Книги по взлому, безопасности, сетям, Wap

n0n

Member
Joined
Feb 27, 2018
Messages
200
Reaction score
26
Advanced Wired and Wireless Networks
by Wysocki, Tadeusz A.; Dadej, Arek; Wysocki, Beata J. (Eds.)

0,11963,0-0-16-125472-0,00.jpg


Series: Multimedia Systems and Applications, Vol. 26
2004, IX, 270 p., Hardcover
ISBN: 0-387-22781-4


ADVANCED WIRED AND WIRELESS NETWORKS brings the reader a sample of recent research efforts representative of advances in the areas of recognized importance for the future Internet, such as ad hoc networking, mobility support and performance improvements in advanced networks and protocols.

In Part I, we bring ad-hoc networking closer to the reality of practical use. The focus is on more advanced scalable routing suitable for large networks, directed flooding useful in information dissemination networks, as well as self-configuration and security issues important in practical deployments. Part II illustrates the efforts towards development of advanced mobility support techniques (beyond traditional "mobile phone net") and Mobile IP technologies. The issues range from prediction based mobility support, through context transfer during Mobile IP handoff, to service provisioning platforms for heterogeneous networks. The focus of the final section concerns the performance of networks and protocols. Furthermore this section illustrates researchers’ interest in protocol enhancement requests for improved performance with advanced networks, reliable and efficient multicast methods in unreliable networks, and composite scheduling in programmable/active networks where computing resources equal network performance as transmission bandwidth.

ADVANCED WIRED AND WIRELESS NETWORKS is structured to meet the needs of a professional audience in industry, as well as graduate-level students in computer science and engineering.


Written for:
Professional audience in industry, graduate-level students in Computer Science and Engineering


Подробнее
http://www.springeronline.com/sgw/cda/frontpage/0,11855,5-40109-22-34955550-0,00.html

Содержание
http://www.springeronline.com/sgw/c...50-detailsPage%3Dppmmedia%7Ctoc%7Ctoc,00.html

Качаем
ftp://ftp.netz.ru/Books/net/Springer.Advanced.Wired.and.Wireless.Networks(by.n0n_www.netz.ru).rar
7,5 Мб


[ADDED=n0n]1109627122[/ADDED]
Advances in Security and Payment Methods for Mobile Commerce
by Wen-Chen Hu , Chung-wei Lee , Weidong Kou; University of North Dakota, USA; Auburn University, USA; Xidian University, USA

1591403456-hu-thumbnail.jpg


Our Price: $80.96 US List Price: $89.95
ISBN:1-59140-345-6
Imprint:IGP
Number of pages:Hard Cover; 351 pages
Copyright:2005


Recently, the emergence of wireless and mobile networks has made possible the admission of electronic commerce to a new application and research subject: mobile commerce, defined as the exchange or buying and selling of commodities, services, or information on the Internet through the use of mobile handheld devices. In just a few years, mobile commerce has emerged from nowhere to become the hottest new trend in business transactions. However, the prosperity and popularity of mobile commerce will be brought to a higher level only if information is securely and safely exchanged among end systems (mobile users and content providers). Advances in Security and Payment Methods for Mobile Commerce includes high-quality research papers and industrial and practice articles in the areas of mobile commerce security and payment from academics and industrialists. It covers research and development results of lasting significance in the theory, design, implementation, analysis, and application of mobile commerce security and payment.

Подробнее
http://www.idea-group.com/books/details.asp?id=4489

Содержание
http://www.idea-group.com/books/additional.asp?id=4489&title=Table+Of+Contents&col=contents

Качаем
ftp://ftp.netz.ru/Books/sec/Idea.Group.Publishing.Advances.in.Security.and.Payment.Methods.for.Mobile.Commerce(by.n0n_www.netz.ru).rar
4,4 Мб
 
Last edited by a moderator:

n0n

Member
Joined
Feb 27, 2018
Messages
200
Reaction score
26
3G Handset and Network Design

3G Handset and Network Design
by Geoff Varrall, Roger Belcher

3ghandsetandnetworkdesi1uw.gif


Paperback: 532 pages
Publisher: Wiley (February 21, 2003)
ISBN: 0471229369
Product Dimensions: 9.3 x 7.4 x 1.2 inches


Book Info
Written for hardware and software engineers, this hands-on guide shows you how to integrate handheld devices and cell phones with wireless network hardware and software. Softcover.

Product Description:
  • Third Generation (3G) wireless networks are in the works in Europe and Asia, and 2.5G networks that incorporate some 3G features are being rolled out in the United States
  • Hands-on guide to integrating cell phone or PDA/portable PC products with present and future wireless network hardware
  • Addresses topics such as quality of service (QoS) and service level agreements (SLAs) from a wireless perspective
  • Presents an in-depth review of both handset and network hardware and software


Подробнее
http://www.amazon.com/exec/obidos/t...f=sr_1_1/102-3189036-9790545?v=glance&s=books

Качаем
ftp://ftp.netz.ru/Books/sec/John.Wi...et.And.Network.Design(by.n0n_www.netz.ru).rar
6 Mb
 
Last edited by a moderator:

n0n

Member
Joined
Feb 27, 2018
Messages
200
Reaction score
26
Home Networking Bible
by Sue Plumley

homenetworkingbible5da.gif



Paperback: 765 pages
Publisher: John Wiley & Sons; 2 edition (February 9, 2004)
ISBN: 0764544160
Product Dimensions: 9.2 x 7.3 x 1.7 inches
Shipping Weight: 2.6 pounds.



Book Info
Designed to help home networkers plan and prepare for networks, purchase the appropriate equipment and software, install the networking equipment, and make it work with Windows 95 or 98. Softcover. --This text refers to an out of print or unavailable edition of this title.

Product Description:
Everything you need to know to set up a home network

Is a home network for you? This comprehensive guide covers everything from deciding what type of network meets your needs to setting up the hardware and software, connecting different operating systems, installing the necessary applications, managing the network, and even adding home entertainment devices. Fully updated with new material on all the latest systems and methods, it·s just what you need to set up your network and keep it running safely and successfully.

Inside, you·ll find complete coverage of home networking
  • Compare the advantages and disadvantages of wired and wireless networks
  • Understand how to choose between workgroup and client/server networking
  • Learn how to install and set up cables and routers and how to install and configure networking software
  • Share files, printers, and a single Internet connection
  • Back up files and secure your network
  • Set up your own home intranet and understand the technologies involved in creating a Web page
  • Manage your network and learn to use tools for locating and repairing problems
  • Expand your home network to include your digital camera, scanner, TV, sound system, and even game consoles
  • Explore SmartHome technology that allows you to automate various household functions
  • Investigate how your network can enable tele-commuting and other remote access capabilities


Подробнее
http://www.amazon.com/exec/obidos/A...1/sr=2-1/ref=pd_bbs_b_2_1/102-3189036-9790545

Качаем
ftp://ftp.netz.ru/Books/sec/John.Wiley.And.Sons.Home.Networking.Bible(by.n0n_www.netz.ru).rar
5.3 Mb
 
  • Like
Reactions: Slu

.ifZ!

GOLD
Joined
Oct 3, 2020
Messages
154
Reaction score
10
Age
35
Hacker Secret Book __http://barnov.ath.cx/books/security/Hacker%20Secret%20Book.pdf
 

n0n

Member
Joined
Feb 27, 2018
Messages
200
Reaction score
26
Apache Security

Apache Security
by IVAN RISTIC

coverlow9pj.jpg


Paperback: 432 pages
Publisher: O'Reilly & Associates (March 15, 2005)
ISBN: 0596007248
Product Dimensions: 9.4 x 7.0 x 1.1 inches
Shipping Weight: 1.5 pounds.


___________________________________


Product Description:
With more than 67% of web servers running Apache, it is by far the most widely used web server platform in the world. Apache has evolved into a powerful system that easily rivals other HTTP servers in terms of functionality, efficiency, and speed. Despite these impressive capabilities, though, Apache is only a beneficial tool if it's a secure one. To be sure, administrators installing and configuring Apache still need a sure-fire way to secure it--whether it's running a huge e-commerce operation, corporate intranet, or just a small hobby site. Our new guide, Apache Security, gives administrators and webmasters just what they crave--a comprehensive security source for Apache. Successfully combining Apache administration and web security topics, Apache Security speaks to nearly everyone in the field. What's more, it offers a concise introduction to the theory of securing Apache, as well as a broad perspective on server security in general. But this book isn't just about theory. The real strength of Apache Security lies in its wealth of interesting and practical advice, with many real-life examples and solutions. Administrators and programmers will learn how to:
  • install and configure Apache
  • prevent denial of service (DoS) and other attacks
  • securely share servers
  • control logging and monitoring
  • secure custom-written web applications
  • conduct a web security assessment
  • use mod_security and other security-related modules
And that's just the tip of the iceberg, as mainstream Apache users will also gain valuable information on PHP and SSL/ TLS. Clearly, Apache Security is packed and to the point, with plenty of details for locking down this extremely popular and versatile web server.


Подробнее:
http://www.amazon.com/exec/obidos/tg/detail/-/0596007248/103-7569777-2019866

Качаем:
ftp://ftp.netz.ru/Books/sec/Oreilly.Apache.Security.Mar.2005.(by.n0n_www.netz.ru).zip
1,6 Мб


__________________________________

Внимание! Какдый, кто напишет, что книга не качается, получит 5 штрафных баллов! Все ссылки, которые начинаются с ftp://ftp.netz.ru рабочие! Единственное, что может случиться, так это ошибка, возникающая из-за того, что на нашём ftp стоит ограничение в 330 пользователей, которые могут одновременно скачивать файлы с нашего сервера. Эта ошибка есть сообщение о том, что необходимо ввести пароль. Так что, возможно, придётся немного подождать. Есть ещё ограничение на листинг директорий под анонимным пользователем. А так, как почти все ftp-клиенты по умолчанию перед тем, как качать, сначала делают листниг директории для проверки наличия файла, то возникает 550-ая ошибка. Используем обычные качалки типа FlashGet.
 

n0n

Member
Joined
Feb 27, 2018
Messages
200
Reaction score
26
Linux Network Administrator's Guide (3rd Edition)
by Tony Bautts, Terry Dawson, Gregor N. Purdy

coverlow0gc.jpg


Paperback: 338 pages
Publisher: O'Reilly & Associates; 3rd edition (February 4, 2005)
ISBN: 0596005482
Product Dimensions: 9.4 x 7.1 x 0.9 inches
Shipping Weight: 1.3 pounds


Product Description:
The Linux Network Administrator's Guide, Third Edition dispenses all the practical advice you need to join a network. Along with some hardware considerations, this highly acclaimed guide takes an in-depth look at all of the essential networking software that comes with the operating system--including basic infrastructure (TCP/IP, wireless networking, firewalling) and the most popular services on Linux systems. But as the follow-up to a classic, the third edition of the Linux Network Administrator's Guide does more than just spruce up the basics. It also provides the very latest information on the following cutting-edge services:
  • Wireless hubs
  • OpenLDAP
  • FreeS/WAN
  • IMAP
  • Spam filtering
  • OpenSSH
  • BIND
  • IPv6
Featuring a litany of insider tips and techniques, the Linux Network Administrator's Guide, Third Edition is an invaluable companion for any network administrator interested in integrating Linux into their Windows environment Authored by Terry Dawson, Tony Bautts, and Gregor N. Purdy, the Linux Network Administrator's Guide, Third Edition emerged from the Linux Documentation Project (LDP). The LDP's goal is to centralize all of the issues of Linux documentation, ranging from online documentation topics such as installing, using, and running Linux.


Подробнее
http://www.amazon.com/exec/obidos/tg/detail/-/0596005482/103-7569777-2019866

Качаем
ftp://ftp.netz.ru/Books/os/Oreilly....3rd.edition.Feb.2005.(by.n0n_www.netz.ru).zip
1.1 MB


___________________________________

Внимание! Какдый, кто напишет, что книга не качается, получит 5 штрафных баллов! Все ссылки, которые начинаются с ftp://ftp.netz.ru рабочие! Единственное, что может случиться, так это ошибка, возникающая из-за того, что на нашём ftp стоит ограничение в 330 пользователей, которые могут одновременно скачивать файлы с нашего сервера. Эта ошибка есть сообщение о том, что необходимо ввести пароль. Так что, возможно, придётся немного подождать. Есть ещё ограничение на листинг директорий под анонимным пользователем. А так, как почти все ftp-клиенты по умолчанию перед тем, как качать, сначала делают листниг директории для проверки наличия файла, то возникает 550-ая ошибка. Используем обычные качалки типа FlashGet.
 
Last edited by a moderator:
R

Rexx72

oops... (кровопролитные кнопки будут всем греком к мне.... hehehe) смогло кто-то уничтожить это для меня.

oops... (bloody buttons are all greek to me.... hehehe) could someone delete this for me.
 
Last edited by a moderator:
R

Rexx72

Mattew said:
wl.jpg


Publisher : O'Reilly
Pub Date : September 2003
ISBN : 0-596-00559-8
Pages : 304


Written for the intermediate to advanced wireless user, Wireless Hacks is full of direct, ractical, ingenious solutions to real-world networking problems. Whether your wireless network needs to extend to the edge of your office or to the other end of town, this collection of non-obvious, "from the field" techniques will show you how to get the job done...

[4.0mb]

_http://matriks.info/OReilly.-.Wireless.Hacks.100.Industrial.-.Strength.Tips.and.Tools.rar

Hi уверено если anyones интересуемые но над соединением no longer не работают однако, то я нашел книгу на этой странице. И вся серия больше на радиотелеграфе. Извинения если это знанные ресурс и я топчет на someones, то toes. _ttp://www.wns.ru/library.html (переведено с babelfish.altavista.com)

Hi, Not sure if anyones interested but above link no longer works. however I did find the book on this page. And a whole lot more on Wireless. Apologies if this a known resource and I'm treading on someones toes. _ttp://www.wns.ru/library.html
 

pariman

ex-Team DUMPz
Joined
Mar 10, 2004
Messages
1,718
Reaction score
983
Location
Ukraine
Hack Attacks Revealed - A Complete Reference with Custom Security Hacking Toolkit
by John Chirillo

7tprzorjopjn5bd.jpg


Publisher: John Wiley & Sons, Inc.;
ISBN: B00005V5UF; (April 2001), : 960 pages
_http://rapidshare.de/files/1437523/HARACRWCS.zip.html

=======================

Hack Proofing Your E-Commerce

B00006929E.01._PE_PI_SCMZZZZZZZ_.jpg


Digital: 512 pages
Publisher: Syngress Publishing
ISBN: 1-928994-27-X
_http://rapidshare.de/files/1437579/HPYE-CS.zip.html

=======================

O'Reilly - IRC Hacks: 100 Industrial-Strength Tips and Tools
by Paul Mutton

059600687X.01._AA400_SCLZZZZZZZ_.jpg


ISBN: 0-596-00687-X,
432 Pages, July 2004.
_http://rapidshare.de/files/1437847/IRCH100ISTT.zip.html
 

pariman

ex-Team DUMPz
Joined
Mar 10, 2004
Messages
1,718
Reaction score
983
Location
Ukraine
GPRS for Mobile Internet

158053600X.01._AA400_SCLZZZZZZZ_.jpg


by Emmanuel Seurre, Patrick Savelli, Pierre-Jean Pietri.
ISBN: 1-58053-600-X,
438 Pages, January 2003.
_http://rapidshare.de/files/1425209/GPRSMI.zip.html
 

pariman

ex-Team DUMPz
Joined
Mar 10, 2004
Messages
1,718
Reaction score
983
Location
Ukraine
Absolute Beginner's Guide to Wi-Fi Wireless Networking
by Harold Davis

0789731150.01._PE32_SCMZZZZZZZ_.jpg


Publisher: Que
ISBN: 0-7897-3115-0,
312 Pages, April 2004

Book Description
WiFi is one of the fastest growing technologies of all time and everyone is interested in learning how to use it. This book makes all the information about WiFi, including the standards and protocols, and how they relate easy to understand. This book covers everything about WiFi, from what to look for how to set up a users computer with WiFi to finding hotspots and access points. Users will be able to configure a home network and share internet connections quickly and easily. And all important security issues are covered so that a user is less exposed to threats.

