Книги по взлому, безопасности, сетям, Wap

n0n

Active member
Регистрация
27.02.2004
Сообщения
197
Реакции
26
Баллы
28
Возраст
41
Местоположение
Курорты Краснодарского края
Apache Security

Apache Security
by IVAN RISTIC

coverlow9pj.jpg


Paperback: 432 pages
Publisher: O'Reilly & Associates (March 15, 2005)
ISBN: 0596007248
Product Dimensions: 9.4 x 7.0 x 1.1 inches
Shipping Weight: 1.5 pounds.


___________________________________


Product Description:
With more than 67% of web servers running Apache, it is by far the most widely used web server platform in the world. Apache has evolved into a powerful system that easily rivals other HTTP servers in terms of functionality, efficiency, and speed. Despite these impressive capabilities, though, Apache is only a beneficial tool if it's a secure one. To be sure, administrators installing and configuring Apache still need a sure-fire way to secure it--whether it's running a huge e-commerce operation, corporate intranet, or just a small hobby site. Our new guide, Apache Security, gives administrators and webmasters just what they crave--a comprehensive security source for Apache. Successfully combining Apache administration and web security topics, Apache Security speaks to nearly everyone in the field. What's more, it offers a concise introduction to the theory of securing Apache, as well as a broad perspective on server security in general. But this book isn't just about theory. The real strength of Apache Security lies in its wealth of interesting and practical advice, with many real-life examples and solutions. Administrators and programmers will learn how to:
  • install and configure Apache
  • prevent denial of service (DoS) and other attacks
  • securely share servers
  • control logging and monitoring
  • secure custom-written web applications
  • conduct a web security assessment
  • use mod_security and other security-related modules
And that's just the tip of the iceberg, as mainstream Apache users will also gain valuable information on PHP and SSL/ TLS. Clearly, Apache Security is packed and to the point, with plenty of details for locking down this extremely popular and versatile web server.


Подробнее:


Качаем:

1,6 Мб


__________________________________

Внимание! Какдый, кто напишет, что книга не качается, получит 5 штрафных баллов! Все ссылки, которые начинаются с рабочие! Единственное, что может случиться, так это ошибка, возникающая из-за того, что на нашём ftp стоит ограничение в 330 пользователей, которые могут одновременно скачивать файлы с нашего сервера. Эта ошибка есть сообщение о том, что необходимо ввести пароль. Так что, возможно, придётся немного подождать. Есть ещё ограничение на листинг директорий под анонимным пользователем. А так, как почти все ftp-клиенты по умолчанию перед тем, как качать, сначала делают листниг директории для проверки наличия файла, то возникает 550-ая ошибка. Используем обычные качалки типа FlashGet.
 

n0n

Active member
Регистрация
27.02.2004
Сообщения
197
Реакции
26
Баллы
28
Возраст
41
Местоположение
Курорты Краснодарского края
Linux Network Administrator's Guide (3rd Edition)
by Tony Bautts, Terry Dawson, Gregor N. Purdy

coverlow0gc.jpg


Paperback: 338 pages
Publisher: O'Reilly & Associates; 3rd edition (February 4, 2005)
ISBN: 0596005482
Product Dimensions: 9.4 x 7.1 x 0.9 inches
Shipping Weight: 1.3 pounds


Product Description:
The Linux Network Administrator's Guide, Third Edition dispenses all the practical advice you need to join a network. Along with some hardware considerations, this highly acclaimed guide takes an in-depth look at all of the essential networking software that comes with the operating system--including basic infrastructure (TCP/IP, wireless networking, firewalling) and the most popular services on Linux systems. But as the follow-up to a classic, the third edition of the Linux Network Administrator's Guide does more than just spruce up the basics. It also provides the very latest information on the following cutting-edge services:
  • Wireless hubs
  • OpenLDAP
  • FreeS/WAN
  • IMAP
  • Spam filtering
  • OpenSSH
  • BIND
  • IPv6
Featuring a litany of insider tips and techniques, the Linux Network Administrator's Guide, Third Edition is an invaluable companion for any network administrator interested in integrating Linux into their Windows environment Authored by Terry Dawson, Tony Bautts, and Gregor N. Purdy, the Linux Network Administrator's Guide, Third Edition emerged from the Linux Documentation Project (LDP). The LDP's goal is to centralize all of the issues of Linux documentation, ranging from online documentation topics such as installing, using, and running Linux.


