banner

[Rule] Rules  [Home] Main Forum  [Portal] Portal  
[Members] Member Listing  [Statistics] Statistics  [Search] Search  [Reading Room] Reading Room 
[Register] Register  
[Login] Loginhttp  | https  ]
 
Forum Index Thông tin về các địa chỉ và tài liệu hữu ích Mỗi ngày một cuốn sách  XML
  [Document]   Mỗi ngày một cuốn sách 10/05/2014 09:50:10 (+0700) | #1 | 280587
nhanlaihong
Member

[Minus]    0    [Plus]
Joined: 17/03/2011 22:30:58
Messages: 15
Offline
[Profile] [PM]
Hiện nay mình có rất nhiều sách mới trên amazon, chia sẻ cho anh em để nâng cao trình độ. Mỗi ngày mình sẽ share một quyển
Quyển thứ nhất:
Practical Reverse Engineering: x86, x64, ARM, Windows Kernel, Reversing Tools, and Obfuscation






Analyzing how hacks are done, so as to stop them in the future

Reverse engineering is the process of analyzing hardware or software and understanding it, without having access to the source code or design documents. Hackers are able to reverse engineer systems and exploit what they find with scary results. Now the good guys can use the same tools to thwart these threats. Practical Reverse Engineering goes under the hood of reverse engineering for security analysts, security engineers, and system programmers, so they can learn how to use these same processes to stop hackers in their tracks.

The book covers x86, x64, and ARM (the first book to cover all three); Windows kernel-mode code rootkits and drivers; virtual machine protection techniques; and much more. Best of all, it offers a systematic approach to the material, with plenty of hands-on exercises and real-world examples.

Offers a systematic approach to understanding reverse engineering, with hands-on exercises and real-world examples
Covers x86, x64, and advanced RISC machine (ARM) architectures as well as deobfuscation and virtual machine protection techniques
Provides special coverage of Windows kernel-mode code (rootkits/drivers), a topic not often covered elsewhere, and explains how to analyze drivers step by step
Demystifies topics that have a steep learning curve
Includes a bonus chapter on reverse engineering tools

Practical Reverse Engineering: Using x86, x64, ARM, Windows Kernel, and Reversing Tools provides crucial, up-to-date guidance for a broad range of IT professionals.

LINK DOWN:
https://app.box.com/s/szcfs66ez3zvpnyaapz7

[Up] [Print Copy]
  [Document]   Mỗi ngày một cuốn sách 10/05/2014 20:48:54 (+0700) | #2 | 280593
[Avatar]
van7hu
Member

[Minus]    0    [Plus]
Joined: 03/07/2010 02:38:47
Messages: 63
Location: Thuỷ điện Hoà Bình
Offline
[Profile] [PM]
Download về thôi nào, đang nan giải cái khoản kernel debug, cần cái sách nào chỉ tận nơi.
https://www.facebook.com/buivan.thu.94
Được phục vụ cho tổ quốc, đó là một niềm vinh hạnh lớn lao..
[Up] [Print Copy]
  [Document]   Mỗi ngày một cuốn sách 11/05/2014 08:43:29 (+0700) | #3 | 280595
nhanlaihong
Member

[Minus]    0    [Plus]
Joined: 17/03/2011 22:30:58
Messages: 15
Offline
[Profile] [PM]
Quyển thứ hai:
Practical Malware Analysis




There are more than 100 malicious computer attacks every second, resulting in tens of billions of dollars in economic damages each year. Among security professionals, the skills required to quickly analyze and assess these attacks are in high demand. Practical Malware Analysis provides a rapid introduction to the tools and methods used to dissect malicious software (malware), showing readers how to discover, debug, and disassemble these threats. The book goes on to examine how to overcome the evasive techniques?stealth, code obfuscation, encryption, file packing, and others?that malware author.

LINK DOWN:
https://app.box.com/s/akcl3yek2capvt9rp4g8
[Up] [Print Copy]
  [Document]   Mỗi ngày một cuốn sách 13/05/2014 09:19:00 (+0700) | #4 | 280621
smartking91
Member

[Minus]    0    [Plus]
Joined: 25/03/2010 21:41:46
Messages: 16
Offline
[Profile] [PM]
Ngày thứ 3, chủ topic đã đi tù smilie
[Up] [Print Copy]
  [Document]   Mỗi ngày một cuốn sách 13/05/2014 19:25:02 (+0700) | #5 | 280633
nhanlaihong
Member

[Minus]    0    [Plus]
Joined: 17/03/2011 22:30:58
Messages: 15
Offline
[Profile] [PM]
Quyển thứ ba:
Hacking For Dummies, 4th Edition




The best way to stay safe online is to stop hackers before they attack - first, by understanding their thinking and second, by ethically hacking your own site to measure the effectiveness of your security. This practical, top-selling guide will help you do both. Fully updated for Windows 8 and the latest version of Linux, Hacking For Dummies, 4th Edition explores the malicious hacker's mindset and helps you develop an ethical hacking plan (also known as penetration testing) using the newest tools and techniques.

More timely than ever, this must-have book covers the very latest threats, including web app hacks, database hacks, VoIP hacks, and hacking of mobile devices.

Guides you through the techniques and tools you need to stop hackers before they hack you
Completely updated to examine the latest hacks to Windows 8 and the newest version of Linux
Explores the malicious hackers's mindset so that you can counteract or avoid attacks completely
Suggests ways to report vulnerabilities to upper management, manage security changes, and put anti-hacking policies and procedures in place

If you're responsible for security or penetration testing in your organization, or want to beef up your current system through ethical hacking, make sure you get Hacking For Dummies, 4th Edition.

LINK DOWN:
https://app.box.com/s/ldju0uxwzizydnfgnwck
[Up] [Print Copy]
  [Document]   Mỗi ngày một cuốn sách 20/05/2014 08:49:20 (+0700) | #6 | 280691
nhanlaihong
Member

[Minus]    0    [Plus]
Joined: 17/03/2011 22:30:58
Messages: 15
Offline
[Profile] [PM]
Quyển thứ tư:
The Hacker Playbook: Practical Guide To Penetration Testing




Just as a professional athlete doesn’t show up without a solid game plan, ethical hackers, IT professionals, and security researchers should not be unprepared, either. The Hacker Playbook provides them their own game plans. Written by a longtime security professional and CEO of Secure Planet, LLC, this step-by-step guide to the “game” of penetration hacking features hands-on examples and helpful advice from the top of the field.

Through a series of football-style “plays,” this straightforward guide gets to the root of many of the roadblocks people may face while penetration testing—including attacking different types of networks, pivoting through security controls, and evading antivirus software.

From “Pregame” research to “The Drive” and “The Lateral Pass,” the practical plays listed can be read in order or referenced as needed. Either way, the valuable advice within will put you in the mindset of a penetration tester of a Fortune 500 company, regardless of your career or level of experience.

Whether you’re downing energy drinks while desperately looking for an exploit, or preparing for an exciting new job in IT security, this guide is an essential part of any ethical hacker’s library—so there’s no reason not to get in the game.

LINK DOWN:
https://app.box.com/s/8dtmhhen6v4jl7syxgwt
[Up] [Print Copy]
  [Document]   Mỗi ngày một cuốn sách 28/05/2014 09:45:15 (+0700) | #7 | 280712
nhanlaihong
Member

[Minus]    0    [Plus]
Joined: 17/03/2011 22:30:58
Messages: 15
Offline
[Profile] [PM]
Quyển thứ năm:
Violent Python: A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers





Violent Python shows you how to move from a theoretical understanding of offensive computing concepts to a practical implementation. Instead of relying on another attacker's tools, this book will teach you to forge your own weapons using the Python programming language. This book demonstrates how to write Python scripts to automate large-scale network attacks, extract metadata, and investigate forensic artifacts. It also shows how to write code to intercept and analyze network traffic using Python, craft and spoof wireless frames to attack wireless and Bluetooth devices, and how to data-mine popular social media websites and evade modern anti-virus.

- Demonstrates how to write Python scripts to automate large-scale network attacks, extract metadata, and investigate forensic artifacts.

- Write code to intercept and analyze network traffic using Python. Craft and spoof wireless frames to attack wireless and Bluetooth devices.

- Data-mine popular social media websites and evade modern anti-virus.

LINK DOWN:
https://app.box.com/s/o24wdafxn06b0yaogyj4
[Up] [Print Copy]
  [Document]   Mỗi ngày một cuốn sách 27/07/2014 00:15:40 (+0700) | #8 | 281091
[Avatar]
van7hu
Member

[Minus]    0    [Plus]
Joined: 03/07/2010 02:38:47
Messages: 63
Location: Thuỷ điện Hoà Bình
Offline
[Profile] [PM]
Có quyển sách rất khó kiếm, cảm ơn bạn.
https://www.facebook.com/buivan.thu.94
Được phục vụ cho tổ quốc, đó là một niềm vinh hạnh lớn lao..
[Up] [Print Copy]
[digg] [delicious] [google] [yahoo] [technorati] [reddit] [stumbleupon]
Go to: 
 Users currently in here 
2 Anonymous

Powered by JForum - Extended by HVAOnline
 hvaonline.net  |  hvaforum.net  |  hvazone.net  |  hvanews.net  |  vnhacker.org
1999 - 2013 © v2012|0504|218|