linux troubleshooting books
Hi,
pls share someone has following books Red Hat Enterprise Linux Troubleshooting Guide by Benjamin Cane http://www.amazon.com/Red-Enterprise-Linux-Troubleshooting-Guide/dp/1785283553/ref=sr_1_1?ie=UTF8&qid=1461254380&sr=8-1&keywords=linux+troubleshooting Linux Troubleshooting Bible 1st Edition by Christopher Negus (Author), Thomas Weeks (Author) http://www.amazon.com/Linux-Troubleshooting-Bible-Christopher-Negus/dp/076456997X/ref=sr_1_3?ie=UTF8&qid=1461254380&sr=8-3&keywords=linux+troubleshooting Linux Troubleshooting for System Administrators and Power Users 1st Edition by James Kirkland (Author), David Carmichael (Author), Christopher L. Tinker (Author), Gregory L. Tinker (Author) http://www.amazon.com/Linux-Troubleshooting-System-Administrators-Power/dp/0131855158/ref=sr_1_4?ie=UTF8&qid=1461254380&sr=8-4&keywords=linux+troubleshooting |
Quote:
Quote:
Linux Troubleshooting for System Administrators and Power Users 1st Edition Quote:
Found two of three. Link are above. Regards, DB |
thanks, pls share if you have pdf links.
|
Future Crimes
Future Crimes is a book about vast and various methods that hackers deploy to penetrate systems (not technical). This book is based on real life encounters of the author (Marc Goodman) himself working as a cyber crime investigator in FBI.
Quote:
Code:
http://www12.zippyshare.com/v/HObD2EH1/file.html Code:
https://1fichier.com/?b48ph7gzc9 |
Hi,
pls share someone has following book. Red Hat Enterprise Linux Troubleshooting Guide by Benjamin Cane http://www.amazon.com/Red-Enterprise-Linux-Troubleshooting-Guide/dp/1785283553/ref=sr_1_1?ie=UTF8&qid=1461254380&sr=8-1&keywords=linux+troubleshooting |
High Performance Parallelism Pearls Volume One: Multicore and Many-core Programming Approaches
hxxp://www22.zippyshare.com/v/12bicRu6/file.html |
Quote:
It was not easy :D Code:
hxxp://www.mirrorcreator.com/files/1J3HYRWY/RHELTG-BC.zip_links Regards Edit : What i've seen... great book!! Tnx. |
Does anyone know where i can get
The Mathematics of Encryption: An Elementary Introduction (Mathematical World) by Margaret Cozzens (2013-09-05) Paperback – 1821 by Margaret Cozzens;Steven J. Miller (Author) https://www.amazon.ca/Mathematics-Encryption-Elementary-Introduction-Mathematical/dp/B01FIYGKQK/ref=sr_1_1?s=books&ie=UTF8&qid=1463654531&sr=1-1&keywords=The+Mathematics+of+Encryption%3A+An+Elementary+Introduction bye N |
Noiseless Steganography: The Key to Covert Communications (2012)
Noiseless Steganography: The Key to Covert Communications (2012)
Author : Dr. Abdelrahman Desoky Pages : 298 Publisher: Auerbach Publications; 1 edition (February 16, 2012) Language: English ISBN-10: 1439846219 ISBN-13: 978-1439846216 Among the features that make Noiseless Steganography: The Key to Covert Communications a first of its kind: The first to comprehensively cover Linguistic Steganography The first to comprehensively cover Graph Steganography The first to comprehensively cover Game Steganography Although the goal of steganography is to prevent adversaries from suspecting the existence of covert communications, most books on the subject present outdated steganography approaches that are detectable by human and/or machine examinations. These approaches often fail because they camouflage data as a detectable noise by altering digital images, audio files, text, etc. However, such alteration raises suspicion and makes the message discernible by detecting its noise. Addressing such shortcomings, Noiseless Steganography: The Key to Covert Communications introduces a novel Noiseless Steganography Paradigm (Nostega). Rather than hiding data in noise or producing noise, Nostega camouflages messages as well as their transmission in the form of unquestionable data in the generated steganographic cover. The book explains how to use Nostega to determine suitable domains capable of generating unsuspicious steganographic cover in which messages are embedded in the form of innocent data that is compatible with the chosen domain. It presents a number of Nostega-based methodologies, including but not limited to: A novel cover type that enables data to be hidden in plotted graphs A novel methodology that pursues popular games such as chess, checkers, crosswords, and dominoes to conceal messages Comprehensive coverage of linguistic steganography Several novel linguistic steganography methodologies based on Natural Language Processing and Computational Linguistic techniques such as: Education-Centric-Based, Summarization-Based, Natural Language Generation Based, Random-Series-Based, Email Headers Based, Automatic Joke Generation Based, List-Based, and