• Ebook OS X exploits and defense

    Ebook OS X exploits and defense

    Ebook "OS X exploits and defense" includes content: Macintosh OS X boot process and forensic software, past and current threats, malicious macs - malware and the mac, malware detection and the mac, Mac OS X for pen testers, wardriving and wireless penetration testing with OS X, security and OS X, encryption technologies and OS X.

     348 p actvn 25/12/2023 52 0

  • Ebook How to cheat at VolP security

    Ebook How to cheat at VolP security

    Ebook "How to cheat at VolP security" includes content: The hardware infrastructure, introduction to VolP security, architectures, support protocols, threats to VolP communications systems, confirm user identity, active security monitoring, logically segregate network traffic, IETF encryption solutions for VolP, skype security... and other contents.

     433 p actvn 25/12/2023 34 0

  • Ebook Open source fuzzing tools

    Ebook Open source fuzzing tools

    Ebook "Open source fuzzing tools" includes content: Introduction to vulnerability research, fuzzing—what’s that, building a fuzzing environment, open source fuzzing tools, commercial fuzzing solutions, build your own fuzzer, integration of fuzzing in the development cycle,... and other contents.

     209 p actvn 25/12/2023 27 0

  • Ebook How to cheat at securing Linux - The perfect reference for the multitasked SysAdmin

    Ebook How to cheat at securing Linux - The perfect reference for the multitasked SysAdmin

    Ebook "How to cheat at securing Linux - The perfect reference for the multitasked SysAdmin" includes content: Presenting the business case for open source software; hardening the operating system; enumeration and scanning your network, introducing intrusion detection and snort; installing and configuring snort and add ons; advanced snort deployment; network analysis, troubleshooting, and packet sniffing; basics of cryptography and encryption;...

     430 p actvn 25/12/2023 31 0

  • Ebook Phishing exposed

    Ebook Phishing exposed

    Ebook "Phishing exposed" includes content: Banking on phishing, go phish, e-mail - the weapon of mass delivery; crossing the phishing line; the dark side of the web; malware, money movers, and ma bell mayhem; so long, and thanks for all the phish.

     416 p actvn 25/12/2023 25 0

  • Ebook Buffer overflow attacks - Detect, exploit, prevent

    Ebook Buffer overflow attacks - Detect, exploit, prevent

    Ebook "Buffer overflow attacks - Detect, exploit, prevent" includes content: Buffer overflows - The essentials; understanding shellcode, writing shellcode, win32 assembly, case studies, stack overflows; heap corruption; format string attacks, windows buffer overflows; case studies; finding buffer overflows in source; case studies.

     521 p actvn 25/12/2023 27 0

  • Ebook How to cheat at windows system administration using command line scripts

    Ebook How to cheat at windows system administration using command line scripts

    Ebook "How to cheat at windows system administration using command line scripts" includes content: Getting started with command line; basic windows administration; managing windows systems and printers; working with active directory; windows networking.

     481 p actvn 25/12/2023 32 0

  • Ebook Kismet hacking

    Ebook Kismet hacking

    Ebook "Kismet hacking" includes content: Introduction to wireless networking, wardriving, and kismet; basic installation; operating kismet; kismet menus; configuring the kismet server; kismet client configuration file; server.conf file advanced configuration; kismet drones, kismet and mapping, wardriving with kismet and backtrack.

     254 p actvn 25/12/2023 20 0

  • Ebook Mac hackers handbook

    Ebook Mac hackers handbook

    Ebook "Mac hackers handbook" includes content: Mac OS X architecture, Mac OS X parlance, attack surface, tracing and debugging, finding bugs, reverse engineering, exploiting stack overflows, exploiting heap overflows, exploit payloads, real world exploits, injecting, hooking, and swizzling; rootkits.

     387 p actvn 25/12/2023 13 0

  • Ebook Metasploit toolkit for penetration testing, exploit development and vulnerability research

    Ebook Metasploit toolkit for penetration testing, exploit development and vulnerability research

    Ebook "Metasploit toolkit for penetration testing, exploit development and vulnerability research" includes content: Introduction to metasploit; architecture, environment, and installation; metasploit framework and advanced environment configurations; advanced payloads and add on modules; adding new payloads case studies; raxnet cacti remote command execution; mercur messaging 2005 SP3 imap remote buffer overflow (cve –2006 1255); slimftpd...

     290 p actvn 25/12/2023 12 0

  • Ebook Software piracy exposed

    Ebook Software piracy exposed

    Ebook "Software piracy exposed" includes content: Inside software piracy, the history of software piracy, the suppliers, crackers, the release, sites, the distribution chain, the piracy scene, piracy and the law, the future of piracy, closing notes.

     329 p actvn 25/12/2023 16 0

  • Ebook Hacking aterror network - The silent threat of covert channels

    Ebook Hacking aterror network - The silent threat of covert channels

    Ebook "Hacking aterror network - The silent threat of covert channels" includes content: The mind of terror; unseen planning, making friends; one step closer; over the line; images of death; the real assignment; creating the code; over the edge; biding time, covert channels; facing the truth; taking command; racing the clock; losing control; heightened motivation; chasing ghosts; taking back control; vengeance for deceit; eliminating false...

     400 p actvn 25/12/2023 9 0

Hướng dẫn khai thác thư viện số
getDocumentFilter3 p_strSchoolCode=actvn