Skip to main content

Amazing Collection of EBooks [Linux, Exploits, Networking, Programming]

This is my collection of Ebooks I have colelcted so far, decided to share it all. I've tried to keep the layout of the directories tidy.


Color Codes:
Main Folder
Sub Folder

EBOOKS INCLUDED


Exploit Folder

  • Extreme Exploits - Advanced Defenses Against Hardcore Hacks
  • Hacking - The Art Of Exploitation
  • Shellcoder's Programming Uncovered
  • The Shellcoder's Handbook - Discovering And Exploiting Security Holes 


Programming Folder


  • Hacker Disassembling Uncovered
  • Learning PHP & MySQL
  • Michael - Mastering UNIX Shell Scripting 

C / C++
  • C By Example
  • C In a Nutshell
  • C Primer Plus, 5th Edition
  • C-C++ Programmer's Reference, 3rd Edition
  • Cryptography In C And C++
  • Effective C++, 3rd Edition
  • Optimizing C++
  • Programming Embedded Systems In C And C++
  • Secure Programming Cookbook For C And C++ 

Linux
  • Assembly Language Step-By-Step - Programming With DOS And Linux, 2nd Edition
  • Beginning Linux Programming
  • Burtch - Linux Shell Scripting with Bash
  • Glass,Ables - Linux for Programmers and Users
  • Guide To Assembly Language Programming In Linux
  • Korn Shell Unix and Linux Programming Manual,
  • Matthew - Beginning Linux Programming
  • Mitchell - Advanced Linux Programming
  • Wall - Linux Programming Unleashed 

Perl
  • Advanced Perl Programming, 2nd Edition
  • Beginning Perl Web Development - From Novice To Professional
  • Intermediate Perl
  • Learning Perl Objects, References, & Modules
  • Learning Perl, 4th Edition
  • Minimal Perl For UNIX And Linux People
  • Perl Best Practices
  • Perl Hacks - Tips And Tools For Programming Debugging And Surviving
  • Perl Medic - Transforming Legacy Code 


Hacking Folder


  • Hacker Linux Uncovered
  • Hacker's Delight
  • Hacker's Guide
  • Hacker's Handbook
  • Hackers_Secrets
  • Hacking Exposed - Network Security Secrets & Solutions, 2nd Edition
  • Hacking For Dummies
  • Honeypots - Tracking Hackers
  • The Art Of Intrusion - The Real Stories Behind The Exploits Of Hackers, Intruders, And Deceivers

Web
  • Firefox Hacks - Tips & Tools For Next-Generation Web Browsing
  • Google Hacking For Penetration Testers
  • Google Hacks, 3rd Edition
  • Hacker Web Exploitation Uncovered
  • Web Hacking - Attacks And Defense 


Networking Folder


  • Advanced Linux Networking
  • Hack The Stack - Using Snort And Ethereal To Master The 8 Layers Of An Insecure Network
  • OpenVPN - Building And Integrating Virtual Private Networks

Programming
  • Illustrated TCP-IP - A Graphic Guide To The Protocol Suite
  • Prentice Hall - Internetworking with TCP-IP, Volume I - Principles, Protocols and Architecture
  • Prentice Hall - Internetworking with TCPIP - Vol 3 Client-Server Programming and Applications for the BSD Sockets Version.
  • Tcp Ip For Dummies
  • TCP-IP Foundations (2004)
  • TCP-IP Network Administration,
  • TCPIPTools
  • Understanding TCP-IP
  • Unix Network Programming - Volume I - The Sockets Networking API,

Security
  • Cryptography And Network Security,
  • Designing And Implementing Linux Firewalls And QoS
  • Firewall Policies And VPN Configurations
  • Fundamentals of Network Security
  • LANSecurity
  • Maximum Computer Security-A Hacker's Guide to Protecting Your Internet Site and Network
  • McGraw Hill - Hacking Exposed - Network Security, Secrets and Solutions, 3rd Ed
  • Network Security Assessment - From Vulnerability To Patch
  • Network Security Hacks - 100 Industrial-Strength Tips & Tools,
  • Network Security With OpenSSL
  • Self-Defending Networks - The Next Generation Of Network Security 


Unix Folder


BSD
  • Absolute BSD - The Ultimate Guide To FreeBSD
  • Absolute OpenBSD - Unix For The Practical Paranoid
  • Embedded FreeBSD Cookbook (2002)
  • Learning the UNIX Operating System
  • Mastering FreeBSD And OpenBSD Security
  • SysAdmin - Security Tools in FreeBSD
  • Teach Yourself FreeBSD In 24 Hours
  • The Complete FreeBSD, 4th Edition
  • The OpenBSD 4.0 Crash Course
  • Unix Power Tools, 3rd Edition

Kernel
  • linuxKernelSux
  • OReilly.Understanding.The Linux Kernel 1st Edition
  • Understanding The Linux Kernel, 3rd Edition

Linux
  • A Practical Guide To Linux Commands, Editors, And Shell Programming
  • Get_Acquainted_with_Linux_Security_and_Optimization_System
  • Hack Proofing Linux - A Guide To Open Source Security
  • Linux Basic Commands
  • Linux Kernel Development, 2nd Edition
  • Linux Kernel module programming guide 1
  • Linux Shell Scripting With Bash (2004)
  • Linux_Administration_Made_Easy
  • Linux_Administrators_Security_Guide
  • McGraw.Hill.HackNotes.Linux.and.Unix.Security.Portable.Reference.eBook-DDU
  • OReilly - Linux_Network_Administrator's_Guide_Second_Edition
  • Sam teach you Linux in 24 hours
  • Securing Linux A Survival Guide for Linux Security Version 1.0 2003
  • Securing Linux Servers for Service Providers
  • SELinux (2004)

Shell
  • shell-scripting
  • tcsh
  • Unix Shell Programming, 3rd Edition (2003)


SQL Folder


  • Mastering_MySQL_4.2003.Sybex
  • MySQL - 2nd Edition (Sams)
  • MySQL - Essential Skills (2004)
  • MySQL - Visual QuickStart Guide, 2nd Edition (2006)
  • MySQL Certification Study Guide (2004)
  • MySQL Cookbook (2002)
  • MySQL Cookbook
  • MySQL Pocket Reference (2003)
  • MySQL Tutorial (2003)
  • MySQL.PHP.Database.Applications
  • SQL - A Beginner's Guide, 2nd Edition (2003)
  • SQL - Practical Guide For Developers (2005)
  • SQL Bible (2003)
  • SQL Cookbook (2005)
  • SQL For Dummies, 6th Edition (2006)
  • SQL Sams Teach Yourself MySQL in 21 Days -- SAMS
  • SQL Server 2000

Comments

Have a look!

Norton Internet Security 2013 20.0.0.39

 Norton Internet Security 2013 20.0.0.39 Norton Internet Security 2013 provides an early look at the next generation of Symantec's security suite. There are no major changes this time around - at least, not yet, and not that we've spotted. The most significant and obvious tweaks have been made to the interface. The style is similar to the previous edition, but it's been optimised for touch (and if you install the package on Windows 8, can now be controlled via a Metro app). Support for hardware acceleration should improve its responsiveness, too. The program does also provide improvements in protection, although they're mostly out of sight. The Insight file reputation database is now updated more rapidly, for instance; Insight technology has been incorporated into the firewall to "improve the ability to detect and block malicious network activity"; SONAR now works in Safe Mode to detect more threats via their behaviour; and Internet Security 2013 c

Gangs of Wasseypur II (2012) DVDScr 650mb

Storyline: Wasseypur is no more the town that was once consumed by the raging war between Sardar Khan and Ramadhir Singh. It has spawned a new generation of money squandering lobbyists, turning into foolhardy gangs overnight. With illegal profiteering through scrap trade auctions over the Internet, corrupt government officials, election rigging and hooliganism, the town got murkier. Everyone wants alliance with the most powerful man of Wasseypur, Faizal Khan. His sole ambition however, is to annihilate Ramadhir Singh, the man with the grand scheme. Gangs of Wasseypur-Part 2 is a fitting conclusion to this story of vengeance, which by now, not just the family but also this town has come to inherit. Movie Info: http://www.imdb.com/title/tt2284926/ [TITLE]…………………….[ Gangs of Wasseypur II [DIRECTOR]………………….[ Anurag Kashyap [RELEASE DATE]………………[ 8 August 2012 (India) [FORMAT]:…………………..[ Matroska (MKV) [GENRE]:……………………[ Action | Crime | Drama [NO OF CDs]…………………[ 1 [FILE SIZE]:……

How To Hack Facebook Account-PART-2- The Web Browser Attack

PART 1 LINK In this following post  ll discus with you about  how you can hack facebook account  using tools that can attack web browser's password safe. Each web browser has feature of storing passwords, every browser first encrypts that password and then stores it in password database but the fact is that their encryption method is so weak that these tools can retrieve passwords  from them with or without master password enabled. They can sometimes retrieve passwords even from cookies and caches stored by web browsers that means you only need your victim to use web browser at least for once. Here I am providing you link to those tools along with small description as per by their manufactures, all of them are free and one click and output ready tools, surely they don't require tutorials just because result is obtained just by a single click. Facebook Password Decryptor: FacebookPasswordDecryptor is the FREE software to instantly recover stored Facebook acc