Подробнее


Качаем

1.1 MB


___________________________________

Внимание! Какдый, кто напишет, что книга не качается, получит 5 штрафных баллов! Все ссылки, которые начинаются с рабочие! Единственное, что может случиться, так это ошибка, возникающая из-за того, что на нашём ftp стоит ограничение в 330 пользователей, которые могут одновременно скачивать файлы с нашего сервера. Эта ошибка есть сообщение о том, что необходимо ввести пароль. Так что, возможно, придётся немного подождать. Есть ещё ограничение на листинг директорий под анонимным пользователем. А так, как почти все ftp-клиенты по умолчанию перед тем, как качать, сначала делают листниг директории для проверки наличия файла, то возникает 550-ая ошибка. Используем обычные качалки типа FlashGet.
 
Последнее редактирование модератором:
R

Rexx72

Guest
oops... (кровопролитные кнопки будут всем греком к мне.... hehehe) смогло кто-то уничтожить это для меня.

oops... (bloody buttons are all greek to me.... hehehe) could someone delete this for me.
 
Последнее редактирование модератором:
R

Rexx72

Guest
Mattew сказал(а):
wl.jpg


Publisher : O'Reilly
Pub Date : September 2003
ISBN : 0-596-00559-8
Pages : 304


Written for the intermediate to advanced wireless user, Wireless Hacks is full of direct, ractical, ingenious solutions to real-world networking problems. Whether your wireless network needs to extend to the edge of your office or to the other end of town, this collection of non-obvious, "from the field" techniques will show you how to get the job done...

[4.0mb]

_http://matriks.info/OReilly.-.Wireless.Hacks.100.Industrial.-.Strength.Tips.and.Tools.rar

Hi уверено если anyones интересуемые но над соединением no longer не работают однако, то я нашел книгу на этой странице. И вся серия больше на радиотелеграфе. Извинения если это знанные ресурс и я топчет на someones, то toes. _ttp://www.wns.ru/library.html (переведено с babelfish.altavista.com)

Hi, Not sure if anyones interested but above link no longer works. however I did find the book on this page. And a whole lot more on Wireless. Apologies if this a known resource and I'm treading on someones toes. _ttp://www.wns.ru/library.html
 

pariman

ex-Team DUMPz
Регистрация
10.03.2004
Сообщения
1 718
Реакции
983
Баллы
113
Местоположение
Ukraine
Hack Attacks Revealed - A Complete Reference with Custom Security Hacking Toolkit
by John Chirillo

7tprzorjopjn5bd.jpg


Publisher: John Wiley & Sons, Inc.;
ISBN: B00005V5UF; (April 2001), : 960 pages
_http://rapidshare.de/files/1437523/HARACRWCS.zip.html

=======================

Hack Proofing Your E-Commerce

B00006929E.01._PE_PI_SCMZZZZZZZ_.jpg


Digital: 512 pages
Publisher: Syngress Publishing
ISBN: 1-928994-27-X
_http://rapidshare.de/files/1437579/HPYE-CS.zip.html

=======================

O'Reilly - IRC Hacks: 100 Industrial-Strength Tips and Tools
by Paul Mutton

059600687X.01._AA400_SCLZZZZZZZ_.jpg


ISBN: 0-596-00687-X,
432 Pages, July 2004.
_http://rapidshare.de/files/1437847/IRCH100ISTT.zip.html
 

pariman

ex-Team DUMPz
Регистрация
10.03.2004
Сообщения
1 718
Реакции
983
Баллы
113
Местоположение
Ukraine
GPRS for Mobile Internet

158053600X.01._AA400_SCLZZZZZZZ_.jpg


by Emmanuel Seurre, Patrick Savelli, Pierre-Jean Pietri.
ISBN: 1-58053-600-X,
438 Pages, January 2003.
_http://rapidshare.de/files/1425209/GPRSMI.zip.html
 

pariman

ex-Team DUMPz
Регистрация
10.03.2004
Сообщения
1 718
Реакции
983
Баллы
113
Местоположение
Ukraine
Absolute Beginner's Guide to Wi-Fi Wireless Networking
by Harold Davis

0789731150.01._PE32_SCMZZZZZZZ_.jpg


Publisher: Que
ISBN: 0-7897-3115-0,
312 Pages, April 2004

Book Description
WiFi is one of the fastest growing technologies of all time and everyone is interested in learning how to use it. This book makes all the information about WiFi, including the standards and protocols, and how they relate easy to understand. This book covers everything about WiFi, from what to look for how to set up a users computer with WiFi to finding hotspots and access points. Users will be able to configure a home network and share internet connections quickly and easily. And all important security issues are covered so that a user is less exposed to threats.

Download:
http://rapidshare.de/files/1422560/ABGWi-FiWN.zip.html
 

pariman

ex-Team DUMPz
Регистрация
10.03.2004
Сообщения
1 718
Реакции
983
Баллы
113
Местоположение
Ukraine
Computer Network & Internet Security
by Brett C. Tjaden

1887902635.01._SCLZZZZZZZ_.jpg


Paperback: 200 pages
Publisher: ABF Content; 1st edition (February 15, 2001)
ISBN: 1887902635

Download:
http://rapidshare.de/files/1424139/CN_IS.zip.html

=========================

Cyber Adversary Characterization: Auditing the Hacker Mind
by Tom Parker, Marcus Sachs, Eric Shaw, Ed Stroz, Matthew G. Devost.

1931836116.01._SCLZZZZZZZ_.jpg


Publisher: Syngress
ISBN: 1-931836-11-6,
356 Pages, June 2004.

Download:
http://rapidshare.de/files/1424178/CACAHM.zip.html
 
Последнее редактирование модератором:
V

vis81

Guest
3G/UMTS wanted

А есть у кого книги по 3g/umts?
 

tosa

New member
Регистрация
26.08.2005
Сообщения
7
Реакции
0
Баллы
1
Местоположение
msk
Помогите найти книгу (на любом языке):

RUS:
Скляров Д. Искусство защиты и взлома информации

ENG:
Dmitry Sklyarov. Hidden Keys to Software Break-Ins and Unauthorized Entry.

PLS!!!
 

okun

Well-known member
Свой / Own
Регистрация
03.05.2005
Сообщения
2 045
Реакции
2 975
Баллы
113
Местоположение
evergreen forest (wonderland)
Honeypots for Windows

1590593359.01.lzzzzzzz.jpg


Roger A. Grimes
ISBN 1590593359

The Book will cover installing, configuring, and maintaining security Honeypots on Windows platforms. The Book will specifically cover the popular open source Honeypot product called honeyd, and summarize other commercial Honeypot solutions. There are no computer security books covering Honeypots (or IDSs) as they run on Windows platforms.

If you're a developer who's tired of reading Unix and Linux documentation and newsgroup letters to get information on building and maintaining a Windows-based Honeypot, then this book is for you. No longer will you have to rummage through Unix-only advice and utilities to extract information relevant to your Windows deployment. This insightful guide will teach you special tricks and provide troubleshooting tips to help you efficiently run and maintain a Windows-based Honeypot.

Target audience: Windows network and security administrators; intrusion detection software users; subscribers to Honeypot mailing list; readers of other author’s Honeypot books - all are very Unix-centric.

. (16821460 Bytes) netz.ru
 

okun

Well-known member
Свой / Own
Регистрация
03.05.2005
Сообщения
2 045
Реакции
2 975
Баллы
113
Местоположение
evergreen forest (wonderland)
Network Security Tools
By Justin Clarke, Nitesh Dhanjani

nst4da.jpg


Publisher: O'Reilly
Pub Date: April 2005
ISBN: 0-596-00794-9
Pages: 352

This concise, high-end guide shows experienced administrators how to customize and extend popular open source security tools such as Nikto, Ettercap, and Nessus. It also addresses port scanners, packet injectors, network sniffers, and web assessment tools. Network Security Tools is the one resource you want at your side when locking down your network.

. (1344564 Bytes) netz.ru
 

piatak

New member
Регистрация
09.12.2005
Сообщения
18
Реакции
1
Баллы
3
Местоположение
yug zone
karpinskiy1 сказал(а):
Вот KiN залил, pабираем:

KIN, какими правами нужно обладать что-бы скачивать?

сорри поспешил, Эта ошибка есть сообщение о том, что необходимо ввести пароль.
 
Последнее редактирование модератором:

MOCKuT

Well-known member
Регистрация
26.11.2003
Сообщения
795
Реакции
948
Баллы
93
Местоположение
Москва
Cryptography - An End-to-End Systems Approach to Elliptic Curve Cryptography.pdf
Cryptography - An Introduction To Cryptography.pdf
Cryptography - Block Ciphers And Cryptanalysis.pdf
Cryptography - Body of Secrets.pdf
Cryptography - CISSP Study Guide On Cryptography.pdf
Cryptography - Cloning and Cryptography with Quantum Continuous Variables.pdf
Cryptography - Codierungstheorie und Kryptographie.pdf
Cryptography - Coding and Cryptography.pdf
Cryptography - CRISIS - Cryptography's Role in Securing the Information Society.pdf
Cryptography - Cryptographic Token Interface Standard - RSA Labs.pdf
Cryptography - Cryptography And Data Security.pdf
Cryptography - Detecting Steganographic Content on the Internet.pdf
Cryptography - Einfuhrung in die Kryptographie.pdf
Cryptography - Elliptic Curves and Cryptography.pdf
Cryptography - Exposing Cryptovirology.pdf
Cryptography - Factoring Large Numbers with the TWIRL device.pdf
Cryptography - Foundations of Cryptography.pdf
Cryptography - GPG Crypto From Gnu Manual.pdf
Cryptography - Handbook Of Applied Cryptography (old).pdf
Cryptography - Handbook Of Applied Cryptography.pdf
Cryptography - High-Speed RSA Implementation.pdf
Cryptography - Informationstheorie Codierung und Kryptographie.pdf
Cryptography - Intro To Cryptography.pdf
Cryptography - Key Agreement and Key Transport Using Elliptic Curve Cryptography.pdf
Cryptography - Kryptologie - Eine Einfuhrung.pdf
Cryptography - Lecture Notes on Cryptography.pdf
Cryptography - New Encryption Technologies for Communications Designers.pdf
Cryptography - Number Theory An Related Alghoritm In Cryptography.pdf
Cryptography - Practical Cryptography.pdf
Cryptography - RAS Suggestion to Random Number Generation in Software.pdf
Cryptography - Rechtsfragen der Kryptographie und der digitalen Signatur.pdf
Cryptography - Report Advanced Cryptography Standard AES.pdf
Cryptography - RSA Encryption Algorithm in a Nut Shell.pdf
Cryptography - RSA Hardware Implementation.pdf
Cryptography - RSA Labs FAQ 4.0.pdf
Cryptography - tecCHANNEL - Kryptographie Grundlagen.pdf
Cryptography - Theory And Practice.pdf
Cryptography - Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems.pdf
Cryptography - Twenty Years of Attacks on the RSA Cryptosystem.pdf
Cryptography, C - Applied Cryptography 2nd Edition Protocols, Algorthms, And Source Code In C.pdf
Cryptography, Java - Introduction To Cryptography With Java Applets.pdf
Cryptography, Java - Java Cryptography.pdf

