• The default language of any content posted is English.
    Do not create multi-accounts, you will be blocked!

Hacking And Security eBooks MegaPack

kingandfifth

Well-known member
Messages
53
Files
1
Reactions
274
Hacking And Security Ebooks MegaPack.png

| S.No | E-Book (PDF Link) | Total Pages |
| 1. | Advanced Penetration Testing | 269 Pages |
| 2. | The Basics of Web Hacking | 179 Pages |
| 3. | The Basics of Hacking and Penetration Testing | 178 Pages |
| 4. | The Art of Deception by Kevin Mitnick | 577 Pages |
| 5. | SQL Injection Attacks and Defense | 761 Pages |
| 6. | Metasploit - The Penetration Tester’s Guide | 332 Pages |
| 7. | Ethical Hacking and Penetration Testing Guide | 523 Pages |
| 8. | Network Attacks and Exploitation - A Framework | 219 Pages |
| 9. | Python Web Penetration Testing Cookbook | 224 Pages |
| 10. | Wireshark for Security Professionals | 391 Pages |
| 11. | Mastering Modern Web Penetration Testing | 298 Pages |
| 12. | The Shellcoder’s Handbook | 745 Pages |
| 13. | The Little Black Book of Computer Viruses | 183 Pages |
| 14. | XSS Attacks - Cross Site Scripting Exploits and Defense | 482 Pages |
| 15. | The Web Application Hacker’s Handbook | 771 Pages |
| 16. | Ethical Hacking and Countermeasures | 239 Pages |
| 17. | Reversing - Secrets of Reverse Engineering | 619 Pages |
| 18. | Network Security Bible | 697 Pages |
| 19. | Hacking Web Applications - Hacking Exposed | 416 Pages |
| 20. | Hacking for Dummies | 387 Pages |
| 21. | Hacking Wireless Network for Dummies | 387 Pages |
| 22. | Ninja Hacking - Unconventional Penetration Testing Tacting and Techniques | 314 pages |
| 23. | Professional Penetration Testing | 525 Pages |
| 24. | Gray Hat Hacking - The Ethical Hacker’s Handbook | 577 Pages |
| 25. | Hack Attacks Testing | 561 Pages |
| 26. | Basic Security Testing with Kali Linux | 242 Pages |
| 27. | Mastering Kali Linux for Advanced Penetration Testing | 356 Pages |
| 28. | Kali Linux CTF Blueprints | 190 Pages |
| 29. | Kali Linux Cookbook | 261 Pages |
| 30. | Kali Linux - Assuring Security by Penetration Testing | 454 Pages |
| 31. | Information Security Management Handbook | 3206 Pages |
| 32. | Computer and Information Security Handbook | 877 Pages |
| 33. | CISSP - Certified Information Systems Security Professional | 804 Pages |
| 34. | Computer Security and Cryptography | 542 Pages |
| 35. | Python for Kids | 348 Pages |
| 36. | End to End Network Security - Defense-in-Depth | 469 Pages |
| 37. | A Guide to Computer Network Security | 483 Pages |
| 38. | Essential Computer Security | 321 Pages |
| 39. | Security in Wireless Mesh Networks | 548 Pages |
| 40. | Hacking Windows XP (OLD) | 379 Pages |
| 41. | Hacking Exposed - Windows Security, Secrets and Solutions | 482 Pages |
| 42. | Hacking Exposed - Network Security, Secrets and Solutions | 736 Pages |
| 43. | Information Security - Principles and Pratice | 413 Pages |
| 44. | Nessus, Snort and Ethereal Power Tools | 472 Pages |
| 45. | Active Defense - A Comprehensive Guide to Network Security | 374 Pages |
| 46. | Information Security Fundamentals | 262 Pages |
| 47. | Wireless Network Security | 422 Pages |
| 48. | Red Hat Linux Security and Optimization | 721 Pages |
