hxxp://cooldogebooks.blogspot.com/
- list of open dirs hxxp://www.releases.ws/category/ebooks/ - portal hxxp://austin.youareinferior.net/books/ hxxp://www.team509.com/download/docs/security/ |
19 Deadly Sins of Software Security
19 Deadly Sins of Software Security
By Michael Howard, David LeBlanc, John Viega, * Publisher: Mcgraw-Hill Osborne Media * Number Of Pages: 304 * Publication Date: 2005-07-26 * Sales Rank: 64948 * ISBN / ASIN: 0072260858 * EAN: 9780072260854 * Binding: Paperback * Manufacturer: Mcgraw-Hill Osborne Media * Studio: Mcgraw-Hill Osborne Media * Average Rating: 4.5 * Total Reviews: 8 Book Description: This essential book for all software developers--regardless of platform, language, or type of application--outlines the ※19 deadly sins§ of software security and shows how to fix each one. Best-selling authors Michael Howard and David LeBlanc, who teach Microsoft employees how to secure code, have partnered with John Viega, the man who uncovered the 19 deadly programming sins to write this much-needed book. Coverage includes: * Windows, UNIX, Linux, and Mac OS X * C, C++, C#, Java, PHP, Perl, and Visual Basic * Web, small client, and smart-client applications Code:
rapidshare.com/files/20746654/McGraw.Hill.19.Deadly.Sins.of.Software.Security.ebook-Spy-0072260858.chm |
this web is good too.
www.b213.net the huge database that i know. |
Windows Administrative Scripting
Windows Administrative Scripting
Cd1: Introduction to Windows Administrative Scripting Cd2: Intermediate Windows Administrative Scripting Cd3: Advanced Windows Administrative Scripting Table of Contents CD1 * Introducing VBScript * Dealing with Data and Logic * Using VBScript Functions and Statements * VBScript Arrays * VBScript Function and Statement Roundup * Using the VBScript Documentation * Scripts that Think for Themselves * Scripts that Repeat Themselves * Introduction to Objects * The FileSystemObject * The WshNetwork Object * The WshShell Object * Designing Your First Script * Writing Your First Script * Debugging Your First Script * Bringing it All Together CD2 * Introduction to Database Scripting * Writing Database Queries * Writing Database Scripts * Introduction to HTAs * Creating Functionality for an HTA * Creating the User Interface for an HTA * Creating and Testing a Complete HTA * Advanced VBScript, Part I * Advanced VBScript, Part II * Creating Script-Based Command-Line Tools * Modularizing Your Scripts, Part I * Modularizing Your Scripts, Part II * Introduction to Web-Based Administrative Scripts * Creating Web-Based Administrative Scripts * Advanced WMI Scripting Techniques CD3 * Introduction to Database Scripting * Writing Database Queries * Writing Database Scripts * Introduction to HTAs * Creating Functionality for an HTA * Creating the User Interface for an HTA * Creating and Testing a Complete HTA * Advanced VBScript, Part I * Advanced VBScript, Part II * Creating Script-Based Command-Line Tools * Modularizing Your Scripts, Part I * Modularizing Your Scripts, Part II * Introduction to Web-Based Administrative Scripts * Creating Web-Based Administrative Scripts * Advanced WMI Scripting Techniques CODE Code:
http://rapidshare.com/files/25716966/zfasdfsdf.part01.rar ##anothershare## |
Hacking Exposed 5th Edition A lot of computer-security textbooks approach the subject from a defensive point of view. ※Do this, and probably you*ll survive a particular kind of attack,§ they say. In refreshing contrast, Hacking Exposed, Second Edition talks about security from an offensive angle. A Jane*s-like catalog of the weaponry that black-hat hackers use is laid out in full. Readers see what programs are out there, get a rundown on what the programs can do, and benefit from detailed explanations of concepts (such as wardialing and rootkits) that most system administrators kind of understand, but perhaps not in detail. The book also walks through how to use the more powerful and popular hacker software, including L0phtCrack. This new edition has been updated extensively, largely with the results of ※honeypot§ exercises (in which attacks on sacrificial machines are monitored) and Windows 2000 public security trials. There*s a lot of new stuff on e-mail worms, distributed denial-of-service (DDoS) attacks, and attacks that involve routing protocols. The result of all of this familiarity with bad-guy tools is a leg up on defending against them. Hacking Exposed wastes no time in explaining how to implement the countermeasures每where they exist每that will render known attacks ineffective. Taking on the major network operating systems and network devices one at a time, the authors tell you exactly what Unix configuration files to alter, what Windows NT Registry keys to change, and what settings to make in NetWare. They spare no criticism of products with which they aren*t impressed, and don*t hesitate to point out inherent, uncorrectable security weaknesses where they find them. This book is no mere rehashing of generally accepted security practices. It and its companion Web site are the best way for all of you network administrators to know thine enemies. 每David Wall Topics covered: Security vulnerabilities of operating systems, applications, and network devices Administrative procedures that will help defeat them Techniques for hacking Windows 95, Windows 98, Windows Me, Windows NT 4.0, Windows 2000, Novell NetWare, and Unix Strategies for breaking into (or bringing down) telephony devices, routers, and firewalls Table of Contents: Hacking Exposed〞Network Security Secrets & Solutions, Fifth Edition Foreword Introduction Part I - Casing the Establishment Chapter 1 - Footprinting Chapter 2 - Scanning Chapter 3 - Enumeration Part II - System Hacking Chapter 4 - Hacking Windows Chapter 5 - Hacking UNIX Chapter 6 - Remote Connectivity and VoIP Hacking Part III - Network Hacking Chapter 7 - Network Devices Chapter 8 - Wireless Hacking Chapter 9 - Firewalls Chapter 10 - Denial of Service Attacks Part IV - Software Hacking Chapter 11 - Hacking Code Chapter 12 - Web Hacking Chapter 13 - Hacking the Internet User Part V - Appendixes Appendix A - Ports Appendix B - Top 14 Security Vulnerabilities Index List of Figures List of Tables List of Code Listings List of Sidebars Download: Code:
http://rapidshare.com/files/37093636/Hacking_Exposed_5th_Ed_0072260815.rar Size: 19.4 MB other link's Code:
http://w13.easy-share.com/1214260.html |
Accelerated C++ Practical Programming by Example
Advanced Cobra Programming with C++ Applied C++ - Techniques for Building Better Software Beginning C++ Game Programming Beyond the C++ Standard Library - An Introduction to Boost C++ Advanced 3D Game Programming with DirectX 9.0 C++ by Dissection C++ Coding Standards - 101 Rules Guidelines C++ Complete Reference C++ Cookbook C++ Demystified - A Self-Teaching Guide C++ Design Generic Programming C++ for Business Programming, 2nd Edition C++ for Dummies, 5th Edition C++ for Real Programmers C++ How to Program, 5th Edition C++ in a Nutshell C++ In Action Industrial Strength Programming Techniques C++ Plus Data Structures C++ Primer Plus, 4th Edition C++ Primer, 4th Edition C++ Programming for the Absolute Beginner C++ Programming with Cobra C++ Reverse Engineering C++ Standard Library - A Tutorial and Reference C++ Templates - The Complete Guide C++ Timesaving Techniques for Dummies C++ Unleashed Core C++ - A Software Engineer's Approach Data Structures and Algorithms with Object Oriented Design Patterns in C++ Data Structures and Problem Solving in C++ Effective and More Effective C++ Effective C++ Third Edition 55 Specific Ways to Improve Your Programs and Designs Essential C++ Exceptional C++ Style 40 New Engineering Puzzles, Programming problems and solutions Game Programming All in One How Not to Program in C++ Linux C++ Programming - Howto Modeling Derivatives in C++ Modern C++ Design Generic Programming and Design Patterns Applied Professional C++ Programming Embedded Systems in C and C++ The Art of C++ The C++ Programming Language, 3rd Edition The Elements of C++ Style Theory and Problems of Programming with C++ Thinking in C++ (Vol 1. and 2) Tricks of the Windows Game Programming Gurus You Can Program in C++ - A Programmer's IntroductionCode: Code:
http://rapidshare.com/files/3411840/C___Ebook_Collection.part1.rar Code:
Password: whizkid |
Books
http://n3t.net/TheVault/Library/
Username: ap Password: appz |
Free PDF Version of Undocumented Windows 2000 Secrets: A Programmer's Cookbook
Undocumented Windows 2000 Secrets: A Programmer's Cookbook
Online PDF Version :cool: This book is little bit outdated, but still great resource for all the Windows reversers and it's also free. You must check it out! http://www.rawol.com/?topic=41 |
[PDF]
Planning Extreme Programming (Kent Beck, Martin Fowler) Extreme Programming Explained (Kent Beck) Extreme Programming Explored (William Wake) -> http://hyatus.newffr.com/TAZ/Coding/xp/ |
Lots of good book including a set of books on data mining
http://salaam.cs.buap.mx/EBOOKS/ |
nice collection>
http://rapidshare.com/users/3A0WK8 |
does anyone know where to get this ebook
Exploiting Online Games: Cheating Massively Distributed Systems (Addison-Wesley Software Security Series) by Greg Hoglund and Gary McGraw |
Oh my God. You want to Cheat??? :D
Regards, |
hi!
