Friday, August 26, 2011

books for hacking (self study)


Hacking: the art of exploitation
Jon Erickson - 2008 - 472 pages

Thoroughly revised and updated to incorporate the latest information on security issues, a serious introduction
to hacking describes the techniques of computer hacking, covering such topics as stack-based overflows,
format string exploits, ...

Hacking For Dummies
Kevin Beaver - 2009 - 408 pages

This guide shows you how, explains common attacks, tells you what to look for, and gives you the tools to
safeguard your sensitive business information.

Web hacking: attacks and defense
Stuart McClure, Saumil Shah, Shreeraj Shah - 2003 - 492 pages

This Web hacking volume extends the Hacking Exposed legacy into the terrain of Web vulnerabilities and
attacks.

Gray Hat Hacking
Harris - 2008

This fully updated volume offers a comprehensive overview of today's hacking and computer security
landscape.

Hacking Exposed 6
McClure - 2009

The book includes new coverage of ISO images, wireless and RFID attacks, Web 2.0 vulnerabilities, anonymous
hacking tools, Ubuntu, Windows Server 2008, mobile devices, and more.Hacking Exposed 6 applies the authors'
internationally renowned ...

An Unofficial Guide To Ethical Hacking
Ankit Fadia - 2006 - 616 pages

The basic motive behind this book is to create a new wave of ethical hackers, which would revolutionise the
global security scene.

Professional Penetration Testing: Creating and Operating a Formal ...
Thomas Wilhelm - 2009 - 504 pages

PART I - Setting Up Chapter 1: Introduction Chapter 2: Ethics and Hacking Chapter 3: Hacking as a Career
Chapter 4: Setting up Your Lab Chapter 5: Creating and Using PenTest Targets in Your Lab Chapter 6:

Hacking: digital media and technological determinism
Tim Jordan - 2008 - 160 pages

This book introduces and explains hacking in all its manifestations: crackers, open source, hacktivists and the


The social construction of what?
Ian Hacking - 1999 - 261 pages

Especially troublesome in this dispute is the status of the natural sciences, and this is where Hacking finds
some of his most telling cases, from the conflict between biological and social approaches to mental illness to

Hacking exposed VoIP
David Endler, Mark Collier, Endler - 2007

This book shows step-by-step, how online criminals perform reconnaissance, gain access, steal data, and .

No comments:

Post a Comment