Popular Posts

Most Viewed

Security Warrior

free books,free ebook,free ebooks,ebooks for free,e book,ebooks,free books download,free book download,free ebooks, electrical engineering,enggineering ebooks,book,jntu ebooks,free engineering books,engineering books download,engineering books,Web Deveopment books,Free Web Development books

Security Warrior
By Anton Chuvakin, Cyrus Peikari


Table of Contents 

Part I:  Software Cracking
  
Chapter 1.  Assembly Language

Chapter 2.  Windows Reverse Engineering

Chapter 3.  Linux Reverse Engineering

Chapter 4.  Windows CE Reverse Engineering

Chapter 5.  Overflow Attacks

Part II:  Network Stalking
  
Chapter 6.  TCP/IP Analysis

Chapter 7.  Social Engineering

Chapter 8.  Reconnaissance

Chapter 9.  OS Fingerprinting

Chapter 10.  Hiding the Tracks

Part III:  Platform Attacks
  
Chapter 11.  Unix Defense

Chapter 12.  Unix Attacks

Chapter 13.  Windows Client Attacks

Chapter 14.  Windows Server Attacks

Chapter 15.  SOAP XML Web Services Security

Chapter 16.  SQL Injection

Chapter 17.  Wireless Security

Part IV:  Advanced Defense
  
Chapter 18.  Audit Trail Analysis    

Chapter 19.  Intrusion Detection Systems

Chapter 20.  Honeypots

Chapter 21.  Incident Response

Chapter 22.  Forensics and Antiforensics

 


Click Here To Download

0 comments:

Post a Comment