• If this is your first visit, be sure to check out the FAQ by clicking the link above. You may have to register before you can post: click the register link above to proceed. To start viewing messages, select the forum that you want to visit from the selection below.
Xin chào ! Nếu đây là lần đầu tiên bạn đến với diễn đàn, xin vui lòng danh ra một phút bấm vào đây để đăng kí và tham gia thảo luận cùng VnPro.

Announcement

Collapse
No announcement yet.

Các Ebook hay ...!

Collapse
X
 
  • Filter
  • Time
  • Show
Clear All
new posts

  • Các Ebook hay ...!

    Hacker Web Exploitation Uncovered



    A description and analysis of the vulnerabilities caused by programming errors in Web applications, this book is written from both from the attacker's and security specialist's perspective. Covered is detecting, investigating, exploiting, and eliminating vulnerabilities in Web applications as well as errors such as PHP source code injection, SQL injection, and XSS. The most common vulnerabilities in PHP and Perl scripts and methods of exploiting these weaknesses are described, information on writing intersite scripts and secure systems for the hosted sites, creating secure authorization systems, and bypassing authorization. Uncovered is how attackers can benefit from the hosted target and why an apparently normal-working application might be vulnerable.



    [code]http://rapidshare.de/files/24148890/A-List.Hacker.Web.Exploitation.Uncovered.ebook-Spy.rar[/cod

  • #2
    Microsoft Windows Server 2003 Unleashed (R2 Edition)

    Microsoft Windows Server 2003 Unleashed (R2 Edition)



    Microsoft Windows Server 2003 Unleashed, 3rd Edition is the first book on the market to cover Windows Server 2003 R2. This latest edition will keep the text viable with the major "R2" update being released from Microsoft late in 2005. Many of the Windows Server 2003 titles have not been revised since release in 2003 even though Microsoft has released a service pack and now the R2 update. This book will provide detailed guidance focused on the most commonly used yet most complicated planning, installation, migration, and problem solving topics that challenge IT professionals. This title goes far beyond the basic installation and setup information found in hundreds of other resources and focus on the less understood yet most important details for system configuration, tips, tricks, and techniques to successfully implement and administer a Windows networking system.

    Code:
    http://rapidshare.de/files/24153442/Sams.Microsoft.Windows.Server.2003.Unleashed.R2.Edition.May.2006.eBook-BBL.rar

    Comment


    • #3
      Biometrics for Network Security

      Biometrics for Network Security



      ISBN: 0131015494
      Author: Paul Reid
      Publisher: Prentice Hall PTR
      Edition: 1st edition (November 17, 2003)
      Paperback: 376 pages
      URL: /http://www.amazon.com/exec/obidos/redirect?tag=songstech-20&path=ASIN%2F0131015494
      Summary:
      he complete guide to implementing biometric security solutions for your network

      Network security has become the latter-day equivalent of oxymoronic terms like "jumbo shrimp" and "exact estimate." Newspaper headlines are routinely peppered with incidents of hackers thwarting the security put forth by the government and the private sector. As with any new technology, the next evolution of network security has long languished in the realm of science fiction and spy novels. It is now ready to step into the reality of practical application.

      In Biometrics for Network Security, biometrics security expert Paul Reid covers a variety of biometric options, ranging from fingerprint identification to voice verification to hand, face, and eye scanning. Approaching the subject from a practitioner's point of view, Reid describes guidelines, applications, and procedures for implementing biometric solutions for your network security systems.

      Coverage includes:

      * An introduction to authentication technologies and biometrics
      * Dealing with privacy issues
      * Biometric technologies, including finger, hand geometry, handwriting, iris, retina, voice, and face
      * Security concerns related to biometrics, including attempts to spoof or fake results
      * Deployment of biometric security systems, including vendor selection and roll out procedures
      * Real-life case studies

      For security, system, and network administrators and managers, as well as anyone who is interested in the application of cutting-edge biometric technology, Biometrics for Network Security will prove an indispensable addition to your library!

      [code]http://rapidshare.de/files/24149677/Biometrics_for_Network_Security.rar[code]

      Comment


      • #4
        Upgrading.and.Repairing.Servers

        Upgrading.and.Repairing.Servers




        As the price of servers comes down to the level of desktop PCs, many small- and medium-sized businesses are forced to provide their own server setup, maintenance and support, without the high-dollar training enjoyed by their big corporation counterparts. Upgrading and Repairing Servers is the first line of defense for small- and medium-sized businesses, and an excellent go-to reference for the experienced administrators who have been asking for a reference guide like this one for a long time! It's all here in one, incredibly useful tome that you will refer to again and again.