| 49. | Windows Forensics Analysis | 386 Pages |
| 50. | Mobile and Wireless Network Security and Privacy | 232 Pages |
| 51. | Firewalls and Internet Security | 456 Pages |
| 52. | An Introduction to Computer Security - The NIST Handbook | 290 Pages |
| 53. | Unauthorized Access - Physical Penetration Testing for IT Security Teams | 309 Pages |
| 54. | Testing Web Security | 297 Pages |
| 55. | Maximum Security - A Hacker’s Guide to Protecting Your Internet Site and Network | 670 Pages |
| 56. | Information Resource Guide - Computer, Internet and Network Systems Security | 325 Pages |
| 57. | The Hacker’s Underground Handbook | 116 Pages |
| 58. | Guide to SCADA and Industrial Control Systems Security | 164 Pages |
| 59. | The International Handbook of Computer Security | 274 Pages |
| 60. | The Code Book - How to Make It, Break It, Hack It, Crack It | 273 Pages |
| 61. | Linux 101 Hacks | 271 Pages |
| 62. | Introduction to Linux - A Hands on Guide | 223 Pages |
| 63. | Bluetooth Security | 222 Pages |
| 64. | IT Governance - A Manager’s Guide to Data Security and ISO 27001/27002 | 385 Pages |
| 65. | Batch File Programming | 155 Pages |
| 66. | Cracking the Coding Interview | 310 Pages |
| 67. | Dictionary of Networking | 465 Pages |
| 68. | Hacking Gmail | 310 Pages |
| 69. | Linux Complete Command Reference | 1528 Pages |
| 70. | Practical Hacking Techniques and Countermeasures | 752 Pages |
| 71. | The Art of Intrusion by Kevin Mitnick | 291 Pages |
| 72. | Hack Notes - Windows Security Portable Reference | 289 Pages |
| 73. | Hacking - The Next Generation | 298 Pages |
| 74. | Hacking the Cable Modem | 330 Pages |
| 75. | Hackers Beware - Defending Your Network From The Wiley Hacker | 817 Pages |
| 76. | Hack Proofing Your Network | 826 Pages |
| 77. | Hack Attacks Revealed | 837 Pages |
| 78. | Dissecting the Hack - The F0rb1dd3n Network | 441 Pages |
| 79. | TCP/IP Guide | 1671 Pages |
| 80. | Offensive Security - Wireless Attacks - WiFu | 385 Pages |
| 81. | Google Hacking - For Penetration Testers | 529 Pages |
| 82. | Computer Forensics Investigating Network Intrusions and Cyber Crime | 394 Pages |
| 83. | Hakin9 Bible | 207 Pages |
| 84. | Network Forensics - Tracking Hackers Through Cyberspace | 574 Pages |
| 85. | Computer Forensics - Investigating Data and Image Files | 227 Pages |
| 86. | Penetration Testing and Network Defense | 625 Pages |
| 87. | Hacking Exposed - Malware and Rootkits | 401 Pages |
| 88. | Malware Analyst’s Cookbook | 746 Pages |
| 89. | Mobile Malware - Attacks and Defense | 386 Pages |
| 90. | Java 2 Network Security | 702 Pages |
| 91. | A Bug Hunter’s Diary | 212 Pages |
| 92. | Viruses Revealed - Understand and Counter Malicious Software | 721 Pages |
| 93. | Figital Forensics With Open Source Tools | 289 Pages |
| 94. | SSH, The Secure Shell - The Definitive Guide | 438 Pages |
| 95. | Pro PHP Security | 369 Pages |
| 96. | Zero Day Exploit - Countdown to Darkness | 363 Pages |
| 97. | Metasploit Penetration Testing Cookbook | 269 Pages |
| 98. | 24 Deadly Sins of Software Securtiy | 433 Pages |
| 99. | Botnets - The Killer Web App | 482 Pages |
| 100. | Hacker Highschool - Hack School for Beginners (ZIP) | 12 Books |

Download Link:
 
View attachment 29119

| S.No | E-Book (PDF Link) | Total Pages |
| 1. | Advanced Penetration Testing | 269 Pages |
| 2. | The Basics of Web Hacking | 179 Pages |
| 3. | The Basics of Hacking and Penetration Testing | 178 Pages |
| 4. | The Art of Deception by Kevin Mitnick | 577 Pages |
| 5. | SQL Injection Attacks and Defense | 761 Pages |
| 6. | Metasploit - The Penetration Tester’s Guide | 332 Pages |
| 7. | Ethical Hacking and Penetration Testing Guide | 523 Pages |
| 8. | Network Attacks and Exploitation - A Framework | 219 Pages |
| 9. | Python Web Penetration Testing Cookbook | 224 Pages |
| 10. | Wireshark for Security Professionals | 391 Pages |
| 11. | Mastering Modern Web Penetration Testing | 298 Pages |
| 12. | The Shellcoder’s Handbook | 745 Pages |
| 13. | The Little Black Book of Computer Viruses | 183 Pages |
| 14. | XSS Attacks - Cross Site Scripting Exploits and Defense | 482 Pages |
| 15. | The Web Application Hacker’s Handbook | 771 Pages |
| 16. | Ethical Hacking and Countermeasures | 239 Pages |
| 17. | Reversing - Secrets of Reverse Engineering | 619 Pages |
| 18. | Network Security Bible | 697 Pages |
| 19. | Hacking Web Applications - Hacking Exposed | 416 Pages |
| 20. | Hacking for Dummies | 387 Pages |
| 21. | Hacking Wireless Network for Dummies | 387 Pages |
| 22. | Ninja Hacking - Unconventional Penetration Testing Tacting and Techniques | 314 pages |
| 23. | Professional Penetration Testing | 525 Pages |
| 24. | Gray Hat Hacking - The Ethical Hacker’s Handbook | 577 Pages |
| 25. | Hack Attacks Testing | 561 Pages |
| 26. | Basic Security Testing with Kali Linux | 242 Pages |
| 27. | Mastering Kali Linux for Advanced Penetration Testing | 356 Pages |
| 28. | Kali Linux CTF Blueprints | 190 Pages |
| 29. | Kali Linux Cookbook | 261 Pages |
| 30. | Kali Linux - Assuring Security by Penetration Testing | 454 Pages |
| 31. | Information Security Management Handbook | 3206 Pages |
| 32. | Computer and Information Security Handbook | 877 Pages |
| 33. | CISSP - Certified Information Systems Security Professional | 804 Pages |
| 34. | Computer Security and Cryptography | 542 Pages |
| 35. | Python for Kids | 348 Pages |
| 36. | End to End Network Security - Defense-in-Depth | 469 Pages |
| 37. | A Guide to Computer Network Security | 483 Pages |
| 38. | Essential Computer Security | 321 Pages |
| 39. | Security in Wireless Mesh Networks | 548 Pages |
| 40. | Hacking Windows XP (OLD) | 379 Pages |
| 41. | Hacking Exposed - Windows Security, Secrets and Solutions | 482 Pages |
| 42. | Hacking Exposed - Network Security, Secrets and Solutions | 736 Pages |
| 43. | Information Security - Principles and Pratice | 413 Pages |
| 44. | Nessus, Snort and Ethereal Power Tools | 472 Pages |
| 45. | Active Defense - A Comprehensive Guide to Network Security | 374 Pages |
| 46. | Information Security Fundamentals | 262 Pages |
| 47. | Wireless Network Security | 422 Pages |
| 48. | Red Hat Linux Security and Optimization | 721 Pages |
| 49. | Windows Forensics Analysis | 386 Pages |
| 50. | Mobile and Wireless Network Security and Privacy | 232 Pages |
| 51. | Firewalls and Internet Security | 456 Pages |
| 52. | An Introduction to Computer Security - The NIST Handbook | 290 Pages |
| 53. | Unauthorized Access - Physical Penetration Testing for IT Security Teams | 309 Pages |
| 54. | Testing Web Security | 297 Pages |
| 55. | Maximum Security - A Hacker’s Guide to Protecting Your Internet Site and Network | 670 Pages |
| 56. | Information Resource Guide - Computer, Internet and Network Systems Security | 325 Pages |
| 57. | The Hacker’s Underground Handbook | 116 Pages |
| 58. | Guide to SCADA and Industrial Control Systems Security | 164 Pages |
| 59. | The International Handbook of Computer Security | 274 Pages |
| 60. | The Code Book - How to Make It, Break It, Hack It, Crack It | 273 Pages |
| 61. | Linux 101 Hacks | 271 Pages |
| 62. | Introduction to Linux - A Hands on Guide | 223 Pages |
| 63. | Bluetooth Security | 222 Pages |
| 64. | IT Governance - A Manager’s Guide to Data Security and ISO 27001/27002 | 385 Pages |
| 65. | Batch File Programming | 155 Pages |
| 66. | Cracking the Coding Interview | 310 Pages |
| 67. | Dictionary of Networking | 465 Pages |
| 68. | Hacking Gmail | 310 Pages |
| 69. | Linux Complete Command Reference | 1528 Pages |
| 70. | Practical Hacking Techniques and Countermeasures | 752 Pages |
| 71. | The Art of Intrusion by Kevin Mitnick | 291 Pages |
| 72. | Hack Notes - Windows Security Portable Reference | 289 Pages |
| 73. | Hacking - The Next Generation | 298 Pages |
| 74. | Hacking the Cable Modem | 330 Pages |
| 75. | Hackers Beware - Defending Your Network From The Wiley Hacker | 817 Pages |
| 76. | Hack Proofing Your Network | 826 Pages |
| 77. | Hack Attacks Revealed | 837 Pages |
| 78. | Dissecting the Hack - The F0rb1dd3n Network | 441 Pages |
| 79. | TCP/IP Guide | 1671 Pages |
| 80. | Offensive Security - Wireless Attacks - WiFu | 385 Pages |
| 81. | Google Hacking - For Penetration Testers | 529 Pages |
| 82. | Computer Forensics Investigating Network Intrusions and Cyber Crime | 394 Pages |
| 83. | Hakin9 Bible | 207 Pages |
| 84. | Network Forensics - Tracking Hackers Through Cyberspace | 574 Pages |
| 85. | Computer Forensics - Investigating Data and Image Files | 227 Pages |
| 86. | Penetration Testing and Network Defense | 625 Pages |
| 87. | Hacking Exposed - Malware and Rootkits | 401 Pages |
| 88. | Malware Analyst’s Cookbook | 746 Pages |
| 89. | Mobile Malware - Attacks and Defense | 386 Pages |
| 90. | Java 2 Network Security | 702 Pages |
| 91. | A Bug Hunter’s Diary | 212 Pages |
| 92. | Viruses Revealed - Understand and Counter Malicious Software | 721 Pages |
| 93. | Figital Forensics With Open Source Tools | 289 Pages |
| 94. | SSH, The Secure Shell - The Definitive Guide | 438 Pages |
| 95. | Pro PHP Security | 369 Pages |
| 96. | Zero Day Exploit - Countdown to Darkness | 363 Pages |
| 97. | Metasploit Penetration Testing Cookbook | 269 Pages |
| 98. | 24 Deadly Sins of Software Securtiy | 433 Pages |
| 99. | Botnets - The Killer Web App | 482 Pages |
| 100. | Hacker Highschool - Hack School for Beginners (ZIP) | 12 Books |