i am too after this book (Exploiting Online Games) ancev |
Computer Online Books
Quote:
|
Symbian OS
Quote:
Code:
h!!p://rapidshare.com/files/64395600/Wiley.Symbian.OS.C.plus.plus.for.Mobile.Phones.Aug.2007.eBook-BBL.rar |
Ebook download site:
Quote:
|
e-books:
"_http://www.blueportal.org_" |
_http://www.digitalbookindex.org/
The index is some this whether book have an electronics version or not. TEST IT. |
Ebook download site
_http://ebook.com/_ |
The index is some this whether book have an electronics version or not:
_http://www.digitalbookindex.org/ |
Hacker Highschool
_http://www.hackerhighschool.org/lessons.shtml |
Someone have the link from where i can find this book ?
Secrets of Delphi 2 by Ray Lischner Tks |
Free ebook site with 3000 ebook and update daily.
_www.ebookit.net |
Over 200 Programing books
_http://www.akae.cn/ftp/ftpdown/mirror/202.96.64.144/books/ |
Over 5GB of ebooks on FTP
_ftp://194.44.214.3/pub/e-books/ |
Lots of ebooks here :
Quote:
|
100+ programming ebooks
Quote:
|
Apress.Pro.VB.2008.and.the.dot.NET.3.5.Platform.3rd.Edition.Mar.2008.eBook-BBL
Quote:
Apress.Pro.SQL.Server.Disaster.Recovery.Mar.2008.eBook-BBL Quote:
|
found on emule: Syngress - Reverse Engineering Code with IDA Pro
hxxp://rapidshare.com/files/109549316/Reverse_Engineering_Code_with_IDA_Pro.zip.html no password |
Beginning Microsoft Visual C# 2008, Wrox
TITLE : Beginning Microsoft Visual C# 2008 (Wrox Beginning Guides) TYPE : Computer/Programming AUTHOR : Karli Watson / Christian Nagel / Jacob Hammer Pedersen / Jon D. Reid / Morgan Skinner / Eric White PUBLISHER : Wrox ISBN : 047019135X PAGES : 1344 pages EDITION : 1st LANGUAGE : ENGLISH RELEASE DATE: 06/15/2008 MAKER : Team BBL PACKAGER : Team BBL SUPPLIER : Team BBL FORMAT : PDF SIZE : 13.4 MB RELEASE NOTES : The book is aimed at novice programmers who wish to learn programming with C# and the .NET framework. The book starts with absolute programming basics. It then moves into Web and Windows programming, data access (databases and XML), and more advanced technologies such as graphics programming with GDI+ and basic networking. The book is divided into sections including: The C# Language: Basic language skills using console application. Content moves from the absolute basics to fairly involved OOP skills. Windows Vista Programming: Using basic Windows applications, reinforcing earlier OOP and debugging skills. Web Programming: Putting together basic Web applications, highlighting differences between Web and Windows programming. Data Access: Accessing all kinds of data sources from Web and Windows applications, including SQL usage, XML, file system data, and Web Services. Additional Techniques: "The fun stuff", including Windows Presentation Foundation, Windows Workflow, Windows Communication Foundation, GDI+, networking, Windows Services, and so on. The book makes complicated subjects seem easy to learn, and it inspires readers to investigate areas further on their own by providing references to additional material, and exercise questions that require significant effort and personal research to complete. URL : http://www.amazon.com/exec/obidos/tg/detail/-/047019135X/ DOWNLOAD : _http://rapidshare.com/files/122827335/047019135X.rar |
Beginning C# 3.0: An Introduction to Object Oriented Programming, Wrox
