Security/Hacking Index:
Tags for IT, Computer, Technology, Internet, Programming eBooks
Database/SQL
Multimedia
Internet/Networking
Operating System
Programming
Security/Hacking
Science/Engineering
Web/HTML/CSS/Ajax
Unix/Linux
Windows
Mac OS X
Office
Perl/PHP/Python
C/C++
.NET
Java
Hardware
Game Development
Embedded Systems
Added TimeLatest Added Security/Hacking eBooks:
- 2014-01-14Applied Network Security Monitoring: Collection, Detection, and Analysis
- 2014-01-14Malware Forensics Field Guide for Linux Systems: Digital Forensics Field Guides
- 2014-01-15Cybersecurity and Cyberwar: What Everyone Needs to Know
- 2014-01-16SIP Security (repost)
- 2014-01-17Quantum Attacks on Public-Key Cryptosystems (repost)
- 2014-01-17Intrusion Detection in Wireless Ad-Hoc Networks
- 2014-01-18Lulzsec
- 2014-01-21Identity Theft: Everything You Need to Know to Protect Yourself (Repost)
- 2014-01-23Security and Privacy for Implantable Medical Devices
- 2014-01-25The State of the Art in Intrusion Prevention and Detection
- 2014-01-27Cryptography and Network Security: Principles and Practice (4th edition) [Repost]
- 2014-01-29Cisco CCNA Security: Firewalls and VPN
- 2014-01-29Operational Semantics and Verification of Security Protocols
- 2014-01-30A Survey of Data Leakage Detection and Prevention Solutions
- 2014-01-31Multimedia Data Hiding
- 2014-02-04Hacking with Kali: Practical Penetration Testing Techniques 2014
- 2014-02-04Peter Engebretson, "Les bases du hacking"
- 2014-02-05Hacker's Challenge 3: 20 Brand New Forensic Scenarios & Solutions
- 2014-02-05Cryptography: Cracking Codes
- 2014-02-08Privacy in the Age of Big Data: Recognizing Threats, Defending Your Rights, and Protecting Your Family
- 2014-02-10iPhone Hacks: Pushing the iPhone and iPod touch Beyond Their Limits
- 2014-02-11Security for Wireless Implantable Medical Devices (repost)
- 2014-02-14Security and Trends in Wireless Identification and Sensing Platform Tags: Advancements in RFID
- 2014-02-14Financial Cryptography and Data Security (repost)
- 2014-02-16Pairing-Based Cryptography – Pairing 2013: 6th International Conference, Beijing, China, November 22-24, 2013
- 2014-02-17Electronic Security Systems: A Manager's Guide to Evaluating and Selecting System Solutions (Repost)
- 2014-02-18Les bases du hacking
- 2014-02-18Network Defense: Perimeter Defense Mechanisms [Repost]
- 2014-02-19Kali Linux Social Engineering
- 2014-02-20Mobile Security: How to Secure, Privatize, and Recover Your Devices
- 2014-02-20Foundations of Programming: Web Security
- 2014-02-20Hacker contro hacker. Manuale pratico e facile di controspionaggio informatico di Salvatore Aranzulla
- 2014-02-20Aggressive Network Self-Defense [Repost]
- 2014-02-21Violent Python: A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers [Repost]
- 2014-02-23Buffer Overflow Attacks: Detect, Exploit, Prevent [Repost]
- 2014-02-23The Web Application Hacker's Handbook: Finding and Exploiting Security Flaws, 2 edition (repost)
- 2014-02-24The web application hacker's handbook: finding and exploiting security flaws (2nd edition)
- 2014-02-28Franck Ebel et collectif, "Sécurité informatique - Ethical Hacking - Apprendre l'attaque pour mieux se défendre"
- 2014-03-02Hacking Exposed: Web Applications
- 2014-03-07Handbook on Security and Networks (Repost)
- 2014-03-07Computer Forensics For Dummies (Repost)
- 2014-03-07Hacking Exposed Computer Forensics: Secrets & Solutions [Repost]
- 2014-03-09Hacking Exposed Series
- 2014-03-09Security and Hacking Books Pack
- 2014-03-14CreativeLive - Learn Anything Hacking Your Education 3 Videos
- 2014-03-14Pairing-Based Cryptography - Pairing 2013 [Repost]
- 2014-03-15SANS Security 660: Advanced Penetration Testing, Exploits and Ethical Hacking