Automatic Notes Generation Based The first book to provide comprehensive coverage of Linguistic Steganography, Graph Steganography, and Game Steganography, it discusses the implementation and steganalysis validation of ten Nostega-based methodologies. It describes how to establish covert channels by employing the selected domain to serve as justification for the interaction and delivery of the cover among the communicating parties. Instead of using contemporary steganography approaches to camouflage your data as noise that is assumed to look innocent, the text provides you with the tools to prevent your adversaries from suspecting the existence of covert communications altogether. About the Author Dr. Abdelrahman Desoky is a scientist and an ambitious Computer Engineering Doctorate with over twenty years of experience in the computer field. He is an experienced educator at both the graduate and undergraduate levels. Furthermore, he has industrial expertise in developing full life cycle systems such as software, hardware, security, and telecommunications/networks. Dr. Desoky received a Doctoral Degree (Ph.D.) from The University of Maryland, Baltimore County (UMBC) and a Master of Science (M.Sc.) from the George Washington University; both degrees are in Computer Engineering. His Doctoral Dissertation is entitled "Nostega: A Novel Noiseless Steganography Paradigm." The paradigm explores the topic of noiseless steganography, which refers to the science and art of covert communications. Nostega provides a way to secure information in static stage and during data transmission to a legitimate recipient. His M.Sc. degree concentrated on Computer Architecture and Networks. His research is entitled "Security Architecture for Computers and Networks". Currently, he is The Academia Planet, CEO. Code:
hxxp://www.mirrorcreator.com/files/1N40TFLA/NS_TKtCC.pdf_links |
Assembly Language for x86 Processors (7th Edition)
Assembly Language for x86 Processors (7th Edition)
Autor : Kip Irvine Pages: 720 Publisher: Pearson; 7 edition (March 21, 2014) Language: English ISBN-10: 0133769402 ISBN-13: 978-0133769401 Assembly Language for x86 Processors, 7e is intended for use in undergraduate courses in assembly language programming and introductory courses in computer systems and computer architecture. This title is also suitable for embedded systems programmers and engineers, communication specialists, game programmers, and graphics programmers. Proficiency in one other programming language, preferably Java, C, or C++, is recommended. Written specifically for 32- and 64-bit Intel/Windows platform, this complete and fullyupdated study of assembly language teaches students to write and debug programs at the machine level. This text simplifies and demystifies concepts that students need to grasp before they can go on to more advanced computer architecture and operating systems courses. Students put theory into practice through writing software at the machine level, creating a memorable experience that gives them the confidence to work in any OS/machine-oriented environment. Additional learning and teaching tools are available on the author¡¯s web site at http://asmirvine.com/ where both instructors and students can access chapter objectives, debugging tools, supplemental files, a Getting Started with MASM and Visual Studio 2012 tutorial, and more. Teaching and Learning Experience This program presents a better teaching and learning experience¡ªfor you and your students. It will help: Teach Effective Design Techniques: Top-down program design demonstration and explanation allows studentsto apply techniques to multiple programming courses. Put Theory into Practice: Students will write software at the machine level, preparing them to work in any OS/machine-oriented environment. Tailor the Text to Fit your Course: Instructors can cover optional chapter topics in varying order and depth. Support Instructors and Students: Visit the author's web site http://asmirvine.com/ for chapter objectives, debugging tools, supplemental files, a Getting Started with MASM and Visual Studio 2012 tutorial, and more. About the Author Kip Irvine has written five computer programming textbooks, for Intel Assembly Language, C++, Visual Basic (beginning and advanced), and COBOL. His book Assembly Language for Intel-Based Computers has been translated into six languages. His first college degrees (B.M., M.M., and doctorate) were in Music Composition, at University of Hawaii and University of Miami. He began programming computers for music synthesis around 1982 and taught programming at Miami-Dade Community College for 17 years. Kip earned an M.S. degree in Computer Science from the University of Miami, and he has been a full-time member of the faculty in the School of Computing and Information Sciences at Florida International University since 2000. Code:
hxxp://www.mirrorcreator.com/files/0COPNMGH/ALFX86P.pdf_links |
Applied Cryptography: Protocols, Algorithms and Source Code in C
Applied Cryptography: Protocols, Algorithms and Source Code in C
Autor: Bruce Schneier Pages: 784 Publisher: Wiley; 1 edition (March 30, 2015) Language: English ISBN-10: 1119096723 ISBN-13: 978-1119096726 From the world's most renowned security technologist, Bruce Schneier, this 20th Anniversary Edition is the most definitive reference on cryptography ever published and is the seminal work on cryptography. Cryptographic techniques have applications far beyond the obvious uses of encoding and decoding information. For developers who need to know about capabilities, such as digital signatures, that depend on cryptographic techniques, there's no better overview than Applied Cryptography, the definitive book on the subject. Bruce Schneier covers general classes of cryptographic protocols and then specific techniques, detailing the inner workings of real-world cryptographic algorithms including the Data Encryption Standard and RSA public-key cryptosystems. The book includes source-code listings and extensive advice on the practical aspects of cryptography implementation, such as the importance of generating truly random numbers and of keeping keys secure. ". . .the best introduction to cryptography I've ever seen. . . .The book the National Security Agency wanted never to be published. . . ." -Wired Magazine ". . .monumental . . . fascinating . . . comprehensive . . . the definitive work on cryptography for computer programmers . . ." -Dr. Dobb's Journal ". . .easily ranks as one of the most authoritative in its field." -PC Magazine The book details how programmers and electronic communications professionals can use cryptography-the technique of enciphering and deciphering messages-to maintain the privacy of computer data. It describes dozens of cryptography algorithms, gives practical advice on how to implement them into cryptographic software, and shows how they can be used to solve security problems. The book shows programmers who design computer applications, networks, and storage systems how they can build security into their software and systems. With a new Introduction by the author, this premium edition will be a keepsake for all those committed to computer and cyber security. Written by the world's most renowned security technologist this special Anniversary Edition celebrates 20 years for the most definitive reference on cryptography ever published, Applied Cryptography, Protocols, Algorithms, and Source Code in C. Inside security enthusiasts will find a compelling introduction by author Bruce Schneider written specifically for this keepsake edition. Included in this edition: Exclusive forward by Bruce Schneier Ways to defeat the key escrow mechanism Encryption algorithms, including algorithms from the former Soviet Union and South Africa, and the RC4 stream cipher Protocols for digital signatures, authentication, secure elections, digital cash, and more Detailed information on key management and cryptographic implementations About the Author Bruce Schneier is an internationally renowned security technologist, called a "security guru" by The Economist. He is the author of twelve books¡ªincluding his seminal work, Applied Cryptography: Protocols, Algorithms, and Source Code in C, and Secrets & Lies: Digital Security in a Networked World as well as hundreds of articles, essays, and academic papers. His influential newsletter "Crypto-Gram" and blog "Schneier on Security" are read by over 250,000 people. Schneier is a fellow at the Berkman Center for Internet and Society at Harvard Law School, a program fellow at the New America Foundation's Open Technology Institute, a board member of the Electronic Frontier Foundation, and an Advisory Board member of the Electronic Privacy Information Center. He is also the Chief Technology Officer of Resilient Systems, Inc. You can read his blog, essays, andacademic papers at www.schneier.com. He tweets at @schneierblog. Code:
hxxp://hugefiles.net/lhfps1mntau4 |
Troubleshooting OpenStack
Hi,
Pls share following book if someone has, Troubleshooting OpenStack by Tony Campbell HTML Code:
http://www.amazon.com/Troubleshooting-OpenStack-Tony-Campbell/dp/1783986883/ref=sr_1_11?s=books&ie=UTF8&qid=1465113504&sr=1-11&keywords=openstack |
a backup for this hugefiles.net/lhfps1mntau4 ?