TITLE : Beginning C# 3.0: An Introduction to Object Oriented Programming (Wrox Beginning Guides) TYPE : Computer/Programming AUTHOR : Jack Purdum PUBLISHER : Wrox ISBN : 0470261293 PAGES : 523 pages EDITION : 1st LANGUAGE : ENGLISH RELEASE DATE: 06/15/2008 MAKER : Team BBL PACKAGER : Team BBL SUPPLIER : Team BBL FORMAT : PDF SIZE : 9.1 MB RELEASE NOTES : Beginning C# is a book that offers a lot of guidance, in a format that readers find intuitive to follow. The exercise-based format of the Wrox Beginning series has a strong following by all levels of readers, and is one that works very well in the classroom or home. Written by a veteran programming instructor, this is the perfect mix of tutorial, and hands-on coding new programmers are looking for - written from their point of view. Beginning C# is written for those readers with no prior programming experience who want a thorough, yet easy to understand, introduction to C# and Object Oriented Programming. Dr. Purdum uses his 25 years of teaching experience to teach readers: The C# syntax and concepts of Object Oriented Programming How to design and write C# programs that are functional and embody safe programming practices Tried and true tricks of the trade, from design concepts to debugging aids And all of these goals are done in an easy-to-read and enjoyable manner and much more. Complete source code, examples, and discussion forms available at Wrox.com URL : http://www.amazon.com/exec/obidos/tg/detail/-/0470261293/ DOWNLOAD : _http://rapidshare.com/files/122826745/0470261293.rar |
Many VFP books at 4shared.com
|
Reverse Engineering Code with IDA Pro
TITLE: "Reverse Engineering Code with IDA Pro"
AUTHOR: Dan Kaminsky Paperback: 448 pages Publisher: Syngress (February 29, 2008) Language: English ISBN-10: 159749237X File: PDF Download: hxxp://rapidshare.com/files/109016129/7D9454DC-46FB-4E9D-9C78-C1D96FCE958B.rar Password: www.freebookspot.com |
_http://letitbit.net/download/51f03c160954/The.Assembly.Programming.Master.Book.rar.html
|
1 . Smart Card Handbook
Link : hxxp://rapidshare.com/files/17002794/0470856688.zip 2 . Smart Cards: The Developer's Toolkit Link : hxxp://rapidshare.com/files/17059575/0130937304.zip 3 . Smart Cards, Tokens, Security and Applications Link : hxxp://earth.flazx.net/preview/f7253a/_smart_cards_tokens_security_and_applications.zip 4 . Smart Card Applications: Design models for using and programming smart cards Link : hxxp://rapidshare.de/files/37838949/047005882X.zip |
C++ Primer Plus (5th Edition) by Stephen Prata
In my opinion this is the *best* C++ book out there. and yes, it's the 5th edition :p
Code:
http://rapidshare.com/files/191459043/C.Plus.Plus.Primer.Plus.Fifth.Edition.2004.zip |
Quote:
|
you may get Smart Cards, Tokens, Security and Applications here:
Code:
http://rapidshare.com/files/164280172/Smart_Cards_Tokens_Security_And_Applications.pdf |
writting your own packer
by bigboote. this paper was published in codebreaker journal on 2004. not complete but a good point to start writting packer. Code:
http://www.codebreakers-journal.com/downloads/cbj/2006/CBM_1_2_2006_BigBoote_Own_Packer.pdf |
All times are GMT +8. The time now is 15:05. |
Powered by vBulletin® Version 3.8.8
Copyright ©2000 - 2024, vBulletin Solutions, Inc.
Always Your Best Friend: Aaron, JMI, ahmadmansoor, ZeNiX