File size: 61.6 Mb
File ID: 6546909
Download Link:
 

z0id

Active member
Регистрация
18.04.2005
Сообщения
390
Реакции
171
Баллы
43
Возраст
38
Местоположение
Москва
Google Hacking for Penetration Testers
by Johnny Long, Ed Skoudis (Foreword), Alrik van Eijkelenborg (Editor)



Product Details:

Author: Johnny Long, Foreword by Ed Skoudis
Paperback: 528 pages
Publisher: Syngress; 1 edition (June 1, 2001)
Language: English
ISBN: 1931836361
Product Dimensions: 9.1 x 7.1 x 1.2 inches
Shipping Weight: 1.8 pounds.

Contents of this Book:

1. Google Searching Basics
2. Advanced Operators
3. Google Hacking Basics
4. Preassesssment
5. Network Mapping
6. Locating Exploits and Finding Targets
7. Ten Simple Security Searches That Work
8. Tracking Down Web Servers, Login Portals, and Network Hardware
9. Usernames, Passwords, and Secret Stuff, Oh My!
10. Document Grinding and Database Digging
11. Protecting Yourself from Google Hackers
12. Automating Google Searches
13. Professional Security Testing
14. An Introduction to Web Application Security

Format: PDF
(~10Mb)

 
Последнее редактирование модератором:

mrli

New member
Регистрация
12.03.2006
Сообщения
3
Реакции
1
Баллы
3
Возраст
43
Местоположение
Katmandu
Слезно разыскиваю, если видел кто или ухватить успел....
поделитесь porfavoure.... заклацаю "спасибами"

Title :Sockets, Shellcode, Porting, and Coding : Reverse Engineering Exploits and Tool Coding for Security Professionals
Publisher: Syngress; 1 edition (April 12, 2005)
Language: English
ISBN: 1597490059
 

lordv

Member
Регистрация
26.10.2004
Сообщения
31
Реакции
4
Баллы
8
Defend I.T.Security by Example

33eccbc5.jpg


_http://rapidshare.de/files/17237987/Defend.zip.html
 
  • Like
Реакции: tmak

mrli

New member
Регистрация
12.03.2006
Сообщения
3
Реакции
1
Баллы
3
Возраст
43
Местоположение
Katmandu
Rootkits : Subverting the Windows Kernel

Всем привет, недавно искал пару книжек на тему безопасности, очень помог этот форум и здешние люди. Спасибо, теперь поделюсь тем что накопал.

Инфо от Амазона:
Paperback: 352 pages
Publisher: Addison-Wesley Professional (July 22, 2005)
Language: English
ISBN: 0321294319


По просьбе, обновляю ссылку:
 
Последнее редактирование модератором:

Slu

New member
Регистрация
18.02.2005
Сообщения
9
Реакции
0
Баллы
1
Возраст
46
n0n сказал(а):
Home Networking Bible
by Sue Plumley

homenetworkingbible5da.gif



Paperback: 765 pages
Publisher: John Wiley & Sons; 2 edition (February 9, 2004)
ISBN: 0764544160
Product Dimensions: 9.2 x 7.3 x 1.7 inches
Shipping Weight: 2.6 pounds.



Book Info
Designed to help home networkers plan and prepare for networks, purchase the appropriate equipment and software, install the networking equipment, and make it work with Windows 95 or 98. Softcover. --This text refers to an out of print or unavailable edition of this title.

Product Description:
Everything you need to know to set up a home network

Is a home network for you? This comprehensive guide covers everything from deciding what type of network meets your needs to setting up the hardware and software, connecting different operating systems, installing the necessary applications, managing the network, and even adding home entertainment devices. Fully updated with new material on all the latest systems and methods, it·s just what you need to set up your network and keep it running safely and successfully.

Inside, you·ll find complete coverage of home networking
  • Compare the advantages and disadvantages of wired and wireless networks
  • Understand how to choose between workgroup and client/server networking
  • Learn how to install and set up cables and routers and how to install and configure networking software
  • Share files, printers, and a single Internet connection
  • Back up files and secure your network
  • Set up your own home intranet and understand the technologies involved in creating a Web page
  • Manage your network and learn to use tools for locating and repairing problems
  • Expand your home network to include your digital camera, scanner, TV, sound system, and even game consoles
  • Explore SmartHome technology that allows you to automate various household functions
  • Investigate how your network can enable tele-commuting and other remote access capabilities


Подробнее


Качаем

5.3 Mb

Скажите, пожалуйста, а как скачать книгу? FTP не пускает :( Заранее спасибо
 

pariman

ex-Team DUMPz
Регистрация
10.03.2004
Сообщения
1 718
Реакции
983
Баллы
113
Местоположение
Ukraine
Slu сказал(а):
Скажите, пожалуйста, а как скачать книгу? FTP не пускает Заранее спасибо
Да, фтп работает не для всех :). Постараюсь залить
 

Slu

New member
Регистрация
18.02.2005
Сообщения
9
Реакции
0
Баллы
1
Возраст
46
Спасибо заранее. Буду очень признателен! А как можно получить доступ к ФТП?
 

okun

Well-known member
Свой / Own
Регистрация
03.05.2005
Сообщения
2 045
Реакции
2 975
Баллы
113
Местоположение
evergreen forest (wonderland)
Internet Denial of Service: Attack and Defense Mechanisms



Jelena Mirkovic, Sven Dietrich, David Dittrich, Peter Reiher
Publisher: Prentice Hall PTR
Pub Date: December 30, 2004
Print ISBN: 0-13-147573-8
Pages: 400
Format: chm

Overview
Suddenly your Web server becomes unavailable. When you investigate, you realize that a flood of packets is surging into your network. You have just become one of the hundreds of thousands of victims of a denial-of-service attack, a pervasive and growing threat to the Internet. What do you do? Internet Denial of Service sheds light on a complex and fascinating form of computer attack that impacts the confidentiality, integrity, and availability of millions of computers worldwide. It tells the network administrator, corporate CTO, incident responder, and student how DDoS attacks are prepared and executed, how to think about DDoS, and how to arrange computer and network defenses. It also provides a suite of actions that can be taken before, during, and after an attack. Inside, you'll find comprehensive information on the following topics How denial-of-service attacks are waged How to improve your network's resilience to denial-of-service attacks What to do when you are involved in a denial-of-service attack The laws that apply to these attacks and their implications How often denial-of-service attacks occur, how strong they are, and the kinds of damage they can cause Real examples of denial-of-service attacks as experienced by the attacker, victim, and unwitting accomplices The authors' extensive experience in handling denial-of-service attacks and researching defense approaches is laid out clearly in practical, detailed terms.

(2.04 Мб) pass: http://netz.ru
 

beerkoff

New member
Регистрация
05.03.2004
Сообщения
26
Реакции
3
Баллы
3
Местоположение
г. Н-ск
Buffer Overflow Attacks
316_web.jpg


формат: pdf->rar
размер: 3мб
язык: english
издательство: syngress

Forensic investigations of notorious Internet attacks, such as the SQL Slammer and Blaster Worms, reveal buffer overflows to be the sophisticated hacker’s “vulnerability of choice.” These worms crippled the Internet and cost billions of dollars to clean up. Now, even more powerful and insidious threats have appeared in the form of “custom exploits.”
 
  • Like
Реакции: tmak
198 098Темы
635 069Сообщения
3 618 396Пользователи
TwixOnFire69Новый пользователь
Верх