FileMood

Download Computing Security eBooks

Computing Security eBooks

Name

Computing Security eBooks

  DOWNLOAD Copy Link

Trouble downloading? see How To

Total Size

2.7 GB

Total Files

180

Hash

FA681D8EADA1752081224957F2224C011D537716

/Penetration Testing/

Practical Hacking Techniques & Countermeasures (2007).pdf

151.0 MB

Aggressive Network Self-Defense (2005).pdf

86.9 MB

Web Penetration Testing with Kali Linux (2013).pdf

20.8 MB

Penetration Tester's Open Source Toolkit [3rd edition] (2011).pdf

17.8 MB

Coding for Penetration Testers (2011).pdf

10.4 MB

Professional Penetration Testing (2010).pdf

9.3 MB

Hacking - The Next Generation (2009).pdf

9.0 MB

Metasploit - The Penetration Testers Guide (2011).pdf

7.2 MB

BackTrack 4 - Assuring Security by Penetration Testing (2010).pdf

6.5 MB

Metasploit Toolkit for Penetration Testing, Exploit Development, & Vulnerability Research (2007).pdf

5.1 MB

The Basics of Hacking and Penetration Testing (2011).pdf

3.9 MB

Hacknotes Linux And Unix Security Portable Reference (2003).pdf

3.6 MB

The Hacker’s Underground Handbook (2008).pdf

2.6 MB

/Software Security/

Sockets, Shellcode, Porting & Coding (2005).pdf

117.8 MB

The Shellcoder's Handbook [2nd edition] (2007).pdf

9.2 MB

Reversing - Secrets Of Reverse Engineering (2005).pdf

8.8 MB

Software Piracy Exposed (2005).pdf

6.5 MB

Buffer Overflow Attacks - Detect, Exploit, Prevent (2005).pdf

5.6 MB

/Operating Systems/

Rootkit Arsenal [2nd Edition] (2013).pdf

111.3 MB

The Rootkit Arsenal - Escape and Evasion in the Dark Corners of the System [2nd Edition] (2013).pdf

98.7 MB

Rootkit Arsenal (2009).pdf

85.3 MB

Windows Internals - Part 1 [6th edition] (2012).pdf

26.2 MB

Programming Windows [6th Edition] (2013).pdf

23.9 MB

Windows Internals - Part 2 [6th edition] (2012).pdf

22.7 MB

Advanced Windows Debugging (2008).pdf

9.9 MB

Windows 7 Device Driver (2010).pdf

1.8 MB

/Computer Programming/iOS/

Learning iOS Programming [3rd edition] (2013).pdf

97.0 MB

More iOS 6 Development (2013).pdf

55.8 MB

Teach Yourself iOS 5 Application Development in 24 Hours [3rd edition] (2012).pdf

40.0 MB

iOS 6 Programming Cookbook (2012).pdf

37.5 MB

iOS 5 Programming Cookbook (2012).pdf

26.2 MB

iOS 6 Recipes - A Problem-Solution Approach (2012).pdf

25.5 MB

Developing iOS Applications with Flex 4.5 (2011).pdf

14.2 MB

Programming iOS 5 [2nd edition] (2011).pdf

11.0 MB

/Information Security (General)/

Black Hat Physical Device Security (2005).pdf

82.4 MB

Hack Proofing Your Network [2nd edition] (2002).pdf

9.2 MB

Security Engineering [2nd edition] (2008).pdf

6.2 MB

The Myths of Security (2009).pdf

2.0 MB

Kingpin - How One Hacker Took Over the Billion-Dollar Cybercrime Underground (2011).pdf

1.4 MB

Beyond Fear - Thinking Sensibly About Security in an Uncertain World (2003).pdf

1.1 MB

/Computer Programming/

Super Scratch Programming Adventure! Learn to Program By Making Cool Games (2012).pdf

