S.No | E-Book (PDF Link) | Total Pages |
1. | Advanced Penetration Testing | 269 Pages |
2. | The Basics of Web Hacking | 179 Pages |
3. | The Basics of Hacking and Penetration Testing | 178 Pages |
4. | The Art of Deception by Kevin Mitnick | 577 Pages |
5. | SQL Injection Attacks and Defense | 761 Pages |
6. | Metasploit – The Penetration Tester’s Guide | 332 Pages |
7. | Ethical Hacking and Penetration Testing Guide | 523 Pages |
8. | Network Attacks and Exploitation – A Framework | 219 Pages |
9. | Python Web Penetration Testing Cookbook | 224 Pages |
10. | Wireshark for Security Professionals | 391 Pages |
11. | Mastering Modern Web Penetration Testing | 298 Pages |
12. | The Shellcoder’s Handbook | 745 Pages |
13. | The Little Black Book of Computer Viruses | 183 Pages |
14. | XSS Attacks – Cross Site Scripting Exploits and Defense | 482 Pages |
15. | The Web Application Hacker’s Handbook | 771 Pages |
16. | Ethical Hacking and Countermeasures | 239 Pages |
17. | Reversing – Secrets of Reverse Engineering | 619 Pages |
18. | Network Security Bible | 697 Pages |
19. | Hacking Web Applications – Hacking Exposed | 416 Pages |
20. | Hacking for Dummies | 387 Pages |
21. | Hacking Wireless Network for Dummies | 387 Pages |
22. | Ninja Hacking – Unconventional Penetration Testing Tacting and Techniques | 314 pages |
23. | Professional Penetration Testing | 525 Pages |
24. | Gray Hat Hacking – The Ethical Hacker’s Handbook | 577 Pages |
25. | Hack Attacks Testing | 561 Pages |
26. | Basic Security Testing with Kali Linux | 242 Pages |
27. | Mastering Kali Linux for Advanced Penetration Testing | 356 Pages |
28. | Kali Linux CTF Blueprints | 190 Pages |
29. | Kali Linux Cookbook | 261 Pages |
30. | Kali Linux – Assuring Security by Penetration Testing | 454 Pages |
31. | Information Security Management Handbook | 3206 Pages |
32. | Computer and Information Security Handbook | 877 Pages |
33. | CISSP – Certified Information Systems Security Professional | 804 Pages |
34. | Computer Security and Cryptography | 542 Pages |
35. | Python for Kids | 348 Pages |
36. | End to End Network Security – Defense-in-Depth | 469 Pages |
37. | A Guide to Computer Network Security | 483 Pages |
38. | Essential Computer Security | 321 Pages |
39. | Security in Wireless Mesh Networks | 548 Pages |
40. | Hacking Windows XP (OLD) | 379 Pages |
41. | Hacking Exposed – Windows Security, Secrets and Solutions | 482 Pages |
42. | Hacking Exposed – Network Security, Secrets and Solutions | 736 Pages |
43. | Information Security – Principles and Pratice | 413 Pages |
44. | Nessus, Snort and Ethereal Power Tools | 472 Pages |
45. | Active Defense – A Comprehensive Guide to Network Security | 374 Pages |
46. | Information Security Fundamentals | 262 Pages |
47. | Wireless Network Security | 422 Pages |
48. | Red Hat Linux Security and Optimization | 721 Pages |
49. | Windows Forensics Analysis | 386 Pages |
50. | Mobile and Wireless Network Security and Privacy | 232 Pages |
51. | Firewalls and Internet Security | 456 Pages |
52. | An Introduction to Computer Security – The NIST Handbook | 290 Pages |
53. | Unauthorized Access – Physical Penetration Testing for IT Security Teams | 309 Pages |
54. | Testing Web Security | 297 Pages |
55. | Maximum Security – A Hacker’s Guide to Protecting Your Internet Site and Network | 670 Pages |
56. | Information Resource Guide – Computer, Internet and Network Systems Security | 325 Pages |
57. | The Hacker’s Underground Handbook | 116 Pages |
58. | Guide to SCADA and Industrial Control Systems Security | 164 Pages |
59. | The International Handbook of Computer Security | 274 Pages |
60. | The Code Book – How to Make It, Break It, Hack It, Crack It | 273 Pages |
61. | Linux 101 Hacks | 271 Pages |
62. | Introduction to Linux – A Hands on Guide | 223 Pages |
63. | Bluetooth Security | 222 Pages |
64. | IT Governance – A Manager’s Guide to Data Security and ISO 27001/27002 | 385 Pages |
65. | Batch File Programming | 155 Pages |
66. | Cracking the Coding Interview | 310 Pages |
67. | Dictionary of Networking | 465 Pages |
68. | Hacking Gmail | 310 Pages |
69. | Linux Complete Command Reference | 1528 Pages |
70. | Practical Hacking Techniques and Countermeasures | 752 Pages |
71. | The Art of Intrusion by Kevin Mitnick | 291 Pages |
72. | Hack Notes – Windows Security Portable Reference | 289 Pages |
73. | Hacing – The Next Generation | 298 Pages |
74. | Hacking the Cable Modem | 330 Pages |
75. | Hackers Beware – Defending Your Network From The Wiley Hacker | 817 Pages |
76. | Hack Proofing Your Network | 826 Pages |
77. | Hack Attacks Revealed | 837 Pages |
78. | Dissecting the Hack – The F0rb1dd3n Network | 441 Pages |
79. | TCP/IP Guide | 1671 Pages |
80. | Offensive Security – Wireless Attacks – WiFu | 385 Pages |
81. | Google Hacking – For Penetration Testers | 529 Pages |
82. | Computer Forensics Investigating Network Intrusions and Cyber Crime | 394 Pages |
83. | Hakin9 Bible | 207 Pages |
84. | Network Forensics – Tracking Hackers Through Cyberspace | 574 Pages |
85. | Computer Forensics – Investigating Data and Image Files | 227 Pages |
86. | Penetration Testing and Network Defense | 625 Pages |
87. | Hacking Exposed – Malware and Rootkits | 401 Pages |
88. | Malware Analyst’s Cookbook | 746 Pages |
89. | Mobile Malware – Attacks and Defense | 386 Pages |
90. | Java 2 Network Security | 702 Pages |
91. | A Bug Hunter’s Diary | 212 Pages |
92. | Viruses Revealed – Undestand and Counter Malicious Software | 721 Pages |
93. | Figital Forensics With Open Source Tools | 289 Pages |
94. | SSH, The Secure Shell – The Definitive Guide | 438 Pages |
95. | Pro PHP Security | 369 Pages |
96. | Zero Day Exploit – Countdown to Darkness | 363 Pages |
97. | Metasploit Penetration Testing Cookbook | 269 Pages |
98. | 24 Deadly Sins of Software Securtiy | 433 Pages |
99. | Botnets – The Killer Web App | 482 Pages |
100. | Hacker Highschool – Hack School for Beginners (ZIP) | 12 Books |
0 Comments