        Inside is in-depth coverage of server design and implementation, building and deploying, server hardware components, network and backup operations, SAN, fault tolerance, server racks, server rooms, server operating systems, as well as SUN Microsystems servers. No other computer hardware book has ever dared tackle this enormous topic - until now!

        Code:
        http://rapidshare.de/files/24159410/Que.Upgrading.and.Repairing.Servers.rar

        Comment


        • #5
          MCTS Self-Paced Training Kit (Exam 70-536)

          MCTS Self-Paced Training Kit (Exam 70-536): Microsoft .NET Framework 2.0 Application Development Foundation (Pro-Developer (Hardcover))




          Summary:
          Announcing an all-new MCTS Training Kit designed to help maximize your performance on Exam 70-536, a core exam for the new Microsoft Technology Specialist and Professional Developer certifications. This kit packs the tools and features that exam candidates want most—including in-depth, self-paced training based on final exam content; rigorous, objective-by-objective review; exam tips from expert, exam-certified authors; and a robust testing suite. It also provides real-world scenarios, case study examples, and troubleshooting labs for skills and expertise that you can apply to the job.
          Focusing on the .NET Framework version 2.0, this official study guide covers topics such as .NET Framework fundamentals, I/O, graphics, collections, serialization, application domains and services, application and user security, threading, instrumentation, reflection, and installing and configuring applications.
          Ace your exam preparation and ramp up quickly on the .NET Framework by working at your own pace through the lessons, hands-on exercises, and practice tests. The flexible, best-of-class test engine on CD features 300 practice questions and pre-assessment and post-assessment capabilities. Choose timed or untimed testing mode, generate random tests, or focus on discrete objectives or chapters, and get detailed explanations for right and wrong answers—including pointers back to the book for further study. You also get a 90-day evaluation version of Microsoft Visual Studio® 2005 and a 15 percent exam discount voucher—making this kit an exceptional value and a great career investment.


          Code:
          http://rapidshare.de/files/24231771/Self-Paced_Training_Kit_70-536_Microsoft_NET_Framework_2.0_Application_Development_Foundation.rar

          Comment


          • #6
            Shellcoder¡¯s Programming Uncovered

            Shellcoder¡¯s Programming Uncovered



            How hackers, viruses, and worms attack computers from the Internet and exploit security holes in software is explained in this outline of antivirus software, patches, and firewalls that try in vain to withstand the storm of attacks. Some software's effectiveness exists only in the imaginations of its developers because they prove unable to prevent the propagation of worms, but this guide examines where security holes come from, how to discover them, how to protect systems (both Windows and Unix), and how to do away with security holes altogether. Unpublished advanced exploits and techniques in both C and Assembly languages are included.



            Code:
            http://rapidshare.de/files/24231143/A-List.Shellcoders.Programming.Uncovered.ebook-Spy.rar

            Comment


            • #7
              Silence on the Wire : A Field Guide to Passive Reconnaissance and Indirect Attacks

              Silence on the Wire : A Field Guide to Passive Reconnaissance and Indirect Attacks






              Author Michal Zalewski has long been known and respected in the hacking and security communities for his intelligence, curiosity and creativity, and this book is truly unlike anything else out there. In Silence on the Wire: A Field Guide to Passive Reconnaissance and Indirect Attacks, Zalewski shares his expertise and experience to explain how computers and networks work, how information is processed and delivered, and what security threats lurk in the shadows. No humdrum technical white paper or how-to manual for protecting one's network, this book is a fascinating narrative that explores a variety of unique, uncommon and often quite elegant security challenges that defy classification and eschew the traditional attacker-victim model


              Code:
              http://rapidshare.de/files/24232364/No.Starch.Press.Silence.on.the.Wire.ebook-Spy.rar

              Comment


              • #8
                Intrusion Prevention Fundamentals

                Intrusion Prevention Fundamentals




                An introduction to network attack mitigation with IPS



                Where did IPS come from? How has it evolved?
                How does IPS work? What components does it have?
                What security needs can IPS address?
                Does IPS work with other security products? What is the ¡°big picture¡±?
                What are the best practices related to IPS?
                How is IPS deployed, and what should be considered prior to a deployment?