Download Link: *** Hidden text: cannot be quoted. ***
i am unable to fil\nd the download link.
Post automatically merged:

someone can explain me this? "Hidden text, you need have 1 reaction, now you have 0 reactions."
I am also facing this issue
 
Reacted by:
View attachment 29119

| S.No | E-Book (PDF Link) | Total Pages |
| 1. | Advanced Penetration Testing | 269 Pages |
| 2. | The Basics of Web Hacking | 179 Pages |
| 3. | The Basics of Hacking and Penetration Testing | 178 Pages |
| 4. | The Art of Deception by Kevin Mitnick | 577 Pages |
| 5. | SQL Injection Attacks and Defense | 761 Pages |
| 6. | Metasploit - The Penetration Tester’s Guide | 332 Pages |
| 7. | Ethical Hacking and Penetration Testing Guide | 523 Pages |
| 8. | Network Attacks and Exploitation - A Framework | 219 Pages |
| 9. | Python Web Penetration Testing Cookbook | 224 Pages |
| 10. | Wireshark for Security Professionals | 391 Pages |
| 11. | Mastering Modern Web Penetration Testing | 298 Pages |
| 12. | The Shellcoder’s Handbook | 745 Pages |
| 13. | The Little Black Book of Computer Viruses | 183 Pages |
| 14. | XSS Attacks - Cross Site Scripting Exploits and Defense | 482 Pages |
| 15. | The Web Application Hacker’s Handbook | 771 Pages |
| 16. | Ethical Hacking and Countermeasures | 239 Pages |
| 17. | Reversing - Secrets of Reverse Engineering | 619 Pages |
| 18. | Network Security Bible | 697 Pages |
| 19. | Hacking Web Applications - Hacking Exposed | 416 Pages |
| 20. | Hacking for Dummies | 387 Pages |
| 21. | Hacking Wireless Network for Dummies | 387 Pages |
| 22. | Ninja Hacking - Unconventional Penetration Testing Tacting and Techniques | 314 pages |
| 23. | Professional Penetration Testing | 525 Pages |
| 24. | Gray Hat Hacking - The Ethical Hacker’s Handbook | 577 Pages |
| 25. | Hack Attacks Testing | 561 Pages |
| 26. | Basic Security Testing with Kali Linux | 242 Pages |
| 27. | Mastering Kali Linux for Advanced Penetration Testing | 356 Pages |
| 28. | Kali Linux CTF Blueprints | 190 Pages |
| 29. | Kali Linux Cookbook | 261 Pages |
| 30. | Kali Linux - Assuring Security by Penetration Testing | 454 Pages |
| 31. | Information Security Management Handbook | 3206 Pages |
| 32. | Computer and Information Security Handbook | 877 Pages |
| 33. | CISSP - Certified Information Systems Security Professional | 804 Pages |
| 34. | Computer Security and Cryptography | 542 Pages |
| 35. | Python for Kids | 348 Pages |
| 36. | End to End Network Security - Defense-in-Depth | 469 Pages |
| 37. | A Guide to Computer Network Security | 483 Pages |
| 38. | Essential Computer Security | 321 Pages |
| 39. | Security in Wireless Mesh Networks | 548 Pages |
| 40. | Hacking Windows XP (OLD) | 379 Pages |
| 41. | Hacking Exposed - Windows Security, Secrets and Solutions | 482 Pages |
| 42. | Hacking Exposed - Network Security, Secrets and Solutions | 736 Pages |
| 43. | Information Security - Principles and Pratice | 413 Pages |
| 44. | Nessus, Snort and Ethereal Power Tools | 472 Pages |
| 45. | Active Defense - A Comprehensive Guide to Network Security | 374 Pages |
| 46. | Information Security Fundamentals | 262 Pages |
| 47. | Wireless Network Security | 422 Pages |
| 48. | Red Hat Linux Security and Optimization | 721 Pages |
