Anti-armenia.ORG - Forumlar - Best 5 Hacking Kitabları



Istifadəçi
    2011-12-08 13:17 GMT                 

Ferid23



Admin
Mesaj Sayı : 1875
Mövzu Sayı :
Rep Ver : 
Rep Sayı :   45  
Indi Saytda : Durum
Cinsiyyət : Oğlan
Şəhər : Anti-armenia.ORG
Ölkə :
Məslək : Programmer & Defacer
Yaş : 12
Mesaj :

Mövzunu Paylaş!


Sizlərə Dünya üzərində 5 ən məhşur hacking kitablarını təqdim edirəm.. Nəzərə çatdırım ki kitablar ingilis dilindədir..Əgər bir az ingilis diliniz varsa bu kitbaları oxumaq sizin üçün bu virtual aləmdə çoxşeyin dəyişəcəyini görəcəksiniz.

http://img151.imageshack.us/img151/9008/image1rz.jpg



Hacking Exposed-5

One of the international best-selling. The book walks through how to use the more powerful and popular hacker software, including L0phtCrack. This new edition has been updated extensively, largely with the results of "honeypot" exercises (in which attacks on sacrificial machines are monitored) and Windows 2000 public security trials. There's a lot of new stuff on e-mail worms, distributed denial-of-service (DDoS) attacks, and attacks that involve routing protocols. Hacking Exposed wastes no time in explaining how to implement the countermeasures--where they exist--that will render known attacks ineffective.


http://rapidshare.com/files/419104326/hacking_exposed_5_www.cyberarmy.in.rar.htm
--------------------------------------
Hack Attacks Testing

A network security breach (a hack, crack, or other invasion) occurs when unauthorized access to the network is achieved and havoc results. The best possible defense is an offensive strategy that allows you to regularly test your network to reveal the vulnerabilities and close the holes before someone gets in. Written by veteran author and security expert John Chirillo, Hack Attacks Testing explains how to perform your own security audits.

http://rapidshare.com/files/419103729/hack_attacks_testing_www.cyberarmy.in.rar.html
--------------------------------------
Secrets Of A Super Hacker

:-- Here is the most amazing book ever published on computer hacking. Step-by-Step illustrated details on the techniques used by hackers to get your data including :- Guessing Passwords, Stealing Passwords, Password Lists, Social Engineering, Reverse Social Engineering, Crashing Electronic Bulletin Boards, Dummy Screens, Fake E-mail, Trojan Horses, Viruses, Worms, Trap Doors, And Much more. Anyone concerned with computer security and data privacy needs to read this book.

http://rapidshare.com/files/419103378/secrets_of_super_hacker_www.cyberarmy.in.rar.htm
--------------------------------------
Stealing The Network

How to Own a Shadow is the final book in Syngress ground breaking, best-selling, Stealing the Network series. As with previous title, How to Own a Shadow is a fictional story that demonstrates accurate, highly detailed scenarios of computer intrusions and counter-strikes. Readers will be amazed at how Knuth, Law Enforcement, and Organized crime twist and torque everything from game stations, printers and fax machines to service provider class switches and routers steal, deceive, and obfuscate. From physical security to open source information gathering, Stealing the Network: How to Own a Shadow will entertain and educate the reader on every page. The books companion Web site will also provide special, behind-the-scenes details and hacks for the reader to join in the chase for Knuth.

http://rapidshare.com/files/419103902/stealing_network_how_to_own_shadow_www.cyberarmy.in.rar.html
--------------------------------------
Hacker's HandBook

This book is a practical guide to discovering and exploiting security flaws in web applications. The authors explain each category of vulnerability using real-world examples, screen shots and code extracts. The book is extremely practical in focus, and describes in detail the steps involved in detecting and exploiting each kind of security weakness found within a variety of applications such as online banking, e-commerce and other web applications. The topics covered include bypassing login mechanisms, injecting code, exploiting logic flaws and compromising other users. This handbook describes a proven methodology that combines the virtues of human intelligence and computerized brute force, often with devastating results.

http://rapidshare.com/files/419104756/webapp_hackers_handbook_www.cyberarmy.in.rar.html

AZ Domaini İhbar Hattı (Azərbaycan saytlarında olan boşluqları bizə bildirin): http://anti-armenia.org/forums.php?m=posts&q=572
Qaydalar (Saytın qayda-qanunlarını oxuyaraq əməl edin)
Anti-armenia.ORG
    

Istifadəçi
    2011-12-08 13:36 GMT                 

VusaL_R



Banned
Mesaj Sayı : 86
Mövzu Sayı :
Rep Ver : 
Rep Sayı :   0  
Indi Saytda : Durum
Cinsiyyət : Oğlan
Şəhər :
Ölkə :
Məslək :
Yaş : 31
Mesaj :

Mövzunu Paylaş!


tesekkurler

Anti-armenia.ORG
    

Istifadəçi
    2011-12-09 15:37 GMT                 

Mr.OpiL



Banned
Mesaj Sayı : 149
Mövzu Sayı :
Rep Ver : 
Rep Sayı :   2  
Indi Saytda : Durum
Cinsiyyət : Oğlan
Şəhər :
Ölkə :
Məslək :
Yaş : 25
Mesaj :

Mövzunu Paylaş!


tewekkurler... oxuyacam 1ni

Anti-armenia.ORG