Либрус
 
Сделать стартовой
Добавить в избранное
Обратная связь
Карта сайта
Зеркало сайта
Новости RSS 2.0
ПОСТУПЛЕНИЯ 
«    Февраль 2020    »
ПнВтСрЧтПтСбВс
 12
3456789
10111213141516
17181920212223
242526272829 
РУБРИКАТОР 
Открыть | Закрыть

ПОПУЛЯРНОЕ  
АРХИВЫ   
Август 2016 (216)
Июль 2016 (456)
Июнь 2016 (321)
Май 2016 (398)
Апрель 2016 (433)
Март 2016 (554)


  Sockets, Shellcode, Porting, and Coding
 Категория: Безопасность, взлом, «Syngress»
   
 
Sockets, Shellcode, Porting, and Coding
Издательство: Syngress
Год издания: 2005
isbn: 1597490059
Количество страниц: 697
Язык: english
Формат: PDF (scan)

In this groundbreaking book, best-selling author James C. Foster reveals for the first time the methods hackers use to attack and exploit the core components of operating systems and their applications. He provides working code and scripts in C/C++, Java, Perl, and NASL to detect and defend against the most dangerous attacks. The book covers in detail the five most important disciplines for security professionals and software developers: Coding, Sockets, Shellcode, Porting Applications, and Coding Security Tools.
 
  • 0
Опубликовал: flashsoft | 16-02-2006, 00:00 | Просмотров: 798  Подробнее и с комментариями (0)
  OS X for Hackers at Heart
 Категория: Безопасность, взлом, «Syngress»
   
 
OS X for Hackers at Heart
Автор: Ken Caruso, Chris Hurley
Издательство: Syngress
Год издания: 2005
isbn: 1-59749-040-7
Количество страниц: 465
Язык: english
Формат: PDF

With sexy hardware, a powerful operating system, and easy-to-use applications, Apple has made OS X the operating system of choice for hackers everywhere. But as great as OS X is out of the box, hackers are eager to push the limits of what it was designed to do (surprise). Tweak and tune both software and hardware to start penetration testing or software development. See how the best and brightest use OS X for cutting-edge research, development, and just plain fooling around. Add Interfaces to the Mac Add interfaces to create a multi-interface firewall or router, simulate a switch, add 802.3ad interface aggregation, or provide another media type. Use the Mac as a Router See how a small low-power device such as a Mac Mini or an iBook expanded with USB-based Ethernet ports can push packets between networks. WarDrive with Your Mac Configure and use the KisMAC WLAN discovery tool to WarDrive. Penetration Test with OS X Discover how all the best tools can be run from the Mac: nmap, Nessus, Ethereal, Snort, and more. Automate Your Mac! Learn how to use Automator, AppleScript, and the bash shell to automate tasks and create slick front ends for command-line favorites! Discover Juicy Mac Hacking Tools Compile Open Source tools directly on OS X using mainstream compilers and interpreters. Hack the iPod Open your iPod, replace the battery, upgrade a 5GB iPod's hard drive, and configure any iPod for Mac or Windows. Use OS X in a Windows Environment Access file shares on a Windows server, mount network file systems via AppleScript, and connect to a Windows PPTP server. PowerBook Mac Tricks Learn cool stunts you can do with the Apple motion sensor, the Apple Remote Desktop, Gestures, Sogudi, and more!
 
  • 0
Опубликовал: flashsoft | 13-02-2006, 00:00 | Просмотров: 872  Подробнее и с комментариями (0)
  Software Piracy Exposed
 Категория: Безопасность, взлом, «Syngress»
   
 
Software Piracy Exposed
Автор: Paul Craig, Ron Honick
Издательство: Syngress
Год издания: 2005
isbn: 1-93226-698-4
Количество страниц: 329
Язык: english
Формат: PDF

For every $2 worth of software purchased legally, $1 worth of software is pirated illegally. For the first time ever, the dark underground of how software is stolen and traded over the internet is revealed. The technical detail provided will open the eyes of software users and manufacturers worldwide! This book is a tell-it-like-it-is expos of how tens of billions of dollars worth of software is stolen every year. Did you know that most of the software on your computer, and nearly every program you've heard of, can be obtained without charge? In less time than it would take you to drive down to your "friendly neighborhood computer store" and purchase a software program, you can download the exact same program from the internet for free! Obtaining something intended to be sold without paying is "controversial" to say the least. But whether you call if "free for the asking," "software piracy," or just out-and-out "stealing;" downloading, copying, and sharing software is being done by thousands of people everyday. This book explains the epidemic problem of software piracy in great detail for both software users and manufacturers.
 
