2007-12-23

Archive for Hacking

စုေဆာင္းသူ everlearner
Hacking for Dummies

This book outlines computer hacker tricks and techniques — in plain English — to assess the security of your own information systems, find security vulnerabilities, and fix the vulnerabilities before malicious and criminal hackers have an opportunity to take advantage of them. This hacking is the professional, aboveboard, and legal type of security testing — which I call ethical hacking throughout the book. Computer and network security is a complex subject and an evermoving target. You must stay on top of it to ensure your information is protected from the bad guys. You can implement all the security technologies and other best practices possible, and your information systems may be secure — as far as you know. However, until you understand how hackers think and apply that knowledge to assess your systems from a hacker’s-eye view, you can’t get a true sense of how secure your information really is. Ethical hacking — sometimes referred to as penetration testing or white-hat hacking — is a necessary requirement to ensure that information systems are truly secure on an ongoing basis. This book provides you with the knowledge required to successfully implement an ethical hacking program, along with countermeasures that you can implement to keep malicious hackers out of your business.
Click Here to download


စုေဆာင္းသူ MrDBA
Exposed Second Edition










Click Here to download










စုေဆာင္းသူ everlearner
Google Hacks

Why Google Hacks?

“Hacks” are generally considered to be “quick-n-dirty” solutions to programming problems or interesting techniques for getting a task done. But what does this kind of hacking have to do with Google?

Considering the size of the Google index, there are many times when you might want to do a particular kind of search and you get too many results for the search to be useful. Or you may want to do a search that the current Google interface does not support.

The idea of Google Hacks is not to give you some exhaustive manual of how every command in the Google syntax works, but rather to show you some tricks for making the best use of a search and show applications of the Google API that perform searches that you can’t perform using the regular Google interface. In other words, hacks.

Dozens of programs and interfaces have sprung up from the Google API. Both games and serious applications using Google’s database of web pages are available from everybody from the serious programmer to the devoted fan (like me).

Click Here to download


စုေဆာင္းသူ MrDBA
Hacker Web Exploration Uncovered




Click Here to download








စုေဆာင္းသူ MrDBA
Hacker's Black Book







Click Here to download











More details: go to http://www.mmopenlibrary.com

No comments:

Up