- 2014-03-17Building Internet Firewalls
- 2014-03-18VTC - Certified Ethical Hacker v8 (Exam 312-50)
- 2014-03-18Udemy - Metasploit Extreme on Kali Linux
- 2014-03-18Cybercrime and Espionage: An Analysis of Subversive Multi-Vector Threats (repost)
- 2014-03-18Pairing-Based Cryptography - Pairing 2013 [Repost]
- 2014-03-19Threat Modeling: Designing for Security
- 2014-03-19Dragnet Nation: A Quest for Privacy, Security, and Freedom in a World of Relentless Surveillance
- 2014-03-19Infiniteskills - CompTIA A 220-801 (2012 Objectives)
- 2014-03-20Introduction to Identity-based Encryption
- 2014-03-20SSL and TLS: Theory and Practice (repost)
- 2014-03-22Corporate Hacking and Technology-Driven Crime: Social Dynamics and Implications (repost)
- 2014-03-22Intrusion Prevention and Active Response: Deploying Network and Host IPS (Repost)
- 2014-03-23OS X for Hackers at Heart (Repost)
- 2014-03-25Cyber Security and IT Infrastructure Protection
- 2014-03-25Cyber Security and IT Infrastructure Protection
- 2014-03-25Hacker's Guide to Project Management (Repost)
- 2014-03-25Network Security (Repost)
- 2014-03-25Stefan Umit Uygur - Penetration Testing with BackBox
- 2014-03-25Penetration Testing with BackBox
- 2014-03-25Information Security Fundamentals (2nd Edition) [Repost]
- 2014-03-26Computer and Information Security Handbook, Second Edition (repost)
- 2014-03-26Linux 101 Hacks (repost)
- 2014-03-26WarDriving & Wireless Penetration Testing [Repost]
- 2014-03-26Kingpin: How One Hacker Took Over the Billion-Dollar Cybercrime Underground (repost)
- 2014-03-27Hacking Windows XP (ExtremeTech) (Repost)
- 2014-03-27Security and the Networked Society (Repost)
- 2014-03-27Collaborative Financial Infrastructure Protection: Tools, Abstractions, and Middleware (repost)
- 2014-03-27Internetrecht: Eine praxisorientierte Einführung (repost)
- 2014-03-29Asterisk Hacking (repost)
- 2014-03-29Microsoft Vista for IT Security Professionals [Repost]
- 2014-03-30Wireless Hacking: Projects for Wi-Fi Enthusiasts [Repost]
- 2014-03-31Techno Security's Guide to Managing Risks for IT Managers, Auditors and Investigators [Repost]
- 2014-04-01Spam Kings: The Real Story behind the High-Rolling Hucksters Pushing Porn, Pills, and %*@)# Enlargements
- 2014-04-01Quantitative Security Risk Assessment of Enterprise Networks (Repost)
- 2014-04-02The Personal Security Handbook [Repost]
- 2014-04-03Cisco Security Professional's Guide to Secure Intrusion Detection Systems [Repost]
- 2014-04-03CompTIA Security Training Kit (Exam SY0-301) [Repost]
- 2014-04-04Hacking Point of Sale: Payment Application Secrets, Threats and Solutions
- 2014-04-04Advanced White Hat Hacking And Penetration Testing Training
- 2014-04-05Mysterious Messages: A History of Codes and Ciphers (repost)
- 2014-04-06Public-Key Cryptography (repost)
- 2014-04-06How to Cheat at Securing a Wireless Network (Repost)
- 2014-04-07Secrets Stolen, Fortunes Lost: Preventing Intellectual Property Theft and Economic Espionage in the 21st Century (Repost)
- 2014-04-07Efficient Secure Two-Party Protocols: Techniques and Constructions (repost)
- 2014-04-08Computer Forensics with Ftk
- 2014-04-10802.11 Wireless Networks: Security and Analysis (Computer Communications and Networks) (repost)
- 2014-04-10802.1X Port-Based Authentication (Repost)
- 2014-04-12Elements of Computer Security [Repost]
- 2014-04-13Networks and Network Analysis for Defence and Security
- 2014-04-14Web Application Vulnerabilities: Detect, Exploit, Prevent (Repost)
- 2014-04-14Hardware Hacking: Have Fun While Voiding Your Warranty (Repost)
- 2014-04-15Security in Wireless Ad Hoc and Sensor Networks (repost)
- 2014-04-15Public-Key Cryptography -- PKC 2014: 17th International Conference on Practice and Theory in Public-Key Cryptography