Free Download Top 100 Hacking Books

Kali Linux – Assuring Security by Penetration Testing

Network Analysis Using Wireshark Cookbook

Computer Security Handbook, 6th Edition

iPad and iPhone Kung Fu: Tips, Tricks, Hints, and Hacks for iOS 7

Android Security Cookbook

Penetration Testing with BackBox

Kali Linux Social Engineering

Computer Forensics with FTK

Android Hacker’s Handbook

Practical Reverse Engineering

Malware Forensics Field Guide for Linux Systems

Learning Pentesting for Android

The Hacker Playbook: Practical Guide To Penetration Testing

Learning Metasploit Exploitation and Development

Web Penetration Testing with Kali Linux

Metasploit Penetration Testing Cookbook Combo Pack (1st+2nd Edition)

Hacking Point of Sale: Payment Application Secrets, Threats, and Solutions

The Browser Hacker’s Handbook 2014

Hacking Politics

The Basics of Web Hacking Tools and Techniques to Attack the Web

Investigative Computer Forensics The Practical Guide for Lawyers, Accountants, Investigators, and Business Executives

The Basics of Hacking and Penetration Testing, Second Edition

Professional Penetration Testing

The State of the Art in Intrusion Prevention and Detection

Cyber Warfare: Techniques, Tactics and Tools for Security Practitioners (Second Edition)

Hacking with Kali: Practical Penetration Testing Techniques

Wireshark 101: Essential Skills for Network Analysis

Hacking Raspberry Pi 2013

Blackhatonomics: An Inside Look at the Economics of Cybercrime

Hacking and Securing iOS Applications

iOS Hacker’s Handbook

Windows Forensics Analysis Toolkit

Linux Server Hacks

Violent Python – A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers

Instant Penetration Testing: Setting Up a Test Lab How-to

Coding Freedom: The Ethics and Aesthetics of Hacking

The Basics of Hacking and Penetration Testing

The Unrevealed Secrets of Hacking and Cracking

Wireshark Network Analysis – Second Edition

The Basics of Information Security

Secrets of Network Cartography

Seven Deadliest Network Attacks

Metaprogramming Ruby: Program Like the Ruby Pros

Next-Generation Firewalls for Dummies

The Rootkit Arsenal: Escape and Evasion in the Dark Corners of the System

Hacking Exposed 7: Network Security Secrets & Solutions, Seventh Edition

Reversing: Secrets of Reverse Engineering

Unauthorised Access – Physical Penetration Testing For IT Security Teams

Advanced Penetration Testing for Highly-Secured Environments

Gray Hat Python: Python Programming for Hackers and Reverse Engineers

Network Forensics Tracking Hackers through Cyberspace

Hackin9 Guide to BackTrack

Coding For Penetration Testers

Practical Malware Analysis

Exploiting Software: How to Break Code

Hacker’s Delight

Hackers Heroes of the Computer Revolution

Facebook Hacking E-Book (Free Download)

Hacking The Next Generation

24 Deadly Sins of Software Security

The Crypter Blue Print

Google Hacking for Penetration Tester

Wireless Kungfu Networking & Hacking

Kingpin: How One Hacker Took Over the Billion-Dollar Cybercrime Underground

Dark Market- CyberThieves CyberCrime and you

Policing Cyber Crime

Metasploit (The Penetration Tester’s Guide)

The Art of Deception 

Ghost in the Wires (Free Download)

BackTrack 5 Wireless Penetration Testing

Windows 7 Tweaks (Best Book for Windows 7 Lovers) 

Free Download Hacker Highschool (13 Books)

Hacking Beware

Batch File Programming

Windows 7 Bible

Two Beginner Guide of Hacking

Evolution of Cyber Crime

Buffer Overflow Attacks

Hacking for Dummies

The CEH Prep Guide

SQL Injection Attack and Defense

Guide to Computer Forensics and Investigation

Stealing the Network (E-Book)

Cyber Forensics (E-Book)

Gmail Hacking (New Hacking E-Book)

Hacking Computer forensics Exposed

You Tube Hacking (My New E-Book)

Footprinting (My New Hacking E-Book)

Hacking Exposed (E-Book)

Forensic Computer Crime Invsestigation

Window Based Command Line Tools (E Book)

Hacking GPS (E- Book)

Window Based GUI Tools (E Book)

Hacker Cracker

Penetration Testing Procedures & Methodologies

CEH V8 Course + Lab Manual

Secure Network Infrastructures by EC-Council

Penetration Testing Communication Media Testing

Computer Forensics Investigating Wireless Networks and Devices

Computer Forensics – Investigating Data and Image Files

Ethical Hacking and Countermeasures- Linux, Macintosh and Mobile Systems

EC-Council Disaster Recovery (E-Book)

Computer Forensics- Investigating Network Intrusions and Cyber Crime

Certified Ethical Hacker Guide (E-Book)

Computer Hacking Forensics Investigator (E- Book)


转载于:https://my.oschina.net/u/1412027/blog/277747

  • 0
    点赞
  • 0
    收藏
    觉得还不错? 一键收藏
  • 0
    评论
Linux Forensics is the most comprehensive and up-to-date resource for those wishing to quickly and efficiently perform forensics on Linux systems. It is also a great asset for anyone that would like to better understand Linux internals. Linux Forensics will guide you step by step through the process of investigating a computer running Linux. Everything you need to know from the moment you receive the call from someone who thinks they have been attacked until the final report is written is covered in this book. All of the tools discussed in this book are free and most are also open source. Dr. Philip Polstra shows how to leverage numerous tools such as Python, shell scripting, and MySQL to quickly, easily, and accurately analyze Linux systems. While readers will have a strong grasp of Python and shell scripting by the time they complete this book, no prior knowledge of either of these scripting languages is assumed. Linux Forensics begins by showing you how to determine if there was an incident with minimally invasive techniques. Once it appears likely that an incident has occurred, Dr. Polstra shows you how to collect data from a live system before shutting it down for the creation of filesystem images. Linux Forensics contains extensive coverage of Linux ext2, ext3, and ext4 filesystems. A large collection of Python and shell scripts for creating, mounting, and analyzing filesystem images are presented in this book. Dr. Polstra introduces readers to the exciting new field of memory analysis using the Volatility framework. Discussions of advanced attacks and malware analysis round out the book. Book Highlights 370 pages in large, easy-to-read 8.5 x 11 inch format Over 9000 lines of Python scripts with explanations Over 800 lines of shell scripts with explanations A 102 page chapter containing up-to-date information on the ext4 filesystem Two scenarios described in detail with images available from the book website All scripts and other support files are availab

“相关推荐”对你有帮助么?

  • 非常没帮助
  • 没帮助
  • 一般
  • 有帮助
  • 非常有帮助
提交
评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值