  • 0
Опубликовал: flashsoft | 13-02-2006, 00:00 | Просмотров: 939  Подробнее и с комментариями (0)
  C# for Java Programmers
 Категория: С, С++, С#, «Syngress»
   
 
C# for Java Programmers
Издательство: Syngress
Год издания: 2002
isbn: 1-931836-54-X
Количество страниц: 642
Язык: english
Формат: PDF

.NET is Microsoft's answer to the J2EE platform for Enterprise Web Services. It is essential that developers know C# if they are to program for the .NET platform. C# for Java Programmers is not an introductory guide to C#, rather it builds on what Java programmers already know about object-oriented languages to give them an efficient means to master the .NET framework. This book will compare and contrast many of the advantages and drawbacks of Java and C#, allowing programmers to make informed, intelligent decisions based on the unique uses of each language.
 
  • 0
Опубликовал: flashsoft | 15-01-2006, 00:00 | Просмотров: 986  Подробнее и с комментариями (0)
  CYA Securing IIS 6.0
 Категория: Безопасность, взлом, «Syngress»
   
 
CYA Securing IIS 6.0
Автор: Chun Hai (Bernard) Cheah
Издательство: Syngress
Год издания: 2004
isbn: 1-931836-25-6
Количество страниц: 417
Язык: english
Формат: PDF

This book fills the need of Networking professionals responsible for configuring, maintaining and troubleshooting the security of Microsoft’s Internet Information Server 6.0. The book is organized around the security services offered by IIS. The table of contents reflects the hierarchy of topics within the IIS MMC, and covers any configuration option within IIS that relates to security. In some instances, references are made to non-IIS services, but only as they relate to or support the IIS service being discussed.
 
  • 0
Опубликовал: flashsoft | 15-01-2006, 00:00 | Просмотров: 740  Подробнее и с комментариями (0)
  Apple I Replica Creation - Back to the Garage
 Категория: Прочее, «Syngress»
   
 
Apple I Replica Creation - Back to the Garage
Автор: Tom Owad
Издательство: Syngress
Год издания: 2005
isbn: 1-931836-40-X
Количество страниц: 369
Язык: english
Формат: PDF (scan)

The Apple I was really the computer designed from the ground up that would kick off personal computing on a large scale. But the Apple I took the biggest step of all. Some very simple concepts are very hard to do the first time. This computer told the world that small computers should never again come with geeky front panels, but rather with human keyboards, ready to type on.
 
  • 0
Опубликовал: flashsoft | 15-01-2006, 00:00 | Просмотров: 867  Подробнее и с комментариями (0)
  Building Cisco Remote Access Networks
 Категория: Cisco, «Syngress»
   
 
Building Cisco Remote Access Networks
Издательство: Syngress
Год издания: 2000
isbn: 1-928994-13-X
Количество страниц: 610
Язык: english
Формат: PDF

Covers the key protocols and connectivity considerations involved with using the Cisco line of routers and access servers to interconnect central sites to branch offices and support home office workers and telecommuters. Chapters discuss point-to-point protocol, virtual private network technology, ISDN, dial-on-demand routing, configuring and backing up permanent connections, security, and network address translation in remote access networks.
 
  • 0
Опубликовал: flashsoft | 9-01-2006, 00:00 | Просмотров: 1185  Подробнее и с комментариями (0)
  Cisco Security Professional's Guide to Secure Intrusion Detection Systems
 Категория: Cisco, «Syngress»
   
 
Cisco Security Professional's Guide to Secure Intrusion Detection Systems
Издательство: Syngress
Год издания: 2003
isbn: 1-932266-69-0
Количество страниц: 673
Язык: english
Формат: PDF

This book presents a combination of intrusion detection systems (IDS) and security theory, Cisco security models, and detailed information regarding specific Cisco-based IDS solutions. The concepts and information presented in this book are one step towards providing a more secure working and living network environment. This book also exists as a guide for Security Administrators seeking to pass the Cisco Secure Intrusion Detection Systems Exam (CSIDS 9E0-100), which is associated with CCSP, Cisco IDS Specialist, and Cisco Security Specialist 1 certifications.
 