Download:
http://rapidshare.de/files/1422560/ABGWi-FiWN.zip.html
 

pariman

ex-Team DUMPz
Joined
Mar 10, 2004
Messages
1,718
Reaction score
983
Location
Ukraine
Computer Network & Internet Security
by Brett C. Tjaden

1887902635.01._SCLZZZZZZZ_.jpg


Paperback: 200 pages
Publisher: ABF Content; 1st edition (February 15, 2001)
ISBN: 1887902635

Download:
http://rapidshare.de/files/1424139/CN_IS.zip.html

=========================

Cyber Adversary Characterization: Auditing the Hacker Mind
by Tom Parker, Marcus Sachs, Eric Shaw, Ed Stroz, Matthew G. Devost.

1931836116.01._SCLZZZZZZZ_.jpg


Publisher: Syngress
ISBN: 1-931836-11-6,
356 Pages, June 2004.

Download:
http://rapidshare.de/files/1424178/CACAHM.zip.html
 
Last edited by a moderator:

tosa

Member
Joined
Aug 26, 2005
Messages
7
Reaction score
0
Location
msk
Помогите найти книгу (на любом языке):

RUS:
Скляров Д. Искусство защиты и взлома информации

ENG:
Dmitry Sklyarov. Hidden Keys to Software Break-Ins and Unauthorized Entry.

PLS!!!
 

okun

Legendary
Joined
May 3, 2014
Messages
6,047
Reaction score
2,975
Deposit
$ 500
Honeypots for Windows

1590593359.01.lzzzzzzz.jpg


Roger A. Grimes
ISBN 1590593359

The Book will cover installing, configuring, and maintaining security Honeypots on Windows platforms. The Book will specifically cover the popular open source Honeypot product called honeyd, and summarize other commercial Honeypot solutions. There are no computer security books covering Honeypots (or IDSs) as they run on Windows platforms.

If you're a developer who's tired of reading Unix and Linux documentation and newsgroup letters to get information on building and maintaining a Windows-based Honeypot, then this book is for you. No longer will you have to rummage through Unix-only advice and utilities to extract information relevant to your Windows deployment. This insightful guide will teach you special tricks and provide troubleshooting tips to help you efficiently run and maintain a Windows-based Honeypot.

Target audience: Windows network and security administrators; intrusion detection software users; subscribers to Honeypot mailing list; readers of other author’s Honeypot books - all are very Unix-centric.

Здесь. (16821460 Bytes) netz.ru
 

okun

Legendary
Joined
May 3, 2014
Messages
6,047
Reaction score
2,975
Deposit
$ 500
Network Security Tools
By Justin Clarke, Nitesh Dhanjani

nst4da.jpg


Publisher: O'Reilly
Pub Date: April 2005
ISBN: 0-596-00794-9
Pages: 352

This concise, high-end guide shows experienced administrators how to customize and extend popular open source security tools such as Nikto, Ettercap, and Nessus. It also addresses port scanners, packet injectors, network sniffers, and web assessment tools. Network Security Tools is the one resource you want at your side when locking down your network.

Здесь. (1344564 Bytes) netz.ru
 

piatak

Member
Joined
Dec 9, 2005
Messages
18
Reaction score
1
Location
yug zone
karpinskiy1 said:
Вот KiN залил, pабираем:

KIN, какими правами нужно обладать что-бы скачивать?

сорри поспешил, Эта ошибка есть сообщение о том, что необходимо ввести пароль.
 
Last edited by a moderator:

MOCKuT

Member
Joined
Nov 26, 2003
Messages
795
Reaction score
948
Location
Москва
Cryptography - An End-to-End Systems Approach to Elliptic Curve Cryptography.pdf
Cryptography - An Introduction To Cryptography.pdf
Cryptography - Block Ciphers And Cryptanalysis.pdf
Cryptography - Body of Secrets.pdf
Cryptography - CISSP Study Guide On Cryptography.pdf
Cryptography - Cloning and Cryptography with Quantum Continuous Variables.pdf
Cryptography - Codierungstheorie und Kryptographie.pdf
Cryptography - Coding and Cryptography.pdf
Cryptography - CRISIS - Cryptography's Role in Securing the Information Society.pdf
Cryptography - Cryptographic Token Interface Standard - RSA Labs.pdf
Cryptography - Cryptography And Data Security.pdf
Cryptography - Detecting Steganographic Content on the Internet.pdf
Cryptography - Einfuhrung in die Kryptographie.pdf
Cryptography - Elliptic Curves and Cryptography.pdf
Cryptography - Exposing Cryptovirology.pdf
Cryptography - Factoring Large Numbers with the TWIRL device.pdf
Cryptography - Foundations of Cryptography.pdf
Cryptography - GPG Crypto From Gnu Manual.pdf
Cryptography - Handbook Of Applied Cryptography (old).pdf
Cryptography - Handbook Of Applied Cryptography.pdf
Cryptography - High-Speed RSA Implementation.pdf
Cryptography - Informationstheorie Codierung und Kryptographie.pdf
Cryptography - Intro To Cryptography.pdf
Cryptography - Key Agreement and Key Transport Using Elliptic Curve Cryptography.pdf
Cryptography - Kryptologie - Eine Einfuhrung.pdf
Cryptography - Lecture Notes on Cryptography.pdf
Cryptography - New Encryption Technologies for Communications Designers.pdf
Cryptography - Number Theory An Related Alghoritm In Cryptography.pdf
Cryptography - Practical Cryptography.pdf
Cryptography - RAS Suggestion to Random Number Generation in Software.pdf
Cryptography - Rechtsfragen der Kryptographie und der digitalen Signatur.pdf
Cryptography - Report Advanced Cryptography Standard AES.pdf
Cryptography - RSA Encryption Algorithm in a Nut Shell.pdf
Cryptography - RSA Hardware Implementation.pdf
Cryptography - RSA Labs FAQ 4.0.pdf
Cryptography - tecCHANNEL - Kryptographie Grundlagen.pdf
Cryptography - Theory And Practice.pdf
Cryptography - Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems.pdf
Cryptography - Twenty Years of Attacks on the RSA Cryptosystem.pdf
Cryptography, C - Applied Cryptography 2nd Edition Protocols, Algorthms, And Source Code In C.pdf
Cryptography, Java - Introduction To Cryptography With Java Applets.pdf
Cryptography, Java - Java Cryptography.pdf

File size: 61.6 Mb
File ID: 6546909
Download Link: http://www.axifile.com?6546909
 

z0id

Member
Joined
Apr 18, 2005
Messages
390
Reaction score
171
Age
38
Location
Москва
Google Hacking for Penetration Testers
by Johnny Long, Ed Skoudis (Foreword), Alrik van Eijkelenborg (Editor)



Product Details:

Author: Johnny Long, Foreword by Ed Skoudis
Paperback: 528 pages
Publisher: Syngress; 1 edition (June 1, 2001)
Language: English
ISBN: 1931836361
Product Dimensions: 9.1 x 7.1 x 1.2 inches
Shipping Weight: 1.8 pounds.

Contents of this Book:

1. Google Searching Basics
2. Advanced Operators
3. Google Hacking Basics
4. Preassesssment
5. Network Mapping
6. Locating Exploits and Finding Targets
7. Ten Simple Security Searches That Work
8. Tracking Down Web Servers, Login Portals, and Network Hardware
9. Usernames, Passwords, and Secret Stuff, Oh My!
10. Document Grinding and Database Digging
11. Protecting Yourself from Google Hackers
12. Automating Google Searches
13. Professional Security Testing
14. An Introduction to Web Application Security

Format: PDF
(~10Mb)

Скачать
 
Last edited by a moderator:

mrli

New member
Joined
Mar 12, 2006
Messages
3
Reaction score
1
Age
43
Location
Katmandu
Слезно разыскиваю, если видел кто или ухватить успел....
поделитесь porfavoure.... заклацаю "спасибами"

Title :Sockets, Shellcode, Porting, and Coding : Reverse Engineering Exploits and Tool Coding for Security Professionals
Publisher: Syngress; 1 edition (April 12, 2005)
Language: English
ISBN: 1597490059
 
Top