| 49. | Windows Forensics Analysis | 386 Pages |
| 50. | Mobile and Wireless Network Security and Privacy | 232 Pages |
| 51. | Firewalls and Internet Security | 456 Pages |
| 52. | An Introduction to Computer Security - The NIST Handbook | 290 Pages |
| 53. | Unauthorized Access - Physical Penetration Testing for IT Security Teams | 309 Pages |
| 54. | Testing Web Security | 297 Pages |
| 55. | Maximum Security - A Hacker’s Guide to Protecting Your Internet Site and Network | 670 Pages |
| 56. | Information Resource Guide - Computer, Internet and Network Systems Security | 325 Pages |
| 57. | The Hacker’s Underground Handbook | 116 Pages |
| 58. | Guide to SCADA and Industrial Control Systems Security | 164 Pages |
| 59. | The International Handbook of Computer Security | 274 Pages |
| 60. | The Code Book - How to Make It, Break It, Hack It, Crack It | 273 Pages |
| 61. | Linux 101 Hacks | 271 Pages |
| 62. | Introduction to Linux - A Hands on Guide | 223 Pages |
| 63. | Bluetooth Security | 222 Pages |
| 64. | IT Governance - A Manager’s Guide to Data Security and ISO 27001/27002 | 385 Pages |
| 65. | Batch File Programming | 155 Pages |
| 66. | Cracking the Coding Interview | 310 Pages |
| 67. | Dictionary of Networking | 465 Pages |
| 68. | Hacking Gmail | 310 Pages |
| 69. | Linux Complete Command Reference | 1528 Pages |
| 70. | Practical Hacking Techniques and Countermeasures | 752 Pages |
| 71. | The Art of Intrusion by Kevin Mitnick | 291 Pages |
| 72. | Hack Notes - Windows Security Portable Reference | 289 Pages |
| 73. | Hacking - The Next Generation | 298 Pages |
| 74. | Hacking the Cable Modem | 330 Pages |
| 75. | Hackers Beware - Defending Your Network From The Wiley Hacker | 817 Pages |
| 76. | Hack Proofing Your Network | 826 Pages |
| 77. | Hack Attacks Revealed | 837 Pages |
| 78. | Dissecting the Hack - The F0rb1dd3n Network | 441 Pages |
| 79. | TCP/IP Guide | 1671 Pages |
| 80. | Offensive Security - Wireless Attacks - WiFu | 385 Pages |
| 81. | Google Hacking - For Penetration Testers | 529 Pages |
| 82. | Computer Forensics Investigating Network Intrusions and Cyber Crime | 394 Pages |
| 83. | Hakin9 Bible | 207 Pages |
| 84. | Network Forensics - Tracking Hackers Through Cyberspace | 574 Pages |
| 85. | Computer Forensics - Investigating Data and Image Files | 227 Pages |
| 86. | Penetration Testing and Network Defense | 625 Pages |
| 87. | Hacking Exposed - Malware and Rootkits | 401 Pages |
| 88. | Malware Analyst’s Cookbook | 746 Pages |
| 89. | Mobile Malware - Attacks and Defense | 386 Pages |
| 90. | Java 2 Network Security | 702 Pages |
| 91. | A Bug Hunter’s Diary | 212 Pages |
| 92. | Viruses Revealed - Understand and Counter Malicious Software | 721 Pages |
| 93. | Figital Forensics With Open Source Tools | 289 Pages |
| 94. | SSH, The Secure Shell - The Definitive Guide | 438 Pages |
| 95. | Pro PHP Security | 369 Pages |
| 96. | Zero Day Exploit - Countdown to Darkness | 363 Pages |
| 97. | Metasploit Penetration Testing Cookbook | 269 Pages |
| 98. | 24 Deadly Sins of Software Securtiy | 433 Pages |
| 99. | Botnets - The Killer Web App | 482 Pages |
| 100. | Hacker Highschool - Hack School for Beginners (ZIP) | 12 Books |

