About

Language Translator

February 02, 2012

Hacking Wireless Networks for Dummies


Hacking Wireless Networks for Dummies
Today wireless networks are everywhere. In this book

  • Perform ethical hacks without compromising a system
  • Combat denial of service and WEP attacks
  • Understand how invaders think
  • Recognize the effects of different hacks
  • Protect against war drivers and rogue devices 
      DOWNLOAD 



    Web Hacking-Attacks & Defense

    the book gives you information about  how Web hacking occurs and teaches you enhanced skill at developing defenses against such Web attacks. Technologies covered in the book include Web languages and protocols, Web and database servers, payment systems and shopping carts, and critical vulnerabilities associated with URLs. This book is a virtual battle plan that will help you identify and eliminate threats that could take your Web site off line.
    Whether it's petty defacing or full-scale cyber robbery, hackers are moving to the Web along with everyone else. Organizations using Web-based business applications are increasingly at risk. Web Hacking: Attacks and Defense is a powerful guide to the latest information on Web attacks and defense. Security experts Stuart McClure (lead author of Hacking Exposed), Saumil Shah, and Shreeraj Shah present a broad range of Web attacks and defense.
    Features include:
    • Overview of the Web and what hackers go after
    • Complete Web application security methodologies
    • Detailed analysis of hack techniques
    • Countermeasures
    What to do at development time to eliminate vulnerabilities New case studies and eye-opening attack scenarios Advanced Web hacking concepts, methodologies, and tools "How Do They Do It?" sections show how and why different attacks succeed, including:
    • Cyber graffiti and Web site defacements
    • e-Shoplifting
    • Database access and Web applications
    • Java™ application servers; how to harden your Java™ Web Server
    • Impersonation and session hijacking
    • Buffer overflows, the most wicked of attacks
    • Automated attack tools and worms
    Appendices include a listing of Web and database ports, cheat sheets for remote command execution, and source code disclosure techniques. etc

    DOWNLOAD (torrent link)

    DOWNLOAD (rapidshare)


    Gray Hat Hacking

    This book is very useful for both beginners and professionals. It gives the reader detailed knowledge on penetration testing. It also has chapters on Linux and windows exploits. 
    Part I: Introduction to Ethical Disclosure,
    Part II: Penetration Testing and Tools ,
    Part III: Exploits 101,
    Part IV: Vulnerability Analysis,
    Part V: Malware Analysis

    DOWNLOAD 



    Maximum Security: A Hacker's Guide to Protecting Your Internet Site and Network
    Written by an anonymous hacker, Maximum Security details hundreds of ways in which invaders may be able to penetrate your system and the steps that you can take to stop them. Before he was arrested, the author used his considerable talents to crack ATMs. Drawing on his vast experience, the author takes you on a journey of the tools that crackers have at their disposal, the ways in which they exploit holes in popular operating systems, and what protective measures are available for each.

    DOWNLOAD (Uploading link)






    CYBER ATTACKS
    This is a small book giving a brief introduction of the security threats  in the cyber world  


    DOWNLOAD ( ziddu.com link)











      IT BILL (INDIA)

    Every hacker in India who is thinking of fooling around the cyberspace i think should read these laws and Regulation related to Information Technology of India, to avoid getting into unnecessary trouble with the law.
    here is a copy of Indian IT Bill passed in 2000


    0 comments: