Книги по взлому, безопасности, сетям, Wap

MOCKuT

Местный
Регистрация
26 Ноя 2003
Сообщения
792
Реакции
958
Credits
170
Fundamental Networking in Java

00161529900ml7.jpg


Name: Fundamental Networking in Java
Author: Esmond Pitt
Publisher: Springer
Year: 2006
Volume: XVIII
Pages: 381
Illustrations: 23
ISBN: 978-1-84628-030-6
Language: English
Filetype: Adobe PDF
Filesize: 1.30 Mb

Written for: Lecturers, advanced undergraduates, graduates, computing practitioners: programmer (junior/senior), architect, designer.

Keywords: Design, Java, Multicast, Networking, Programming, Scalable,
Server, TCP/IP, UDP, event-driven architecture

The book provides complete coverage of fundamental IP networking in Java. It introduces the concepts behind TCP/IP and UDP and their intended use and purpose; gives complete coverage of Java networking APIs, includes an extended discussion of advanced server design, so that the various design principles and tradeoffs concerned are discussed and equips the reader with analytic queuing-theory tools to evaluate design alternatives; covers UDP multicasting, and covers multi-homed hosts, leading the reader to understand the extra programming steps and design considerations required in such environments.

After reading this book the reader will have an advanced knowledge of fundamental network design and programming concepts in the Java language, enabling them to design and implement distributed applications with advanced features and to predict their performance. Special emphasis is given to the scalable I/O facilities of Java 1.4 as well as complete treatments of multi-homing and UDP both unicast and multicast.

Для просмотра ссылки Войди или Зарегистрируйся
 

MOCKuT

Местный
Регистрация
26 Ноя 2003
Сообщения
792
Реакции
958
Credits
170
1597490059.01._AA240_SCLZZZZZZZ_.jpg


Name: Sockets, Shellcode, Porting, & Coding: Reverse Engineering Exploits and Tool Coding for Security Professionals [ILLUSTRATED]
Authors: James C Foster (Author), Mike Price (Author), Stuart McClure (Foreword)

Product Details:
* Paperback: 667 pages
* Publisher: Syngress Publishing; 1 edition (March 21, 2005)
* Language: English
* ISBN-10: 1597490059
* ISBN-13: 978-1597490054

The book is logically divided into 5 main categories with each category representing a major skill set required by most security professionals:

1. Coding The ability to program and script is quickly becoming a mainstream requirement for just about everyone in the security industry. This section covers the basics in coding complemented with a slue of programming tips and tricks in C/C++, Java, Perl and NASL.

2. Sockets The technology that allows programs and scripts to communicate over a network is sockets. Even though the theory remains the same communication over TCP and UDP, sockets are implemented differently in nearly ever language.

3. Shellcode Shellcode, commonly defined as bytecode converted from Assembly, is utilized to execute commands on remote systems via direct memory access.

4. Porting Due to the differences between operating platforms and language implementations on those platforms, it is a common practice to modify an original body of code to work on a different platforms. This technique is known as porting and is incredible useful in the real world environments since it allows you to not recreate the wheel.

5. Coding Tools The culmination of the previous four sections, coding tools brings all of the techniques that you have learned to the forefront. With the background technologies and techniques you will now be able to code quick utilities that will not only make you more productive, they will arm you with an extremely valuable skill that will remain with you as long as you make the proper time and effort dedications.

*Contains never before seen chapters on writing and automating exploits on windows systems with all-new exploits.

*Perform zero-day exploit forensics by reverse engineering malicious code.

*Provides working code and scripts in all of the most common programming languages for readers to use TODAY to defend their networks.

Download:
Для просмотра ссылки Войди или Зарегистрируйся
Для просмотра ссылки Войди или Зарегистрируйся
 

MOCKuT

Местный
Регистрация
26 Ноя 2003
Сообщения
792
Реакции
958
Credits
170
Covert Java: Techniques for Decompiling, Patching, and Reverse Engineering

Name: Covert Java: Techniques for Decompiling, Patching, and Reverse Engineering
Author: Alex Kalinovsky
Paperback: 288 pages
Publisher:
Sams (May 3, 2004)
Language: English
ISBN-10: 0672326388
ISBN-13: 978-0672326387
Format: .pdf
Size: 3.84 Mb

067232638801ss500sclzzzes4.jpg


Book Description

As a Java developer, you may find yourself in a situation where you have to maintain someone else's code or use a third-party's library for your own application without documentation of the original source code. Rather than spend hours feeling like you want to bang your head against the wall, turn to Covert Java: Techniques for Decompiling, Patching, and Reverse Engineering. These techniques will show you how to better understand and work with third-party applications. Each chapter focuses on a technique to solve a specific problem, such as obfuscation in code or scalability vulnerabilities, outlining the issue and demonstrating possible solutions. Summaries at the end of each chapter will help you double check that you understood the crucial points of each lesson. You will also be able to download all code examples and sample applications for future reference from the publisher's website. Let Covert Java help you crack open mysterious codes!

