syngress.com Description The number of security countermeasures against user-land exploitation is on the rise. Because of this, kernel exploitation is becoming much more popular among exploit writers and attackers. Playing with the heart of the operating system […]

Read more


June 15, 2011


Review of Ninja Hacking

Review of Ninja Hacking Unconventional Penetration Testing Tactics and Techniques By Michael Munt www.syngress.com   This is an unusual title for a book that is being aimed at the Security community and when I first looked at it i thought it was someones attempt to bring some humour into the IT Security arena, then as […]

Read more

IT MAGAZINES: Hakin9 Magazine | Pentest Magazine | eForensics Magazine | Software Developer's Journal | Hadoop Magazine | Java Magazine
IT Blogs: Hakin9 Magazine Blog | Pentest Magazine Blog | eForensics Magazine Blog | Software Developer's Journal Blog | Hadoop Magazine Blog | Java Magazine Blog
IT ONLINE COURSES: Pentest Laboratory
JOB OFFERS FOR IT SPECIALIST: Jobs on Hakin9 Magazine | Jobs on Pentest Magazine | Jobs on eForensics Magazine | Jobs on Software Developer's Journal | Jobs on Java Magazine | Jobs on Hadoop Magazine
Hakin9 Media Sp. z o.o. Sp. komandytowa ul. Postępu 17D, 02-676 Warszawa