Php Hacks

eBook Download

BOOK EXCERPT:

Offering hands-on tools that range from basic PHP and Pear installation and scripting to advanced multimedia and database optimizing tricks, this text includes hacks for integrating with iTunes, generating PDFs and using X10 to control home heating and security with PHP applications.

Product Details :

Genre : Computers
Author : Jack D. Herrington
Publisher : "O'Reilly Media, Inc."
Release : 2006
File : 468 Pages
ISBN-13 : 9780596101398


Sql Hacks

eBook Download

BOOK EXCERPT:

A guide to getting the most out of the SQL language covers such topics as sending SQL commands to a database, using advanced techniques, solving puzzles, performing searches, and managing users.

Product Details :

Genre : Computers
Author : Andrew Cumming
Publisher : O'Reilly Media, Inc.
Release : 2007
File : 428 Pages
ISBN-13 : UOM:39015066871016


Hacking Linux Exposed

eBook Download

BOOK EXCERPT:

From the publisher of the international bestseller, "Hacking Exposed: Network Security Secrets & Solutions, " comes this must-have security handbook for anyone running Linux. This up-to-date edition shows how to think like a Linux hacker in order to beat the Linux hacker.

Product Details :

Genre : Computers
Author : Brian Hatch
Publisher : McGraw-Hill/Osborne Media
Release : 2003
File : 746 Pages
ISBN-13 : 0072225645


Hack Attacks Denied

eBook Download

BOOK EXCERPT:

Arms you with the necessary security steps from the system to the daemon, concluding with an effective security policy. Contains over 170 new countermeasures, patching the top 75 hack attacks for Unix and Windows, cleanup and prevention of malicious code, and a full suite single license version of TigerSurf 2.0 security software.

Product Details :

Genre : Computers
Author : John Chirillo
Publisher : John Wiley & Sons
Release : 2002-09-23
File : 712 Pages
ISBN-13 : UCSD:31822032051914


Defeating The Hacker

eBook Download

BOOK EXCERPT:

Featuring crucial information on how to secure a network, this text covers IT security, hackers, crackers, phisers, spammers, scammers, virus-writers, Trojan horses, malware, spyware - and how to keep these technical afflictions out of computer systems.

Product Details :

Genre : Computers
Author : Robert Schifreen
Publisher : John Wiley & Sons
Release : 2006-04-24
File : 408 Pages
ISBN-13 : UCSC:32106017800506


Hacking Exposed Web Applications Second Edition

eBook Download

BOOK EXCERPT:

Implement bulletproof e-business security the proven Hacking Exposed way Defend against the latest Web-based attacks by looking at your Web applications through the eyes of a malicious intruder. Fully revised and updated to cover the latest Web exploitation techniques, Hacking Exposed Web Applications, Second Edition shows you, step-by-step, how cyber-criminals target vulnerable sites, gain access, steal critical data, and execute devastating attacks. All of the cutting-edge threats and vulnerabilities are covered in full detail alongside real-world examples, case studies, and battle-tested countermeasures from the authors' experiences as gray hat security professionals. Find out how hackers use infrastructure and application profiling to perform reconnaissance and enter vulnerable systems Get details on exploits, evasion techniques, and countermeasures for the most popular Web platforms, including IIS, Apache, PHP, and ASP.NET Learn the strengths and weaknesses of common Web authentication mechanisms, including password-based, multifactor, and single sign-on mechanisms like Passport See how to excise the heart of any Web application's access controls through advanced session analysis, hijacking, and fixation techniques Find and fix input validation flaws, including cross-site scripting (XSS), SQL injection, HTTP response splitting, encoding, and special character abuse Get an in-depth presentation of the newest SQL injection techniques, including blind attacks, advanced exploitation through subqueries, Oracle exploits, and improved countermeasures Learn about the latest XML Web Services hacks, Web management attacks, and DDoS attacks, including click fraud Tour Firefox and IE exploits, as well as the newest socially-driven client attacks like phishing and adware

Product Details :

Genre : Computers
Author : Joel Scambray
Publisher : McGraw-Hill Osborne Media
Release : 2006-06-05
File : 556 Pages
ISBN-13 : UOM:39015064711867


Hacker S Challenge 3

eBook Download

BOOK EXCERPT:

The stories about phishing attacks against banks are so true-to-life, it’s chilling.” --Joel Dubin, CISSP, Microsoft MVP in Security Every day, hackers are devising new ways to break into your network. Do you have what it takes to stop them? Find out in Hacker’s Challenge 3. Inside, top-tier security experts offer 20 brand-new, real-world network security incidents to test your computer forensics and response skills. All the latest hot-button topics are covered, including phishing and pharming scams, internal corporate hacking, Cisco IOS, wireless, iSCSI storage, VoIP, Windows, Mac OS X, and UNIX/Linux hacks, and much more. Each challenge includes a detailed explanation of the incident--how the break-in was detected, evidence and clues, technical background such as log files and network maps, and a series of questions for you to solve. In Part II, you’ll get a detailed analysis of how the experts solved each incident. Exerpt from “Big Bait, Big Phish”: The Challenge: “Could you find out what’s going on with the gobi web server? Customer order e-mails aren’t being sent out, and the thing’s chugging under a big load...” Rob e-mailed the development team reminding them not to send marketing e-mails from the gobi web server.... “Customer service is worried about some issue with tons of disputed false orders....” Rob noticed a suspicious pattern with the “false” orders: they were all being delivered to the same P.O. box...He decided to investigate the access logs. An external JavaScript file being referenced seemed especially strange, so he tested to see if he could access it himself.... The attacker was manipulating the link parameter of the login.pl application. Rob needed to see the server side script that generated the login.pl page to determine the purpose.... The Solution: After reviewing the log files included in the challenge, propose your assessment: What is the significance of the attacker’s JavaScript file? What was an early clue that Rob missed that might have alerted him to something being amiss? What are some different ways the attacker could have delivered the payload? Who is this attack ultimately targeted against? Then, turn to the experts' answers to find out what really happened.

Product Details :

Genre : Computers
Author : David Pollino
Publisher : McGraw Hill Professional
Release : 2006
File : 412 Pages
ISBN-13 : UOM:39015064718821


Blackberry Hacks

eBook Download

BOOK EXCERPT:

The versatile and flexible BlackBerry handheld computing device allows users to stay in touch and in-the-know--no matter where they are or where they go. For both corporate and consumer users, this guide delivers tips, tools, and innovative ways to make the most of the technology.

Product Details :

Genre : Computers
Author : Dave Mabe
Publisher :
Release : 2005-10-13
File : 344 Pages
ISBN-13 : UOM:39015062835320


Hacker S Challenge 2 Test Your Network Security Forensic Skills

eBook Download

BOOK EXCERPT:

For readers who want to keep the bad guys out of their network, the latest edition of this bestselling book features over 20 all-new hacking challenges to solve. Plus, the book includes in-depth solutions for each, all written by experienced security consultants.

Product Details :

Genre : Computers
Author : Mike Schiffman
Publisher : McGraw Hill Professional
Release : 2003
File : 356 Pages
ISBN-13 : 0072226307


The Database Hacker S Handbook

eBook Download

BOOK EXCERPT:

This handbook covers how to break into and how to defend the most popular database server software.

Product Details :

Genre : Computers
Author : David Litchfield
Publisher : John Wiley & Sons
Release : 2005-07-14
File : 536 Pages
ISBN-13 : UOM:39015061443803