eBooks-it.org Logo
eBooks-IT.org Inner Image

Nitesh Dhanjani eBooks

Download free Nitesh Dhanjani eBooks

Network Security Tools

Writing, Hacking, and Modifying Security Tools
Network Security Tools Image
If you're an advanced security professional, then you know that the battle to protect online privacy continues to rage on. Security chat rooms, especially, are resounding with calls for vendors to take more responsibility to release products that are more secure. In fact, with all the information and code that is passed on a daily basis, it's a fight that may never end. Fortunately, there are a number of open source security tools that give you a leg up in the battle.Often a security tool does exactly what you want, right out of the box. More frequently, you need to customize the tool to fit the needs of your network structure. Network Security Tools shows experienced administrators how to modify, customize, and extend popular open source security to...

Hacking

The Next Generation
Hacking Image
With the advent of rich Internet applications, the explosion of social media, and the increased use of powerful cloud computing infrastructures, a new generation of attackers has added cunning new techniques to its arsenal. For anyone involved in defending an application or a network of systems, Hacking: The Next Generation is one of the few books to identify a variety of emerging attack vectors. You'll not only find valuable information on new hacks that attempt to exploit technical flaws, you'll also learn how attackers take advantage of individuals via social networking sites, and abuse vulnerabilities in wireless technologies and cloud infrastructures. Written by seasoned Internet security professionals, this book helps you understand the motives...

Linux and Unix Security

HackNotes Portable Reference
Linux and Unix Security Image
Safeguard your systems from all types of hackers, hijackers, and predators with help from this insightful resource. Get thorough, just-the-facts coverage of Linux, UNIX and Solaris, and learn about advanced hacking techniques including buffer overflows, password theory, port re-direction, and more....


2007 - 2017 © eBooks-IT.org