حوزه هک و امنیت | hack & security

the Little black book of computer viruses

the Little black book of computer viruses

The Little Black Book of Computer Viruses has seen five good years in print. In those five years it has opened a door to seriously ask the question whether it is better to make technical information about computer viruses known or not.


دانلود رایگان کتاب

Cryptography and Network Security: Principles and Practice (5th Edition)

کتاب رمزنگاری و امنیت شبکه استالینگز یک بررسی عملی از رمزنگاری و امنیت شبکه با پشتیبانی بی نظیر برای مدرسان و دانشجویان فراهم می کند. و می تواند برای متخصصین امنیت، دانشجویان و اساتید رشته های کامپیوتر، فناوری اطلاعات و الکترونیک و کسانی که می خواهند در حوزه ی امنیت شبکه پژوهش کنند مفید باشد.

سرفصل ها:

Chapter 0 Reader’s Guide

Chapter 1 Overview

Chapter 2 Classical Encryption Techniques

Chapter 3 Block Ciphers and the Data Encryption Standard

Chapter 4 Basic Concepts in Number Theory and Finite Fields

Chapter 5 Advanced Encryption Standard

Chapter 6 Block Cipher Operation

Chapter 7 Pseudorandom Number Generation and Stream Ciphers

Chapter 8 More Number Theory

Chapter 9 Public-Key Cryptography and RSA

Chapter 10 Other Public-Key Cryptosystems

Chapter 11 Cryptographic Hash Functions

Chapter 12 Message Authentication Codes

Chapter 13 Digital Signatures

Chapter 14 Key Management and Distribution

Chapter 15 User Authentication Protocols

Chapter 16 Transport-Level Security

Chapter 17 Wireless Network Security

Chapter 18 Electronic Mail Security

Chapter 19 IP Security

مشخصات کتاب:

نویسنده: William Stallings

ناشر: Pearson

سال نشر: ۲۰۱۰

تعداد صفحات: ۷۴۴


دانلود رایگان کتاب

Bitcoin Hacking Protect Yourself From Hackers

Bitcoin Hacking Protect Yourself From Hackers

Bitcoin Hacking

Protect yourself, and your Bitcoins from hackers, by learning their methods.
This book is going to share with you some of the ways that hackers can get your Bitcoins, and do with them as they please. All without a trace of evidence landing back to them.

This is all too real. And it goes on daily, as we speak.

If you are invested in Bitcoin, or any type of investment, crypto, or not. You should read this short, to the point book.

The patterns of hackers is clear to see, once you know what they do.

Protect your investments against all hacking, and data theft.

دانلود رایگان کتاب
Gray Hat Python: Python Programming for Hackers and Reverse Engineers 1st Edition

Gray Hat Python: Python Programming for Hackers and Reverse Engineers 1st Edition

Python is fast becoming the programming language of choice for hackers, reverse engineers, and software testers because it’s easy to write quickly, and it has the low-level support and libraries that make hackers happy.

But until now, there has been no real manual on how to use Python for a variety of hacking tasks. You had to dig through forum posts and man pages, endlessly tweaking your own code to get everything working. Not anymore.

Gray Hat Python explains the concepts behind hacking tools and techniques like debuggers, trojans, fuzzers, and emulators. But author Justin Seitz goes beyond theory, showing you how to harness existing Python-based security tools – and how to build your own when the pre-built ones won’t cut it.

You’ll learn how to:

Automate tedious reversing and security tasks

Design and program your own debugger

Learn how to fuzz Windows drivers and create powerful fuzzers from scratch

Have fun with code and library injection, soft and hard hooking techniques, and other software trickery

Sniff secure traffic out of an encrypted web browser session

Use PyDBG, Immunity Debugger, Sulley, IDAPython, PyEMU, and more


دانلود رایگان کتاب

Hacking: World Class Hacking

This book includes three different computer technology books in 1:

Hacking: Become a World Class Hacker, Hack Any Password, Program Or System With Proven Strategies and Tricks

Cyber Security: Understand Hacking and Protect Yourself and Your Organization From Ever Getting Hacked

Python Programming: Fluent In Python – Code Examples, Tips & Trick for Beginners

Hacking, puzzles, and code breaking have always been something humans have been interested in. Even if we refer back to the famous enigma during world war two or back to the clues the ancient society left us, we love to engage in code breaking one way or the other.