Download:
Для просмотра ссылки Войди или Зарегистрируйся
 
Последнее редактирование модератором:

MOCKuT

Местный
Регистрация
26 Ноя 2003
Сообщения
792
Реакции
958
Credits
170
CD Cracking Uncovered: Protection Against Unsanctioned CD Copying

Name: CD Cracking Uncovered: Protection Against Unsanctioned CD Copying
Author: Kris Kaspersky
Paperback: 300 pages
Publisher: A-List (April 1, 2004)
Language: English
ISBN-10: 1931769338
ISBN-13: 978-1931769334
Format: .chm
Size: 8.98 Mb

193176933801ss500sclzzzej2.jpg


Book Description
A manual on protecting CDs against illegal copying, this book shows how crackers copy CDs using various access methods. The methods covered include the CDFS driver, cooked mode, SPTI, ASPI, the SCSI port, and the MSCDEX driver. Explained is how to prevent cracker break-ins using protections based on nonstandard CD formats such as the CD driver and weak CD sectors. Information on CD functioning fundamentals and tips related to CD protection in a format free of math and assembling-such as data formats, the scrambler, the Reed-Solomon coder/encoder, the CIRC coder/encoder, and a weak-sectors generator-are also provided. The main program interfaces, which provide direct control via peripheral devices on the application level in UNIX, Novell, and Windows 9x/NT/2000/XP, are considered, as is how to read and write RAW sectors.

Download:
Для просмотра ссылки Войди или Зарегистрируйся
 

MOCKuT

Местный
Регистрация
26 Ноя 2003
Сообщения
792
Реакции
958
Credits
170
Reverse Engineering of Object Oriented Code

Name: Reverse Engineering of Object Oriented Code
Author: Paolo Tonella, Alessandra Potrich
Paperback: 210 pages
Publisher: Springer; 1 edition (December 17, 2004)
Language: English
ISBN-10: 0387402950
ISBN-13: 978-0387402956
Format: .pdf
Size: 5.83 Mb

038740295001bo220420320ts0.jpg


Book Description
During maintenance of a software system, not all questions can be answered directly by resorting to otherwise reliable and accurate source code. Reverse engineering aims at extracting abstract, goal-oriented views of the system, able to summarize relevant properties of the program's computations. Reverse Engineering of Object-Oriented Code provides a comprehensive overview of several techniques that have been recently investigated in the field of reverse engineering. The book describes the algorithms involved in recovering UML diagrams from the code and the techniques that can be adopted for their visualization. This is important because the UML has become the standard for representing design diagrams in object-oriented development. A state-of-the-art exposition on how to design object-oriented code and accompanying algorithms that can be reverse engineered for greater flexibility in future code maintenance and alteration. Essential object-oriented concepts and programming methods for software engineers and researchers.

Download:
Для просмотра ссылки Войди или Зарегистрируйся
 
  • Like
Реакции: okun

MOCKuT

Местный
Регистрация
26 Ноя 2003
Сообщения
792
Реакции
958
Credits
170
Reversing - Secrets of Reverse Engineering

Name: Reversing - Secrets of Reverse Engineering
Author: Eldad Eilam
Paperback: 617 pages
Publisher: Wiley (April 15, 2005)
Language: English
ISBN-10: 0764574817
ISBN-13: 978-0764574818
Format: .pdf
Size: 8.56 Mb

076457481701bo220420320wu4.jpg


Book Description
Beginning with a basic primer on reverse engineering-including computer internals, operating systems, and assembly language-and then discussing the various
applications of reverse engineering, this book provides readers with practical, in-depth techniques for software reverse engineering. The book is broken into two parts, the first deals with security-related reverse engineering and the second explores the more practical aspects of reverse engineering. In addition, the author explains how to reverse engineer a third-party software library to improve interfacing and how to reverse engineer a competitor's software to build a better product.
* The first popular book to show how software reverse engineering can help defend against security threats, speed up development, and unlock the secrets of competitive products
* Helps developers plug security holes by demonstrating how hackers exploit reverse engineering techniques to crack copy-protection schemes and identify software targets for viruses and other malware
* Offers a primer on advanced reverse-engineering, delving into "disassembly"-code-level reverse engineering-and explaining how to decipher assembly language.

Download:
Для просмотра ссылки Войди или Зарегистрируйся
 

MOCKuT

Местный
Регистрация
26 Ноя 2003
Сообщения
792
Реакции
958
Credits
170
Hacking: The Art of Exploitation

Name: Hacking: The Art of Exploitation
Author: Jon Erickson
Paperback: 264 pages
Publisher: No Starch Press; 1 edition (October 2003)
Language: English
ISBN-10: 1593270070
ISBN-13: 978-1593270070
Format: .chm
Size: 1.39 Mb

159327007001ss500sclzzzpu8.jpg


Book Description
About.com, November 2003
"This is an excellent book."

Security Forums, January 2004
"the seminal hackers handbook"

Download:
Для просмотра ссылки Войди или Зарегистрируйся
 

MOCKuT

Местный
Регистрация
26 Ноя 2003
Сообщения
792
Реакции
958
Credits
170
Hacker Disassembling Uncovered

Name: Hacker Disassembling Uncovered
Author: Kris Kaspersky
Paperback: 600 pages
Publisher: A-List Publishing (April 1, 2003)
Language: English
ISBN-10: 1931769222
ISBN-13: 978-1931769228
Format: .chm
Size: 4.72 Mb

193176922201aa240sclzzzuh8.jpg


Book Description
Going beyond the issues of analyzing and optimizing programs as well as creating the means of protecting information, this guide takes on the programming problem of, once having found holes in a program, how to go about disassembling it without its source code. Covered are the hacking methods used to analyze programs using a debugger and disassembler. These methods include virtual functions, local and global variables, branching, loops, objects and their hierarchy, and mathematical operators. Also covered are methods of fighting disassemblers, self-modifying code in operating systems, and executing code in the stack. Advanced disassembler topics such as optimizing compilers and movable code are discussed as well.

Download:
Для просмотра ссылки Войди или Зарегистрируйся
 

MOCKuT

Местный
Регистрация
26 Ноя 2003
Сообщения
792
Реакции
958
Credits
170
Introduction to Reverse Engineering Software

Name: Introduction to Reverse Engineering Software
Author: Mike Perry, Nasko Oskov
Paperback: 110 pages, v1.3 2003
Publisher: -
Language: English
ISBN-10: -
ISBN-13: -
Format: .pdf
Size: 0.3 Mb



Book Description
This book is an attempt to provide an introduction to reverse engineering software under both Linux and Microsoft Windows�. The goal of this book is not to cover how to reproduce an entire program from a binary, but instead how to use the Scientific Method to deduce specific behavior and to target, analyze, extract and modify specific operations of a program, usually for interoperability purposes. As such, the book takes a top-down approach, starting at the highest level (program behavior) and drilling down to assembly when it is needed.
This book is currently incomplete, and we are looking for a publisher to publish a completed version. Please contact the authors if you are interested in helping to publish this book or know someone who would be.

Download:
Для просмотра ссылки Войди или Зарегистрируйся
 
  • Like
Реакции: okun

MOCKuT

Местный
Регистрация
26 Ноя 2003
Сообщения
792
Реакции
958
Credits
170
Static and Dynamic Reverse Engineering Techniques for Java Software Systems

Name: Static and Dynamic Reverse Engineering Techniques for Java Software Systems
Author: Systä Tarja
Paperback: 232 pages
Publisher: Acta Electronica Universitatis, 2000
Language: English
ISBN-10: 951-44-4787-5
ISBN-13: -
Format: .pdf
Size: 1.11 Mb

957949122__kansi.gif


Dissertation Description

The main contributions of this dissertation are as follows:

methods for using the dependencies between static and dynamic models for goal driven reverse engineering tasks, including
– merging dynamic information to a static Rigiview;
– using static information to guide the generation of dynamici nformation;
– slicing a Rigi view using SCED scenarios; and
– raising the level of abstraction of SCED scenarios using a high-level Rigigraph;

algorithms for optimizing synthesized state diagrams using UMLnotation;
-application of the synthesis algorithm presented by Koskimies and Mäkinen [54] to SCED;

string matching algorithms for raising the level of abstraction of SCED scenario iagrams;

the prototype reverse ngineering environment Shimba, which integrates two existing tools:
– Rigi for reverse engineering the static structure of Javasoftware; and
– SCED and its state diagram synthesis facility for reverse engineering the dynamic behavior of Java software;

methods and tools for gathering information, including
– extraction of static information from Java byte code;and
–extraction of run-time information by running the target system under a customized jdk debugger;

a case study to evaluate the facilities of Shimba.

