Quote:
|
Visual Cryptography and Its Applications" by Jonathan Weir and WeiQi Yan
BoBoCoAe | 2015 | ISBN: 8740301265 9788740301267 | 163 pages | PDF | 11 MB In this book, one of data security methods known as visual cryptography (VC) is presented. Specifically, visual cryptography allows effective and efficient secret sharing between a number of trusted parties. As with many cryptographic schemes, trust is the most difficult part. Visual cryptography provides a very powerful technique by which one secret can be distributed into two or more shares. Practical VC applications are also outlined. These applications involve the use of Moire patterns and watermarking techniques. Detailed analysis of the watermarking domain is presented along with various techniques and schemes that can incorporate VC successfully within the field of watermarking. The foundations of these techniques are reviewed and examples provided. https://www.uploadable.ch/file/qGKjx...12BoBoCoAe.PDF regards zeuscane |
zeuscane, can you please make a mirror on MEGA, rghost or mediafire...??'
Your link is not reachable.. Thanks in advance |
The online version is free for this book about Python. The author also has a course in udemy but that is not free.
https://automatetheboringstuff.com/#toc |
Automate the Boring Stuff with Python (PDF) full
Quote:
Quote:
|
Here
http://www94.zippyshare.com/v/5bt2BOn5/file.html regards zeuscane Quote:
|
Any one have this Book. Please share if Some on have. Her is Official Amazon Link >
The-Official-ISC-Guide-CCSP-CBK-1st-Edition |
Can anyone share ebook on data recovery field (e.g hdd/ssd data recovery)? Thank you
|
Hi,
Is there ebooks or resource available about MSIL ? Can anyone post links possibly ? |
Advanced Metaprogramming in Classic C++
by Davide Di Gennaro Publisher: Apress; 3 edition (April 29, 2015) Language: English ISBN-10: 1484210115 ISBN-13: 978-1484210116 Hostr |
@rangga
Look at the Amazon search results here: http://www.amazon.com/s/ref=nb_sb_noss_2?url=search-alias%3Dstripbooks&field-keywords=data+recovery&rh=n%3A283155%2Ck%3Adata+recovery And decide what is it that you are looking for... Once you identify the book that suites you, ask for it here and it may be provided... |
@Debugger
Same thing... please be specific. Search on Amazon for the book that you are looking for and post here for what you want/need. |
would anyone have any ebooks about the tpm and coding for it ?
|
Rootkits and Bootkits: Reversing Modern Malware and Next Generation Threats (Early Access)
Alex Matrosov, Eugene Rodionov, and Sergey Bratus http://mir.cr/ZWHVIIV0 |
Head First C# 3rd Edition
Head First C# is a complete learning experience for learning how to program with C#, XAML, the .NET Framework, and Visual Studio. Fun and highly visual, this introduction to C# is designed to keep you engaged and entertained from first page to last. Updated for Windows 8.1 and Visual Studio 2013, and includes projects for all previous versions of Windows (included in the book, no additional downloading or printing required).
You¡¯ll build a fully functional video game in the opening chapter, and then learn how to use classes and object-oriented programming, draw graphics and animation, and query data with LINQ and serialize it to files. And you'll do it all by creating games, solving puzzles, and doing hands-on projects. By the time you're done, you'll be a solid C# programmer¡ªand you'll have a great time along the way! Create a fun arcade game in the first chapter, and build games and other projects throughout the book Learn how to use XAML to design attractive and interactive pages and windows Build modern Windows Store apps using the latest Microsoft technology Learn WPF (Windows Presentation Foundation) using the downloadable WPF Learner's Guide Using the Model-View-ViewModel (MVVM) pattern to create robust architecture Build a bonus Windows Phone project and run it in the Visual Studio Windows Phone emulator https://mega.nz/#!e9dm1QiA!yl49NGaagMzZIGvw1g9IAq-SAyXT5GjlhYCdmzOtzHk |
Does anyone have the book "Obfuscating .NET - Protecting your code from Prying Eyes" by Daniel Appleman? Please upload it, I found some links on the internet but all of them are no longer valid.
Thanks in advance |
Please keep in mind that ebook requests should be posted in the request section, not here.
|
@Spiderz_Soft
Better late than never :) http://www46.zippyshare.com/v/ZSUVJAhw/file.html @evlncrn8 Will get more for the end of the week http://www46.zippyshare.com/v/cRSRcXym/file.html http://www46.zippyshare.com/v/VWB1aBh9/file.html @Levis Will get it, wait a few days @debugger @rangga Give me some names and I will try to get them |
Can anyone get:
Game Hacking: Developing Autonomous Bots for Online Games http://www.amazon.co.uk/gp/product/1593276699?psc=1&redirect=true&ref_=oh_aui_detailpage_o03_s01 |
CODE + BOOK
http://board.b-at-s.info/index.php?showtopic=9908 OR https://github.com/GameHackingBook/GameHackingExamples https://www.sendspace.com/file/vd3cvz |
Does anyone have this book?
Secure Coding in C and C++, 2nd Edition By Robert C. Seacord http://www.amazon.com/Secure-Coding-2nd-Software-Engineering/dp/0321822137/ref=sr_1_1?ie=UTF8&qid=1454587186&sr=8-1&keywords=Secure+Coding+in+C+and+C%2B%2B%2C+2nd+Edition |
I'm still looking for this one: "Real Digital Forensics: Computer Security and Incident Response". I hope anyone can share. Thanks
|
Quote:
Quote:
|
Quote:
You can find it here: http://resources.sei.cmu.edu/asset_files/BookChapter/2005_009_001_52692.pdf cheers |
yes i found that but i would need whole book if someone has it..
|
Quote:
PM me if anyone wants... |
KVM books
Hi,
Pls share following books if someone have..Thanks http://www.amazon.com/Mastering-KVM-Virtualization-Prasad-Mukhedkar/dp/1784399051/ref=sr_1_2?ie=UTF8&qid=1457153674&sr=8-2&keywords=KVM+books http://www.amazon.com/Getting-Started-Red-Enterprise-Virtualization/dp/1782167404/ref=pd_sim_sbs_14_3?ie=UTF8&dpID=51bsxKXF5xL&dpSrc=sims&preST=_AC_UL160_SR130%2C160_&refRID=03S9V6XY6MPJGNXRZ4N4 http://www.amazon.com/Ubuntu-Unleashed-2016-Covering-15-10/dp/0134268113/ref=sr_1_2?s=books&ie=UTF8&qid=1457154030&sr=1-2&keywords=KVM+ubuntu http://www.amazon.com/SUSE-Linux-Toolbox-Commands-Enterprise/dp/0470082925/ref=sr_1_1?s=books&ie=UTF8&qid=1457153788&sr=1-1&keywords=suse+linux thanks in advance. |
openstack books
Hi,
Pls share following books if someone have http://www.amazon.com/Mastering-OpenStack-Omar-Khedher/dp/1784395641/ref=sr_1_2?s=books&ie=UTF8&qid=1457154311&sr=1-2&keywords=openstack http://www.amazon.com/Learning-OpenStack-Alok-Shrivastwa/dp/1783986964/ref=sr_1_5?s=books&ie=UTF8&qid=1457154185&sr=1-5&keywords=openstack+ubuntu http://www.amazon.com/OpenStack-Administrators-Guide-administration-OpenStack-based/dp/1515048101/ref=sr_1_12?s=books&ie=UTF8&qid=1457154185&sr=1-12&keywords=openstack+ubuntu BR |
RE ebook
Does anyone have a copy of this book? Look very interesting.
hxxp://amazon.com/Deep-Dive-Development-Exploit-Win32/dp/3738620095 |
Quote:
Code:
http://www.nitroflare.com/view/A2FA803EC065053/h340b.Mastering.OpenStack.epub Code:
http://nitroflare.com/view/E98D7727C9241C6/1783986964.epub |
Quote:
Code:
http://www.nitroflare.com/view/BC67CBE81F7446F/29ajz.Getting.Started.with.Red.Hat.Enterprise.Virtualization.rar Code:
http://mir.cr/EQUASH35 |
Quote:
Wish your favorite PC game had a more informative heads up display? What if you could instantly collect all that loot from your latest epic battle? You don't need to be a sorcerer to transform a game you like into a game you love. Just make a bot to do the grunt work for you! If you're familiar with Windows-based development and memory management, then Game Hacking, provides all the tools and knowledge you need to become a true game hacker. Let veteran game hacker Nick Cano teach you the basics, including reverse engineering, assembly code analysis, programmatic memory manipulation, and code injection. Throughout the book, you'll hone your new skills with hands-on labs, dig into practice binaries, and learn to write your own bot. Level up your toolbox with hacking techniques: Scan and modify memory with Cheat Engine Explore program structure and execution flow with OllyDBG Log processes and pinpoint useful data files with Process Monitor Manipulate control flow through NOPing, hooking, and more Locate and dissect common game memory structures Discover the secrets behind common game bots, including: Persistent hacks, such as a heads up display Responsive hacks, such as auto healers and combo bots Bots with artificial intelligence, such as cave walkers and automatic looters Game hacking might seem like black magic, but that doesn't mean it's evil. When you know how bot makers create bots and why they do it, you'll be empowered to discourage and defend against bots in your own games! Journey through the inner workings of PC games, and come away with a deeper understanding of both game design and computer security. Code:
hxxp://www.mirrorcreator.com/files/1CHZJUGY/Game_Hacking_-_Developing_Autonomous_Bots_for_Online_Games_-_1st_Edition_(2016)_0.pdf_links |
Quote:
http://forum.exetools.com/showpost.php?p=104009&postcount=780 by our friend Kurapica... Cheers :) |
ups... sorry, i didn't know...
