Книги по взлому, безопасности, сетям, Wap

fiksik

Founder
Свой / Own
Регистрация
20.11.2003
Сообщения
1 611
Реакции
1 704
Баллы
113
В этой теме будем размещать книги по взлому, безопасности, сетям, WAP....
Вообщем если есть книги по криптографии, различным хакам то все кидаем сюда...


--------------------------------------

Ссылки не личить и нигде больше не выкладывать!
Хотите поделиться с кем-то книгами дайте список книг и ссылку на эту тему:



И не более!
P.S. Если кто-нибудь увидит где-нибудь прямые ссылки на скачку большая просьба сообщать мне или любому из супермодераторов,
спасибо!

-----------------------

Большое всем спасибо за теплые слова благодарности, но согласно пункту III/15 общих правил, прошу воздержаться от постов в одно- три слова("спасибо", "биг респект" и т.п).
Пишите такие сообщения, чтобы и другие смогли прочесть что-то полезное для себя(как работает, читается, где еще есть книги по теме и т.п.).
Посты не несущие (для всех) смысловой нагрузки- очень засоряют темы(до линков не добраться) и поэтому они будут удаляться, так что без обид...

----
III/15. Создание сообщений типа "спасибо", "thanks" и т.п. категорически НЕ рекомендуется, для выражения благодарности есть служба личных сообщений(ЛС ака личка), специальный ТОПИК [ , репутация и банеры внизу страницы .
Последний вариант приветствуется особо и этим Вы действительно нас благодарите...
 
Последнее редактирование модератором:
U

uuh

Guest
Ну вообщем страшновато, конечно, сюда что-либо постить. Ведь этот топик не просто так пустует. Он, скорее всего со смыслом пустует. Ну да ладно.
Книга не совсем хакерская, но зато автор книги самый расхакерский хакер.

The Art of Deception: Controlling the Human Element of Security
Kevin D. Mitnick, William L. Simon, Steve Wozniak (Foreword by)
368 pages
pdf
5,19 Mb
October 2002

_webfile.ru/78705 в течение 7 дней до 18:56 29.10.2004
 
M

Mattew

Guest
wl.jpg


Publisher : O'Reilly
Pub Date : September 2003
ISBN : 0-596-00559-8
Pages : 304


Written for the intermediate to advanced wireless user, Wireless Hacks is full of direct, ractical, ingenious solutions to real-world networking problems. Whether your wireless network needs to extend to the edge of your office or to the other end of town, this collection of non-obvious, "from the field" techniques will show you how to get the job done...

[4.0mb]

_http://matriks.info/OReilly.-.Wireless.Hacks.100.Industrial.-.Strength.Tips.and.Tools.rar
 

is-in

Member
Регистрация
23.09.2004
Сообщения
64
Реакции
3
Баллы
8
Возраст
42
У мну есть архивчик со взора за пол года книг который там вылазмлм может что то надо ? Если да то могу пожделится, только куда и как ?
 

neoplan

Member
Регистрация
28.01.2004
Сообщения
65
Реакции
1
Баллы
8
Возраст
43
Местоположение
Spb
А может список для начала?
 

WWWovan

New member
Регистрация
30.10.2004
Сообщения
27
Реакции
0
Баллы
1
Возраст
41
Местоположение
Київ, Україна
А есть книги на эту тему на русском языке? У меня несколько имееться....Хотелось бы еще
 
Последнее редактирование модератором:
H

h0ma

Guest
WWWovan,
а какие книги у тебя на русском, списочек можеш выложить?
 

karpinskiy1

Active member
Регистрация
23.02.2004
Сообщения
283
Реакции
89
Баллы
28
Возраст
45
Вот KiN залил, pабираем:

Wireless Hacking: Projects For Wi-fi Enthusiasts
de Lee Barken, Eric Bermel, John Eder

193183637X.01.LZZZZZZZ.jpg

Product Details:
ISBN: 193183637X
Format: Paperback, 357pp
Pub. Date: October 2004
Размер электронной версии книги: 4,1 Мб

Product Description:
“Hardware Hacking” is not just a slogan--it’s a way of life for a huge group of technology enthusiasts who are mechanically inclined, but need that “extra little help” from a book in order to give them the confidence to roll up their sleeves and tackle a project. This book covers 802.11a/b/g (“Wi-Fi”) projects. In addition, it covers techniques for building outdoor enclosures and working with Linux and BSD to build, deploy, and manage wireless networks. All of the authors are members of the SoCalFreeNet Wireless Users Group, a group of technology enthusiasts dedicated to building and exploring community based wireless networks to enable widespread broadband adoption and create an empowered, connected society. They are experts in this field, with real-world experience, and hands-on knowledge.
The book includes coverage of: Wireless Hacking, Indoor/Outdoor Deployment Considerations, Wireless Network Models, 802.11 Access Points, 802.11 Client Cards, Wireless Operating Systems, Monitoring the Network, Low-Cost Commercial Options, Mesh Networks, Antennas and Outdoor Enclosure Projects, Antennas, Building Outdoor Enclosures & Antenna Masts, Solar Powered Access Points and Repeaters and Other Wireless Projects.

.[Netz.Ru].rar
 
Последнее редактирование модератором:
X

-=xwx=-

Guest
ктото может выложить на другой сервак please...
 

karpinskiy1

Active member
Регистрация
23.02.2004
Сообщения
283
Реакции
89
Баллы
28
Возраст
45
Network Security Foundations
by Matthew Strebe

0782143741.01._SCLZZZZZZZ_.jpg

Product Details:
Paperback: 315 pages
Publisher: Sybex Inc (September 5, 2004)
ISBN: 0782143741
Product Dimensions: 9.0 x 7.4 x 0.8 inches
Размер электронной версии книги: 4,3 Мб
Product Description:
Anyone embarking on a career in IT security can benefit from a firm understanding of common security threats and the technologies used to counter them. Network Security Foundations assumes no prior knowledge of the subject and provides a solid introduction to the major issues involved, explaining the essentials of network security in simple terms with tangible examples. Aspiring IT security professionals will enjoy this book's straightforward approach and abundance of valuable information. Turn here to acquire the technology fundamentals for IT success.
Забираем: .[Netz.Ru].rar
 
Последнее редактирование модератором:

pns11

New member
Регистрация
26.07.2004
Сообщения
4
Реакции
0
Баллы
1
Возраст
54
Ренаме тхе линк фор Нетwорк Сецуриты фоундатионс *фтп://фтп.нетз.ру/Боокс/сец/Боокс.Нетwорк.Сецуриты.Фоундатионс.[Netz.Ru].рар

[ADDED=pns11]1106969522[/ADDED]
rename the link for Network security foundations _ftp://ftp.netz.ru/Books/sec/Books.Network.Security.Foundations.[Netz.Ru].rar
 
Последнее редактирование модератором:
G

goodman

Guest
I have upped it to=>
Код:
password=>J0hnG00dman
http://rapidshare.de/files-en/469927/1.rar.html
http://rapidshare.de/files-de/469927/1.rar.html
 

karpinskiy1

Active member
Регистрация
23.02.2004
Сообщения
283
Реакции
89
Баллы
28
Возраст
45
Книги от KiN_a:

1. Wi-Fi Toys: 15 Cool Wireless Projects for Home, Office, and Entertainment by Mike Outmesguine

0764558943.01._SCLZZZZZZZ_.jpg


Product Details:
Paperback: 408 pages
Publisher: John Wiley & Sons (June 21, 2004)
ISBN: 0764558943
Product Dimensions: 9.2 x 7.4 x 0.9 inches

Product Description:
This ultra-cool volume invites readers to tap into your inner geek and build seventeen ultra-cool wireless devices including a solar powered access point, a wireless picture frame that dynamically changes its own photos, and even a wireless car-to-car audio and video system
With a few simple tools, some off-the-shelf parts, and this book, readers will be creating wireless devices they never thought were possible-toys that certainly can't be found at the local computer store
Written by the cofounder and members of the Southern California Wireless Users Group, this book provides readers with hands-on instruction and insider tips and tricks from those who are on the bleeding edge of wireless technology
New addition to the ExtremeTech line of books-books for serious technophiles

Берем здесь:
 
Последнее редактирование модератором:
U

ursus

Guest
To: karpinsky1

Проверь, пожалуйста, "Smart Environments". Там внутри Rar'a битые zip файлы, которые отказываются распаковываться. Пробовал и в Linux и в Windows, все одно.
 

n0n

Active member
Регистрация
27.02.2004
Сообщения
197
Реакции
26
Баллы
28
Возраст
41
Местоположение
Курорты Краснодарского края
Network Security Bible

07645739771ku.jpg

Eric Cole, Ronald L. Krutz, James Conley
ISBN: 0-7645-7397-7
Paperback
694 pages
January 2005



  • A must for working network and security professionals as well as anyone in IS seeking to build competence in the increasingly important field of security
  • Written by three high-profile experts, including Eric Cole, an ex-CIA security guru who appears regularly on CNN and elsewhere in the media, and Ronald Krutz, a security pioneer who cowrote The CISSP Prep Guide and other security bestsellers
  • Covers everything from basic security principles and practices to the latest security threats and responses, including proven methods for diagnosing network vulnerabilities and insider secrets for boosting security effectiveness



Качаем

Размер 5,7 Мб

________________________________________________________________

Buffer Overflow Attacks:Detect, Exploit, Prevent

316web8dt.jpg


By James C. Foster, Foreword by Dave Aitel
520 pages
Size: 6x9



Will the Code You Write Today, Headline Tomorrow’s BugTraq Mail List?
Forensic investigations of notorious Internet attacks, such as the SQL Slammer and Blaster Worms, reveal buffer overflows to be the sophisticated hacker’s “vulnerability of choice.” These worms crippled the Internet and cost billions of dollars to clean up. Now, even more powerful and insidious threats have appeared in the form of “custom exploits.”

These one-time only exploits are custom crafted to attack your enterprise, making them even more difficult to detect and defend. No catchy names, no media coverage; just your own personal disaster.

James C. Foster’s Buffer Overflow Attacks clearly demonstrates that the only way to defend against the endless variety of buffer overflow attacks is to implement a comprehensive design, coding and test plan for all of your applications. From Dave Aitel’s Foreword through the last appendix, this is the only book dedicated exclusively to detecting, exploiting, and preventing buffer overflow attacks



Качаем

Размер 3 Мб
 
Последнее редактирование модератором:
D

Dracon

Guest
Network Security Bible
_http://rapidshare.de/files-en/645143/Network.Security.Bible.Jan.2005.rar.html
 
Последнее редактирование модератором:

TDA

New member
Регистрация
26.03.2004
Сообщения
6
Реакции
0
Баллы
1
Уже писалось, но если не трудно, перезалейте Interscience.Smart.Environments.Technology.Protocols.and.Applications.[Netz.Ru].rar. В нем ЗИПы битые...
 

andycpp

New member
Регистрация
29.11.2004
Сообщения
15
Реакции
0
Баллы
1
Возраст
45
Interscience.Smart.Environments.Technology.Protoco ls.and.Applications.[Netz.Ru].rar - битые ZIP'ы внутри. Афтар, пишы исчо!!
 

n0n

Active member
Регистрация
27.02.2004
Сообщения
197
Реакции
26
Баллы
28
Возраст
41
Местоположение
Курорты Краснодарского края
Перезалил
ftp://ftp.netz.ru/Books/sec/Wiley.Interscience.Smart.Environments.Technology.Protocols.and.Applications.Oct.2004(by.n0n_www.netz.ru).rar
 

n0n

Active member
Регистрация
27.02.2004
Сообщения
197
Реакции
26
Баллы
28
Возраст
41
Местоположение
Курорты Краснодарского края
Hacking a Terror Network: The Silent Threat of Covert Channels
By Russ Rogers, Matthew G. Devost

314web2qx.jpg



Price: $39.95
448 pages
Size: 7 x 9.1875



“Hacking a Terror Network provides accurate technical detail in an intriguing fictional format. You will not want to put the book down and when you are done you will be amazed with how much you have learned.”— Dr. Eric Cole, Chief Scientist of The Sytex Group, Inc.

