Ethical Hacking eBooks
Hacking GPS shows you how to get more out of owning a GPS receiver. Written with the Extreme Technology community in mind, this book shows you how to do a variety of different things with your receiver:-Download 8.50 MB
— Build custom cabling
— Protecting your GPS from the elements
— Connecting your GPS to a PC or PDA
— Build and mount external antennas
— Load new, modified, firmware onto your device
— Access secret diagnostic screens and test utilities
— GPS games & much more...
If you've got a GPS and you want to be able to make the most of it then this is the book for you!
The Oracle Hacker's Handbook
While Oracle continues to improve the security features of its product, it still has a long way to go. David Litchfield has devoted years to relentlessly searching out the flaws in this ubiquitous database system and creating defenses against them. Now he offers you his complete arsenal to assess and defend your own Oracle systems. This in-depth guide explores every technique and tool used by black hat hackers to invade and compromise Oracle. It shows you how to find the weak spots and defend them. Without that knowledge, you have little chance of keeping your databases truly secure. Discover how to deal with the security flaws revealed in the Oracle RDBMS. Explore some never-before-published forays into Oracle security holes and learn to defend them from attack.Download 480 KB
Security and Cryptography for Networks
6th International Conference, SCN 2008, Amalfi, Italy, September 10-12, 2008, ProceedingsDownload 4.86 MB
Editors: Rafail Ostrovsky, Roberto De Prisco and Ivan Visconti
Hardcover: 423 pages
Publisher: Springer; 1 edition (September 1, 2008)
This book constitutes the refereed proceedings of the 6th International Conference on Security and Cryptology for Networks, SCN 2008, held in Amalfi, Italy, in September 2008.
The Shellcoder's Handbook
The Shellcoder's Handbook, discovering and exploiting security holes is the second edition. It covers introduction to exploitation: linux on x86 contains stack overflows, shellcodes, format string bugs, heap overflows. Also for windows platform and solaris exploitation too. OS X shellcode, cisco ios exploitaion, unix kernel overflows, windows kernel hacking, protection mechnism and much more...Download 2.98 MB