Annonce

Réduire
Aucune annonce.

Pack de PDF (anglais)

Réduire
X
 
  • Filtre
  • Heure
  • Afficher
Tout nettoyer
nouveaux messages

  • Pack de PDF (anglais)

    Salut,

    J'ai mit la main sur un pack de livre d'informatique au format PDF malheuresement come beaucoup le savent dans le domaine du hacking (de l'informatique en général) les ouvrages sont souvent en anglais :/

    https://mega.co.nz/#F!4lYWSDxS!TLt4sSCGH7oJCnmeVoV7qA

    Allez bonne lecture

    PS : Donc le pack comprend 189 livres ^^

    19 Deadly Sins of Software Security Programming Flaws and How to Fix Them Security One off .chm
    24 Deadly Sins of Software Security Programming Flaws and How to Fix Them.pdf
    A Bug Hunter 039 s Diary A Guided Tour Through the Wilds of Software Security.pdf
    A Comparative Analysis of Methods of Defense against Buffer Overflow Attacks.pdf
    A Guide to Kernel Exploitation Attacking the Core.pdf
    Absolute OpenBSD UNIX for the Practical Paranoid.pdf
    Ajax Security.pdf
    Anti Hacker Tool Kit Third Edition.chm
    Apache the Definitive Guide 2nd Edition.pdf
    Apache Security.chm
    Applied Oracle Security Developing Secure Database and Middleware Environments.pdf
    BackTrack 4 Assuring Security by Penetration Testing.pdf
    BackTrack 5 Wireless Penetration Testing Beginner 039 s Guide.pdf
    Beginning ASP NET Security Wrox Programmer to Programmer .pdf
    BIOS Disassembly Ninjutsu Uncovered Uncovered series .pdf
    Botnets The Killer Web Applications.pdf
    Build Your Own Security Lab A Field Guide for Network Testing.pdf
    Chained Exploits Advanced Hacking Attacks from Start to Finish.chm
    Coding for Penetration Testers Building Better Tools.pdf
    Computer Security Art and Science.chm
    Computer Viruses and Malware Advances in Information Security .pdf
    Core Security Patterns Best Practices and Strategies for J2EE TM Web Services and Identity Management.chm
    Counter Hack Reloaded A Step by Step Guide to Computer Attacks and Effective Defenses 2nd Edition .chm
    Covert Java Techniques for Decompiling Patching and Reverse Engineering.pdf
    Cracking Drupal A Drop in the Bucket.pdf
    Crimeware Understanding New Attacks and Defenses Symantec Press .chm
    Cross Site Scripting Attacks Xss Exploits and Defense.pdf
    Cryptography and Network Security 4th Edition.pdf
    Cyber War The Next Threat to National Security and What to Do About It.epub
    CyberForensics Understanding Information Security Investigations Springers Forensic Laboratory Science Series .pdf
    DarkMarket Cyberthieves Cybercops and You.epub
    Designing BSD Rootkits An Introduction to Kernel Hacking.pdf
    Disappearing Cryptography Third Edition Information Hiding Steganography amp Watermarking The Morgan Kaufmann Series in Software Engineering and.pdf
    Dissecting the Hack The F0rb1dd3n Network Revised Edition.pdf
    Enterprise Web Services Security Internet Series .pdf
    Exploiting Online Games Cheating Massively Distributed Systems.chm
    Extreme Exploits Advanced Defenses Against Hardcore Hacks Hacking Exposed .chm
    Fuzzing Brute Force Vulnerability Discovery.pdf
    Fuzzing for Software Security Testing and Quality Assurance Artech House Information Security and Privacy .pdf
    Ghost in the Wires My Adventures as the World 039 s Most Wanted Hacker.pdf
    Google Hacking for Penetration Testers Volume 2.pdf
    Google Hacking for Penetration Testers.pdf
    Gray Hat Hacking The Ethical Hackers Handbook 3rd Edition.pdf
    Gray Hat Python Python Programming for Hackers and Reverse Engineers.pdf
    Hack Attacks Revealed A Complete Reference with Custom Security Hacking Toolkit.pdf
    Hack Proofing Your Ecommerce Site.pdf
    Hack the Stack Using Snort and Ethereal to Master the 8 Layers of an Insecure Network.pdf
    Hacker Culture.pdf
    Hacker Web Exploitation Uncovered.chm
    Hackers Crime in the Digital Sublime.pdf
    Hackers Beware The Ultimate Guide to Network Security.pdf
    Hacking The Art of Exploitation 2nd Edition.pdf
    Hacking The Next Generation Animal Guide .pdf
    Hacking Exposed Malware and Rootkits.pdf
    Hacking Exposed Network Security Secrets amp Solutions Second Edition Hacking Exposed .pdf
    Hacking Exposed 5th Edition Hacking Exposed .chm
    Hacking Exposed Cisco Networks Cisco Security Secrets amp Solutions.chm
    Hacking Exposed Computer Forensics Second Edition Computer Forensics Secrets amp Solutions.pdf
    Hacking Exposed Linux 3rd Edition.pdf
    Hacking Exposed VoIP Voice Over IP Security Secrets amp Solutions.chm
    Hacking Exposed Web 2 0 Web 2 0 Security Secrets and Solutions Hacking Exposed .pdf
    HACKING EXPOSED WEB APPLICATIONS 3rd Edition.pdf
    Hacking Exposed Windows Microsoft Windows Security Secrets and Solutions Third Edition.pdf
    Hacking Exposed Wireless.chm
    Hacking the Cable Modem What Cable Companies Don 039 t Want You to Know.pdf
    Hacking the Human.pdf
    Hacking the Xbox An Introduction to Reverse Engineering.pdf
    Hacking VoIP Protocols Attacks and Countermeasures.chm
    HackNotes tm Web Security Pocket Reference.pdf
    Hardware based Computer Security Techniques to Defeat Hackers From Biometrics to Quantum Cryptography.pdf
    How to Break Web Software Functional and Security Testing of Web Applications and Web Services Book amp CD.chm
    Identifying Malicious Code Through Reverse Engineering Advances in Information Security .pdf
    Implementing Database Security and Auditing A guide for DBAs information security administrators and auditors.pdf
    Inside Cyber Warfare Mapping the Cyber Underworld 2nd Edition.pdf
    Inside Cyber Warfare Mapping the Cyber Underworld.pdf
    Inside the Security Mind Making the Tough Decisions.chm
    Inside the SPAM Cartel By Spammer X.pdf
    Introduction to Computer Security.chm
    Intrusion Detection with SNORT Advanced IDS Techniques Using SNORT Apache MySQL PHP and ACID.pdf
    iPhone and iOS Forensics Investigation Analysis and Mobile Security for Apple iPhone iPad and iOS Devices.pdf
    IT Security Metrics A Practical Framework for Measuring Security amp Protecting Data.pdf
    Joomla Web Security.pdf
    Kismet Hacking.pdf
    Linux Firewalls Attack Detection and Response with iptables psad and fwsnort.pdf
    Linux Hacking Exposed Linux Security Secrets and Solutions.pdf
    Malicious Cryptography Exposing Cryptovirology.pdf
    Malicious Mobile Code Virus Protection for Windows O 039 Reilly Computer Security .chm
    Malware Fighting Malicious Code.chm
    Malware Analyst 039 s Cookbook and DVD Tools and Techniques for Fighting Malicious Code.pdf
    Malware Detection Advances in Information Security .pdf
    Managed Code Rootkits Hooking Into Runtime Environments.pdf
    Mastering FreeBSD and OpenBSD Security.chm
    Mastering Network Security.pdf
    Masters of Deception The Gang That Ruled Cyberspace.pdf
    Metasploit The Penetration Tester 039 s Guide.pdf
    Metasploit Toolkit for Penetration Testing Exploit Development and Vulnerability Research.pdf
    Mobile Application Security.pdf
    Mobile Malware Attacks and Defense.pdf
    Modern Communications Jamming Principles and Techniques.pdf
    NET Security and Cryptography.chm
    Network Security A Practical Approach The Morgan Kaufmann Series in Networking .pdf
    Network Security Tools.chm
    Ninja Hacking Unconventional Penetration Testing Tactics and Techniques.pdf
    No Tech Hacking A Guide to Social Engineering Dumpster Diving and Shoulder Surfing.pdf
    Open Source Fuzzing Tools.pdf
    OS X Exploits and Defense.pdf
    Out of the Inner Circle A Hacker 039 s Guide to Computer Security.pdf
    Penetration Tester 039 s Open Source Toolkit Volume 2.pdf
    Penetration Tester 039 s Open Source Toolkit.pdf
    Perl Scripting for Windows Security Live Response Forensic Analysis and Monitoring.pdf
    Pfsense The Definitive Guide.pdf
    pfSense 2 Cookbook.pdf
    PGP amp GPG Email for the Practical Paranoid.pdf
    Phishing Exposed.pdf
    php architect 039 s Guide to PHP Security.pdf
    Practical Hacking Techniques and Countermeasures.pdf
    Practical Lock Picking A Physical Penetration Tester 039 s Training Guide.pdf
    Practical Oracle Security Your Unauthorized Guide to Relational Database Security.pdf
    Practical Packet Analysis Using Wireshark to Solve Real World Network Problems.pdf
    Practical Unix amp Internet Security 3rd Edition.chm
    Preventing Web Attacks with Apache.chm
    Privacy and Big Data.epub
    Pro OpenSSH Pro .pdf
    Pro PHP Security From Application Security Principles to the Implementation of XSS Defenses Second Edition.pdf
    Professional Penetration Testing Creating and Operating a Formal Hacking Lab.pdf
    Protecting Networks with SATAN.epub
    Real World Linux Security Intrusion Prevention Detection and Recovery 2nd Edition .chm
    Reverse Engineering of Object Oriented Code Monographs in Computer Science .pdf
    Reverse Engineering.pdf
    Reversing Secrets of Reverse Engineering.pdf
    Rootkits Subverting the Windows Kernel.chm
    Secrets and Lies Digital Security in a Networked World.pdf
    Secure Coding in C and C SEI Series in Software Engineering .chm
    Secure Programming with Static Analysis.pdf
    Securing amp Optimizing Linux The Hacking Solution.pdf
    Securing PHP Web Applications.pdf
    Security for Web Services and Service Oriented Architectures.pdf
    Security on Rails.pdf
    Security Power Tools.pdf
    Self Defending Networks The Next Generation of Network Security.chm
    SELinux NSA 039 s Open Source Security Enhanced Linux.chm
    Seven Deadliest Social Network Attacks Syngress Seven Deadliest Attacks .pdf
    Seven Deadliest Web Application Attacks.pdf
    Silence on the Wire A Field Guide to Passive Reconnaissance and Indirect Attacks.chm
    Social Engineering The Art of Human Hacking.pdf
    Sockets Shellcode Porting and Coding Reverse Engineering Exploits and Tool Coding for Security Professionals.pdf
    Spyware and Adware Advances in Information Security 50 .pdf
    SQL Injection Attacks and Defense.pdf
    SSH The Secure Shell The Definitive Guide.chm
    SSL amp TLS Essentials Securing the Web.pdf
    Stealing the Network How to Own the Box.pdf
    Stealing the Network The Complete Series Collector 039 s Edition Final Chapter and DVD.pdf
    Subclassing and Hooking with Visual Basic.pdf
    Tangled Web Tales of Digital Crime from the Shadows of Cyberspace Queconsumerother .pdf
    The Art of Computer Virus Research and Defense.chm
    The Art of Deception Controlling the Human Element of Security.pdf
    The Art of Intrusion The Real Stories Behind the Exploits of Hackers Intruders amp Deceivers.pdf
    The Basics of Hacking and Penetration Testing Ethical Hacking and Penetration Testing Made Easy.pdf
    The Best of 2600 A Hacker Odyssey Collectors Editon.pdf
    The Book of PF A No Nonsense Guide to the OpenBSD Firewall.pdf
    The Craft of System Security.pdf
    The Cuckoo 039 s Egg Tracking a Spy Through the Maze of Computer Espionage.pdf
    The Database Hacker 039 s Handbook Defending Database Servers.chm
    The IDA Pro Book The Unofficial Guide to the World 039 s Most Popular Disassembler.pdf
    The Myths of Security What the Computer Security Industry Doesn 039 t Want You to Know.pdf
    The Oracle Hacker 039 s Handbook Hacking and Defending Oracle.chm
    The Rootkit Arsenal Escape and Evasion in the Dark Corners of the System.pdf
    The Shellcoder 039 s Handbook Discovering and Exploiting Security Holes.chm
    The Shellcoder 039 s Handbook Discovering and Exploiting Security Holes 2nd Edition.pdf
    The Software Vulnerability Guide Programming Series .pdf
    The Web Application Hacker 039 s Handbook Discovering and Exploiting Security Flaws.pdf
    The Web Application Hacker 039 s Handbook Finding and Exploiting Security Flaws.pdf
    Towards Hardware Intrinsic Security Foundations and Practice Information Security and Cryptography .pdf
    Underground Tales of Hacking Madness and Obsession on the Electronic Frontier.pdf
    UNIX and Linux Forensic Analysis DVD Toolkit.pdf
    Virtual Honeypots From Botnet Tracking to Intrusion Detection.chm
    Virtualization for Security Including Sandboxing Disaster Recovery High Availability Forensic Analysis and Honeypotting.pdf
    War 2 0 Irregular Warfare in the Information Age Praeger Security International .pdf
    Wardriving amp Wireless Penetration Testing.pdf
    Web Application Vulnerabilities Detect Exploit Prevent.pdf
    Web Security Privacy and Commerce 2nd Edition.pdf
    Web Security Testing Cookbook Systematic Techniques to Find Problems Fast.pdf
    Wi Foo The Secrets of Wireless Hacking.chm
    Windows Forensic Analysis DVD Toolkit Second Edition.pdf
    Windows Registry Forensics Advanced Digital Forensic Analysis of the Windows Registry.pdf
    Wireshark amp Ethereal Network Protocol Analyzer Toolkit.pdf
    Writing Secure Code Practical Strategies and Proven Techniques for Building Secure Applications in a Networked World.chm
    Writing Security Tools and Exploits.pdf
    XML Security.pdf
    Dernière modification par SpiritWhite, 27 mars 2013, 18h21.

  • #2
    Tu peux préciser combien il y a de livres, et les titres si tu peux ?
    Merci d'avance


    Suivre Hackademics: Twitter, Google+, Facebook.

    Commentaire


    • #3
      Ok c'est long à faire ce que tu me demande ^^'

      Commentaire


      • #4
        merci pour ce partage...

        Commentaire


        • #5
          Merci de partager.
          Il faut toujours viser la lune car même en cas d'échec on atterit toujours au milieu des étoiles...

          Commentaire


          • #6
            Merci pour le partage, ca va faire de la lecture

            Commentaire

            Chargement...
            X