                Intrusion Prevention Fundamentals offers an introduction and in-depth overview of Intrusion Prevention Systems (IPS) technology. Using real-world scenarios and practical case studies, this book walks you through the lifecycle of an IPS project¨Cfrom needs definition to deployment considerations. Implementation examples help you learn how IPS works, so you can make decisions about how and when to use the technology and understand what ¡°flavors¡± of IPS are available. The book will answer questions like:



                Whether you are evaluating IPS technologies or want to learn how to deploy and manage IPS in your network, this book is an invaluable resource for anyone who needs to know how IPS technology works, what problems it can or cannot solve, how it is deployed, and where it fits in the larger security marketplace.



                Understand the types, triggers, and actions of IPS signatures
                Deploy, configure, and monitor IPS activities and secure IPS communications
                Learn the capabilities, benefits, and limitations of host IPS
                Examine the inner workings of host IPS agents and management infrastructures
                Enhance your network security posture by deploying network IPS features
                Evaluate the various network IPS sensor types and management options
                Examine real-world host and network IPS deployment scenarios


                This book is part of the Cisco Press® Fundamentals Series. Books in this series introduce networking professionals to new networking technologies, covering network topologies, example deployment concepts, protocols, and management techniques.

                Code:
                http://rapidshare.de/files/24232499/Cisco.Press.Intrusion.Prevention.Fundamentals.Jan.2006.rar

                Comment


                • #9
                  Microsoft ® Windows ® XP : Simply Visual

                  Microsoft ® Windows ® XP : Simply Visual





                  Learning How to Use Windows XP Has Never Been Easier! This highly illustrated introduction to the latest release of Windows XP is packed with easy-to-follow lessons that make learning simple. Just follow the screens and instructions, step by step, and you'll understand the most essential and frequently used features of Windows XP Professional and Windows XP Home Edition. If you want to explore beyond the basics, you'll find tips on customizing your computer, setting up a home network, and much more. Master all the fundamental skills, including: * Navigating and managing files and folders * Installing and running programs with Windows XP * Working with photographs and still images * Playing with music and videos * Customizing the look and function of Windows XP * Setting up a home network * Connecting your computer to the Internet * Exploring the web * Communicating online * Customizing your online experience * Optimizing system performance * afeguarding and troubleshooting your system * Installing new hardware


                  Code:
                  http://rapidshare.de/files/24234621/Microsoft_Windows_XP__Simply_Visual.rar

                  Comment


                  • #10
                    Hackers Beware: The Ultimate Guide to Network Security

                    Hackers Beware: The Ultimate Guide to Network Security



                    In Hackers Beware, Eric Cole succeeds in explaining how hackers break into computers, steal information, and deny services to machines’ legitimate users. An intended side effect of his documentary efforts is a feeling for how network-connected computers should be configured for maximum resistance to attack. Cole, who works with the attack-monitoring SANS Institute as an instructor and security consultant, conveys to his readers specific knowledge of offensive and defensive weaponry as well as general familiarity with attack strategies and good security practices. Hackers Beware is a good primer and really earns its price by going into enough detail to enable readers to actually do something to make their resources safer. It also enables its readers to understand more specialized security texts, including Stephen Northcutt’s fine Intrusion Signatures and Analysis.
                    Cole’s didactic style is largely conversational, embracing the fact that most computer exploits can be conveyed as stories about what hackers want and the steps they take to achieve their goals. He punctuates his prose passages with line drawings that clarify what gets passed among the machines involved in an attack, and pauses frequently to show programs’ user interfaces and passages from their logs. Cole explains all the jargon he uses–a characteristic that alone distinguishes this book from many of its competitors. –David Wall
                    Topics covered: What motivates black-hat hackers, and the technical means they use to go about satisfying their ambitions. General attack strategies–spoofing, password cracking, social engineering, and buffer overflows, among others–are explained, and the tools used to carry them out are catalogued. The same goes for defensive tools and practices.

                    Code:
                    http://rapidshare.de/files/24249299/Hackers_Beware_Defending_Your_Network_From_The_Wiley_Hacker.rar

                    Comment


                    • #11
                      Firewalls 24seven

                      Firewalls 24seven



                      Firewalls is a guide to protecting an Internet-connected network from external threats–a complex task. You not only need to be aware of the known vulnerabilities of your system, you also need to remain alert to potential attacks. Firewalls are tools that help you do this by controlling access to and from your network.
                      This book teaches the basics of network operation and how a firewall is put together. It’s important to understand risk, and the book helps explain risk management and how it impacts a security policy. You’ll also see how hackers target and penetrate systems. There’s a guide to TCP/IP and common Internet services. From this base camp, Firewalls begins to climb the mountain of Internet security. The basic technologies and security requirements that fit together to form a firewall are introduced, along with the security policies of the authors’ “perfect firewall.”
                      A large section of the book is taken up with comparative reviews of most of the main freeware and commercial firewall products currently available. This is a useful tool that gives you everything you’re likely to need when deciding how to choose a firewall for your network.
                      Firewalls is a very practical book aimed at the experienced network administrator who may be unfamiliar with Internet security. Real-world examples and plenty of tips and warnings make this a welcome addition to the system administrator’s bookshelf. –Simon Bisson, Amazon.co.uk

                      Code:
                      http://rapidshare.de/files/24252281/Firewalls247.rar

                      Comment


                      • #12
                        Network Security : A Beginner’s Guide

                        Network Security : A Beginner’s Guide




                        From Library Journal
                        All companies rely on some security mechanisms to ensure their corporate privacy and information integrity. In many cases, the ability of the technician to explain a system’s vulnerabilities to managers in order to acquire funding is as important as the technical skills to build the system. This book addresses a wide range of topics, from security basics to policies, practices, and practical solutions. Though intended for network administrators, this also acts as a good primer on security concepts for the lay computer user. A rock-solid resource for all libraries.
                        Copyright 2001 Reed Business Information, Inc.

                        Review
                        Adams, David Security Management : Books for beginners fall into two categories: the Dummies or Idiot’s Guide books that treat the reader like an imbecile, and those that treat novices as mature and intelligent. Network Security: A Beginner’s Guide falls into the second category. The reader comes away with a lucid understanding of the fundamentals of network security without being talked down to. Information security managers have a rough job. Although more money is being spent


                        Code:
                        http://rapidshare.de/files/24253225/NSABG.rar

                        Comment


                        • #13
                          Cisco Security Architectures

                          Cisco Security Architectures





                          A Cisco troubleshooting methodology. It includes coverage of: how to create, operate and use Cisco Access lists; how to secure a network when access occurs via a Cisco Router; and the TCP/IP Protocol and its use with Cisco routers. There are a number of security discussions too, and these include: public network and private network security threats and how to prevent them; how firewalls and proxy servers can be used as a first line of defence; how to configure Cisco Routers to accept only specific recognized incoming packets; using the Cisco PIX Firewall and the Centri firewall; and how to use the special security features built into Cisco routers.

                          Code:
                          http://rapidshare.de/files/24253502/Cisco_Security_Architectures.rar

                          Comment


                          • #14
                            Hackers: Heroes of the Computer Revolution

                            Hackers: Heroes of the Computer Revolution





                            Steven Levy’s classic book explains why the misuse of the word “hackers” to describe computer criminals does a terrible disservice to many important shapers of the digital revolution. Levy follows members of an MIT model railroad club–a group of brilliant budding electrical engineers and computer innovators–from the late 1950s to the mid-1980s. These eccentric characters used the term “hack” to describe a clever way of improving the electronic system that ran their massive railroad. And as they started designing clever ways to improve computer systems, “hack” moved over with them. These maverick characters were often fanatics who did not always restrict themselves to the letter of the law and who devoted themselves to what became known as “The Hacker Ethic.” The book traces the history of hackers, from finagling access to clunky computer-card-punching machines to uncovering the inner secrets of what would become the Internet. This story of brilliant, eccentric, flawed, and often funny people devoted to their dream of a better world will appeal to a wide audience. –This text refers to an out of print or unavailable edition of this title.

                            Ingram
                            A classic reissued for the first time in trade paperback with a new afterword from the author, this is the story of the true pioneers of the computer revolution–the young mavericks and renegades who hacked their way into controlling an industry. Levy’s monthly column appear in MacWorld.


                            Code:
                            http://rapidshare.de/files/24253741/Hackers_-_Heroes_Of_The_Computer_Revolution_-_Steven_Levy.rar

                            Comment


                            • #15
                              Administering and Securing the Apache Server

                              Administering and Securing the Apache Server





                              Apache is the most popular Web server in the world, hosting 50 percent of all Web sites! With Apache, you will get excellent performance at a low cost. The server, plus all of its source code, is freely available and you can modify it to your specific needs. With this book, you will learn how to install, configure, and troubleshoot the Apache server. Administering and Securing the Apache Server teaches you how to maximize the benefits of Apache in order to gain the competitive edge.


                              Code:
                              http://rapidshare.de/files/24256092/Premier_Press_-_Administering_and_Securing_the_Apache_Server.rar

                              Comment

                              Working...
                              X