|
@niculaita:
Thanks. But File not found. Please upload to some other site. |
Quote:
|
@bolzano_1989:
Thanks for the link. I thought he uploaded "Troubleshooting OpenStackby Tony" Campbell", SO I asked to upload to other site. I found link for this book in "novafile", but that site seems blocked , not able to open. I have tried with some proxies, but no success. please some can help me to download fro here hxxp://novafile.com/u7pj4euiexer |
Windows Internals, Part 1 & Part II (6th Edition 2012)
by Mark E. Russinovich (Author), David A. Solomon (Author), Alex Ionescu (Author) 6/ed (2012) | English | PDF | 752 / 672 pages | ISBN-10: 0735648735 / 0735665877 | 25 / 22 Mb Part I: http://www40.zippyshare.com/v/7rvcFlPV/file.html Part II: http://www40.zippyshare.com/v/cLIjRKOi/file.html (part II has been posted already, but link is dead) |
1 Attachment(s)
VX Ebooks Collections
hxxp://download.adamas.ai/dlbase/ebooks/VX_related/ All Download links in text files |
Quote:
|
Quote:
What are the MUST read between all these ebooks? |
Applied Mathematics For Reversers series
This is actually from http://reteam.org
Mirror: Part 1: https://mega.nz/#!OYRRRDSB Part 2: https://mega.nz/#!3URlUTKQ Part 3: https://mega.nz/#!eNwmRSCJ |
Quote:
|
Quote:
|
I'm looking for these two books
1- What Makes It Page?: The Windows 7 (x64) Virtual Memory Manager 2- Windows NT File System Internals : OSR Classic Reprints (2006) --> not 1997 one |
I'm looking for:
https://sourcemaking.com/design_patterns Quote:
|
Quote:
Code:
hxxp://www84.zippyshare.com/v/DLjsfWIr/file.html |
2 Attachment(s)
Website contains a lot books for free!
For members only. I'll post more stuff later! Stitch Edit: Added second website. |
please share
LLVM Essentials Suyog Sarda, Mayur Pandey hxxps://www.packtpub.com/application-development/llvm-essentials thanks |
Quote:
Quote:
|
Quote:
Can you share LLVM Cookbook by Mayur Pandey, Suyog Sarda ? |
Quote:
LLVM Cookbook by Mayur Pandey (2015) : Quote:
************************************************************************************************************************************** As a sidenote, LLVM combined with Symbolic Execution is an excellent technique in creation of deobfuscators/unpackers for VMProtect ... Takes time and tedious though ... While we are on the topic of LLVM, you may want to go and read this : Playing with the Tigress binary protection. Automatic deobfuscation using symbolic execution and LLVM and Challenges HERE ... |
Database Design for Mere Mortals 3rd Ed (2013) :
Download it here : Quote:
Databases Demystified [PDF]: Download it here : Quote:
|
The Art of PCB Reverse Engineering
I'm looking for The Art of PCB Reverse Engineering by Ng Keng Tiong. Does anyone has a copy of it :)
|
Troubleshooting with the Windows Sysinternals Tools, 2nd Edition
Paperback: 688 pages Publisher: Microsoft Press; 2 edition (October 27, 2016) PHP Code:
|
Learning Linux Binary Analysis
Author: Ryan "elfmaster" O'Neill Length: 282 pages Publisher: Packt Publishing Publication Date: 2016-02-29 Table of Contents Chapter 1. The Linux Environment and Its Tools Chapter 2. The ELF Binary Format Chapter 3. Linux Process Tracing Chapter 4. ELF Virus Technology ¨C Linux/Unix Viruses Chapter 5. Linux Binary Protection Chapter 6. ELF Binary Forensics in Linux Chapter 7. Process Memory Forensics Chapter 8. ECFS ¨C Extended Core File Snapshot Technology Chapter 9. Linux /proc/kcore Analysis PHP Code:
|
Stack Frames: A Look From Inside
Paperback: 171 pages Publisher: Apress; 1st ed. edition (September 29, 2016) Table of Contents Chapter 1: Hardware and Software Chapter 2: GNU/Linux Distributions Chapter 3: Base 2, 8, and 16 Notations Chapter 4: Executables and Libraries Chapter 5: Stack Frames --- extremely helpful for exploit developer or anyone need to understand how stack frames work. PHP Code:
|
Some nice resources....
http://www.mediafire.com/folder/i6fvhtsfqaat9/mohnageib Don't leak this or I will no longer share these type of things.. :) |
Samsung ARTIK Reference The Definitive Developers Guide
Samsung ARTIK Reference The Definitive Developers Guide
hxxp://nitroflare.com/view/EE7C1039C39DFEE/1484223217.epub |
The Art of Debugging
Quote:
Code:
http://sendfile.su/1302322 |
Car Hacker's Handbook
Car Hacker's Handbook :
Description from the Website : Quote:
Direct Download : Code:
https://drive.google.com/file/d/0B9fLHoDsdVNhWTB0d2hyQkhvNlE/view?usp=sharing |
All times are GMT +8. The time now is 10:36. |
Powered by vBulletin® Version 3.8.8
Copyright ©2000 - 2024, vBulletin Solutions, Inc.
Always Your Best Friend: Aaron, JMI, ahmadmansoor, ZeNiX