Seems you have not registered as a member of alcohol-abuse-info.com!

You may have to register before you can download all our books and magazines, click the sign up button below to create a free account.

Sign up

The Mac Hacker's Handbook
  • Language: es
  • Pages: 384

The Mac Hacker's Handbook

As more and more vulnerabilities are found in the Mac OS X (Leopard) operating system, security researchers are realizing the importance of developing proof-of-concept exploits for those vulnerabilities. This unique tome is the first book to uncover the flaws in the Mac OS X operating system—and how to deal with them. Written by two white hat hackers, this book is aimed at making vital information known so that you can find ways to secure your Mac OS X systems, and examines the sorts of attacks that are prevented by Leopard’s security defenses, what attacks aren’t, and how to best handle those weaknesses.

Cracking Iphone Security
  • Language: en
  • Pages: 408

Cracking Iphone Security

A book that covers 2g and 3g iPhones and a future version of the iPhone hardware shows how to write secure iPhone applications, outlines the techniques hackers use to attack the device, examines vulnerabilities and provides in-depth analysis of the iPhone's built-in security and security testing.

The Art of Software Security Testing
  • Language: en
  • Pages: 312

The Art of Software Security Testing

State-of-the-Art Software Security Testing: Expert, Up to Date, and Comprehensive The Art of Software Security Testing delivers in-depth, up-to-date, battle-tested techniques for anticipating and identifying software security problems before the “bad guys” do. Drawing on decades of experience in application and penetration testing, this book’s authors can help you transform your approach from mere “verification” to proactive “attack.” The authors begin by systematically reviewing the design and coding vulnerabilities that can arise in software, and offering realistic guidance in avoiding them. Next, they show you ways to customize software debugging tools to test the unique asp...

iOS Hacker's Handbook
  • Language: en
  • Pages: 408

iOS Hacker's Handbook

Discover all the security risks and exploits that can threaten iOS-based mobile devices iOS is Apple's mobile operating system for the iPhone and iPad. With the introduction of iOS5, many security issues have come to light. This book explains and discusses them all. The award-winning author team, experts in Mac and iOS security, examines the vulnerabilities and the internals of iOS to show how attacks can be mitigated. The book explains how the operating system works, its overall security architecture, and the security risks associated with it, as well as exploits, rootkits, and other payloads developed for it. Covers iOS security architecture, vulnerability hunting, exploit writing, and how iOS jailbreaks work Explores iOS enterprise and encryption, code signing and memory protection, sandboxing, iPhone fuzzing, exploitation, ROP payloads, and baseband attacks Also examines kernel debugging and exploitation Companion website includes source code and tools to facilitate your efforts iOS Hacker's Handbook arms you with the tools needed to identify, understand, and foil iOS attacks.

A Bug Hunter's Diary
  • Language: en
  • Pages: 208

A Bug Hunter's Diary

Klein tracks down and exploits bugs in some of the world's most popular programs. Whether by browsing source code, poring over disassembly, or fuzzing live programs, readers get an over-the-shoulder glimpse into the world of a bug hunter as Klein unearths security flaws and uses them to take control of affected systems.

Computer Security Handbook, Set
  • Language: en
  • Pages: 2000

Computer Security Handbook, Set

Computer security touches every part of our daily lives from our computers and connected devices to the wireless signals around us. Breaches have real and immediate financial, privacy, and safety consequences. This handbook has compiled advice from top professionals working in the real world about how to minimize the possibility of computer security breaches in your systems. Written for professionals and college students, it provides comprehensive best guidance about how to minimize hacking, fraud, human error, the effects of natural disasters, and more. This essential and highly-regarded reference maintains timeless lessons and is fully revised and updated with current information on security issues for social networks, cloud computing, virtualization, and more.

Network Security Assessment
  • Language: en
  • Pages: 494

Network Security Assessment

How secure is your network? The best way to find out is to attack it, using the same tactics attackers employ to identify and exploit weaknesses. With the third edition of this practical book, you’ll learn how to perform network-based penetration testing in a structured manner. Security expert Chris McNab demonstrates common vulnerabilities, and the steps you can take to identify them in your environment. System complexity and attack surfaces continue to grow. This book provides a process to help you mitigate risks posed to your network. Each chapter includes a checklist summarizing attacker techniques, along with effective countermeasures you can use immediately. Learn how to effectively test system components, including: Common services such as SSH, FTP, Kerberos, SNMP, and LDAP Microsoft services, including NetBIOS, SMB, RPC, and RDP SMTP, POP3, and IMAP email services IPsec and PPTP services that provide secure network access TLS protocols and features providing transport security Web server software, including Microsoft IIS, Apache, and Nginx Frameworks including Rails, Django, Microsoft ASP.NET, and PHP Database servers, storage protocols, and distributed key-value stores

Uncle John's 24-Karat Gold Bathroom Reader
  • Language: en
  • Pages: 544

Uncle John's 24-Karat Gold Bathroom Reader

Uncle John’s 24th flagship edition is glittering with more than 500 all-new pages of absorbing material that prove once again why Uncle John makes the best-selling bathroom-reading series in the world. Uncle John’s 24th flagship edition glitters with more than 500 all-new pages of absorbing material that prove once again why Uncle John makes the best-selling bathroom-reading series in the world. The information miners at the Bathroom Readers’ Institute have unearthed a priceless collection of surprising, amazing, wow-inducing, and hilarious articles. Divided by length for your sitting convenience, 24-Karat Gold is chock-full of little-known history, random origins, weird news, celebrity secrets, urban legends, dumb criminals, clever wordplay, quirky quotations, and more. Just go to any page--who knows what treasures await you? Some samples: * Judges Gone Wild * The Barbie Scandals * Canada’s Underpants King * The History of the Umbrella * America’s Forbidden Island * Helen Keller: Vaudeville Star * The Double A-bomb Survivors * Mind Your Zarfs and Wambles * What the Hokey Pokey is Really All About And much, much more!

Practical Malware Analysis
  • Language: en
  • Pages: 800

Practical Malware Analysis

Introduces tools and techniques for analyzing and debugging malicious software, discussing how to set up a safe virtual environment, overcome malware tricks, and use five of the most popular packers.

Malicious Cryptography
  • Language: en
  • Pages: 416

Malicious Cryptography

Hackers have uncovered the dark side of cryptography—that device developed to defeat Trojan horses, viruses, password theft, and other cyber-crime. It’s called cryptovirology, the art of turning the very methods designed to protect your data into a means of subverting it. In this fascinating, disturbing volume, the experts who first identified cryptovirology show you exactly what you’re up against and how to fight back. They will take you inside the brilliant and devious mind of a hacker—as much an addict as the vacant-eyed denizen of the crackhouse—so you can feel the rush and recognize your opponent’s power. Then, they will arm you for the counterattack. This book reads like a futuristic fantasy, but be assured, the threat is ominously real. Vigilance is essential, now. Understand the mechanics of computationally secure information stealing Learn how non-zero sum Game Theory is used to develop survivable malware Discover how hackers use public key cryptography to mount extortion attacks Recognize and combat the danger of kleptographic attacks on smart-card devices Build a strong arsenal against a cryptovirology attack