Hi fellows,
here is a site full of any kind of IT books. It offers even fast, unlimited direct downloads from the site, thus no shared host hassle. Code:
http://it-ebooks.info/ Regards *RemedY* |
mega tutorials
|
Gentoomen Library
|
Ross Anderson - Security Engineering, second edition for free
hxxp://www.cl.cam.ac.uk/~rja14/book.html |
Professional Visual Studio 2012
Publisher: Wrox | 2012 | EPUB + PDF | ISBN: 1118337700 | 1104 pages | 16.9 + 45.4 Mb Code:
pdf |
I hope somebody could share this one -- "Real Digital Forensics: Computer Security and Incident Response". ---Thx.
|
List of all books
1 Attachment(s)
Hi there,
some weeks ago I've posted a link to it-ebooks.info. A site with direct ebooks downloads. One shortcoming of this site is the lack of a browsable index. This makes it hard to look for a certain topic and in general it's just inconvenient. To overcome this issue I've created a tiny Python script that creates the index - consisting of title, second title (if there is any), description, and clickable download link. I hope you'll find it useful. I have also put the script itself in the .rar file so you can adjust it if you want the index to be different. Best regards *RemedY* |
1 Attachment(s)
Stuxnet: The True Story Of Hunt And Evolution
Publication Date: February 18, 2013 http://d188rgcu4zozwl.cloudfront.net/content/B00BJ6KPLS/images/cover.jpg This book is about a notorious computer virus Stuxnet. You might be wondering: there are so many computer viruses, why Stuxnet? What is so special about the Stuxnet computer worm? Stuxnet never managed to become the biggest, the scariest, or the most sophisticated malware. At the same time, because of some unexpected twists of fate, Stuxnet had become much more than just a computer worm. Stuxnet brought from shadows into spotlight some very serious issues with the Internet security ranging from stolen digital certificates and defenselessness of industrial computers to an existence of ¡°gray¡± market of pre-written software vulnerabilities for sale. Overall, the story of Stuxnet is a story of its evolution from an ordinary malware to a cyber-weapon that was followed by its major transformation into a successful long-term propaganda-weapon. The appearance of Stuxnet that was loaded with two digital certificates and four previously unknown breaches in Window¡¯s defense raised some painful questions. Who was behind Stuxnet? For how long was this cyber-war going on? Are secure Internet transactions really secure? Can we trust digital certificates? Who is in the business of creating and selling malware to penetrate Internet browsers¡¯ security? The story of the computer worm Stuxnet is full of surprises and unexpected twists that might change your opinion about the present and future of the Internet and the World Wide Web. |
Sams - Covert Java Techniques for Decompiling, Patching,and Reverse Engineering
2 Attachment(s)
Description:
The book gives some practical methods of how to overcome the many problems: Decompile, and confusion; Decipher the private variables and methods; Alternative and patch application class; Eavesdropping technology simplifies troubleshooting and performance tuning; The interception control flow and control class loading; Description: The book gives some practical methods of how to overcome the many problems: Decompile, and confusion; Decipher the private variables and methods; Alternative and patch application class; Eavesdropping technology simplifies troubleshooting and performance tuning; The interception control flow and control class loading; Understand and adjust bytecode; Change the third-party application logic; Decipher the behavior of the JVM; To protect the commercial software from decipher; Some of the tips mentioned in this book can help you save time and improve efficiency. Each chapter focusing on the kind of technology to solve a class of problems overview of where the problem lies, given the solution of the problem, and then give other idea to test the program. [Contents] Chapter 1 Getting Started Guide 1.1 Summary - time and purpose of using the various methods 1.2 use of document management to improve the efficiency of program development 1.2.1 FAR å’Œ Total Commander 1.2.2 Java IDE 1.3 the function and structure of the sample application 1.4 quick test 1.5 Summary Chapter 2 decompiled class 2.1 determine when to decompile 2.2 understand the best anti-compiler 2.3 decompiled class 2.4 decompile feasible elements 2.5 decompiled code potential problems 2.6 quick test 2.7 Summary Chapter 3 of confusion classes 3.1 protection code behind the idea 3.2 Confusion - kind of intellectual property protection 3.3 the transformation of the program executed by the confusion 3.3.1 remove debugging information 3.3.2 The name of the processing 3.3.3 coding Java string 3.3.4 change control flow 3.3.5 insert the correct code 3.3.6 remove unused code (compression) 3.3.7 optimized bytecode 3.4 understand the confusion The 3.5 potential problems and common solutions 3.5.1 Dynamic Class Loading 3.5.2 reflection 3.5.3 serialization 3.5.4 violate naming conventions 3.5.5 maintenance problems 3.6 è¿ç”¨ Zelix KlassMaster æ··æ·† 一个 Chat 应用 ç¨‹åº 3.7 to crack the code of confusion 3.8 quick test 3.9 Summary Chapter 4 decipher non-public methods and variables 4.1 package 4.2 access package and a member of the protected class 4.3 access private class members 4.4 quick test 4.5 Summary Chapter 5 replacement and repair applications 5.1 After various attempts have failed should do 5.2 to find the class must be patched 5.2.1 common method 5.2.2 Search text string 5.2.3 obfuscated code processing 5.3 an example of a need to repair 5.3.1 using the class name 5.3.2 Search text string 5.3.3 use the call stack search program logic 5.4 patched classes to provide new logic 5.5 refactoring applications to load and use the repair class 5.6 patch package package 5.7 quick test 5.8 Summary Chapter 6 uses tracking technology Chapter 7 Java security Chapter 8 spy runtime environment Chapter 9 decipher coded informal debugger Chapter 10, the use of performance analysis tools to analyze applications running Chapter 11, the use of positioning and correction of the load test scalability problem Chapter 12 Application of Reverse Engineering Chapter 13 eavesdropping technology Chapter 14 of the control class loading Chapter 15 alternative and patch core Java classes Chapter 16 interception control flow Chapter 17 to understand and adjust bytecode Chapter 18, the use of native code patching method for total control Chapter 19 protection commercial program from crack to Appendix A commercial software license Appendix B Resources Appendix C Test Questions Ps: downloaded from Unppack.cn Attachment 6711 Attachment 6712 |
|
Does anyone have an ebook about Kerberos?
|
what book for Kerberos?
this just api monitor bro |
|
Anyone know where I can get this book?
http://www.amazon.com/gp/product/0321578899?ie=UTF8&tag=advancenetdeb-20&linkCode=as2&camp=1789&creative=390957&creativeASIN=0321578899 I can't find it on the forum. I've search, but there's nothing. It looks awesome. |
Quote:
password: the result of 12345678 xor 87654321 |
All times are GMT +8. The time now is 17:38. |
Powered by vBulletin® Version 3.8.8
Copyright ©2000 - 2024, vBulletin Solutions, Inc.
Always Your Best Friend: Aaron, JMI, ahmadmansoor, ZeNiX