Cover Book Actions
AAA++ Rated - DON'T Use Your... -

AAA++ Rated - DON'T Use Your...

Here’s a list of the topics you’ll find inside:- Spyware Can Destroy - Is Adware/Spyware Legal - How Does Adware/Spyware Spread? - How To Remove Adware/Spyware?- What Programs Help Prevent Adware/Spyware? - Why Stop Spam?- How File Sharing … more

AAA++ Rated - DON’T Use Your Computer Without ME - How to PROTECT Your PC / Computer from VIRUSES & DATA LOSS !! (PLUSBONUSES)
The Beginner's Guide to the ... - Jeremy Martin

The Beginner's Guide to the ...Jeremy Martin

Average wait: N/A

This doc covers the basics of anonymity, hactivism, & hidden parts of the Internet underground, along with some of the things you may find there. Disclaimer: Do NOT break the law. This was written to explain what the Darknet / Tor hidden se… more

The Beginner’s Guide to the Internet Underground
Jeremy Martin
Information Warfare Center , English
Linux Journal Paranoid Penguin - Mick Bauer

Linux Journal Paranoid PenguinMick Bauer

Paranoid Penguin is a monthly column featured in Linux Journal.

Linux Journal Paranoid Penguin
Mick Bauer
Belltown Media, Inc , English
Social Engineering: Hiding i... - Patricia Arnold

Social Engineering: Hiding i...Patricia Arnold

The movie industry has glamorized the abilities of technically talented people. From Mission Impossible to The Matrix, we are impressed at what the human mind can accomplish with the assistance of a computer. This book doesn’t underestimate… more

Social Engineering: Hiding in Plain Sight (InfoSec Series)
Patricia Arnold
Computer Security 2012 - Brian Taylor

Computer Security 2012Brian Taylor

Average wait: N/A

Computer Security Basics and Fundamentals

Computer Security 2012
Brian Taylor
The BackTrack Experience - I... - Karthik Ranganath

The BackTrack Experience - I...Karthik Ranganath

The BackTrack Experience of a Novice - Introduction to WhiteHat Hacking” is about my experience with back track and I have documented it in the form of a book. I am sure beginners will surely save a lot of their time in understanding conce… more

The BackTrack Experience - Introduction to WhiteHat Hacking
Karthik Ranganath
ModSecurity Handbook - Ivan Ristic

ModSecurity HandbookIvan Ristic

ModSecurity Handbook is the definitive guide to ModSecurity, a popular open source web application firewall. Written by Ivan Ristic, who designed and wrote much of ModSecurity, this book will teach you everything you need to know to monitor… more

ModSecurity Handbook
Ivan Ristic
Feisty Duck Ltd , English
Basic Security Testing with ... - Daniel Dieterle

Basic Security Testing with ...Daniel Dieterle

With computer hacking attacks making headline news on a frequent occasion, it is time for companies and individuals to take a more active stance in securing their computer systems.

Kali Linux is an Ethical Hacking platform that allows good… more

Basic Security Testing with Kali Linux
Daniel Dieterle
PLANET MULTITASKING An Opini... - khurram afzal

PLANET MULTITASKING An Opini...khurram afzal

This book explains the multitasking, its uses, its advantages, and legal aspects.The author Khurram Afzal actually presents his opinion, which can also beused as an evidence. Moreover, the book tells the computer user to run movieson their … more

PLANET MULTITASKING An Opinion And An Evidence
khurram afzal
khurram afzal , English
The Hacker's Underground Handbook - David Melnichuck

The Hacker's Underground HandbookDavid Melnichuck

The Information Given in this Book will put you into a hacker’s mindset and teach you all of the hacker’s secret ways. The Hacker’s Underground Handbook is for the people out there that wish to get into the the amazing field of hacking. It … more

The Hacker’s Underground Handbook
David Melnichuck
The Essential Guide to Inter... - Michael Nickle

The Essential Guide to Inter...Michael Nickle

Average wait: N/A

Computer security is a complex topic, especially for those who aren’t IT professionals. This book offers a clear and easy-to-understand approach to Windows security risks and attacks for PC users. By boiling down the topic to just the esse… more