  • 0
Опубликовал: flashsoft | 9-01-2006, 00:00 | Просмотров: 1001  Подробнее и с комментариями (0)
  Cisco Security Specialist’s Guide to PIX Firewall
 Категория: Cisco, «Syngress»
   
 
Cisco Security Specialist’s Guide to PIX Firewall
Издательство: Syngress
Год издания: 2002
isbn: 1-931836-63-9
Количество страниц: 658
Язык: english
Формат: PDF

The firewall has come to exemplify network security. While an overall security strategy requires a harmonious integration of people, process, and technologies to reduce risk, thereA???s no doubt that firewalls can be a very valuable security tool. Cisco Systems' PIX firewalls have gained market leadership by demonstrating a mix of functionality, performance, and flexibility. The objective of this book is to help you gain a deeper knowledge of Cisco PIX Firewalls. Whether you have administrative responsibilities or are studying to pass an exam such as the Cisco Secure PIX Firewall Advanced (CSPFA), this comprehensive guide will be of value to you. This is the only book in the market that focuses on covering (and going well beyond) all of the objectives of the latest CSPFA 3.0 exam (9E0-111). Through the use of detailed examples, this book provides step-by-side instructions on how to configure, maintain, and troubleshoot PIX firewalls running software version 6.2 and PIX Device Manager (PDM) version 2.1. All the latest and greatest features of PIX firewall software version 6.2 are covered, including TurboACLs, object grouping, NTP, HTTP failover replication, command level authorization, downloadable ACLs, LAN-based failover, and PPPoE.
 
  • 0
Опубликовал: flashsoft | 9-01-2006, 00:00 | Просмотров: 1052  Подробнее и с комментариями (0)
  Aggressive Network Self-defense
 Категория: Безопасность, взлом, «Syngress»
   
 
Aggressive Network Self-defense
Издательство: Syngress
Год издания: 2005
isbn: 1-931836-20-5
Количество страниц: 417
Язык: english
Формат: PDF (scan)

When the Worm Turns… Analyze the technical and legal implications of “neutralizing” machines that propagate malicious worms across the Internet. Are You the Hunter or the Hunted? Discover for yourself how easy it is to cross the line from defender to aggressor, and understand the potential consequences. Reverse Engineer Working Trojans, Viruses, and Keyloggers Perform forensic analysis of malicious code attacking a Pocket PC to track down, identify, and strike back against the attacker. To Catch a Thief… Track stolen software as it propagates through peer-to-peer networks and learn to bypass MD5 checksum verification to allow multiple generations of attackers to be traced. Learn the Definition of “Hostile Corporate Takeover” in Cyberspace Find out who will own the fictional Primulus Corporation as attacker and defender wage war. Understand the Active Defense Algorithm Model (ADAM) Analyze the primary considerations of implementing an active defense strategy in your organization: ethical, legal, unintended consequences, and risk validation. See What Can Happen when the Virtual World Meets the Real World Use keyloggers, Bluetooth device exploitation, and Windows forensics to discover if your cubicle mate has been stealing more than post-it notes. Where the Wild Things Are… Follow along as a real-life “in-the-wild” format string bug is morphed into strike-back code that launches a listening shell on the attacker's own machine. Implement Passive Strike-Back Technologies Learn the strategy and implement the tools for responding to footprinting, network reconnaissance, vulnerability scanning, and exploit code.
 
  • 0
Опубликовал: flashsoft | 27-12-2005, 00:00 | Просмотров: 1051  Подробнее и с комментариями (0)
  Главная страница | Регистрация | Новое на сайте | Статистика |
 
«Librus - Mountain of Knowledge»
«Либрус - гора знаний» 2004-2020
Design by Flashsoft © 2005-2020