A quite old book but still could be useful
windows nt 2000 native api reference http://www.4shared.com/file/oJfD0s9K/Windows_NT-2000_Native_API_Ref.html |
USB Complete: The Developer's Guide 4th Edition
Author's Web Site: http://www.lvr.com/usb.htm#books
Quote:
Code:
download: |
Flash Security
Chapter 11 "Flash Security" of "AdvancED Flex 4" by S. Tiwari and E. Elrom
Code:
http://www.amazon.com/AdvancED-Flex-4-Shashank-Tiwari/dp/1430224835/ref=ntt_at_ep_dpt_3 Code:
http://www.multiupload.com/64NYA5SW6P |
Professional C++, 2nd Edition
epub format
Code:
http://www.wupload.com/file/1187776881/Wrox.Professional.CPP.2nd.Edition.Oct.2011.epub |
Start Here! Learn Microsoft Visual C# 2010 (Developer)
Learn the fundamentals of modern programming with Visual C# 2010ˇŞand begin building your first apps for the desktop and web. If you have absolutely no previous experience, no problemˇŞsimply start here! This book introduces must-know concepts and techniques through easy-to-follow explanations, examples, and exercises.
http://www.filesonic.in/file/3270838624/0735657726.pdf |
The D Programming Language
hxxp://www.filesonic.com/file/3151830595/0321635361.rar BackTrack 5 Wireless Penetration Testing hxxp://www.filesonic.com/file/2898368915/BackTrack_5_Wireless_Penetration_Testing.rar |
|
Pro iOS 5 Augmented Reality
Book Description
ISBN-10: 1430239123 | ISBN-13: 978-1430239123 | Publication Date: December 14, 2011 | Edition: 1 Augmented reality takes the real world and through the use of graphics, sound and other effects allows you to enhance the environment. It makes a game more real. Your social media app puts you where want to be or go. Pro iOS 5 Augmented Reality walks you through the foundations of building an augmented reality application for the iPhone or iPad. From using MapKit, to the accelerometer and magnetometer, to integrating facial recognition and Facebook data, you'll learn the building blocks of creating augmented reality applications. Case studies are included in this one-of-a-kind book and you'll learn how to create augmented reality apps that unleash the full potential of the on-board sensors and camera. This book complements other iOS game or social media apps development books available from Apress. After reading Pro iOS 5 Augmented Reality, you'll be able to build augmented reality rich media apps or integrate all the best augmented reality techniques and tools into your existing apps. What youˇŻll learn The differences in hardware sensors, cameras and more between the iPhone 4 and iPhone 4S, iPod touch, iPad and iPad 2 How to use MapKit and integrate it into your app How to play and record sound within an augmented reality app How to use the iPhone or iPad camera and video How to program against the accelerometer and gyroscope to detect movement and the orientation of the iPhone or iPad How to access and use the information from the magnetometer (compass) How to use cocos2D to overlay a heads-up display on the camera view How to integrate facial recognition into your app How to build augmented reality feature-rich enterprise game and Facebook apps Code:
http://filepost.com/files/d8fce384/1430239123.rar |
Oh. Thanks for sharing. But the first link not live...!
|
How about using a little personal initiative and put:
Pro_iOS_5_Augmented_Reality.pdf or Pro_iOS_5_Augmented_Reality.epub in your favorite search engine and YOU download the file. I have easily found both. ;) |
After searching for Practical Cryptography (Bruce Schneier) ebook, I cannot find the download link. At last, I realized that in the second version, it's name has been changed to Cryptography Engineering. Hope it help anyone who keep searching for this book.
The download link: Code:
hxxp://crocko.com/1915815804/0470474246.djvu |
Nice find. Is there also a PDF of this please?. AVS fails to convert it to PDF.
Git |
[Hint] Perhaps you should try google with Practical Cryptography (Bruce Schneier) [Hint].
It shows numerous sources for the PDF version. :o Regards, |
Quite a few for "Cryptography Engineering" pdf too, but they are all the same djvu when you visit them.
Git |
This online converter seems to convert the file effectively:
Code:
http://www.djvu-pdf.com/ |
I have downloaded two which are very different. The first is:
Cryptography - Practical Cryptography Which had 222 pages, (which is 40 pages in the PDF). (Edit: Just looked at this one more closely and noticed it starts with Chapter 11. Duh) The second is: Applied Cryptography, Second Edition: Protocols, Algorthms, and Source Code in C (cloth) (Publisher: John Wiley & Sons, Inc.) Author(s): Bruce Schneier ISBN: 0471128457 Publication Date: 01/01/96 Which has 1028 PDF pages, with lots of code and examples. I do realize the Titles are different. Just thought you might also be interested in the second one. Does this help? |
I've found 2nd edition of AP now, thanks, and also a good collection of crypto books by torent. I've fallen for that chapter 11 trial too.
Git |
some technical books (about 400)
Some technical books: http://www.techmeet.in/books/index.html
|
does anyone have the book of Russinowich, Zero Day ??
|
1 Attachment(s)
Quote:
|
1 Attachment(s)
This is in PDF format. (converted .epub)
|
Operating System Concepts
Operating System Concepts, 8th Edition
http://filepost.com/files/md83c8ed/0470128720_OperSyst.pdf/ |
Automatic Parallelization An Overview of Fundamental Compiler Techniques
http://filepost.com/files/9124am5c |
I saw this on Reditt today. Course notes and lecture handouts
Collection of Malware Analysis courseware CS 6V81--005: System Security and Malicious Code Analysis http://www.utdallas.edu/~zhiqiang.lin/spring2012.html last updated Tue May 15 22:32:14 2012 Course Overview CS-6V81 is a graduate level, research oriented, system and software security course. The goal of this course is to explain the low-level system details from compiler, linker, loader, to OS kernel and computer architectures, examine the weakest link in each system component, explore the left bits and bytes after all these transformations, and study the state-of-the-art offenses and defenses. The learning outcome is students shall be able to understand how an attack is launched (e.g., how an expoit is created), and how to do the defense (e.g., developing OS patches, analyzing the binary code, and detecting intrusions) In particular, we will cover Memory exploits. We will investigate the unsafe but widely used system programming language C, cover typical vulnerabilities such as buffer overflows, format strings, integer overflows, etc. How to create robust shell code using such as ROP, HeapSpray. OS Kernel Internals. What's the behavior when a program is running on top of OS. Why we use paging. How virtual to physical address translation is performed. How MMU (e.g., TLB) helps this. How OS manage files, and disks. How can we model the program behavior when sitting at OS layer. We will use both Linux and Windows as working kernel. Linker and Loader Internals. How a program can be dynamically linked, and what an attacker can do to cheat the system and meanwhile what we can do to protect the system. Kernel-level Defense, how can we defend against the common exploits, techniques including such as ASR, and DEP, NX-bits. User-level Defense. Safe library, Compiler extension, Binary Transformation/Rewriting, Runtime Verification. Binary code reverse engineering. Static binary code analysis. Dynamic Binary code instrumentation. Data flow analysis, and control flow analysis. Malware packing and unpacking. The class will also have a heavy-hands on project. Students could choose either to perform research (will work on a semester-long research topic of their choosing), or perform an engineering project. |
"site does not exist" :(
|
deepzero, are you referring to the link provided by redbull? It loads perfectly on my computer. Seeing how the University of Dallas is located in the United States, perhaps the site is restricted to US ip addresses. Try loading the site via a US proxy and see if that fixes the issue. ;)
|
Quote:
|
tried several, page still not found :(
can we mirror the material? :S in the mean time, maybe this is of interest to some... Engineering a Compiler 2nd ed - K. Cooper, L. Torczon (Morgan Kaufman, 2012) BBS.pdf Quote:
|
HERE is a browsable copy of the entire site with original directory structure (141MB). You need to refer "spring2012.html" for "CS 6V81--005: System Security and Malicious Code Analysis". You have also "CS 6V81--005: Advanced Digital Forensics and Data Reverse Engineering" - need to refer file "fall2011.html". HTML files are located in ~zhiqiang.lin folder.
|
Sockets, Shellcode, Porting, and Coding: Reverse Engineering Exploits and Tool Coding
The book is logically divided into 5 main categories with each category representing a major skill set required by most security professionals:
1. Coding - The ability to program and script is quickly becoming a mainstream requirement for just about everyone in the security industry. This section covers the basics in coding complemented with a slue of programming tips and tricks in C/C++, Java, Perl and NASL. 2. Sockets - The technology that allows programs and scripts to communicate over a network is sockets. Even though the theory remains the same - communication over TCP and UDP, sockets are implemented differently in nearly ever language. 3. Shellcode - Shellcode, commonly defined as bytecode converted from Assembly, is utilized to execute commands on remote systems via direct memory access. 4. Porting - Due to the differences between operating platforms and language implementations on those platforms, it is a common practice to modify an original body of code to work on a different platforms. This technique is known as porting and is incredible useful in the real world environments since it allows you to not "recreate the wheel.” 5. Coding Tools - The culmination of the previous four sections, coding tools brings all of the techniques that you have learned to the forefront. With the background technologies and techniques you will now be able to code quick utilities that will not only make you more productive, they will arm you with an extremely valuable skill that will remain with you as long as you make the proper time and effort dedications. *Contains never before seen chapters on writing and automating exploits on windows systems with all-new exploits. *Perform zero-day exploit forensics by reverse engineering malicious code. *Provides working code and scripts in all of the most common programming languages for readers to use TODAY to defend their networks. link download: Code:
htp://hotfile.com/dl/152255592/439a586/Sockets_Shellcode_Porting__Coding_RE_www.box4dl.com.rar.html |
Does anyone have a copy of the C++ Without Fear: A Beginner's Guide That Makes You Feel Smart, second edition?
thanks |
Here it is:
Quote:
|
PC Assembly Language eBook [PDF]
1 Attachment(s)
Hi guys here is my first post i hope you guys like this ebook is really nice :)
Code:
Attached file. |
Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software
By Michael Sikorski, Andrew Honig Publisher: No Starch Press 800 Pages ISBN: 1593272901 PDF | 9 MB Download link : hxxp://filepost.com/files/7am8a85c/Practical_Malware_Analysis.pdf files: hxxp://sourceforge.net/projects/pmalabs/ |
680 Malware EBook Collection
File Size: 624 MB Ebook list : hxxp://note.shell32dll.info/download-ebook-680-malware-ebook-collection-2011 Download links : hxxp://www.mediafire.com/?ebsnetqqx8encbf hxxp://www.mediafire.com/?smmwcf42z53z7bp hxxp://www.mediafire.com/?hbzo8fy8d2zk93w hxxp://www.mediafire.com/?8wd4ca54dmjpo6b hxxp://www.mediafire.com/?qab6eahfmaxvdsq hxxp://www.mediafire.com/?v0cyic11flmlp0j |
CODE - The Hidden Language of Computer Hardware and Software
PHP Code:
PHP Code:
|
Charles Petzold - Programming Windows 6th Edition
Code:
http://filepost.com/files/md44a6f9/Programming.Windows.6th.Edition.pdf |
Quote:
Code:
http://www.4shared.com/get/noZJs9it/Sockets_Shellcode_Porting_And_.html |
The C++ Standard Library, 2nd Edition
The Best-Selling C++ Resource. Now Updated for C++11
The C++ standard library provides a set of common classes and interfaces that greatly extend the core C++ language. The library, however, is not self-explanatory. To make full use of its components¨Cand to benefit from their power¨Cyou need a resource that does far more than list the classes and their functions. The C++ Standard Library: A Tutorial and Reference, Second Edition, describes this library as now incorporated into the new ANSI/ISO C++ language standard (C++11). The book provides comprehensive documentation of each library component, including an introduction to its purpose and design; clearly written explanations of complex concepts; the practical programming details needed for effective use; traps and pitfalls; the exact signature and definition of the most important classes and functions; and numerous examples of working code. The book focuses in particular on the Standard Template Library (STL), examining containers, iterators, function objects, and STL algorithms. The book covers all the new C++11 library components, including Concurrency Fractional arithmetic Clocks and timers Tuples New STL containers New STL algorithms New smart pointers New locale facets Random numbers and distributions Type traits and utilities Regular expressions The book also examines the new C++ programming style and its effect on the standard library, including lambdas, range-based for loops, move semantics, and variadic templates. An accompanying Web site, including source code, can be found at www.cppstdlib.com. Table of Contents Chapter 1. About This Book Chapter 2. Introduction to C++ and the Standard Library Chapter 4. General Concepts Chapter 5. Utilities Chapter 6. The Standard Template Library Chapter 7. STL Containers Chapter 8. STL Container Members in Detail Chapter 9. STL Iterators Chapter 10. STL Function Objects and Using Lambdas Chapter 11. STL Algorithms Chapter 12. Special Containers Chapter 13. Strings Chapter 14. Regular Expressions Chapter 15. Input/Output Using Stream Classes Chapter 16. Internationalization Chapter 17. Numerics Chapter 18. Concurrency Chapter 19. Allocators Code:
http://prefiles.com/jyuxloofr81a/Addison.Wesley.The.CPP.Standard.Library.2nd.Edition.Mar.2012.rar |
a big book, but extremely complete!
C++ Primer, 5th Edition http://www.freebookdownloader.com/public/images/ebook/c-primer.jpg eBook Description Quote:
Code:
http://ul.to/su2y1bic |
All times are GMT +8. The time now is 16:24. |
Powered by vBulletin® Version 3.8.8
Copyright ©2000 - 2024, vBulletin Solutions, Inc.
Always Your Best Friend: Aaron, JMI, ahmadmansoor, ZeNiX