21 julio 2014

Descarga gratis los 105 mejores libros de hacking

Impresionante recopilatorio con el top 105 de libros de hacking del blog de Raj Chandel:

  1. Kali Linux – Assuring Security by Penetration Testing 
  2. Network Analysis Using Wireshark Cookbook  
  3. Computer Security Handbook, 6th Edition  
  4. iPad and iPhone Kung Fu: Tips, Tricks, Hints, and Hacks for iOS 7  
  5. Android Security Cookbook  
  6. Penetration Testing with BackBox  
  7. Kali Linux Social Engineering  
  8. Computer Forensics with FTK  
  9. Android Hacker’s Handbook  
  10. Practical Reverse Engineering  
  11. Malware Forensics Field Guide for Linux Systems  
  12. Learning Pentesting for Android  
  13. The Hacker Playbook: Practical Guide To Penetration Testing  
  14. Learning Metasploit Exploitation and Development  
  15. Web Penetration Testing with Kali Linux  
  16. Metasploit Penetration Testing Cookbook Combo Pack (1st+2nd Edition)  
  17. Hacking Point of Sale: Payment Application Secrets, Threats, and Solutions  
  18. The Browser Hacker’s Handbook 2014  
  19. Hacking Politics  
  20. The Basics of Web Hacking Tools and Techniques to Attack the Web  
  21. Investigative Computer Forensics The Practical Guide for Lawyers, Accountants, Investigators, and Business Executives  
  22. The Basics of Hacking and Penetration Testing, Second Edition  
  23. Professional Penetration Testing  
  24. The State of the Art in Intrusion Prevention and Detection  
  25. Cyber Warfare: Techniques, Tactics and Tools for Security Practitioners (Second Edition)  
  26. Hacking with Kali: Practical Penetration Testing Techniques  
  27. Wireshark 101: Essential Skills for Network Analysis  
  28. Hacking Raspberry Pi 2013  
  29. Blackhatonomics: An Inside Look at the Economics of Cybercrime  
  30. Hacking and Securing iOS Applications  
  31. iOS Hacker’s Handbook  
  32. Windows Forensics Analysis Toolkit  
  33. Linux Server Hacks  
  34. Violent Python – A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers  
  35. Instant Penetration Testing: Setting Up a Test Lab How-to  
  36. Coding Freedom: The Ethics and Aesthetics of Hacking  
  37. The Basics of Hacking and Penetration Testing  
  38. The Unrevealed Secrets of Hacking and Cracking  
  39. Wireshark Network Analysis – Second Edition  
  40. The Basics of Information Security  
  41. Secrets of Network Cartography  
  42. Seven Deadliest Network Attacks  
  43. Metaprogramming Ruby: Program Like the Ruby Pros  
  44. Next-Generation Firewalls for Dummies  
  45. The Rootkit Arsenal: Escape and Evasion in the Dark Corners of the System  
  46. Hacking Exposed 7: Network Security Secrets & Solutions, Seventh Edition  
  47. Reversing: Secrets of Reverse Engineering  
  48. Unauthorised Access – Physical Penetration Testing For IT Security Teams  
  49. Advanced Penetration Testing for Highly-Secured Environments  
  50. Gray Hat Python: Python Programming for Hackers and Reverse Engineers  
  51. Network Forensics Tracking Hackers through Cyberspace  
  52. Hackin9 Guide to BackTrack  
  53. Coding For Penetration Testers  
  54. Practical Malware Analysis  
  55. Exploiting Software: How to Break Code  
  56. Hacker’s Delight  
  57. Hackers Heroes of the Computer Revolution  
  58. Facebook Hacking E-Book (Free Download)  
  59. Hacking The Next Generation  
  60. 24 Deadly Sins of Software Security  
  61. The Crypter Blue Print  
  62. Google Hacking for Penetration Tester  
  63. Wireless Kungfu Networking & Hacking  
  64. Kingpin: How One Hacker Took Over the Billion-Dollar Cybercrime Underground  
  65. Dark Market- CyberThieves CyberCrime and you  
  66. Policing Cyber Crime  
  67. Metasploit (The Penetration Tester’s Guide)  
  68. The Art of Deception  
  69. Ghost in the Wires (Free Download)  
  70. BackTrack 5 Wireless Penetration Testing  
  71. Windows 7 Tweaks (Best Book for Windows 7 Lovers)  
  72. Free Download Hacker Highschool (13 Books)  
  73. Hacking Beware  
  74. Batch File Programming  
  75. Windows 7 Bible  
  76. Two Beginner Guide of Hacking  
  77. Evolution of Cyber Crime  
  78. Buffer Overflow Attacks  
  79. Hacking for Dummies  
  80. The CEH Prep Guide  
  81. SQL Injection Attack and Defense  
  82. Guide to Computer Forensics and Investigation  
  83. Stealing the Network (E-Book)  
  84. Cyber Forensics (E-Book)  
  85. Gmail Hacking (New Hacking E-Book)  
  86. Hacking Computer forensics Exposed  
  87. You Tube Hacking (My New E-Book)  
  88. Footprinting (My New Hacking E-Book)  
  89. Hacking Exposed (E-Book)  
  90. Forensic Computer Crime Invsestigation  
  91. Window Based Command Line Tools (E Book)  
  92. Hacking GPS (E- Book)  
  93. Window Based GUI Tools (E Book)  
  94. Hacker Cracker  
  95. Penetration Testing Procedures & Methodologies  
  96. CEH V8 Course + Lab Manual  
  97. Secure Network Infrastructures by EC-Council  
  98. Penetration Testing Communication Media Testing  
  99. Computer Forensics Investigating Wireless Networks and Devices  
  100. Computer Forensics – Investigating Data and Image Files  
  101. Ethical Hacking and Countermeasures- Linux, Macintosh and Mobile Systems  
  102. EC-Council Disaster Recovery (E-Book)  
  103. Computer Forensics- Investigating Network Intrusions and Cyber Crime  
  104. Certified Ethical Hacker Guide (E-Book)  
  105. Computer Hacking Forensics Investigator (E- Book)

Tomado de: http://www.hackingarticles.in/free-download-top-100-hacking-books/

No hay comentarios: