Sockets, Shellcode, Porting, and Coding: Reverse Engineering Exploits and Tool Coding for Security Professionals
James C Foster
Download - Immediately Available
Format: eBook (PDF)
Information Security Best Practices : 205 Basic Rules
George L Stefanek
Download - Immediately Available
Format: eBook (PDF)
Disappearing Cryptography : Information Hiding: Steganography & Watermarking
Peter Wayner
Download - Immediately Available
Format: eBook (PDF)
How to Cheat at Windows System Administration Using Command Line Scripts
Pawan K Bhardwaj
Download - Immediately Available
Format: eBook (PDF)
Joe Grand's Best of Hardware, Wireless, and Game Console Hacking
Joe Grand
Download - Immediately Available
Format: eBook (PDF)
Network Security Assessment: From Vulnerability to Patch
Steve Manzuik
Download - Immediately Available
Format: eBook (PDF)
Trojans, Worms, and Spyware : A Computer Security Professional's Guide to Malicious Code
Michael Erbschloe
Download - Immediately Available
Format: eBook (PDF)
Java Cryptography Extensions : Practical Guide for Programmers
Jason R. Weiss
Download - Immediately Available
Format: eBook (PDF)
The Best Damn Cybercrime and Digital Forensics Book Period
Anthony Reyes
Download - Immediately Available
Format: eBook (PDF)
Windows Forensic Analysis DVD Toolkit
Harlan Carvey
Download - Immediately Available
Format: eBook (PDF)
The Best Damn IT Security Management Book Period
Susan Snedaker
Download - Immediately Available
Format: eBook (PDF)
InfoSecurity 2008 Threat Analysis
Craig Schiller
Download - Immediately Available
Format: eBook (PDF)
Managing Catastrophic Loss of Sensitive Data : A Guide for IT and Security Professionals
Constantine Photopoulos
Download - Immediately Available
Format: eBook (PDF)
OS X Exploits and Defense : Own it...Just Like Windows or Linux!
Chris Hurley
Download - Immediately Available
Format: eBook (PDF)
TechnoSecurity's Guide to E-Discovery and Digital Forensics : A Comprehensive Handbook
Jack Wiles
Download - Immediately Available
Format: eBook (PDF)
SELinux by Example : Using Security Enhanced Linux
Frank Mayer
Download - Immediately Available
Format: eBook (PDF)
Security and Usability : Designing Secure Systems that People Can Use
Lorrie Faith Cranor
Download - Immediately Available
Format: eBook (PDF)
Building Internet Firewalls : Internet and Web Security
Elizabeth D. Zwicky
Download - Immediately Available
Format: eBook (PDF)
Hardening Cisco Routers : Help for Network Administrators
Thomas Akin
Download - Immediately Available
Format: eBook (PDF)
Programming .NET Security : Writing Secure Applications Using C# or Visual Basic .NET
Adam Freeman
Download - Immediately Available
Format: eBook (PDF)