The best possible defense is an offensive strategy that allows you to regularly test your network to reveal the vulnerabilities and close the holes before someone gets in. Written by veteran author and security expert John Chirillo, Hack Attacks Testing explains how to perform your own security audits. * Paperback: 576 pages | |
Download | (Size :- 6.80 MB) |
Guessing Passwords, Stealing Passwords, Password Lists, Social Engineering, Reverse Social Engineering, Crashing Electronic Bulletin Boards, Dummy Screens, Fake E-mail, Trojan Horses, Viruses, Worms, Trap Doors, And Much more. Anyone concerned with computer security and data privacy needs to read this book. | |
Download | (Size :- 1.82 MB) |
Everything about GMail including :- Inside GMail, Conquering GMail, Desktop Integration, GMail Power Tips, Skinning GMail, How GMail Works, GMail & Greasemonkey, GMail Libraries, Building API, Using GMailFS, etc..........! | |
Download | (Size :- 3.08 MB) |
Download | (Size :- 8.16 MB) |
No comments:
Post a Comment