Today, most of that code breaking involves computers and in large extent hacking. Hacking, cyber security, and programming have become a part of every organization and company.

With all the confidential information floating around the internet, a lot of criminals get into the hacking and cyber war as well.

Learning to hack your competitor and protect yourself have become one of the most important skill to protect your business today. By doing so you can focus on serving your customers and deliver to your clients, without fear of having your computer infrastructure shoot down.

This three book bundle including all three parts that will make you a great hacker!


دانلود رایگان کتاب

Linux Firewalls: Enhancing Security with nftables and Beyond

Linux Firewalls: Enhancing Security with nftables and Beyond

As the security challenges facing Linux system and network administrators have grown, the security tools and techniques available to them have improved dramatically. In Linux® Firewalls, Fourth Edition, long-time Linux security expert Steve Suehring has revamped his definitive Linux firewall guide to cover the important advances in Linux security.

An indispensable working resource for every Linux administrator concerned with security, this guide presents comprehensive coverage of both iptables and nftables. Building on the solid networking and firewalling foundation in previous editions, it also adds coverage of modern tools and techniques for detecting exploits and intrusions, and much more.

Distribution neutral throughout, this edition is fully updated for today’s Linux kernels, and includes current code examples and support scripts for Red Hat/Fedora, Ubuntu, and Debian implementations. If you’re a Linux professional, it will help you establish an understanding of security for any Linux system, and for networks of all sizes, from home to enterprise.

Inside, you’ll find just what you need to

Install, configure, and update a Linux firewall running either iptables or nftables

Migrate to nftables, or take advantage of the latest iptables enhancements

Manage complex multiple firewall configurations

Create, debug, and optimize firewall rules

Use Samhain and other tools to protect filesystem integrity, monitor networks, and detect intrusions

Harden systems against port scanning and other attacks

Uncover exploits such as rootkits and backdoors with chkrootkit


دانلود رایگان کتاب

Take Control of Wi-Fi Networking and Security

Take Control of Wi-Fi Networking and Security

Take Control of Wi-Fi Networking and Security

Wi-Fi is nearing two decades old. It’s much easier to set up and use than in the past, but the intricacies of creating a robust home or small-office network that has solid and fast coverage everywhere you want it can remain a struggle.

This book is designed to offer guidance at every step of the way, and reduce your frustration with the terminology and arcana required to make decisions.

Because we all now use many different kinds of equipment on a modern Wi-Fi networks, I provide detailed, illustrated advice on connecting and configuring hardware running macOS, iOS, Android, Windows 10, and ChromeOS to work with various Wi-Fi features. After surveying popular Wi-Fi gateways, I provide advice compatible with nearly all hardware on the market.

If you’re trying to understand the difference between standard Wi-Fi networks and new mesh wireless networks, I go into great detail, and help you decide which may serve you better. I also provide information on how to plan a network and locate the Wi-Fi network devices that provide service to your various connected equipped, from computers to game systems to sous vide cookers.

This book will also help you set up and use personal hotspots, add printers and use networked drives, manage wireless security, and make sure your own data is secured when you use Wi-Fi on your own or other networks.


دانلود رایگان کتاب

The Basics of Information Security

The Basics of Information Security

As part of the Syngress Basics series, The Basics of Information Security provides you with fundamental knowledge of information security in both theoretical and practical aspects.

Author Jason Andress gives you the basic knowledge needed to understand the key concepts of confidentiality, integrity, and availability, and then dives into practical applications of these ideas in the areas of operational, physical, network, application, and operating system security.

The Basics of Information Security gives you clear-non-technical explanations of how infosec works and how to apply these principles whether you’re in the IT field or want to understand how it affects your career and business. The new Second Edition has been updated for the latest trends and threats, including new material on many infosec subjects.

  • Learn about information security without wading through a huge textbook
  • Covers both theoretical and practical aspects of information security
  • Provides a broad view of the information security field in a concise manner
  • All-new Second Edition updated for the latest information security trends and threats, including material on incident response, social engineering, security awareness, risk management, and legal/regulatory issues


دانلود رایگان کتاب

Ethical Hacking and Countermeasures: Linux, Macintosh and Mobile Systems

Ethical Hacking and Countermeasures: Linux, Macintosh and Mobile Systems

مجموعه ی Ethical Hacking and Countermeasures از پنج کتاب تشکیل شده است که مباحث مربوط به امنیت شبکه، هک قانونمند و حفاظت از شبکه و اقدامات متقابل را پوشش می دهند. محتوای این مجموعه به گونه ای طراحی شده که خواننده را در یک محیط تعاملی فرو می برد و در آن چگونگی اسکن، تست، هک و سیستم های اطلاعاتی امن نشان داده خواهد شد.

با این مجموعه کتابها خواننده دانش لازم را کسب خواهد کرد و تجربه ی عملی با سیستم های امن اساسی حاصل می شود و برای موفقیت در آزمون Certified Ethical Hacker یا C|EH آماده می شود.

با بدست آوردن درک کامل از نحوه ی عمل هکرها، یک هکر قانونمند قادر به راه اندازی اقدامات متقابل قوی و سیستم های دفاعی برای حفاظت از زیرساخت های حیاتی سازمان و اطلاعات خواهد بود.

سرفصل ها:

Chapter1: Linux Hacking
Chapter2: Macintosh Hacking
Chapter3: Hacking Routers, Cable Modems, and Firewalls
Chapter4: Hacking Mobile Phones, PDAs and Handheld Devices
Chapter5: Bluetooth Hacking
Chapter6: RFID Hacking
Chapter7: Hacking USB Devices



نویسنده: EC-Council

ناشر: Cengage Learning

سال نشر: ۲۰۰۹

تعداد صفحات: ۱۸۶


دانلود رایگان کتاب

Hacking For Dummies

Hacking For Dummies

welcome to Hacking For Dummies, 5th Edition

This book outlines in plain English computer hacker tricks and techniques that you can use to assess the security of your information systems, find the vulnerabilities that matter, and fix the weaknesses before criminal hackers and malicious insiders take advantage of them This hacking is the professionala boveboard, and legal type of security testing which I often refer to as ethical hacking throughout the book,

سرفصل ها:

Part I: Building the Foundation for Security Testing

Chapter 1: Introduction to Ethical Hacking

Chapter 2: Cracking the Hacker Mindset

Chapter 3: Developing Your Ethical Hacking Plan

Chapter 4: Hacking Methodology

Part II: Putting Security Testing in Motion

Chapter 5: Information Gathering

Chapter 6: Social Engineering

Chapter 7: Physical Security

Chapter 8: Passwords

Part III: Hacking Network Hosts

Chapter 9: Network Infrastructure Systems

Chapter 10: Wireless Networks

Chapter 11: Mobile Devices

Part IV: Hacking Operating Systems

Chapter 12: Windows

Chapter 13: Linux

Part V: Hacking Applications

Chapter 14: Communication and Messaging Systems

Chapter 15: Web Applications and Mobile Apps

Chapter 16: Databases and Storage Systems

Part VI: Security Testing Aftermath

Chapter 17: Reporting Your Results

Chapter 18: Plugging Security Holes

Chapter 19: Managing Security Processes

Part VII: The Part of Tens

Chapter 20: Ten Tips for Getting Security Buy-In

Chapter 21: Ten Reasons Hacking Is the Only Effective Way to Test

Chapter 22: Ten Deadly Mistakes


نویسنده:Kevin Beaver

ناشر:John Wiley & Sons

سال نشر:۲۰۱۷

تعداد صفحات:۴۱۰


دانلود رایگان کتاب