Prikupljanje sredstava 15. septembra 2024 – 1. oktobra 2024 O prikupljanju novca
1
Violent Python: A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers

Violent Python: A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers

Godina:
2012
Jezik:
english
Fajl:
PDF, 7.83 MB
5.0 / 4.5
english, 2012
2
Practical Lock Picking - A Physical Penetration Tester's Training Guide

Practical Lock Picking - A Physical Penetration Tester's Training Guide

Godina:
2010
Jezik:
english
Fajl:
PDF, 19.19 MB
0 / 0
english, 2010
3
The Basics of Hacking and Penetration Testing: Ethical Hacking and Penetration Testing Made Easy

The Basics of Hacking and Penetration Testing: Ethical Hacking and Penetration Testing Made Easy

Godina:
2011
Jezik:
english
Fajl:
PDF, 3.74 MB
1.0 / 5.0
english, 2011
5
Buffer Overflow Attacks: Detect, Exploit, Prevent

Buffer Overflow Attacks: Detect, Exploit, Prevent

Godina:
2005
Jezik:
english
Fajl:
PDF, 5.38 MB
5.0 / 5.0
english, 2005
6
Secure Your Network For Free : Using Nmap, Wireshark, Snort, Nessus, and MRGT

Secure Your Network For Free : Using Nmap, Wireshark, Snort, Nessus, and MRGT

Godina:
2007
Jezik:
english
Fajl:
PDF, 7.20 MB
4.0 / 5.0
english, 2007
9
Reverse Engineering Code with IDA Pro

Reverse Engineering Code with IDA Pro

Godina:
2008
Jezik:
english
Fajl:
PDF, 3.91 MB
5.0 / 5.0
english, 2008
10
SQL Injection Attacks and Defense

SQL Injection Attacks and Defense

Godina:
2009
Jezik:
english
Fajl:
PDF, 3.34 MB
5.0 / 5.0
english, 2009
11
The Wireshark Field Guide: Analyzing and Troubleshooting Network Traffic

The Wireshark Field Guide: Analyzing and Troubleshooting Network Traffic

Godina:
2013
Jezik:
english
Fajl:
PDF, 25.24 MB
0 / 0
english, 2013
12
Hacking Web Apps: Detecting and Preventing Web Application Security Problems

Hacking Web Apps: Detecting and Preventing Web Application Security Problems

Godina:
2012
Jezik:
english
Fajl:
PDF, 14.68 MB
5.0 / 5.0
english, 2012
14
Black Hat Physical Device Security: Exploiting Hardware and Software

Black Hat Physical Device Security: Exploiting Hardware and Software

Godina:
2005
Jezik:
english
Fajl:
PDF, 78.40 MB
0 / 0
english, 2005
15
DNS Security. Defending the Domain Name System

DNS Security. Defending the Domain Name System

Godina:
2016
Jezik:
english
Fajl:
PDF, 5.80 MB
0 / 0
english, 2016
17
Hack the Stack: Using Snort and Ethereal to Master the 8 Layers of an Insecure Network

Hack the Stack: Using Snort and Ethereal to Master the 8 Layers of an Insecure Network

Godina:
2007
Jezik:
english
Fajl:
PDF, 7.19 MB
0 / 0
english, 2007
19
Research Methods for Cyber Security

Research Methods for Cyber Security

Godina:
2017
Jezik:
english
Fajl:
PDF, 10.28 MB
0 / 0
english, 2017
20
Cryptography for Developers

Cryptography for Developers

Godina:
2006
Jezik:
english
Fajl:
PDF, 4.10 MB
0 / 0
english, 2006
21
Targeted Cyber Attacks. Multi-staged Attacks Driven by Exploits and Malware

Targeted Cyber Attacks. Multi-staged Attacks Driven by Exploits and Malware

Godina:
2014
Jezik:
english
Fajl:
PDF, 5.51 MB
0 / 5.0
english, 2014
22
IP addressing and subnetting, including IPv6

IP addressing and subnetting, including IPv6

Godina:
1999
Jezik:
english
Fajl:
PDF, 1.73 MB
5.0 / 3.5
english, 1999
23
Business Continuity and Disaster Recovery Planning for IT Professionals

Business Continuity and Disaster Recovery Planning for IT Professionals

Godina:
2014
Jezik:
english
Fajl:
PDF, 6.87 MB
5.0 / 5.0
english, 2014
24
Google Hacking for Penetration Testers

Google Hacking for Penetration Testers

Godina:
2007
Jezik:
english
Fajl:
PDF, 13.67 MB
0 / 0
english, 2007
26
Game Console Hardware Hacking (Xbox, Playstation, Nintendo, Atari And Gamepark 32)