Download:
Для просмотра ссылки Войди или Зарегистрируйся
 
Последнее редактирование модератором:
  • Like
Реакции: okun

okun

Местный
Регистрация
3 Май 2005
Сообщения
2,042
Реакции
2,996
Credits
0
Computer Security and Cryptography

computersecurityandcrypja5.gif


Alan G. Konheim
Hardcover: 544 pages
Publisher: Wiley-Interscience (January 29, 2007)
Language: English
ISBN-10: 0471947830
ISBN-13: 978-0471947837
Format: pdf

Review
"...essential reading for professionals in e-commerce and information technology...it is also ideal for students." (IEEE Computer Magazine, March 2007)

Book Description
Gain the skills and knowledge needed to create effective data security systems

This book updates readers with all the tools, techniques, and concepts needed to understand and implement data security systems. It presents a wide range of topics for a thorough understanding of the factors that affect the efficiency of secrecy, authentication, and digital signature schema. Most importantly, readers gain hands-on experience in cryptanalysis and learn how to create effective cryptographic systems.

The author contributed to the design and analysis of the Data Encryption Standard (DES), a widely used symmetric-key encryption algorithm. His recommendations are based on firsthand experience of what does and does not work.

Thorough in its coverage, the book starts with a discussion of the history of cryptography, including a description of the basic encryption systems and many of the cipher systems used in the twentieth century. The author then discusses the theory of symmetric- and public-key cryptography. Readers not only discover what cryptography can do to protect sensitive data, but also learn the practical limitations of the technology. The book ends with two chapters that explore a wide range of cryptography applications.

Three basic types of chapters are featured to facilitate learning:
  • Chapters that develop technical skills
  • Chapters that describe a cryptosystem and present a method of analysis
  • Chapters that describe a cryptosystem, present a method of analysis, and provide problems to test your grasp of the material and your ability to implement practical solutions

With consumers becoming increasingly wary of identity theft and companies struggling to develop safe, secure systems, this book is essential reading for professionals in e-commerce and information technology. Written by a professor who teaches cryptography, it is also ideal for students.

Для просмотра ссылки Войди или Зарегистрируйся (8,37 Мб)
 

okun

Местный
Регистрация
3 Май 2005
Сообщения
2,042
Реакции
2,996
Credits
0
Cross Site Scripting Attacks: Xss Exploits and Defense

e51eed8c2880a6ae36e05caku8.jpg


Seth Fogie, Jeremiah Grossman, Robert Hansen, Anton Rager
Paperback: 488 pages
Publisher: Syngress (May 15, 2007)
Language: English
ISBN-10: 1597491543
ISBN-13: 978-1597491549
Format: pdf

Book Description
Cross Site Scripting Attacks starts by defining the terms and laying out the ground work. It assumes that the reader is familiar with basic web programming (HTML) and JavaScript. First it discusses the concepts, methodology, and technology that makes XSS a valid concern. It then moves into the various types of XSS attacks, how they are implemented, used, and abused. After XSS is thoroughly explored, the next part provides examples of XSS malware and demonstrates real cases where XSS is a dangerous risk that exposes internet users to remote access, sensitive data theft, and monetary losses. Finally, the book closes by examining the ways developers can avoid XSS vulnerabilities in their web applications, and how users can avoid becoming a victim. The audience is web developers, security practitioners, and managers.

*XSS Vulnerabilities exist in 8 out of 10 Web sites
*The authors of this book are the undisputed industry leading authorities
*Contains independent, bleeding edge research, code listings and exploits that can not be found anywhere else

About the Author
Seth Fogie is the VP of Dallas-based Airscanner Corporation where he oversees the development of security software for the Window Mobile (Pocket PC) platform. He has co-authored numerous technical books on information security, including the top selling "Maximum Wireless Security" from SAMS, and "Security Warrior" from O'Reilly. Seth frequently speaks at IT and security conferences/seminars, including Black Hat, Defcon, CSI, and Dallascon. In addition, Seth has co-authored the HIPAA medical education course for the Texas Medical Associate and is acting Site Host for Security at the "InformIT.com" website where he writes articles and reviews/manages weekly information security related books and articles Jeremiah Grossman, founder and chief technology officer of WhiteHat Security, is a world-renowned expert in web application security and a founding member of the Web Application Security Consortium (WASC). At WhiteHat, Mr. Grossman is responsible for web application security R&D and industry evangelism. He is a frequent speaker at industry events including the Black Hat Briefings, ISACA, OWASP, NASA, ISSA and Defcon. A trusted media resource, Mr. Grossman has been featured in USA Today, the Washington Post, Information Week, NBC Nightly News, and many others. Prior to WhiteHat, Mr. Grossman was an information security officer at Yahoo! Robert Hansen, also known as RSnake, is the founder of the ha.ckers.org web application security lab and has been heavily involved in the hacking and the security industry since the mid 1990s. Robert has worked in banner advertizing and built click fraud detection in his role as CSO for several startups. For many years he ran the managed security services product lines for Cable & Wireless. At eBay he worked on anti-cross site scripting, anti-phishing, anti-virus and web application intrusion detection and countermeasures. He has spoken at Black Hat, the Gartner security round table and at Networld+Interop and he is a member of WASC, OWASP, and ISSA. Anton Rager is a Sr. Security Engineer with Avaya Labs and a founding member of Avaya's Enterprise Security Practice. He specializes in vulnerability research, VPN security and wireless security and is best known for his WEPCrack, WEPWedgie and IKECrack security tools. He has presented at Defcon, Toorcon, Interz0ne and many other lesser-known conferences, and was a contributing technical editor to the book Maximum Wireless Security.

Для просмотра ссылки Войди или Зарегистрируйся (4,88 Мб)
 

okun

Местный
Регистрация
3 Май 2005
Сообщения
2,042
Реакции
2,996
Credits
0
Computer Viruses: from theory to applications

9782287239397ts2.jpg


Éric Filiol
Paperback: 400 pages
Publisher: Springer; 1 edition (September 14, 2005)
Language: English
ISBN-10: 2287239391
ISBN-13: 978-2287239397
Format: pdf

Book Description
This book deals with computer viruses envisaged from three different points of view, namely the theoretical fundamentals of computer virology, algorithmic and practical aspects of viruses and their potential applications to various areas. The theoretical formalization by means of Turing machines, self-reproducing automata and recursive functions enable a precise and exhaustive description of the different types of malware. It follows that the main stakes of computer defense and antiviral fighting are easily highlighted. Detailed analysis of the source code for representative members of each virus/worm family allows the reader to grasp the basic algorithmic aspects involved in self-reproducing codes. The C programming language has been systematically used for a better understanding of the considered codes.

Для просмотра ссылки Войди или Зарегистрируйся (2,29 Мб)
 

Vicci

ex-Team DUMPz
Местный
Регистрация
19 Апр 2004
Сообщения
5,110
Реакции
3,391
Credits
0
Для просмотра ссылки Войди или Зарегистрируйся

Для просмотра ссылки Войди или Зарегистрируйся


M. Tim Jones.
Charles River Media © 2002 (478 pages)
ISBN:1584502479
Format: chm

Book Description
Communication is fast becoming a general requirement for embedded systems in our increasingly connected world. In fact, it's difficult to find embedded systems that include no form of external communication. Embedded systems are now transmitting electric meter readings over low-bandwidth wireless links to alleviate the need to read them visually. Global Positioning System (GPS) technology and wireless links with embedded systems are also used to pinpoint the exact location, speed, oil pressure, and other parameters of fleets of trucks anywhere in the country. Creation of these and other networked applications are the focus of this book. Using practical tutorials on TCP/IP application layer protocols such as HTTP, SMTP, POP3, SNMP, and SLP, developers learn how to develop and deploy these protocols in their embedded systems.

Using practical tutorials on TCP/IP application layer protocols such as HTTP, SMTP, POP3, SNMP, and SLP, this text explains how to develop and deploy application layer protocols for adding connectivity to embedded devices.

Размер архива 3,53 Mb
Пароль на архив: http://dumpz.ws
 
  • Like
Реакции: kstu

7ALEX7

Местный
Регистрация
2 Авг 2006
Сообщения
30
Реакции
13
Credits
58
Всем вперед по адресу - :cool:
hxxp:\\ivanlef0u.free.fr\repo\ebooks\
есть маленькая подборка очень редких книг -
Addison.Wesley.Professional.Rootkits.Subverting.the.Windows.Kernel.Jul.2005.eBook-DDU.chm
Oreilly.Windows.XP.Hacks.2nd.edition.Feb.2005.LiB.chm
Professional%20Rootkits%20Code%202-2-07.zip
Reversing%20Secrets%20of%20Reverse%20Engineering.pdf
Syngress,.Stealing.the.Network.How.to_Own.a.continent.(2004).LiB.ShareConnector.chm
и т.д. и т.п.
 
Последнее редактирование модератором: