Книги по взлому, безопасности, сетям, Wap

KiN

Founder
Coder
Professional Carder
Carder
Joined
Nov 20, 2013
Messages
1,599
Reaction score
1,691
В этой теме будем размещать книги по взлому, безопасности, сетям, WAP....
Вообщем если есть книги по криптографии, различным хакам то все кидаем сюда...


--------------------------------------

Ссылки не личить и нигде больше не выкладывать!
Хотите поделиться с кем-то книгами дайте список книг и ссылку на эту тему:

http://dumpz.ru/showthread.php?p=50781

И не более!
P.S. Если кто-нибудь увидит где-нибудь прямые ссылки на скачку большая просьба сообщать мне или любому из супермодераторов,
спасибо!

-----------------------

Большое всем спасибо за теплые слова благодарности, но согласно пункту III/15 общих правил, прошу воздержаться от постов в одно- три слова("спасибо", "биг респект" и т.п).
Пишите такие сообщения, чтобы и другие смогли прочесть что-то полезное для себя(как работает, читается, где еще есть книги по теме и т.п.).
Посты не несущие (для всех) смысловой нагрузки- очень засоряют темы(до линков не добраться) и поэтому они будут удаляться, так что без обид...

----
III/15. Создание сообщений типа "спасибо", "thanks" и т.п. категорически НЕ рекомендуется, для выражения благодарности есть служба личных сообщений(ЛС ака личка), специальный ТОПИК [http://dumpz.ru/showthread.php?t=4944], репутация и банеры внизу страницы .
Последний вариант приветствуется особо и этим Вы действительно нас благодарите...
 
Last edited by a moderator:
U

uuh

Ну вообщем страшновато, конечно, сюда что-либо постить. Ведь этот топик не просто так пустует. Он, скорее всего со смыслом пустует. Ну да ладно.
Книга не совсем хакерская, но зато автор книги самый расхакерский хакер.

The Art of Deception: Controlling the Human Element of Security
Kevin D. Mitnick, William L. Simon, Steve Wozniak (Foreword by)
368 pages
pdf
5,19 Mb
October 2002

_webfile.ru/78705 в течение 7 дней до 18:56 29.10.2004
 
M

Mattew

wl.jpg


Publisher : O'Reilly
Pub Date : September 2003
ISBN : 0-596-00559-8
Pages : 304


Written for the intermediate to advanced wireless user, Wireless Hacks is full of direct, ractical, ingenious solutions to real-world networking problems. Whether your wireless network needs to extend to the edge of your office or to the other end of town, this collection of non-obvious, "from the field" techniques will show you how to get the job done...

[4.0mb]

_http://matriks.info/OReilly.-.Wireless.Hacks.100.Industrial.-.Strength.Tips.and.Tools.rar
 

is-in

Member
Joined
Sep 23, 2004
Messages
64
Reaction score
3
Age
43
У мну есть архивчик со взора за пол года книг который там вылазмлм может что то надо ? Если да то могу пожделится, только куда и как ?
 

WWWovan

Member
Joined
Oct 30, 2004
Messages
27
Reaction score
0
Age
41
Location
Київ, Україна
А есть книги на эту тему на русском языке? У меня несколько имееться....Хотелось бы еще
 
Last edited by a moderator:
H

h0ma

WWWovan,
а какие книги у тебя на русском, списочек можеш выложить?
 

karpinskiy1

Member
Joined
Feb 23, 2004
Messages
283
Reaction score
89
Age
45
Вот KiN залил, pабираем:

Wireless Hacking: Projects For Wi-fi Enthusiasts
de Lee Barken, Eric Bermel, John Eder

193183637X.01.LZZZZZZZ.jpg

Product Details:
ISBN: 193183637X
Format: Paperback, 357pp
Pub. Date: October 2004
Размер электронной версии книги: 4,1 Мб

Product Description:
“Hardware Hacking” is not just a slogan--it’s a way of life for a huge group of technology enthusiasts who are mechanically inclined, but need that “extra little help” from a book in order to give them the confidence to roll up their sleeves and tackle a project. This book covers 802.11a/b/g (“Wi-Fi”) projects. In addition, it covers techniques for building outdoor enclosures and working with Linux and BSD to build, deploy, and manage wireless networks. All of the authors are members of the SoCalFreeNet Wireless Users Group, a group of technology enthusiasts dedicated to building and exploring community based wireless networks to enable widespread broadband adoption and create an empowered, connected society. They are experts in this field, with real-world experience, and hands-on knowledge.
The book includes coverage of: Wireless Hacking, Indoor/Outdoor Deployment Considerations, Wireless Network Models, 802.11 Access Points, 802.11 Client Cards, Wireless Operating Systems, Monitoring the Network, Low-Cost Commercial Options, Mesh Networks, Antennas and Outdoor Enclosure Projects, Antennas, Building Outdoor Enclosures & Antenna Masts, Solar Powered Access Points and Repeaters and Other Wireless Projects.

ftp://ftp.netz.ru/Books/sec/Wireless.Hacking.Projects.for.Wi-Fi.Enthusiasts.[Netz.Ru].rar
 
Last edited by a moderator:
X

-=xwx=-

ктото может выложить на другой сервак please...
 

karpinskiy1

Member
Joined
Feb 23, 2004
Messages
283
Reaction score
89
Age
45
Network Security Foundations
by Matthew Strebe

0782143741.01._SCLZZZZZZZ_.jpg

Product Details:
Paperback: 315 pages
Publisher: Sybex Inc (September 5, 2004)
ISBN: 0782143741
Product Dimensions: 9.0 x 7.4 x 0.8 inches
Размер электронной версии книги: 4,3 Мб
Product Description:
Anyone embarking on a career in IT security can benefit from a firm understanding of common security threats and the technologies used to counter them. Network Security Foundations assumes no prior knowledge of the subject and provides a solid introduction to the major issues involved, explaining the essentials of network security in simple terms with tangible examples. Aspiring IT security professionals will enjoy this book's straightforward approach and abundance of valuable information. Turn here to acquire the technology fundamentals for IT success.
Забираем: ftp://ftp.netz.ru/Books/sec/Books.Network.Security.Foundations.[Netz.Ru].rar
 
Last edited by a moderator:

pns11

New member
Joined
Jul 26, 2004
Messages
4
Reaction score
0
Age
54
Ренаме тхе линк фор Нетwорк Сецуриты фоундатионс *фтп://фтп.нетз.ру/Боокс/сец/Боокс.Нетwорк.Сецуриты.Фоундатионс.[Netz.Ru].рар

[ADDED=pns11]1106969522[/ADDED]
rename the link for Network security foundations _ftp://ftp.netz.ru/Books/sec/Books.Network.Security.Foundations.[Netz.Ru].rar
 
Last edited by a moderator:
G

goodman

I have upped it to=>
Code:
password=>J0hnG00dman
http://rapidshare.de/files-en/469927/1.rar.html
http://rapidshare.de/files-de/469927/1.rar.html
 

karpinskiy1

Member
Joined
Feb 23, 2004
Messages
283
Reaction score
89
Age
45
Книги от KiN_a:

1. Wi-Fi Toys: 15 Cool Wireless Projects for Home, Office, and Entertainment by Mike Outmesguine

0764558943.01._SCLZZZZZZZ_.jpg


Product Details:
Paperback: 408 pages
Publisher: John Wiley & Sons (June 21, 2004)
ISBN: 0764558943
Product Dimensions: 9.2 x 7.4 x 0.9 inches

Product Description:
This ultra-cool volume invites readers to tap into your inner geek and build seventeen ultra-cool wireless devices including a solar powered access point, a wireless picture frame that dynamically changes its own photos, and even a wireless car-to-car audio and video system
With a few simple tools, some off-the-shelf parts, and this book, readers will be creating wireless devices they never thought were possible-toys that certainly can't be found at the local computer store
Written by the cofounder and members of the Southern California Wireless Users Group, this book provides readers with hands-on instruction and insider tips and tricks from those who are on the bleeding edge of wireless technology
New addition to the ExtremeTech line of books-books for serious technophiles

Берем здесь: ftp://ftp.netz.ru/Books/sec/Wi.Fi.T...r.Home.Office.and.Entertainment.[Netz.Ru].rar
 
Last edited by a moderator:
U

ursus

To: karpinsky1

Проверь, пожалуйста, "Smart Environments". Там внутри Rar'a битые zip файлы, которые отказываются распаковываться. Пробовал и в Linux и в Windows, все одно.
 

n0n

Member
Joined
Feb 27, 2018
Messages
200
Reaction score
26
Network Security Bible

07645739771ku.jpg

Eric Cole, Ronald L. Krutz, James Conley
ISBN: 0-7645-7397-7
Paperback
694 pages
January 2005



  • A must for working network and security professionals as well as anyone in IS seeking to build competence in the increasingly important field of security
  • Written by three high-profile experts, including Eric Cole, an ex-CIA security guru who appears regularly on CNN and elsewhere in the media, and Ronald Krutz, a security pioneer who cowrote The CISSP Prep Guide and other security bestsellers
  • Covers everything from basic security principles and practices to the latest security threats and responses, including proven methods for diagnosing network vulnerabilities and insider secrets for boosting security effectiveness



Качаем
ftp://ftp.netz.ru/Books/sec/Network.Security.Bible.2005(by.n0n_www.netz.ru).rar

Размер 5,7 Мб

________________________________________________________________

Buffer Overflow Attacks:Detect, Exploit, Prevent

316web8dt.jpg


By James C. Foster, Foreword by Dave Aitel
520 pages
Size: 6x9



Will the Code You Write Today, Headline Tomorrow’s BugTraq Mail List?
Forensic investigations of notorious Internet attacks, such as the SQL Slammer and Blaster Worms, reveal buffer overflows to be the sophisticated hacker’s “vulnerability of choice.” These worms crippled the Internet and cost billions of dollars to clean up. Now, even more powerful and insidious threats have appeared in the form of “custom exploits.”

These one-time only exploits are custom crafted to attack your enterprise, making them even more difficult to detect and defend. No catchy names, no media coverage; just your own personal disaster.

James C. Foster’s Buffer Overflow Attacks clearly demonstrates that the only way to defend against the endless variety of buffer overflow attacks is to implement a comprehensive design, coding and test plan for all of your applications. From Dave Aitel’s Foreword through the last appendix, this is the only book dedicated exclusively to detecting, exploiting, and preventing buffer overflow attacks



Качаем
ftp://ftp.netz.ru/Books/sec/Buffer.Overflow.Attacks.Dec.2004(by.n0n_www.netz.ru).rar[/b]

Размер 3 Мб
 
Last edited by a moderator:
D

Dracon

Network Security Bible
_http://rapidshare.de/files-en/645143/Network.Security.Bible.Jan.2005.rar.html
 
Last edited by a moderator:

TDA

Member
Joined
Mar 26, 2004
Messages
6
Reaction score
0
Уже писалось, но если не трудно, перезалейте Interscience.Smart.Environments.Technology.Protocols.and.Applications.[Netz.Ru].rar. В нем ЗИПы битые...
 

andycpp

Member
Joined
Nov 29, 2004
Messages
15
Reaction score
0
Age
46
Interscience.Smart.Environments.Technology.Protoco ls.and.Applications.[Netz.Ru].rar - битые ZIP'ы внутри. Афтар, пишы исчо!!
 

n0n

Member
Joined
Feb 27, 2018
Messages
200
Reaction score
26
Перезалил
ftp://ftp.netz.ru/Books/sec/Wiley.Interscience.Smart.Environments.Technology.Protocols.and.Applications.Oct.2004(by.n0n_www.netz.ru).rar
 

n0n

Member
Joined
Feb 27, 2018
Messages
200
Reaction score
26
Hacking a Terror Network: The Silent Threat of Covert Channels
By Russ Rogers, Matthew G. Devost

314web2qx.jpg



Price: $39.95
448 pages
Size: 7 x 9.1875



“Hacking a Terror Network provides accurate technical detail in an intriguing fictional format. You will not want to put the book down and when you are done you will be amazed with how much you have learned.”— Dr. Eric Cole, Chief Scientist of The Sytex Group, Inc.

“Russ has done it again, a great story teller in person and from the printed page. The bad news is, this is not just another story, it is the cold frightening and exacting truth about the world that we now live in … everyday” –Chet Hosmer, CEO, WetStone Technologies, Inc.



Written by a certified Arabic linguist from the Defense Language Institute with extensive background in decoding encrypted communications, this cyber-thriller uses a fictional narrative to provide a fascinating and realistic "insiders look" into technically sophisticated covert terrorist communications over the Internet. The accompanying CD allows readers to "hack along" with the story line, by viewing the same Web sites described in the book containing encrypted, covert communications.

An American agent works with allies to discover the intent of a mysterious plot. Potential terrorist planning activities are hidden everywhere, but remain unseen. Only with the use of the most modern of technology and a little help from watchful citizens is there a chance to uncover the plot before someone gets hurt. As the terrorist break new ground in covert communication, agents must stretch their intelligence and imagination to understand how the terrorists are working together, who is in charge, and what the targets are.

Follow along with American agents by examining real covert communication, captured and stored on the included CDROM as this fictional story takes place. Browse the same websites used by the terrorists and examine the same images that could hold the key to saving the lives of thousands of people. Learn to see the hidden messages inside the Covert Channels used by the terrorists to plan their attacks.



Подробнее
http://www.syngress.com/catalog/?pid=3140


Качаем
ftp://ftp.netz.ru/Books/sec/Syngress.Hacking.a.Terror.Network.Nov.2004(by.n0n_www.netz.ru).rar
5,5 Mb
Если в линке появляются пробелы (%20) смело их удаляем.
 
Last edited by a moderator:
Top