Join date : 1970-01-01
| Subject: Computer Reverse Engineering Books Wed 9 Feb - 14:52 | |
| Here is the monthly review of top security books. Each month we review one good book related to computer security so as to help the users to buy right one. We also put the links for eBook to help the users who cannot afford to buy a book for whatever reason. However we strongly recommend to buy these Great books as they are worth every cent you spend. | | In addition to this, we also have put up complete collection of [You must be registered and logged in to see this link.] with direct links to amazon store so can you are buy them outright. Check it out here.
Title: Social Engineering: The Art of Human Hacking | Author: Christopher Hadnagy, Paul Wilson | Rating: | Ebook: Got a Link, let me know ! |
|
| | This is the BEST book published so far on 'Social Engineering' and must get into your book-shelf if you are the one who look beyond the human face! [You must be registered and logged in to see this link.]
Title: A Guide to Kernel Exploitation | Author: Enrico Perla, Massimiliano Oldani | Rating: | Ebook: Got a Link, let me know ! |
|
| | This is a great source to begin your journey into Kernel exploitation and well worth the price it is set for ! [You must be registered and logged in to see this link.]
Title: Malware Analyst's Cookbook and DVD | Author: Michael Ligh, Steven Adair, Blake Hartstein, Matthew Richard | Rating: | Ebook: Got a Link, let me know ! |
|
| | Latest master piece in the Malware Analysis field which covers almost all facets of the subject from all possible angles. Highly recommended ! [You must be registered and logged in to see this link.]
Title: Mobile Malware Attacks and Defense | Author: Ken Dunham | Rating: | Ebook: http://www.megaupload.com/?d=9IOGHZM0 |
|
| | This book offers one of best insights on mobile malwares, their trends, analysis and protections against such threats for novice as well as experts.! [You must be registered and logged in to see this link.]
Title: CISSP All-in-One Exam Guide (5th Edition) | Author: Shon Harris | Rating: | Ebook: http://hotfile.com/dl/35013099/1667f77/0071602178_CISSP5th.rar.html |
|
| | This book is one stop guide for any Security Professional to clear the most acclaimed CISSP exam in one shot ! [You must be registered and logged in to see this link.]
Title: Cyber Fraud: Tactics, Techniques and Procedures | Author: Rick Howard | Rating: | Ebook: http://depositfiles.com/en/files/1brucuras & http://hotfile.com/dl/68402576/303aef4/1420091271.rar.html |
|
| | Recommended for any one who would like to know in & out of the Cyber crooks, their operations and the framework in which they operate to make millions behind the lines. [You must be registered and logged in to see this link.]
Title: Cloud Security & Privacy | Author: Tim Mather, Subra Kumaraswamy & Shahed Latif | Rating: | Ebook: http://www.megaupload.com/?d=XM6EDN7B |
|
| | This is a must read for anyone either novice or expert who wants to know everything about cloud computing and its security paradigm. [You must be registered and logged in to see this link.] |
Title: Virtual Honeypots: From Botnet Tracking to Intrusion Detection | Author: Niels Provos, Thorsten Holz | Rating: | Ebook: http://rghost.net/2011196 |
|
| | This books cuts off all those rating levels to emerge as one of the best written book on Honeypots and it is highly recommended to anyone who wants to know everything about it. [You must be registered and logged in to see this link.]
Title: Wireshark Network Analysis | Author: Laura Chappell | Rating: | Ebook: Got a link? Let me know. |
|
| | Either you are on the air or wire there is no better tool than Wireshark and there is no better book than this. [You must be registered and logged in to see this link.]
Title: NMAP COOKBOOK - The Fat-free Guide to Network Scanning | Author: Nicholas Marsh | Rating: | Ebook: Link is removed on Author's request. |
|
| | This book does a great job in helping to master the instrinsic technicalities of NMAP with its simplified and concise illustrations. [You must be registered and logged in to see this link.]
Title: Windows Forensic Analysis | Author: Harlan Carvey | Rating: | Ebook: http://www.eazyupload.net/download/ifBzvYXn/159749156X.zip.htm |
|
| | Harlan has produced this master piece on the Forensics subject and it is highly recommended for any one willing to acquire mastery over this field. [You must be registered and logged in to see this link.]
Title : SQL Injection Attacks and Defense | Author : Justin Clarke | Rating : | Ebook : http://rs59.rapidshare.com/files/293360186/1597494240.pdf |
|
| | Written by the experts the book covers from basic to advanced levels and it is highly recommended for any one involved in the web security. [You must be registered and logged in to see this link.]
Title : Professional Penetration Testing | Author : Thomas Wilhelm | Rating : | Ebook : http://rs221.rapidshare.com/files/356187584/1597494259_PenetrationA.rar |
|
| | Recommended book for anyone seriously willing to pursue his career as Pentester. [You must be registered and logged in to see this link.]
Title : The Myths of Security | Author : John Viega | Rating : | Ebook : http://www.eazyupload.net/download/nSwv3S2l/0596523025.zip.htm |
| | | This is another non-technical book which exposes the true & practical realities of the security.This book is compilation of lot of security facts which has the power of awakening any living soul. The facts which are hard to agree and digest, but they are true to the point. [You must be registered and logged in to see this link.]
Title : Zero Day Threat | Author : Byron Acohido, Jon Swartz | Rating : | Ebook : Got a link? Let me know |
|
| | This book exposes the real myths of security by presenting the real stories, real numbers and real people who drives the show...! [You must be registered and logged in to see this link.]
Title : Writing Secure Code for Windows Vista | Author : Michael Howard, David LeBlanc | Rating : | Ebook : Rapidshare_ebook_WritingSecureCodeForVista |
|
| | This is must have book for any security conscious developer to unleash the security defenses of Vista and Win 7. [You must be registered and logged in to see this link.]
Title : Malware Forensics | Author : Cameron H. Malin, Eoghan Casey, James M. Aquilina | Rating : |
|
| | Written by forensic experts from the field, this book is the finest of all in exploring the art of Malware investigation in clear and concise manner. [You must be registered and logged in to see this link.]
Title : The Rootkit ARSENAL | Author : Reverend Bill Blunden | Rating : | Ebook : http://www.megaupload.com/?d=S1O5QUE4 |
|
| | By far this is the very good reference book ever produced on the darkest subjects of Computer security and very well recommended for any one who wants to conquer the mysterious world of Rootkits. [You must be registered and logged in to see this link.]
Title : Hacker's Challenge 3 - 20 Brand New Forensic Scenarios & Solutions | Author : David Pollino, Bill Pennington, Tony Bradley, Himanshu Dwivedi | Rating : |
|
| | The 'Hackers Challenge book presents one of the best hacker stories you have ever read which not only makes it enjoyable to read but at the same time imparts the real knowledge. [You must be registered and logged in to see this link.]
Title : Hacking - The Art of Exploitation | Author : Jon Erickson | Rating : | Ebook : [You must be registered and logged in to see this link.] |
| | | The best practical book for any security professional to understand as well as master the art of vulnerability exploitation. [You must be registered and logged in to see this link.]
Title : 19 Deadly Sins of Software Security | Author : Michael Howard, David LeBlanc, John Viega | Rating : | Ebook : Ebook_link_19_Deadly_Sins_of_Software_Security |
| | | Written by prominent authors, entire book is filled with rich technical code samples which make it more insightful and valuable resource for all coders out there. [You must be registered and logged in to see this link.]
Title : Fuzzing: Brute Force Vulnerability Discovery | Author : Michael Sutton, Adam Greene, Pedram Amini | Rating : | Ebook : Ebook_link_Fuzzing_Bruteforce_Vulnerability_Discovery |
| | | This is the first ever book written on Fuzzing by prominent authors who have mastered this field. [You must be registered and logged in to see this link.]
Title : The Shellcoder's Handbook: Discovering and Exploiting Security Holes | Author : Jack Koziol, David Litchfield, Dave Aitel, Chris Anley, Sinan, Neel Mehta, Riley Hassell. | Rating : | Ebook : Ebook_link_Shellcoders_Handbook |
| | | This is one of the best book written on most complex and interesting topics of computer security, 'Discovering and Exploiting Security Holes'. Read more >>>
Title : Rootkits, Subverting the Windows Kernel | Author : Greg Hoguland, Jamie Butler | Rating : | Ebook : Ebook_link_Rootkits_Subverting_Windows_Kernel |
|
| | This is the incredible book ever written on darkest area of computer security world. Authors have done splendid job in presenting the most mysterious subject of computer security in very simple and easy to understandable format. [You must be registered and logged in to see this link.]
Title : The IDA Pro Book | Author : Chris Eagle | Rating : | Ebook : Ebook_link_the_IDA_Pro_book |
|
| | There has been many books written on the IDA Pro. But this book stands apart from all those. So far this is the most splendid book every produced on world's most popular disassembler. Read more >>>
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
|