77.5 MB

Introduction to the Theory of Computation [2nd edition] (2006).pdf

21.6 MB

Hello World! - Computer Programming for Kids and Other Beginners (2009).pdf

18.9 MB

The C Programming Language [2nd edition] (1988).pdf

13.8 MB

The Art Of Debugging With GDB, DDD, and Eclipse (2008).pdf

9.5 MB

C How To Program [6th Edition] (2010).pdf

9.1 MB

Ruby by Example - Concepts and Code (2007).pdf

6.7 MB

theForger's Win32 API Tutorial (2003).pdf

408.6 KB

/Software Security/Vulnerability Research/

Fuzzing - Brute Force Vulnerability Discovery (2007).pdf

58.2 MB

The IDA Pro Book (2008).pdf

27.1 MB

The IDA Pro Book [2nd edition] (2011).pdf

9.7 MB

A Guide to Kernel Exploitation (2011).pdf

5.5 MB

A Bug Hunter's Diary (2011).pdf

5.4 MB

Fuzzing for Software Security Testing and Quality Assurance (2008).pdf

4.7 MB

Open Source Fuzzing Tools (2007).pdf

4.4 MB

/Computer Programming/Android/

Android Apps for Absolute Beginners [2nd edition] (2012).pdf

41.9 MB

OpenGL ES 2 for Android - A Quick-Start Guide (2013).pdf

32.1 MB

Beginning Android Application Development (2011).pdf

22.8 MB

Android in Action (2011).pdf

19.1 MB

Android for Programmers - An App-Driven Approach (2012).pdf

16.0 MB

Professional Android Application Development (2009).pdf

11.1 MB

Learn Java for Android Development (2010).pdf

9.5 MB

Designing for Android (2012).pdf

8.9 MB

Android Programming Tutorials (2011).pdf

7.0 MB

Hello, Android - Introducing Google's Mobile Development Platform (2008).pdf

6.7 MB

Expert Android (2013).pdf

5.9 MB

The Business of Android Apps Development [2nd edition] (2013).pdf

5.3 MB

Learn Java for Android Development [2nd edition] (2013).pdf

4.1 MB

/Malware Research/

Malicious Cryptography - Exposing Cryptovirology (2004).pdf

30.5 MB

Malware Forensics - Investigating & Analyzing Malicious Code (2008).pdf

26.2 MB

Malware Detection (2007).pdf

19.4 MB

Computer Viruses & Malware (2006).pdf

11.3 MB

Hacking Exposed - Malware & Rootkits (2010).pdf

10.9 MB

Practical Malware Analysis (2012).pdf

9.9 MB

Malware Analyst's Cookbook (2011).pdf

9.4 MB

Botnets - The Killer Web App (2007).pdf

7.3 MB

Mobile Malware Attacks and Defense (2009).pdf

7.1 MB

The Giant Black Boot of Computer Viruses (1995).pdf

6.0 MB

AVIEN Malware Defense Guide for the Enterprise (2007).pdf

6.0 MB

Defense & Detection Strategies against Internet Worms (2004).pdf

3.0 MB

Stuxnet Malware Analysis Paper (2011).pdf

2.3 MB

The Little Black Book of Computer Viruses (1990).pdf

1.5 MB

/Lockpicking/

Practical Lock Picking [2nd Edition] (2012).pdf

30.1 MB

Keys to the Kingdom (2012).pdf

28.4 MB

Practical Lock Picking (2010).pdf

20.1 MB

Master Locksmithing (2008).pdf

18.6 MB

Opening Locks By Bumping In Five Seconds Or Less (2006).pdf

3.3 MB

Bumping locks (2005).pdf

556.9 KB

MIT Guide to Lock Picking (1991).pdf

521.1 KB

/Intelligence Agencies/

By Way of Deception (1990).pdf

27.7 MB

Secret Power (1996).pdf

23.4 MB

Shadow Factory (2008).pdf

1.3 MB

The Big Breach (2001).pdf

1.3 MB

/Computer Programming/Python/

Python - How to Program (2001).pdf

26.2 MB

Beginning Python - From Novice to Pro (2005).pdf

13.9 MB

Violent Python - A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers (2012).pdf

