Home
skip to main
|
skip to sidebar
Kislay Bhardwaj
If you have talent then it's God's gift to you and How to use it, is your gift to God.
Home
Tuesday, September 27, 2011
E-Books on Computer Security
Unknown
-
9:59 AM
As I love reading books and studying the books on security, so today I am posting some links of E-books.
E-book 1
password: flaifle
E-book 2
E-book 3
E-Book 4
E-Book 5
E-Book 6
E-Book 7
Newer Post
Older Post
Home
Labels
Advertising
(1)
Android
(2)
ASP.net
(2)
Bluetooth
(2)
Bot
(3)
Botnet
(3)
Buffer Overflow
(2)
Bypass xss filter
(1)
Cheatsheet
(4)
Cloning
(1)
Denial of Service
(3)
Downloads
(8)
Firewall
(2)
Framework
(6)
GSM
(1)
Introduction
(1)
Intrusion Detection System
(2)
Linux
(7)
Malware
(1)
Metasploit
(13)
Mobile
(2)
Networking
(2)
NeXpose
(2)
Nmap
(2)
Penetration Testing
(15)
Phishing
(1)
Port Scanning
(2)
Reverse shell
(13)
Security
(7)
Sniffing
(3)
Spamming
(1)
Website Hacking
(4)
Wireless
(1)
XSS
(4)
About Me
Priyanshu Sahay
Unknown
Popular Posts
Metasploit~ Nessus Scanning through a Metasploit Meterpreter Session
This tutorial is successful after installation of SSH on victim's system. Go to Step 1. Scenario: You are doing a penetration test. ...
Cloning of a bluetooth device
Ok, So here comes Linux. Have you ever gave a thought that you can clone a Bluetooth device by using Linux. Here I will explain you that ...
XSSF in Metasploit (XSS Attack by Metasploit)
Hello guys and gals, I was unable to update my site because of lack of time. But I am back with some Metasploit stuff. Here is the XSSF (Cro...
Introduction to Buffer Overflows
In general term, Buffer just a block or portion of memory allocated for data storage of programs such as variables. Stack is another dyn...
ASP.NET Padding Attack Explained
Some Background Before we discuss using PadBuster, let’s briefly discuss the fundamentals of a classic padding oracle attack. As the ter...
Home
Followers
About
Feedjit Live Blog Stats
Blogger templates
Follow this blog
Home
The Hacker News
Important Links
Ethical Mohit
Hacker's Online Club
The Hacker News