Tnx |
Links shared on this thread are dead, so new mirrors :
Debugging with Fiddler The complete reference from the creator of the Fiddler Web Debugger Code:
hxxp://www.mirrorcreator.com/files/47G99T96/DwF.pdf_links |
Penetration Testing with Raspberry Pi
======================= Construct a hacking arsenal for penetration testers or hacking enthusiasts using Kali Linux on a Raspberry Pi If you are looking for a low budget, small form-factor remotely accessible hacking tool, then the concepts in this book are ideal for you. If you are a penetration tester who wants to save on travel costs by placing a low-cost node on a target network, you will save thousands by using the methods covered in this book. You do not have to be a skilled hacker or programmer to use this book. It will be beneficial to have some networking experience; however, it is not required to follow the concepts covered in this book. The Raspberry Pi is a low-cost credit-card sized computing system that can be customized for just about anything including penetration testing. Raspberry Pi is the best known platform not because it is cheap but because it is very powerful. Kali is a pentesting/security auditing Linux distribution. Kali Linux has many penetration-testing programs, including nmap (a port scanner), Wireshark (a packet analyzer), John the Ripper (a password cracker), Aircrack-ng (a software suite for the penetration-testing of wireless LANs), and Burp suite and OWASP ZAP (both web application security scanners). This book covers how to turn a Raspberry Pi into a hacking arsenal to leverage the most popular open source toolkit, Kali Linux. You will learn how to use various tools to breach networks and steal data. Quote:
|
Quote:
|
devops
Hi,
I am looking for following books... Continuous delivery and DevOps: A Quickstart Guide by Paul Swartout http://www.amazon.in/gp/product/B009ZUECSW/ref=s9_simh_gw_p351_d10_i5?pf_rd_m=A1VBAL9TL5WCBF&pf_rd_s=desktop-top&pf_rd_r=1MGJKP7G491NA4FP3DZ8&pf_rd_t=36701&pf_rd_p=869530187&pf_rd_i=desktop and DevOps: Learn One of the Most Powerful Software Development Methodologies FAST AND EASY! by Derek Rangel http://www.amazon.in/DevOps-Powerful-Software-Development-Methodologies-ebook/dp/B0170ME48E/ref=pd_sim_351_4?ie=UTF8&dpID=51IcKPJAINL&dpSrc=sims&preST=_UX300_PJku-sticker-v3%2CTopRight%2C0%2C-44_OU31_AC_UL160_SR100%2C160_&refRID=0D1R4QCV1HX2Y0QH0684 please share if someone has..Thanks. |
Continuous delivery and DevOps: A Quickstart Guide by Paul Swartout
it is here 1th & 2th edition http://avxsearch.in/?q=Continuous%20...kstart%20Guide DevOps: Learn One of the Most Powerful Software Development Methodologies FAST AND EASY! by Derek Rangel is at this link http://avxhome.se/ebooks/programming...t/3753988.html regards zeuscane |
Check it out:
Code:
http://rghost.net/private/7DsWKQmfK/d972b8305e980c7f5f2808b695cc9fd1 Quote:
|
All times are GMT +8. The time now is 17:06. |
Powered by vBulletin® Version 3.8.8
Copyright ©2000 - 2024, vBulletin Solutions, Inc.
Always Your Best Friend: Aaron, JMI, ahmadmansoor, ZeNiX