# عنوان نوع فایل سایز فایل بازدید دانلود امتیاز قیمت (تومان)
1
Gray Hat Hacking, 3rd Edition
12.68 MB 72 1
رایگان
2
BackTrack 4: Assuring Security by Penetration Testing
10.17 MB 80 0
رایگان
3
Practical Malware Analysis
10.07 MB 76 0
رایگان
4
Metasploit Penetration Testing Cookbook
4.05 MB 80 2
رایگان
5
Managing Risk and Information Security
2.54 MB 100 0
رایگان
6
Cyber Security Policy Guidebook
3.42 MB 101 1
رایگان
7
BackTrack 5 Cookbook
29.93 MB 79 0
رایگان
8
Advanced Penetration Testing for Highly-Secured Environments
12.87 MB 74 1
رایگان
9
Web Penetration Testing with Kali Linux
19.55 MB 78 1
رایگان
10
Information Security The Complete Reference, 2nd Edition
20.23 MB 116 0
رایگان
11
Hacking For Dummies, 4th Edition
17.62 MB 116 2
رایگان
12
Hacking Exposed Mobile
6.52 MB 115 2
رایگان
13
Cuckoo Malware Analysis
7.30 MB 78 2
رایگان
14
Computer Security – ESORICS 2013
10.23 MB 87 0
رایگان
15
What Is Computer Science?
6.17 MB 83 0
رایگان
16
Threat Modeling
5.90 MB 85 2
رایگان
17
The Manager’s Guide to Web Application Security
1.86 MB 88 1
رایگان
18
The InfoSec Handbook
8.72 MB 83 1
رایگان
19
The Hacker Playbook: Practical Guide To Penetration Testing
26.11 MB 91 3
رایگان
20
The Browser Hacker’s Handbook
23.33 MB 79 1
رایگان
21
The Art of Memory Forensics
7.99 MB 89 1
رایگان
22
Practical Reverse Engineering
4.65 MB 95 3
رایگان
23
Penetration Testing with the Bash shell
5.89 MB 94 2
رایگان
24
Penetration Testing with BackBox
3.61 MB 80 1
رایگان
25
Penetration Testing
12.58 MB 81 2
رایگان
Gray Hat Hacking, 3rd Edition

Gray Hat Hacking, 3rd Edition

This one-of-a-kind guide offers a comprehensive overview of the hacking landscape and is organized in a progressive manner, first giving an update on ...

دانلود 1
12.68 MB
رایگان
BackTrack 4: Assuring Security by Penetration Testing

BackTrack 4: Assuring Security ...

BackTrack 4: Assuring Security by Penetration Testing is a fully focused, structured book providing guidance on developing practical penetration testi ...

10.17 MB
رایگان
Practical Malware Analysis

Practical Malware Analysis

Malware analysis is big business, and attacks can cost a company dearly. When malware breaches your defenses, you need to act quickly to cure current ...

10.07 MB
رایگان
Metasploit Penetration Testing Cookbook

Metasploit Penetration Testing ...

Metasploit software helps security and IT professionals identify security issues, verify vulnerability mitigations, and manage expert-driven security ...

دانلود 2
4.05 MB
رایگان
Managing Risk and Information Security

Managing Risk and Information S ...

Managing Risk and Information Security: Protect to Enable, an ApressOpen title, describes the changing risk environment and why a fresh approach to in ...

2.54 MB
رایگان
Cyber Security Policy Guidebook

Cyber Security Policy Guidebook

Drawing upon a wealth of experience from academia, industry, and government service, Cyber Security Policy Guidebook details and dissects, in simple l ...

دانلود 1
3.42 MB
رایگان
BackTrack 5 Cookbook

BackTrack 5 Cookbook

Learn to perform penetration tests with BackTrack 5. Nearly 100 recipes designed to teach penetration testing principles and build knowledge of BackTr ...

29.93 MB
رایگان
Advanced Penetration Testing for Highly-Secured Environments

Advanced Penetration Testing fo ...

Advanced Penetration Testing for Highly-Secured Environments will teach you how to efficiently and effectively ensure the security posture of environm ...

دانلود 1
12.87 MB
رایگان
Web Penetration Testing with Kali Linux

Web Penetration Testing with Ka ...

Kali Linux is built for professional penetration testing and security auditing. It is the next-generation of BackTrack, the most popular open-source p ...

دانلود 1
19.55 MB
رایگان
Information Security The Complete Reference, 2nd Edition

Information Security The Comple ...

Today’s complex world of mobile platforms, cloud computing, and ubiquitous data access puts new security demands on every IT professional. Information ...

20.23 MB
رایگان
Hacking For Dummies, 4th Edition

Hacking For Dummies, 4th Editio ...

The best way to stay safe online is to stop hackers before they attack – first, by understanding their thinking and second, by ethically hacking your ...

دانلود 2
17.62 MB
رایگان
Hacking Exposed Mobile

Hacking Exposed Mobile

Hacking Exposed Mobile continues in the great tradition of the Hacking Exposed series, arming business leaders and technology practitioners with an in ...

دانلود 2
6.52 MB
رایگان
Cuckoo Malware Analysis

Cuckoo Malware Analysis

Cuckoo Sandbox is a leading open source automated malware analysis system. This means that you can throw any suspicious file at it and, in a matter of ...

دانلود 2
7.30 MB
رایگان
Computer Security – ESORICS 2013

Computer Security – ESORICS 201 ...

This book constitutes the refereed proceedings of the 18th European Symposium on Computer Security, ESORICS 2013, held in Egham, UK, in September 2013 ...

10.23 MB
رایگان
What Is Computer Science?

What Is Computer Science?

This engaging and accessible text addresses the fundamental question: What Is Computer Science? The book showcases a set of representative concepts br ...

6.17 MB
رایگان
Threat Modeling

Threat Modeling

Adam Shostack is responsible for security development lifecycle threat modeling at Microsoft and is one of a handful of threat modeling experts in the ...

دانلود 2
5.90 MB
رایگان
The Manager’s Guide to Web Application Security

The Manager’s Guide to Web Appl ...

The Manager’s Guide to Web Application Security is a concise, information-packed guide to application security risks every organization faces, written ...

دانلود 1
1.86 MB
رایگان
The InfoSec Handbook

The InfoSec Handbook

The InfoSec Handbook offers the reader an organized layout of information that is easily read and understood. Allowing beginners to enter the field an ...

دانلود 1
8.72 MB
رایگان
The Hacker Playbook: Practical Guide To Penetration Testing

The Hacker Playbook: Practical ...

Just as a professional athlete doesn’t show up without a solid game plan, ethical hackers, IT professionals, and security researchers should not be un ...

دانلود 3
26.11 MB
رایگان
The Browser Hacker’s Handbook

The Browser Hacker’s Handbook

The Browser Hacker’s Handbook gives a practical understanding of hacking the everyday web browser and using it as a beachhead to launch further attack ...

دانلود 1
23.33 MB
رایگان
The Art of Memory Forensics

The Art of Memory Forensics

Memory forensics is the art of analyzing computer memory (RAM) to solve digital crimes. As a follow-up to the best seller Malware Analyst’s Cookbook, ...

دانلود 1
7.99 MB
رایگان
Practical Reverse Engineering

Practical Reverse Engineering

Reverse engineering is the process of analyzing hardware or software and understanding it, without having access to the source code or design document ...

دانلود 3
4.65 MB
رایگان
Penetration Testing with the Bash shell

Penetration Testing with the Ba ...

This book teaches you to take your problem solving capabilities to the next level with the Bash shell, to assess network and application level securit ...

دانلود 2
5.89 MB
رایگان
Penetration Testing with BackBox

Penetration Testing with BackBo ...

BackBox is an amazing Linux security distribution designed to keep in mind the needs of security and system administration specialists. It has been de ...

دانلود 1
3.61 MB
رایگان
Penetration Testing

Penetration Testing

Penetration testers simulate cyber attacks to find security weaknesses in networks, operating systems, and applications. Information security experts ...

دانلود 2
12.58 MB
رایگان

بارگزاری