“Russ has done it again, a great story teller in person and from the printed page. The bad news is, this is not just another story, it is the cold frightening and exacting truth about the world that we now live in … everyday” –Chet Hosmer, CEO, WetStone Technologies, Inc.



Written by a certified Arabic linguist from the Defense Language Institute with extensive background in decoding encrypted communications, this cyber-thriller uses a fictional narrative to provide a fascinating and realistic "insiders look" into technically sophisticated covert terrorist communications over the Internet. The accompanying CD allows readers to "hack along" with the story line, by viewing the same Web sites described in the book containing encrypted, covert communications.

An American agent works with allies to discover the intent of a mysterious plot. Potential terrorist planning activities are hidden everywhere, but remain unseen. Only with the use of the most modern of technology and a little help from watchful citizens is there a chance to uncover the plot before someone gets hurt. As the terrorist break new ground in covert communication, agents must stretch their intelligence and imagination to understand how the terrorists are working together, who is in charge, and what the targets are.

Follow along with American agents by examining real covert communication, captured and stored on the included CDROM as this fictional story takes place. Browse the same websites used by the terrorists and examine the same images that could hold the key to saving the lives of thousands of people. Learn to see the hidden messages inside the Covert Channels used by the terrorists to plan their attacks.



Подробнее



Качаем
ftp://ftp.netz.ru/Books/sec/Syngress.Hacking.a.Terror.Network.Nov.2004(by.n0n_www.netz.ru).rar
5,5 Mb
Если в линке появляются пробелы (%20) смело их удаляем.
 
Последнее редактирование модератором:

n0n

Active member
Регистрация
27.02.2004
Сообщения
197
Реакции
26
Баллы
28
Возраст
41
Местоположение
Курорты Краснодарского края
Advanced Wired and Wireless Networks
by Wysocki, Tadeusz A.; Dadej, Arek; Wysocki, Beata J. (Eds.)

0,11963,0-0-16-125472-0,00.jpg


Series: Multimedia Systems and Applications, Vol. 26
2004, IX, 270 p., Hardcover
ISBN: 0-387-22781-4


ADVANCED WIRED AND WIRELESS NETWORKS brings the reader a sample of recent research efforts representative of advances in the areas of recognized importance for the future Internet, such as ad hoc networking, mobility support and performance improvements in advanced networks and protocols.

In Part I, we bring ad-hoc networking closer to the reality of practical use. The focus is on more advanced scalable routing suitable for large networks, directed flooding useful in information dissemination networks, as well as self-configuration and security issues important in practical deployments. Part II illustrates the efforts towards development of advanced mobility support techniques (beyond traditional "mobile phone net") and Mobile IP technologies. The issues range from prediction based mobility support, through context transfer during Mobile IP handoff, to service provisioning platforms for heterogeneous networks. The focus of the final section concerns the performance of networks and protocols. Furthermore this section illustrates researchers’ interest in protocol enhancement requests for improved performance with advanced networks, reliable and efficient multicast methods in unreliable networks, and composite scheduling in programmable/active networks where computing resources equal network performance as transmission bandwidth.

ADVANCED WIRED AND WIRELESS NETWORKS is structured to meet the needs of a professional audience in industry, as well as graduate-level students in computer science and engineering.


Written for:
Professional audience in industry, graduate-level students in Computer Science and Engineering


Подробнее


Содержание


Качаем
ftp://ftp.netz.ru/Books/net/Springer.Advanced.Wired.and.Wireless.Networks(by.n0n_www.netz.ru).rar
7,5 Мб


[ADDED=n0n]1109627122[/ADDED]
Advances in Security and Payment Methods for Mobile Commerce
by Wen-Chen Hu , Chung-wei Lee , Weidong Kou; University of North Dakota, USA; Auburn University, USA; Xidian University, USA

1591403456-hu-thumbnail.jpg


Our Price: $80.96 US List Price: $89.95
ISBN:1-59140-345-6
Imprint:IGP
Number of pages:Hard Cover; 351 pages
Copyright:2005


Recently, the emergence of wireless and mobile networks has made possible the admission of electronic commerce to a new application and research subject: mobile commerce, defined as the exchange or buying and selling of commodities, services, or information on the Internet through the use of mobile handheld devices. In just a few years, mobile commerce has emerged from nowhere to become the hottest new trend in business transactions. However, the prosperity and popularity of mobile commerce will be brought to a higher level only if information is securely and safely exchanged among end systems (mobile users and content providers). Advances in Security and Payment Methods for Mobile Commerce includes high-quality research papers and industrial and practice articles in the areas of mobile commerce security and payment from academics and industrialists. It covers research and development results of lasting significance in the theory, design, implementation, analysis, and application of mobile commerce security and payment.