Download Link: *** Hidden text: cannot be quoted. ***
thank you for sharing bro
 
Reacted by:
  • Like
Reactions: mea-dk
thank you for sharing bro
View attachment 29119

| S.No | E-Book (PDF Link) | Total Pages |
| 1. | Advanced Penetration Testing | 269 Pages |
| 2. | The Basics of Web Hacking | 179 Pages |
| 3. | The Basics of Hacking and Penetration Testing | 178 Pages |
| 4. | The Art of Deception by Kevin Mitnick | 577 Pages |
| 5. | SQL Injection Attacks and Defense | 761 Pages |
| 6. | Metasploit - The Penetration Tester’s Guide | 332 Pages |
| 7. | Ethical Hacking and Penetration Testing Guide | 523 Pages |
| 8. | Network Attacks and Exploitation - A Framework | 219 Pages |
| 9. | Python Web Penetration Testing Cookbook | 224 Pages |
| 10. | Wireshark for Security Professionals | 391 Pages |
| 11. | Mastering Modern Web Penetration Testing | 298 Pages |
| 12. | The Shellcoder’s Handbook | 745 Pages |
| 13. | The Little Black Book of Computer Viruses | 183 Pages |
| 14. | XSS Attacks - Cross Site Scripting Exploits and Defense | 482 Pages |
| 15. | The Web Application Hacker’s Handbook | 771 Pages |
| 16. | Ethical Hacking and Countermeasures | 239 Pages |
| 17. | Reversing - Secrets of Reverse Engineering | 619 Pages |
| 18. | Network Security Bible | 697 Pages |
| 19. | Hacking Web Applications - Hacking Exposed | 416 Pages |
| 20. | Hacking for Dummies | 387 Pages |
| 21. | Hacking Wireless Network for Dummies | 387 Pages |
| 22. | Ninja Hacking - Unconventional Penetration Testing Tacting and Techniques | 314 pages |
| 23. | Professional Penetration Testing | 525 Pages |
| 24. | Gray Hat Hacking - The Ethical Hacker’s Handbook | 577 Pages |
| 25. | Hack Attacks Testing | 561 Pages |
| 26. | Basic Security Testing with Kali Linux | 242 Pages |
| 27. | Mastering Kali Linux for Advanced Penetration Testing | 356 Pages |
| 28. | Kali Linux CTF Blueprints | 190 Pages |
| 29. | Kali Linux Cookbook | 261 Pages |
| 30. | Kali Linux - Assuring Security by Penetration Testing | 454 Pages |
| 31. | Information Security Management Handbook | 3206 Pages |
| 32. | Computer and Information Security Handbook | 877 Pages |
| 33. | CISSP - Certified Information Systems Security Professional | 804 Pages |
| 34. | Computer Security and Cryptography | 542 Pages |
| 35. | Python for Kids | 348 Pages |
| 36. | End to End Network Security - Defense-in-Depth | 469 Pages |
| 37. | A Guide to Computer Network Security | 483 Pages |
| 38. | Essential Computer Security | 321 Pages |
| 39. | Security in Wireless Mesh Networks | 548 Pages |
| 40. | Hacking Windows XP (OLD) | 379 Pages |
| 41. | Hacking Exposed - Windows Security, Secrets and Solutions | 482 Pages |
| 42. | Hacking Exposed - Network Security, Secrets and Solutions | 736 Pages |
| 43. | Information Security - Principles and Pratice | 413 Pages |
| 44. | Nessus, Snort and Ethereal Power Tools | 472 Pages |
| 45. | Active Defense - A Comprehensive Guide to Network Security | 374 Pages |
| 46. | Information Security Fundamentals | 262 Pages |
| 47. | Wireless Network Security | 422 Pages |
| 48. | Red Hat Linux Security and Optimization | 721 Pages |
| 49. | Windows Forensics Analysis | 386 Pages |
| 50. | Mobile and Wireless Network Security and Privacy | 232 Pages |
| 51. | Firewalls and Internet Security | 456 Pages |
| 52. | An Introduction to Computer Security - The NIST Handbook | 290 Pages |
| 53. | Unauthorized Access - Physical Penetration Testing for IT Security Teams | 309 Pages |
| 54. | Testing Web Security | 297 Pages |
| 55. | Maximum Security - A Hacker’s Guide to Protecting Your Internet Site and Network | 670 Pages |
| 56. | Information Resource Guide - Computer, Internet and Network Systems Security | 325 Pages |
| 57. | The Hacker’s Underground Handbook | 116 Pages |
| 58. | Guide to SCADA and Industrial Control Systems Security | 164 Pages |
| 59. | The International Handbook of Computer Security | 274 Pages |
| 60. | The Code Book - How to Make It, Break It, Hack It, Crack It | 273 Pages |
| 61. | Linux 101 Hacks | 271 Pages |
| 62. | Introduction to Linux - A Hands on Guide | 223 Pages |
| 63. | Bluetooth Security | 222 Pages |
| 64. | IT Governance - A Manager’s Guide to Data Security and ISO 27001/27002 | 385 Pages |
| 65. | Batch File Programming | 155 Pages |
| 66. | Cracking the Coding Interview | 310 Pages |
| 67. | Dictionary of Networking | 465 Pages |
| 68. | Hacking Gmail | 310 Pages |
| 69. | Linux Complete Command Reference | 1528 Pages |
| 70. | Practical Hacking Techniques and Countermeasures | 752 Pages |
| 71. | The Art of Intrusion by Kevin Mitnick | 291 Pages |
| 72. | Hack Notes - Windows Security Portable Reference | 289 Pages |
| 73. | Hacking - The Next Generation | 298 Pages |
| 74. | Hacking the Cable Modem | 330 Pages |
| 75. | Hackers Beware - Defending Your Network From The Wiley Hacker | 817 Pages |
| 76. | Hack Proofing Your Network | 826 Pages |
| 77. | Hack Attacks Revealed | 837 Pages |
| 78. | Dissecting the Hack - The F0rb1dd3n Network | 441 Pages |
| 79. | TCP/IP Guide | 1671 Pages |
| 80. | Offensive Security - Wireless Attacks - WiFu | 385 Pages |
| 81. | Google Hacking - For Penetration Testers | 529 Pages |
| 82. | Computer Forensics Investigating Network Intrusions and Cyber Crime | 394 Pages |
| 83. | Hakin9 Bible | 207 Pages |
| 84. | Network Forensics - Tracking Hackers Through Cyberspace | 574 Pages |
| 85. | Computer Forensics - Investigating Data and Image Files | 227 Pages |
| 86. | Penetration Testing and Network Defense | 625 Pages |
| 87. | Hacking Exposed - Malware and Rootkits | 401 Pages |
| 88. | Malware Analyst’s Cookbook | 746 Pages |
| 89. | Mobile Malware - Attacks and Defense | 386 Pages |
| 90. | Java 2 Network Security | 702 Pages |
| 91. | A Bug Hunter’s Diary | 212 Pages |
| 92. | Viruses Revealed - Understand and Counter Malicious Software | 721 Pages |
| 93. | Figital Forensics With Open Source Tools | 289 Pages |
| 94. | SSH, The Secure Shell - The Definitive Guide | 438 Pages |
| 95. | Pro PHP Security | 369 Pages |
| 96. | Zero Day Exploit - Countdown to Darkness | 363 Pages |
| 97. | Metasploit Penetration Testing Cookbook | 269 Pages |
| 98. | 24 Deadly Sins of Software Securtiy | 433 Pages |
| 99. | Botnets - The Killer Web App | 482 Pages |
| 100. | Hacker Highschool - Hack School for Beginners (ZIP) | 12 Books |

