Ethical Hacking eBooks

  • Hacking GPS
    Hacking GPS

    Hacking GPS shows you how to get more out of owning a GPS receiver. Written with the Extreme Technology community in mind, this book shows you how to do a variety of different things with your receiver:-
    — Build custom cabling
    — Protecting your GPS from the elements
    — Connecting your GPS to a PC or PDA
    — Build and mount external antennas
    — Load new, modified, firmware onto your device
    — Access secret diagnostic screens and test utilities
    — GPS games & much more...
    If you've got a GPS and you want to be able to make the most of it then this is the book for you!

    Download 8.50 MB
  • The Oracle Hacker's Handbook
    The Oracle Hacker's Handbook

    While Oracle continues to improve the security features of its product, it still has a long way to go. David Litchfield has devoted years to relentlessly searching out the flaws in this ubiquitous database system and creating defenses against them. Now he offers you his complete arsenal to assess and defend your own Oracle systems. This in-depth guide explores every technique and tool used by black hat hackers to invade and compromise Oracle. It shows you how to find the weak spots and defend them. Without that knowledge, you have little chance of keeping your databases truly secure. Discover how to deal with the security flaws revealed in the Oracle RDBMS. Explore some never-before-published forays into Oracle security holes and learn to defend them from attack.

    Download 480 KB
  • Security and Cryptography for Networks
    Security and Cryptography for Networks

    6th International Conference, SCN 2008, Amalfi, Italy, September 10-12, 2008, Proceedings
    Editors: Rafail Ostrovsky, Roberto De Prisco and Ivan Visconti
    Hardcover: 423 pages
    Publisher: Springer; 1 edition (September 1, 2008)
    Language: English
    ISBN-10: 3540858547
    ISBN-13: 978-3540858546
    Format: pdf
    This book constitutes the refereed proceedings of the 6th International Conference on Security and Cryptology for Networks, SCN 2008, held in Amalfi, Italy, in September 2008.

    Download 4.86 MB
  • The Shellcoder's Handbook
    The Shellcoder's Handbook

    The Shellcoder's Handbook, discovering and exploiting security holes is the second edition. It covers introduction to exploitation: linux on x86 contains stack overflows, shellcodes, format string bugs, heap overflows. Also for windows platform and solaris exploitation too. OS X shellcode, cisco ios exploitaion, unix kernel overflows, windows kernel hacking, protection mechnism and much more...

    Download 2.98 MB