Facebook Icon Image Google Plus Icon Image Twitter Icon Image Logo Image

Download Free Hacks eBooks

Extreme Exploits Image

Extreme Exploits

Jun 30 2016  This cutting-edge volume takes network security professionals to the next level in protecting their networks and Web sites. Never-before-published advanced security techniques and step-by-step instructions explain how to defend against devastating vulnerabilities in systems and underlying network infrastructure. Some of these advanced methodologies include advanced attack and defense vectors, advanced attack profiling, and the theatre of war concept. In addition, readers will learn how to architect and prepare their network from threats that don't yet exist....

The Basics of Hacking and Penetration Testing Image

The Basics of Hacking and Penetration Testing

Jun 30 2016  The Basics of Hacking and Penetration Testing, 2nd Ed. serves as an introduction to the steps required to complete a penetration test or perform an ethical hack from beginning to end. No prior hacking experience is needed. You will learn how to properly utilize and interpret the results of modern day hacking tools, which are required to complete a penetration test. Tool coverage includes Backtrack and Kali Linux, Google reconnaissance, MetaGooFil, DNS interrogation, Nmap, Nessus, Metasploit, the Social Engineer Toolkit (SET) , w3af, Netcat, post exploitation tactics, the Hacker Defender rootki...

Hacking GMail Image

Hacking GMail

Jun 30 2016  The first book to unlock the true power behind Gmail, Hacking Gmail will immediately appeal to Google and Gmail fansThis is serious, down-and-dirty, under-the-hood, code-level hacking that will have readers eliminating the default settings, customizing appearance, disabling advertising, and taking control over their Gmail accountsCovers turning Gmail into an online hard drive for backing up files, using it as a blogging tool, and even creating customized Gmail tools and hacksShows readers how to check their Gmail without visiting the site; use Gmail APIs in Perl, Python, PHP, and other languag...

Understanding Network Hacks Image

Understanding Network Hacks

Jun 30 2016  This book explains how to see one's own network through the eyes of an attacker, to understand their techniques and effectively protect against them. Through Python code samples the reader learns to code tools on subjects such as password sniffing, ARP poisoning, DNS spoofing, SQL injection, Google harvesting and Wifi hacking. Furthermore the reader will be introduced to defense methods such as intrusion detection and prevention systems and log file analysis by diving into code....

Word Hacks Image

Word Hacks

Jun 30 2016  As one of the applications in Microsoft Office, Word is the dominant word-processing program for both Windows and Mac users. Millions of people around the globe use it. But many, if not most, of them barely skim the surface of what is possible with Microsoft Word. Seduced by the application's supposed simplicity, they settle for just what's obvious--even if it doesn't satisfy their wants and needs. They may curse the wretched Bullets and Numbering buttons multiple times a day or take hours to change the font size of every heading in a lengthy report, yet they're reluctant to dig deeper to take...