The Essential Guide to Internet Security for Windows 7 & Windows XP
Michael Nickle
Sunshine on Secure Java:  OW... - Natalie "Sunny" Wear

Sunshine on Secure Java: OW...Natalie "Sunny" Wear

Average wait: N/A

This book provides explanations and remediations to the OWASP Top 10 for 2013 web application security vulnerabilities. Java coding techniques are provided within to show how to mitigate attacks. This book shows programmers how to minimiz… more

Sunshine on Secure Java: OWASP Top 10 - Writing Secure Web Applications
Natalie “Sunny” Wear
BookBaby , English
IT Security: Internet Usage ... - Kashif Kamran

IT Security: Internet Usage ...Kashif Kamran

Average wait: N/A

Internet usage policy is an essential part of any corporate IT Security plan that is to be defined in any organization. Lack of Internet usage policy may lead to security breaches, infected networks, reduced productivity from employees and … more

IT Security: Internet Usage Policy (IT Security Manual)
Kashif Kamran
SSH Mastery: OpenSSH, PuTTY,... - Michael W. Lucas

SSH Mastery: OpenSSH, PuTTY,...Michael W. Lucas

Average wait: N/A

Secure Shell (SSH) lets systems administrators securely manage remote systems. But most people only use the bare minimum SSH offers. Used properly, SSH simplifies your job and improves security.This book saves you from sifting a decade of o… more

SSH Mastery: OpenSSH, PuTTY, Tunnels and Keys
Michael W. Lucas
Tilted Windmill Press , English
Sudo Mastery: User Access Co... - Michael W Lucas

Sudo Mastery: User Access Co...Michael W Lucas

Average wait: N/A

Unix-like operating systems have a primitive access control system. The root account can do anything. Other users are peasants with only minimal system access. This worked fine in UNIX’s youth, but today, system administration responsibilit… more

Sudo Mastery: User Access Control for Real People
Michael W Lucas
Tilted Windmill Press , English
The Ultimate Guide To Spywar... - Arnold Mullins

The Ultimate Guide To Spywar...Arnold Mullins

The Ultimate Guide To Spyware Removal: How To Eliminate Spyware For Good”Say No To The Hackers And Spy’s, And Keep Your PC Safe From All Interruptions Popups and Scam’s Today with a Few Easy Steps”This book covers several topics including:•… more

The Ultimate Guide To Spyware Removal: How To Eliminate Spyware For Good
Arnold Mullins
Top 10 Reasons Why Computers Crash - Gaurav Dhaka

Top 10 Reasons Why Computers CrashGaurav Dhaka

Fatal error: the system has become unstable or is busy,” it says. “Enter to return to Windows or press Control-Alt-Delete to restart your computer. If you do this you will lose any unsaved information in all open applications.”You have just… more

Top 10 Reasons Why Computers Crash
Gaurav Dhaka
The PC Security Handbook - L... - Inc. Nationwide Consulting Group

The PC Security Handbook - L...Inc. Nationwide Consulting Group

Introducing the new “The PC Security Handbook”Your Info Guide To Beefing Up Your Personal Computer’s Safety From Malicious Threats!Dear Internet Friend,Today, more and more people are using their computers for everything: from communication… more

The PC Security Handbook - Learn How To Secure Your PC Today
Inc. Nationwide Consulting Group
The Holistic Operational Rea... - Michael Peters

The Holistic Operational Rea...Michael Peters

Governance Documentation and Information Technology Security Policies Demystified is the professional companion book to the popular global resource, the HORSE Project Wiki, that provides a comprehensive examination of corporate information … more

The Holistic Operational Readiness Security Evaluation: HORSE Project Series: Governance Documentation and Information Technology Security Policies Demystified
Michael Peters
Metasploit Penetration Testi... - Abhinav Singh

Metasploit Penetration Testi...Abhinav Singh

This is a Cookbook which follows a practical task-based style. There are plenty of code and commands used for illustration which make your learning curve easy and quick. This book targets both professional penetration testers as well as new… more

Metasploit Penetration Testing Cookbook
Abhinav Singh
Packt Publishing , English