Game Console Hardware Hacking (Xbox, Playstation, Nintendo, Atari And Gamepark 32)

Godina:
2004
Jezik:
english
Fajl:
PDF, 22.75 MB
0 / 0
english, 2004
27
Android Forensics: Investigation, Analysis and Mobile Security for Google Android

Android Forensics: Investigation, Analysis and Mobile Security for Google Android

Godina:
2011
Jezik:
english
Fajl:
PDF, 39.01 MB
0 / 4.0
english, 2011
28
How to Define and Build an Effective Cyber Threat Intelligence Capability

How to Define and Build an Effective Cyber Threat Intelligence Capability

Godina:
2014
Jezik:
english
Fajl:
PDF, 3.33 MB
4.0 / 4.0
english, 2014
31
Ninja Hacking: Unconventional Penetration Testing Tactics and Techniques

Ninja Hacking: Unconventional Penetration Testing Tactics and Techniques

Godina:
2010
Jezik:
english
Fajl:
PDF, 9.85 MB
0 / 0
english, 2010
34
Metrics and Methods for Security Risk Management

Metrics and Methods for Security Risk Management

Godina:
2010
Jezik:
english
Fajl:
PDF, 6.15 MB
0 / 0
english, 2010
35
Essential Skills for Hackers

Essential Skills for Hackers

Godina:
2016
Jezik:
english
Fajl:
PDF, 6.09 MB
5.0 / 3.0
english, 2016
36
Managed Code Rootkits: Hooking into Runtime Environments

Managed Code Rootkits: Hooking into Runtime Environments

Godina:
2010
Jezik:
english
Fajl:
PDF, 5.56 MB
5.0 / 5.0
english, 2010
38
Simple Steps to Data Encryption: A Practical Guide to Secure Computing

Simple Steps to Data Encryption: A Practical Guide to Secure Computing

Godina:
2013
Jezik:
english
Fajl:
PDF, 6.57 MB
0 / 5.0
english, 2013
39
Google Hacking for Penetration Testers, Volume 2

Google Hacking for Penetration Testers, Volume 2

Godina:
2007
Jezik:
english
Fajl:
PDF, 15.27 MB
0 / 0
english, 2007
40
Hiding behind the keyboard : uncovering covert communication methods with forensic analysis

Hiding behind the keyboard : uncovering covert communication methods with forensic analysis

Godina:
2016
Jezik:
english
Fajl:
PDF, 29.64 MB
0 / 0
english, 2016
41
Scripting VMware: Power Tools for Automating Virtual Infrastructure Administration

Scripting VMware: Power Tools for Automating Virtual Infrastructure Administration

Godina:
2007
Jezik:
english
Fajl:
PDF, 5.01 MB
0 / 0
english, 2007
42
Penetration Tester’s Open Source Toolkit

Penetration Tester’s Open Source Toolkit

Godina:
2016
Jezik:
english
Fajl:
PDF, 30.45 MB
0 / 5.0
english, 2016
43
Business Continuity and Disaster Recovery Planning for IT Professionals

Business Continuity and Disaster Recovery Planning for IT Professionals

Godina:
2007
Jezik:
english
Fajl:
PDF, 5.73 MB
0 / 0
english, 2007
44
Perfect Passwords: Selection, Protection, Authentication

Perfect Passwords: Selection, Protection, Authentication

Godina:
2005
Jezik:
english
Fajl:
PDF, 1.80 MB
0 / 0
english, 2005
45
Identity and Access Management: Business Performance Through Connected Intelligence

Identity and Access Management: Business Performance Through Connected Intelligence

Godina:
2013
Jezik:
english
Fajl:
PDF, 165.70 MB
0 / 0
english, 2013
47
Hack Proofing Your Wireless Network

Hack Proofing Your Wireless Network

Godina:
2002
Jezik:
english
Fajl:
PDF, 5.94 MB
0 / 0
english, 2002
48
Applied Cyber Security and the Smart Grid: Implementing Security Controls into the Modern Power Infrastructure

Applied Cyber Security and the Smart Grid: Implementing Security Controls into the Modern Power Infrastructure

Godina:
2013
Jezik:
english
Fajl:
PDF, 9.22 MB
4.0 / 4.5
english, 2013
49
No Tech Hacking: A Guide to Social Engineering, Dumpster Diving, and Shoulder Surfing

No Tech Hacking: A Guide to Social Engineering, Dumpster Diving, and Shoulder Surfing

Godina:
2008
Jezik:
english
Fajl:
EPUB, 8.56 MB
0 / 0
english, 2008
50
Developer's Guide to Web Application Security

Developer's Guide to Web Application Security

Godina:
2007
Jezik:
english
Fajl:
PDF, 10.91 MB
0 / 0
english, 2007