8.2 MB

Hacking Secret Ciphers with Python (2013).pdf

6.9 MB

Invent Your Own Computer Games with Python [2nd edition] (2010).pdf

5.1 MB

The Quick Python Book [2nd edition] (2010).pdf

4.6 MB

Making Games with Python & Pygame [2nd edition] (2012).pdf

4.5 MB

Dive Into Python (2004).pdf

1.3 MB

Think Python - How to Think Like A Computer Scientist (2012).pdf

884.6 KB

/Digital Forensics/

iOS Forensic Analysis (2010).pdf

25.1 MB

Hacking Exposed - Computer Forensics [2nd edition] (2010).pdf

12.2 MB

Forensic Computing - A Practitioner's Guide [2nd edition] (2007).pdf

10.0 MB

iPhone and iOS Forensics (2011).pdf

9.2 MB

Windows Forensic Analysis DVD Toolkit [2nd edition] (2009).pdf

6.2 MB

CD And DVD Forensics (2006).pdf

5.4 MB

Windows Forensic Analysis DVD Toolkit (2007).pdf

4.5 MB

Windows Registry Forensics (2011).pdf

3.8 MB

/Cryptology/Mathematics/

Topics in Algebra (1964).pdf

20.6 MB

/Cryptology/

Applied Cryptanalysis (2007).pdf

19.6 MB

Cryptography - Theory and Practice [3rd edition] (2006).pdf

17.4 MB

Machine Cryptography and Modern Cryptanalysis [Abridged, Chapters 2-4-5 only] (1985).pdf

16.4 MB

Computer Security and Cryptography (2007).pdf

14.8 MB

Decrypted Secrets - Methods and Maxims of Cryptology [4th edition] (2007).pdf

12.9 MB

Basic Cryptanalysis (1990).pdf

10.4 MB

Military Cryptanalysis - Part IV - Transposition And Fractionating Systems (1939).pdf

9.8 MB

A Classical Introduction to Cryptography Exercise Book (2006).pdf

9.4 MB

Military Cryptanalysis - Part I - Monoalphabetic Substitution Systems (1939).pdf

7.7 MB

The Code Book (1999).pdf

7.6 MB

Military Cryptanalysis - Part III - Simpler Varieties Of Aperiodic Substitution Systems (1939).pdf

6.3 MB

Military Cryptanalysis - Part II - Simpler Varieties Of Polyalphabetic Substitution Systems (1939).pdf

