Hiển thị các bài đăng có nhãn Hack. Hiển thị tất cả bài đăng
Hiển thị các bài đăng có nhãn Hack. Hiển thị tất cả bài đăng

Thứ Hai, 27 tháng 10, 2008

Hacking Exposed Wireless

ImageShack

Hacking Exposed Wireless provides real, tactical wireless security implementation coverage by showing how to execute the attacks and implement the defenses. This is an invaluable resource for any IT professional who works with wireless technology.


It: demonstrates how attackers identify and exploit wireless network weaknesses; covers the spectrum of wireless technologies -

WiFi/802.11, Bluetooth, IRDA, 3G Wireless, RFID,WiMAX, and more; and includes new, previously unpublished attacks and their countermeasures.

Hacking Exposed Wireless | 377 Pages | Year 2007  | PDF

Download Ebook Hacking Exposed Wireless

Chủ Nhật, 26 tháng 10, 2008

Hacking - The Art of Exploitation

hacking---the-art-of-exploitation
Name : Hacking - The Art of Exploitation
This text introduces the spirit and theory of hacking as well as the science behind it all; it also provides some core techniques and tricks of hacking so you can think like a hacker, write your own hacks or thwart potential system attacks.

This book explains the details of various hacking techniques, many of which get very technical. While the fundamental programming concepts that these hacking techniques build from are introduced in the book, general programming knowledge will certainly aid the reader in understanding these concepts. The code examples in this book were done on an x86-based computer running Linux. Having a similarly set-up computer to follow along is encouraged; this will let you see the results for yourself and allow you to experiment and try new things. This is what hacking is all about.

Hacking is the art of creating problem solving, whether used to find an unconventional solution to a difficult problem or to exploit holes in sloppy programming. Many people call themselves hackers, but few have the strong technical foundation that a hacker needs to be successful. Hacking - The Art of Exploitation explains things that every real hacker should know.

Code:
http://www.ziddu.com/download/1927726/Hackers_Secrets.rar.html

Thứ Bảy, 25 tháng 10, 2008

Hackers: Heroes of the Computer Revolution

Hackers: Heroes of the Computer Revolution by Steven Levy and Steven Levy
Amazon.com Review
Steven Levy’s classic book explains why the misuse of the word “hackers” to describe computer criminals does a terrible disservice to many important shapers of the digital revolution. Levy follows members of an MIT model railroad club–a group of brilliant budding electrical engineers and computer innovators–from the late 1950s to the mid-1980s. These eccentric characters used the term “hack” to describe a clever way of improving the electronic system that ran their massive railroad. And as they started designing clever ways to improve computer systems, “hack” moved over with them.

These maverick characters were often fanatics who did not always restrict themselves to the letter of the law and who devoted themselves to what became known as “The Hacker Ethic.” The book traces the history of hackers, from finagling access to clunky computer-card-punching machines to uncovering the inner secrets of what would become the Internet. This story of brilliant, eccentric, flawed, and often funny people devoted to their dream of a better world will appeal to a wide audience.

Code: Select all
http://rapidshare.com/files/157072875/heroes_of_the_computer_revolution.pdf

 

blogger templates | Make Money Online