Home
skip to main
|
skip to sidebar
Kislay Bhardwaj
If you have talent then it's God's gift to you and How to use it, is your gift to God.
Home
Tuesday, September 27, 2011
E-Books on Computer Security
Unknown
-
9:59 AM
As I love reading books and studying the books on security, so today I am posting some links of E-books.
E-book 1
password: flaifle
E-book 2
E-book 3
E-Book 4
E-Book 5
E-Book 6
E-Book 7
Newer Post
Older Post
Home
Labels
Advertising
(1)
Android
(2)
ASP.net
(2)
Bluetooth
(2)
Bot
(3)
Botnet
(3)
Buffer Overflow
(2)
Bypass xss filter
(1)
Cheatsheet
(4)
Cloning
(1)
Denial of Service
(3)
Downloads
(8)
Firewall
(2)
Framework
(6)
GSM
(1)
Introduction
(1)
Intrusion Detection System
(2)
Linux
(7)
Malware
(1)
Metasploit
(13)
Mobile
(2)
Networking
(2)
NeXpose
(2)
Nmap
(2)
Penetration Testing
(15)
Phishing
(1)
Port Scanning
(2)
Reverse shell
(13)
Security
(7)
Sniffing
(3)
Spamming
(1)
Website Hacking
(4)
Wireless
(1)
XSS
(4)
About Me
Priyanshu Sahay
Unknown
Popular Posts
Metasploit~ Nessus Scanning through a Metasploit Meterpreter Session
This tutorial is successful after installation of SSH on victim's system. Go to Step 1. Scenario: You are doing a penetration test. ...
Malware Analysis - Part 1
Malware Analysis: I hope I don't need to explain the definintion of malware and it's analysis if you don't know about...
Installing NeoPwn in Nokia N900
Hey guys, in my last article I've told you about NeoPwn. Today I'm gonna tell you how to install it in Nokia N900. As you guys know ...
Penetration Testing by Nokia N900
So I'm back with more Mobile fun. Let's talk about Penetration Testing. You guys are aware of this process, right? So what's new...
A very basic tutorial of creating a RAT
First of all, a RAT is a computer program that allows you to remotely access the computer running a server file,the RAT consists of 2 progr...
Home
Followers
About
Feedjit Live Blog Stats
Blogger templates
Follow this blog
Home
The Hacker News
Important Links
Ethical Mohit
Hacker's Online Club
The Hacker News