6.0 MB

Manual for the Solution of Military Ciphers (1916).pdf

5.9 MB

The Index Of Coincidence And Its Applications In Cryptanalysis (1922).pdf

5.6 MB

Cryptology Unlocked (2007).pdf

4.9 MB

Brute Force - Cracking the Data Encryption Standard (2005).pdf

2.0 MB

Algebraic Cryptanalysis (2009).pdf

1.8 MB

The Codebreakers - The Story of Secret Writing [Abridged] (1973).pdf

1.5 MB

Codes and Ciphers - Julius Caesar, the Enigma, and the Internet (2001).pdf

1.3 MB

/Wireless Security/

Wireless Security Handbook (2006).pdf

18.0 MB

RFID Security (2006).pdf

6.2 MB

/Information & Coding Theory/

Error Control Coding (2002).pdf

17.8 MB

Information Theory and Statistics (1968).pdf

16.9 MB

The Art of Error Correcting Coding [2nd Edition] (2006).pdf

2.3 MB

Communication Theory of Secrecy Systems (1949).pdf

562.6 KB

A Mathematical Theory of Communication (1948).pdf

366.3 KB

/Information Security (Fiction)/

Dissecting the Hack (2010).pdf

17.4 MB

Stealing the Network - How to Own A Shadow (2007).pdf

9.6 MB

Stealing the Network - How to Own an Identity (2005).pdf

8.1 MB

Stealing the Network - How to Own the Box (2003).pdf

4.8 MB

Zero-Day Exploit - Countdown to Darkness (2004).pdf

3.9 MB

/Network Security & Tools/

Practical Packet Analysis [2nd edition] (2011).pdf

16.8 MB

Snort 2.1 Intrusion Detection [2nd edition] (2004).pdf

12.7 MB

Hack the Stack - Using Snort and Ethereal to Master the 8 Layers of an Insecure Network (2006).pdf

11.9 MB

How to Cheat at Configuring Open Source Security Tools (2007).pdf

8.0 MB

Nmap Cookbook (2010).pdf

6.6 MB

Your Botnet is My Botnet - Analysis of a Botnet Takeover (2009).pdf

943.9 KB

/Social Engineering/Personal Protection/

The Big Book of Secret Hiding Places (1987).pdf

14.3 MB

How To be Invisible - The Essential Guide to Protecting Your Personal Privacy (2004).pdf

5.6 MB

What Every BODY Is Saying (2007).pdf

2.8 MB

Executive's Guide to Personal Security (2003).pdf

1.8 MB

Never Be Lied to Again (1999).pdf

677.5 KB

/Web Security/

The Web Application Hackers Handbook [2nd edition] (2011).pdf

14.2 MB

The Web Application Hackers Handbook (2008).pdf

11.5 MB

SQL Injection Attacks and Defense [2nd edition] (2012).pdf

6.7 MB

XSS Attacks - Cross Site Scripting Exploits & Defense (2007).pdf

6.5 MB

/Penetration Testing/Hacking/

Gray Hat Hacking - The Ethical Hacker's Handbook [2nd edition] (2008).pdf

13.2 MB

Gray Hat Hacking - The Ethical Hacker's Handbook [3rd edition] (2011).pdf

12.8 MB

Hacking Exposed - Network Security Secrets & Solutions [2nd edition] (2001).pdf

8.4 MB

Hacking Exposed - Windows [3rd edition] (2008).pdf

6.3 MB

Hacking - The Art of Exploitation [2nd edition] (2008).pdf

4.6 MB

Gray Hat Python (2009).pdf

3.2 MB

/Mental Exercise & Other Tests/

Test Your EQ Assess Your Emotional Intelligence with 20 Personality Questionnaires (2009).pdf

12.2 MB

Math Puzzles and Games - Grades 6-8 (2009).pdf

7.3 MB

IQ Gym - Grow Your Mind (2008).pdf

7.2 MB

Mathematical Teasers (1970).pdf

4.5 MB

World's 200 Hardest Brain Teasers (2010).pdf

3.8 MB

Career, Aptitude and Selection Tests Match Your IQ, Personality and Abilities to Your Ideal Career [2nd Edition] (2006).pdf

1.5 MB

The Psychologist's Book of Personality Tests (2001).pdf

1.1 MB

Meyers-Briggs Type Indicator Lite Test (2012).pdf

694.3 KB

/Social Engineering/

Social Engineering - The Art of Human Hacking (2011).pdf

11.0 MB

Ninja Hacking - Unconventional Penetration Testing (2011).pdf

10.3 MB

The Art of Intrusion (2005).pdf

3.2 MB

Unauthorised Access (2009).pdf

2.8 MB

The Art of Deception (2002).pdf

1.6 MB

/Mobile App Security/

Hacking and Securing iOS Applications (2012).pdf

10.7 MB

Android Apps Security (2012).pdf

6.6 MB

/VPN Security/

A Technical Guide to IPSec Virtual Private Networks (2001).pdf

7.1 MB

/Digital Forensics/Cybercrime/

Fighting Computer Crime-A New Framework for Protecting Information (1998).pdf

1.9 MB

 

Total files 180


Copyright © 2025 FileMood.com