Подробнее


Содержание


Качаем
ftp://ftp.netz.ru/Books/sec/Idea.Group.Publishing.Advances.in.Security.and.Payment.Methods.for.Mobile.Commerce(by.n0n_www.netz.ru).rar
4,4 Мб
 
Последнее редактирование модератором:

n0n

Active member
Регистрация
27.02.2004
Сообщения
197
Реакции
26
Баллы
28
Возраст
41
Местоположение
Курорты Краснодарского края
3G Handset and Network Design

3G Handset and Network Design
by Geoff Varrall, Roger Belcher

3ghandsetandnetworkdesi1uw.gif


Paperback: 532 pages
Publisher: Wiley (February 21, 2003)
ISBN: 0471229369
Product Dimensions: 9.3 x 7.4 x 1.2 inches


Book Info
Written for hardware and software engineers, this hands-on guide shows you how to integrate handheld devices and cell phones with wireless network hardware and software. Softcover.

Product Description:
  • Third Generation (3G) wireless networks are in the works in Europe and Asia, and 2.5G networks that incorporate some 3G features are being rolled out in the United States
  • Hands-on guide to integrating cell phone or PDA/portable PC products with present and future wireless network hardware
  • Addresses topics such as quality of service (QoS) and service level agreements (SLAs) from a wireless perspective
  • Presents an in-depth review of both handset and network hardware and software


Подробнее


Качаем

6 Mb
 
Последнее редактирование модератором:

n0n

Active member
Регистрация
27.02.2004
Сообщения
197
Реакции
26
Баллы
28
Возраст
41
Местоположение
Курорты Краснодарского края
Home Networking Bible
by Sue Plumley

homenetworkingbible5da.gif



Paperback: 765 pages
Publisher: John Wiley & Sons; 2 edition (February 9, 2004)
ISBN: 0764544160
Product Dimensions: 9.2 x 7.3 x 1.7 inches
Shipping Weight: 2.6 pounds.



Book Info
Designed to help home networkers plan and prepare for networks, purchase the appropriate equipment and software, install the networking equipment, and make it work with Windows 95 or 98. Softcover. --This text refers to an out of print or unavailable edition of this title.

Product Description:
Everything you need to know to set up a home network

Is a home network for you? This comprehensive guide covers everything from deciding what type of network meets your needs to setting up the hardware and software, connecting different operating systems, installing the necessary applications, managing the network, and even adding home entertainment devices. Fully updated with new material on all the latest systems and methods, it·s just what you need to set up your network and keep it running safely and successfully.

Inside, you·ll find complete coverage of home networking
  • Compare the advantages and disadvantages of wired and wireless networks
  • Understand how to choose between workgroup and client/server networking
  • Learn how to install and set up cables and routers and how to install and configure networking software
  • Share files, printers, and a single Internet connection
  • Back up files and secure your network
  • Set up your own home intranet and understand the technologies involved in creating a Web page
  • Manage your network and learn to use tools for locating and repairing problems
  • Expand your home network to include your digital camera, scanner, TV, sound system, and even game consoles
  • Explore SmartHome technology that allows you to automate various household functions
  • Investigate how your network can enable tele-commuting and other remote access capabilities


Подробнее


Качаем

5.3 Mb
 
  • Like
Реакции: Slu

.ifZ!

Member
Регистрация
03.10.2004
Сообщения
52
Реакции
0
Баллы
6
Возраст
35
Hacker Secret Book __http://barnov.ath.cx/books/security/Hacker%20Secret%20Book.pdf
 
197 138Темы
634 108Сообщения
3 618 349Пользователи
bullj5112Новый пользователь
Верх