Home
skip to main
|
skip to sidebar
Kislay Bhardwaj
If you have talent then it's God's gift to you and How to use it, is your gift to God.
Home
Tuesday, September 27, 2011
E-Books on Computer Security
Unknown
-
9:59 AM
As I love reading books and studying the books on security, so today I am posting some links of E-books.
E-book 1
password: flaifle
E-book 2
E-book 3
E-Book 4
E-Book 5
E-Book 6
E-Book 7
Newer Post
Older Post
Home
Labels
Advertising
(1)
Android
(2)
ASP.net
(2)
Bluetooth
(2)
Bot
(3)
Botnet
(3)
Buffer Overflow
(2)
Bypass xss filter
(1)
Cheatsheet
(4)
Cloning
(1)
Denial of Service
(3)
Downloads
(8)
Firewall
(2)
Framework
(6)
GSM
(1)
Introduction
(1)
Intrusion Detection System
(2)
Linux
(7)
Malware
(1)
Metasploit
(13)
Mobile
(2)
Networking
(2)
NeXpose
(2)
Nmap
(2)
Penetration Testing
(15)
Phishing
(1)
Port Scanning
(2)
Reverse shell
(13)
Security
(7)
Sniffing
(3)
Spamming
(1)
Website Hacking
(4)
Wireless
(1)
XSS
(4)
About Me
Priyanshu Sahay
Unknown
Popular Posts
Examples of XSSer
Recently I posted about XSSer, an automated tool for XSS, here are some examples of xsser for those who can't get it on. Firstly Downl...
Phlashing -- A threat to Hardware.
Phlashing means a Permanent Denial of Service attack or PDoS . A PDOS attack damages a system so badly that it requires replacement or reins...
Backdooring in windows 7 with Meterpreter.
First of all, I would like to tell you about Meterpreter. Meterpreter is the part of Metasploit Framework which is used in Post Exploitatio...
ASP.NET Padding Attack Explained
Some Background Before we discuss using PadBuster, let’s briefly discuss the fundamentals of a classic padding oracle attack. As the ter...
Exploit writing: A basic Idea.
Exploit Writing Made Easier With !pvefindaddr A few notes before we begin, covering what this paper is about and what it isn’t about: 1. T...
Home
Followers
About
Feedjit Live Blog Stats
Blogger templates
Follow this blog
Home
The Hacker News
Important Links
Ethical Mohit
Hacker's Online Club
The Hacker News