112

GitHub - yeahhub/Hacking-Security-Ebooks: Top 100 Hacking & Security E-Books...

 4 years ago
source link: https://github.com/yeahhub/Hacking-Security-Ebooks
Go to the source link to view the article. You can view the picture content, updated content and better typesetting reading experience. If the link is broken, please click the button below to view the snapshot at that time.

README.md

Hacking-Security-Ebooks

Top 100 Hacking & Security E-Books (Free Download) - Powered by Yeahhub.com.

S.No E-Book (PDF Link) Total Pages 1.Advanced Penetration Testing269 Pages2.The Basics of Web Hacking179 Pages3.The Basics of Hacking and Penetration Testing178 Pages4.The Art of Deception by Kevin Mitnick577 Pages5.SQL Injection Attacks and Defense761 Pages6.Metasploit - The Penetration Tester's Guide332 Pages7.Ethical Hacking and Penetration Testing Guide523 Pages8.Network Attacks and Exploitation - A Framework219 Pages9.Python Web Penetration Testing Cookbook224 Pages10.Wireshark for Security Professionals391 Pages11.Mastering Modern Web Penetration Testing298 Pages12.The Shellcoder's Handbook745 Pages13.The Little Black Book of Computer Viruses183 Pages14.XSS Attacks - Cross Site Scripting Exploits and Defense482 Pages15.The Web Application Hacker's Handbook771 Pages16.Ethical Hacking and Countermeasures239 Pages17.Reversing - Secrets of Reverse Engineering619 Pages18.Network Security Bible697 Pages19.Hacking Web Applications - Hacking Exposed416 Pages20.Hacking for Dummies387 Pages21.Hacking Wireless Network for Dummies387 Pages22.Ninja Hacking - Unconventional Penetration Testing Tacting and Techniques314 pages23.Professional Penetration Testing525 Pages24.Gray Hat Hacking - The Ethical Hacker's Handbook577 Pages25.Hack Attacks Testing561 Pages26.Basic Security Testing with Kali Linux242 Pages27.Mastering Kali Linux for Advanced Penetration Testing356 Pages28.Kali Linux CTF Blueprints190 Pages29.Kali Linux Cookbook261 Pages30.Kali Linux - Assuring Security by Penetration Testing454 Pages31.Information Security Management Handbook3206 Pages32.Computer and Information Security Handbook877 Pages33.CISSP - Certified Information Systems Security Professional804 Pages34.Computer Security and Cryptography542 Pages35.Python for Kids348 Pages36.End to End Network Security - Defense-in-Depth469 Pages37.A Guide to Computer Network Security483 Pages38.Essential Computer Security321 Pages39.Security in Wireless Mesh Networks548 Pages40.Hacking Windows XP (OLD)379 Pages41.Hacking Exposed - Windows Security, Secrets and Solutions482 Pages42.Hacking Exposed - Network Security, Secrets and Solutions736 Pages43.Information Security - Principles and Pratice413 Pages44.Nessus, Snort and Ethereal Power Tools472 Pages45.Active Defense - A Comprehensive Guide to Network Security374 Pages46.Information Security Fundamentals262 Pages47.Wireless Network Security422 Pages48.Red Hat Linux Security and Optimization721 Pages49.Windows Forensics Analysis386 Pages50.Mobile and Wireless Network Security and Privacy232 Pages51.Firewalls and Internet Security456 Pages52.An Introduction to Computer Security - The NIST Handbook290 Pages53.Unauthorized Access - Physical Penetration Testing for IT Security Teams309 Pages54.Testing Web Security297 Pages55.Maximum Security - A Hacker's Guide to Protecting Your Internet Site and Network670 Pages56.Information Resource Guide - Computer, Internet and Network Systems Security325 Pages57.The Hacker's Underground Handbook116 Pages58.Guide to SCADA and Industrial Control Systems Security164 Pages59.The International Handbook of Computer Security274 Pages60.The Code Book - How to Make It, Break It, Hack It, Crack It273 Pages61.Linux 101 Hacks271 Pages62.Introduction to Linux - A Hands on Guide223 Pages63.Bluetooth Security222 Pages64.IT Governance - A Manager's Guide to Data Security and ISO 27001/27002385 Pages65.Batch File Programming155 Pages66.Cracking the Coding Interview310 Pages67.Dictionary of Networking465 Pages68.Hacking Gmail310 Pages69.Linux Complete Command Reference1528 Pages70.Practical Hacking Techniques and Countermeasures752 Pages71.The Art of Intrusion by Kevin Mitnick291 Pages72.Hack Notes - Windows Security Portable Reference289 Pages73.Hacing - The Next Generation298 Pages74.Hacking the Cable Modem330 Pages75.Hackers Beware - Defending Your Network From The Wiley Hacker817 Pages76.Hack Proofing Your Network826 Pages77.Hack Attacks Revealed837 Pages78.Dissecting the Hack - The F0rb1dd3n Network441 Pages79.TCP/IP Guide1671 Pages80.Offensive Security - Wireless Attacks - WiFu385 Pages81.Google Hacking - For Penetration Testers529 Pages82.Computer Forensics Investigating Network Intrusions and Cyber Crime394 Pages83.Hakin9 Bible207 Pages84.Network Forensics - Tracking Hackers Through Cyberspace574 Pages85.Computer Forensics - Investigating Data and Image Files227 Pages86.Penetration Testing and Network Defense625 Pages87.Hacking Exposed - Malware and Rootkits401 Pages88.Malware Analyst's Cookbook746 Pages89.Mobile Malware - Attacks and Defense386 Pages90.Java 2 Network Security702 Pages91.A Bug Hunter's Diary212 Pages92.Viruses Revealed - Undestand and Counter Malicious Software721 Pages93.Figital Forensics With Open Source Tools289 Pages94.SSH, The Secure Shell - The Definitive Guide438 Pages95.Pro PHP Security369 Pages96.Zero Day Exploit - Countdown to Darkness363 Pages97.Metasploit Penetration Testing Cookbook269 Pages98.24 Deadly Sins of Software Securtiy433 Pages99.Botnets - The Killer Web App482 Pages100.Hacker Highschool - Hack School for Beginners (ZIP)12 Books

For any broken link, please drop a mail at [email protected]


About Joyk


Aggregate valuable and interesting links.
Joyk means Joy of geeK