Details
Rating
haltandcatchfire
Rating
Controls
Aggressive Network Self-Defense
Aggressive Network Self-Defense
  • Neil R. Wyler
0-
Mobile Application Security
Mobile Application Security
  • Himanshu Dwivedi
  • Chris Clark
  • David Thiel
0-
Fuzzing for software security testing and quality assurance
Fuzzing for software security testing and quality assurance
  • Ari Takanen
0-
Identifying Malicious Code Through Reverse Engineering
Identifying Malicious Code Through Reverse Engineering
    0-
    Gray Hat Python
    Gray Hat Python
    • Justin Seitz
    3-
    A Guide to Kernel Exploitation: Attacking the Core
    A Guide to Kernel Exploitation: Attacking the Core
    • Enrico Perla B.Sc. Computer Science University of Torino M.Sc. Computer Science Trinity College Dubl
    • Enrico Perla B.Sc. Computer Science University of Torino M.Sc. Computer Science Trinity College
    • Massimiliano Oldani
    0-
    Seven Deadliest Network Attacks
    Seven Deadliest Network Attacks
    • Stacy Prowell
    • Rob Kraus
    • Mike Borkin
    0-
    Articles on Hacking (Computer Security), Including: Script Kiddie, Hacktivism, Hacker Manifesto, Tiger Team, the Hacker's Handbook, Great Hacker War, Timeline of Computer Security Hacker History, the Cuckoo's Egg (Book), White Hat
    Articles on Hacking (Computer Security), Including: Script Kiddie, Hacktivism, Hacker Manifesto, Tiger Team, the Hacker's Handbook, Great Hacker War, Timeline of Computer Security Hacker History, the Cuckoo's Egg (Book), White Hat
    • Hephaestus Books
    0-
    Seven Deadliest Microsoft Attacks
    Seven Deadliest Microsoft Attacks
    • Rob Kraus
    • Brian Barber
    • Mike Borkin
    • Naomi Alpern
    0-
    Seven Deadliest Social Network Attacks
    Seven Deadliest Social Network Attacks
    • Carl Timm
    • Richard Pérez
    0-
    The Theoretical Minimum: What You Need to Know to Start Doing Physics
    The Theoretical Minimum: What You Need to Know to Start Doing Physics
    • Leonard Susskind
    • George Hrabovsky
    3.5-
    Network Security
    Network Security
    • Owen Poole
    0-
    We Are Anonymous: Inside the Hacker World of LulzSec, Anonymous, and the Global Cyber Insurgency
    We Are Anonymous: Inside the Hacker World of LulzSec, Anonymous, and the Global Cyber Insurgency
    • Parmy Olson
    3.9-
    Covert Java
    Covert Java
    • Alex Kalinovsky
    4-
    Design for Hackers
    Design for Hackers
      2.8-
      Silence on the Wire: A Field Guide to Passive Reconnaissance and Indirect Attacks
      Silence on the Wire: A Field Guide to Passive Reconnaissance and Indirect Attacks
      • Michal Zalewski
      4-
      Cryptonomicon
      Cryptonomicon
      • Neal Stephenson
      4.24-
      The Facebook Effect
      The Facebook Effect
      • David Kirkpatrick
      3.7-
      Network Security: The Complete Reference
      Network Security: The Complete Reference
      • Mark Rhodes-Ousley
      • Roberta Bragg
      • Keith Strassberg
      5-
      The best of 2600
      The best of 2600
      • Emmanuel Goldstein
      3-
      A Complete H@cker's Handbook
      A Complete H@cker's Handbook
      • Paul Day
      • Dr. K.
      0-
      The Tangled Web: A Guide to Securing Modern Web Applications
      The Tangled Web: A Guide to Securing Modern Web Applications
      • Michal Zalewski
      3.33-
      The Code Book: The Science of Secrecy from Ancient Egypt to Quantum Cryptography
      The Code Book: The Science of Secrecy from Ancient Egypt to Quantum Cryptography
      • Simon Singh
      4.18-
      Hacking the Xbox
      Hacking the Xbox
      • Andrew "Bunnie" Huang
      3.75-
      The Google Story
      The Google Story: Inside the Hottest Business, Media and Technology Success of Our Time
      • David A. Vise
      3.67-
      Practical Packet Analysis
      Practical Packet Analysis
      • Chris Sanders
      5-
      Underground
      Underground
      • Suelette Dreyfus
      • Julian Assange
      0-
      Where Wizards Stay Up Late
      Where Wizards Stay Up Late
      • Katie Hafner
      • Matthew Lyon
      4-
      Hacking Exposed: Network Security Secrets & Solutions
      Hacking Exposed: Network Security Secrets & Solutions
      • Stuart McClure
      4-
      Reverse Engineering: Technology of Reinvention
      Reverse Engineering: Technology of Reinvention
      • Wego Wang
      0-
      Hacker Disassembling Uncovered: Powerful Techniques To Safeguard Your Programming
      Hacker Disassembling Uncovered: Powerful Techniques To Safeguard Your Programming
      • Kris Kaspersky
      0-
      Epic Win for Anonymous: How 4chan's Army Conquered the Web
      Epic Win for Anonymous: How 4chan's Army Conquered the Web
      • Cole Stryker
      2-
      Fatal System Error: The Hunt for the New Crime Lords Who are Bringing Down the Internet
      Fatal System Error: The Hunt for the New Crime Lords Who are Bringing Down the Internet
      • Joseph Menn
      3.5-
      Reverse engineering : an industrial perspective.
      Reverse engineering : an industrial perspective.
        0-
        Lone Survivor
        Lone Survivor
        • Marcus Luttrell
        • Patrick Robinson
        4.14-
        Into the Fire: A Firsthand Account of the Most Extraordinary Battle in the Afghan War
        Into the Fire: A Firsthand Account of the Most Extraordinary Battle in the Afghan War
        • Dakota Meyer
        • Bing West
        4.5-
        Edible Garden Design: Delicious Designs From the Ground Up
        Edible Garden Design: Delicious Designs From the Ground Up
        • Jamie Durie
        0-
        1491: New Revelations of the Americas Before Columbus
        1491: New Revelations of the Americas Before Columbus
        • Charles C. Mann
        4.21-
        1984
        1984
        • George Orwell
        4.21-
        Animal Farm
        Animal Farm
        • George Orwell
        • Boris Grabnar (Translator)
        • Celâl Üster (Translator)
        • Celâl Üstüner (Translator)
        4.04-