1:23 PM | 7
comments | Read More
eBooks.OReilly.-.Wireless.Hacks.100.Industrial.-.Strength.Tips.and.Tools
Written for the intermediate to advanced wireless user, Wireless Hacks is full of direct, practical, ingenious solutions to real-world networking problems. Whether your wireless network needs to extend to the edge of your office or to the other end of town, this collection of non-obvious, "from the field" techniques will show you how to get the job done.
download here
download here
12:53 PM | 0
comments | Read More
database hacker handbook
database hacker handbook
Table of Contents
The Database Hacker's Handbook — Defending Database Servers
Preface
Introduction
Part I - Introduction
Chapter 1 - Why Care About Database Security?
Part II - Oracle
Chapter 2 - The Oracle Architecture
Chapter 3 - Attacking Oracle
Chapter 4 - Oracle: Moving Further into the Network
Chapter 5 - Securing Oracle
Part III - DB2
Chapter 6 - IBM DB2 Universal Database
Chapter 7 - DB2: Discovery, Attack, and Defense
Chapter 8 - Attacking DB2
Chapter 9 - Securing DB2
Part IV - Informix
Chapter 10 - The Informix Architecture
Chapter 11 - Informix: Discovery, Attack, and Defense
Chapter 12 - Securing Informix
Part V - Sybase ASE
Chapter 13 - Sybase Architecture
Chapter 14 - Sybase: Discovery, Attack, and Defense
Chapter 15 - Sybase: Moving Further into the Network
Chapter 16 - Securing Sybase
Part VI - MySQL
Chapter 17 - MySQL Architecture
Chapter 18 - MySQL: Discovery, Attack, and Defense
Chapter 19 - MySQL: Moving Further into the Network
Chapter 20 - Securing MySQL
Part VII - SQL Server
Chapter 21 - Microsoft SQL Server Architecture
Chapter 22 - SQL Server: Exploitation, Attack, and Defense
Chapter 23 - Securing SQL Server
Part VIII - PostgreSQL
Chapter 24 - The PostgreSQL Architecture
Chapter 25 - PostgreSQL: Discovery and Attack
Chapter 26 - Securing PostgreSQL http://www.blogger.com/img/blank.gif
Part IX - Appendixes
Appendix A - Example C Code for a Time-Delay SQL Injection Harness
Appendix B - Dangerous Extended Stored Procedures
Appendix C - Oracle Default Usernames and Passwords
Download here
Table of Contents
The Database Hacker's Handbook — Defending Database Servers
Preface
Introduction
Part I - Introduction
Chapter 1 - Why Care About Database Security?
Part II - Oracle
Chapter 2 - The Oracle Architecture
Chapter 3 - Attacking Oracle
Chapter 4 - Oracle: Moving Further into the Network
Chapter 5 - Securing Oracle
Part III - DB2
Chapter 6 - IBM DB2 Universal Database
Chapter 7 - DB2: Discovery, Attack, and Defense
Chapter 8 - Attacking DB2
Chapter 9 - Securing DB2
Part IV - Informix
Chapter 10 - The Informix Architecture
Chapter 11 - Informix: Discovery, Attack, and Defense
Chapter 12 - Securing Informix
Part V - Sybase ASE
Chapter 13 - Sybase Architecture
Chapter 14 - Sybase: Discovery, Attack, and Defense
Chapter 15 - Sybase: Moving Further into the Network
Chapter 16 - Securing Sybase
Part VI - MySQL
Chapter 17 - MySQL Architecture
Chapter 18 - MySQL: Discovery, Attack, and Defense
Chapter 19 - MySQL: Moving Further into the Network
Chapter 20 - Securing MySQL
Part VII - SQL Server
Chapter 21 - Microsoft SQL Server Architecture
Chapter 22 - SQL Server: Exploitation, Attack, and Defense
Chapter 23 - Securing SQL Server
Part VIII - PostgreSQL
Chapter 24 - The PostgreSQL Architecture
Chapter 25 - PostgreSQL: Discovery and Attack
Chapter 26 - Securing PostgreSQL http://www.blogger.com/img/blank.gif
Part IX - Appendixes
Appendix A - Example C Code for a Time-Delay SQL Injection Harness
Appendix B - Dangerous Extended Stored Procedures
Appendix C - Oracle Default Usernames and Passwords
Download here
12:44 PM | 0
comments | Read More
DangerousGoogle-SearchingForSecrets
Pertama kali mengenal hacking, handbook saya adalah ebook ini :D
http://www.blogger.com/img/blank.gif
Download here
Download here
12:24 PM | 1
comments | Read More
Subscribe to:
Posts (Atom)