Download Link: *** Hidden text: cannot be quoted. ***
thank you for sharing bro
 
Reacted by:
View attachment 29119

| S.No | E-Book (PDF Link) | Total Pages |
| 1. | Advanced Penetration Testing | 269 Pages |
| 2. | The Basics of Web Hacking | 179 Pages |
| 3. | The Basics of Hacking and Penetration Testing | 178 Pages |
| 4. | The Art of Deception by Kevin Mitnick | 577 Pages |
| 5. | SQL Injection Attacks and Defense | 761 Pages |
| 6. | Metasploit - The Penetration Tester’s Guide | 332 Pages |
| 7. | Ethical Hacking and Penetration Testing Guide | 523 Pages |
| 8. | Network Attacks and Exploitation - A Framework | 219 Pages |
| 9. | Python Web Penetration Testing Cookbook | 224 Pages |
| 10. | Wireshark for Security Professionals | 391 Pages |
| 11. | Mastering Modern Web Penetration Testing | 298 Pages |
| 12. | The Shellcoder’s Handbook | 745 Pages |
| 13. | The Little Black Book of Computer Viruses | 183 Pages |
| 14. | XSS Attacks - Cross Site Scripting Exploits and Defense | 482 Pages |
| 15. | The Web Application Hacker’s Handbook | 771 Pages |
| 16. | Ethical Hacking and Countermeasures | 239 Pages |
| 17. | Reversing - Secrets of Reverse Engineering | 619 Pages |
| 18. | Network Security Bible | 697 Pages |
| 19. | Hacking Web Applications - Hacking Exposed | 416 Pages |
| 20. | Hacking for Dummies | 387 Pages |
| 21. | Hacking Wireless Network for Dummies | 387 Pages |
| 22. | Ninja Hacking - Unconventional Penetration Testing Tacting and Techniques | 314 pages |
| 23. | Professional Penetration Testing | 525 Pages |
| 24. | Gray Hat Hacking - The Ethical Hacker’s Handbook | 577 Pages |
| 25. | Hack Attacks Testing | 561 Pages |
| 26. | Basic Security Testing with Kali Linux | 242 Pages |
| 27. | Mastering Kali Linux for Advanced Penetration Testing | 356 Pages |
| 28. | Kali Linux CTF Blueprints | 190 Pages |
| 29. | Kali Linux Cookbook | 261 Pages |
| 30. | Kali Linux - Assuring Security by Penetration Testing | 454 Pages |
| 31. | Information Security Management Handbook | 3206 Pages |
| 32. | Computer and Information Security Handbook | 877 Pages |
| 33. | CISSP - Certified Information Systems Security Professional | 804 Pages |
| 34. | Computer Security and Cryptography | 542 Pages |
| 35. | Python for Kids | 348 Pages |
| 36. | End to End Network Security - Defense-in-Depth | 469 Pages |
| 37. | A Guide to Computer Network Security | 483 Pages |
| 38. | Essential Computer Security | 321 Pages |
| 39. | Security in Wireless Mesh Networks | 548 Pages |
| 40. | Hacking Windows XP (OLD) | 379 Pages |
| 41. | Hacking Exposed - Windows Security, Secrets and Solutions | 482 Pages |
| 42. | Hacking Exposed - Network Security, Secrets and Solutions | 736 Pages |
| 43. | Information Security - Principles and Pratice | 413 Pages |
| 44. | Nessus, Snort and Ethereal Power Tools | 472 Pages |
| 45. | Active Defense - A Comprehensive Guide to Network Security | 374 Pages |
| 46. | Information Security Fundamentals | 262 Pages |
| 47. | Wireless Network Security | 422 Pages |
| 48. | Red Hat Linux Security and Optimization | 721 Pages |
| 49. | Windows Forensics Analysis | 386 Pages |
| 50. | Sécurité et confidentialité des réseaux mobiles et sans fil | 232 pages |
| 51. | Pare-feu et sécurité Internet | 456 pages |
| 52. | Introduction à la sécurité informatique - Le manuel du NIST | 290 pages |
| 53. | Accès non autorisé - Tests de pénétration physique pour les équipes de sécurité informatique | 309 pages |
| 54. | Test de sécurité Web | 297 pages |
| 55. | Sécurité maximale - Guide du pirate informatique pour protéger votre site Internet et votre réseau | 670 pages |
| 56. | Guide de ressources d'information - Sécurité des systèmes informatiques, Internet et réseau | 325 pages |
| 57. | Le manuel du hacker underground | 116 pages |
| 58. | Guide de sécurité des systèmes SCADA et de contrôle industriel | 164 pages |
| 59. | Manuel international de sécurité informatique | 274 pages |
| 60. | Le livre de codes - Comment le créer, le casser, le pirater, le déchiffrer | 273 pages |
| 61. | Astuces Linux 101 | 271 pages |
| 62. | Introduction à Linux - Un guide pratique | 223 pages |
| 63. | Sécurité Bluetooth | 222 pages |
| 64. | Gouvernance informatique - Guide du gestionnaire sur la sécurité des données et la norme ISO 27001/27002 | 385 pages |
| 65. | Programmation par lots | 155 pages |
| 66. | Décrypter l'entretien de codage | 310 pages |
| 67. | Dictionnaire des réseaux | 465 pages |
| 68. | Piratage de Gmail | 310 pages |
| 69. | Référence complète des commandes Linux | 1528 pages |
| 70. | Techniques pratiques de piratage informatique et contre-mesures | 752 pages |
| 71. | L'art de l'intrusion par Kevin Mitnick | 291 pages |
| 72. | Hack Notes - Référence portable sur la sécurité Windows | 289 pages |
| 73. | Hacking - La nouvelle génération | 298 pages |
| 74. | Piratage du modem câble | 330 pages |
| 75. | Attention aux pirates informatiques - Protégez votre réseau contre le pirate Wiley | 817 pages |
| 76. | Protégez votre réseau contre le piratage | 826 pages |
| 77. | Attaques de piratage révélées | 837 pages |
| 78. | Analyse du piratage - Le réseau F0rb1dd3n | 441 pages |
| 79. | Guide TCP/IP | 1671 pages |
| 80. | Sécurité offensive - Attaques sans fil - WiFu | 385 pages |
| 81. | Google Hacking - Pour les testeurs de pénétration | 529 pages |
| 82. | Informatique légale : enquête sur les intrusions dans les réseaux et la cybercriminalité | 394 pages |
| 83. | Bible Hakin9 | 207 pages |
| 84. | Forensics réseau - Suivi des pirates informatiques dans le cyberespace | 574 pages |
| 85. | Informatique légale - Enquête sur les fichiers de données et d'images | 227 pages |
| 86. | Tests de pénétration et défense du réseau | 625 pages |
| 87. | Piratage informatique révélé - Logiciels malveillants et rootkits | Pages 401 |
| 88. | Livre de recettes de l'analyste de logiciels malveillants | 746 pages |
| 89. | Logiciels malveillants mobiles - Attaques et défense | 386 pages |
| 90. | Sécurité du réseau Java 2 | 702 pages |
| 91. | Journal d'un chasseur d'insectes | 212 pages |
| 92. | Les virus révélés - Comprendre et contrer les logiciels malveillants | 721 pages |
| 93. | Forensics Figital avec des outils Open Source | 289 pages |
| 94. | SSH, le Secure Shell - Le guide ultime | 438 pages |
| 95. | Sécurité PHP Pro | 369 pages |
| 96. | Exploit Zero Day - Compte à rebours vers l'obscurité | 363 pages |
| 97. | Livre de recettes de tests de pénétration Metasploit | 269 pages |
| 98. | 24 péchés capitaux de la sécurité logicielle | 433 pages |
| 99. | Botnets - L'application Web tueuse | 482 pages |
| 100. | Hacker Highschool - École de hackers pour débutants (ZIP) | 12 livres |

Lien de téléchargement : *** Texte caché : ne peut être cité. ***
Hi, thank your for sharing
 
Reacted by:
Top