Blackstone's Counter-Terrorism Handbook

Blackstone's Counter-Terrorism Handbook
ByAndrew Staniforth,Clive Walker,+1 more
@haltandcatchfire
Added on

2009 • 1 Reader • 722 pages

@haltandcatchfire
Added on

2004 • 7 Readers • 718 pages

Aggressive Network Self-Defense

@haltandcatchfire
Added on

2005 • 1 Reader • 560 pages

Exploiting Software: How to Break Code

Exploiting Software: How to Break Code
ByGreg Hoglund,Gary McGraw
@haltandcatchfire
Added on

2004 • 2 Readers

Hunting Security Bugs

Hunting Security Bugs
ByTom Gallagher,Bryan Jeffries,+1 more
@haltandcatchfire
Added on

2006 • 2 Readers • 590 pages

How to Break Software Security

How to Break Software Security
ByJames A. Whittaker,Hugh Thompson
@haltandcatchfire
Added on

2002 • 2 Readers

Seven Deadliest Microsoft Attacks

Seven Deadliest Microsoft Attacks
ByRob Kraus,Brian Barber,+2 more
@haltandcatchfire
Added on

2010 • 1 Reader • 149 pages

Identifying Malicious Code Through Reverse Engineering

Identifying Malicious Code Through Reverse Engineering
ByAbhishek Singh(Editor),Baibhav Singh(contributor)
@haltandcatchfire
Added on

2009 • 1 Reader

Managed code rootkits

@haltandcatchfire
Added on

1 Reader

Open Source Fuzzing Tools

@haltandcatchfire
Added on

2007 • 2 Readers • 199 pages

Fuzzing for software security testing and quality assurance

@haltandcatchfire
Added on

2008 • 2 Readers • 312 pages

Advanced windows debugging

Advanced windows debugging
ByDaniel Pravat,Mario Hewardt
@haltandcatchfire
Added on

2007 • 2 Readers • 809 pages

Gray Hat Python

Gray Hat Python
ByJustin Seitz
@haltandcatchfire
Added on

2008 • 5 Readers 3

A Guide to Kernel Exploitation: Attacking the Core

A Guide to Kernel Exploitation: Attacking the Core
ByEnrico Perla B.Sc. Computer Science University of Torino M.Sc. Computer Science Trinity College Dubl,Enrico Perla B.Sc. Computer Science University of Torino M.Sc. Computer Science Trinity College,+1 more
@haltandcatchfire
Added on

2010 • 1 Reader • 442 pages

Seven Deadliest Social Network Attacks

Seven Deadliest Social Network Attacks
ByCarl Timm,Richard Pérez
@haltandcatchfire
Added on

2009 • 1 Reader • 133 pages

The Art of Software Security Assessment: Identifying and Preventing Software Vulnerabilities

@haltandcatchfire
Added on

2006 • 5 Readers

@haltandcatchfire
Added on

2009 • 2 Readers 3

Seven Deadliest Network Attacks

Seven Deadliest Network Attacks
ByStacy Prowell,Rob Kraus,+1 more
@haltandcatchfire
Added on

2010 • 1 Reader • 142 pages

Mobile Application Security

Mobile Application Security
ByHimanshu Dwivedi,Chris Clark,+1 more
@haltandcatchfire
Added on

2010 • 1 Reader • 432 pages

The Theoretical Minimum: What You Need to Know to Start Doing Physics

10 The Theoretical Minimum

@haltandcatchfire
Added on

2013 • 50 Readers • 171 pages 3.5

A Complete H@cker's Handbook

@haltandcatchfire
Added on

2000 • 1 Reader

Silence on the Wire: A Field Guide to Passive Reconnaissance and Indirect Attacks

@haltandcatchfire
Added on

2005 • 17 Readers 4

The Code Book: The Science of Secrecy from Ancient Egypt to Quantum Cryptography

@haltandcatchfire
Added on

1996 • 267 Readers • 434 pages 4.2

Hacking the Xbox

Hacking the Xbox
ByAndrew "Bunnie" Huang
@haltandcatchfire
Added on

11 Readers 3.8

The Google Story

@haltandcatchfire
Added on

2005 • 32 Readers • 364 pages 3.7

Practical Packet Analysis

@haltandcatchfire
Added on

2007 • 8 Readers • 178 pages 5

The Tangled Web: A Guide to Securing Modern Web Applications

@haltandcatchfire
Added on

2011 • 16 Readers 3.3

Underground

Underground
BySuelette Dreyfus,Julian Assange
@haltandcatchfire
Added on

2012 • 1 Reader • 517 pages

Network Security: The Complete Reference

Network Security: The Complete Reference
ByMark Rhodes-Ousley,Roberta Bragg,+1 more
@haltandcatchfire
Added on

2003 • 2 Readers 5

Where Wizards Stay Up Late

Where Wizards Stay Up Late
ByKatie Hafner,Matthew Lyon
@haltandcatchfire
Added on

1998 • 91 Readers • 316 pages 4

Hacking Exposed: Network Security Secrets & Solutions

@haltandcatchfire
Added on

1999 • 6 Readers • 484 pages 4

Reverse Engineering: Technology of Reinvention

@haltandcatchfire
Added on

2010 • 1 Reader • 357 pages

Cryptonomicon

Cryptonomicon
ByNeal Stephenson
@haltandcatchfire
Added on

1999 • 909 Readers • 1,152 pages 4.2

The best of 2600

The best of 2600
ByEmmanuel Goldstein
@haltandcatchfire
Added on

13 Readers 3

Design for Hackers

Design for Hackers
ByDavid Kadavy(Contributor)
@haltandcatchfire
Added on

2011 • 20 Readers • 352 pages 2.8

The Facebook Effect

The Facebook Effect
ByDavid Kirkpatrick
@haltandcatchfire
Added on

2010 • 27 Readers • 384 pages 3.7

We Are Anonymous: Inside the Hacker World of LulzSec, Anonymous, and the Global Cyber Insurgency

@haltandcatchfire
Added on

2013 • 55 Readers • 510 pages 3.9

Fatal System Error: The Hunt for the New Crime Lords Who are Bringing Down the Internet

@haltandcatchfire
Added on

2010 • 15 Readers • 249 pages 3.5

Covert Java

Covert Java
ByAlex Kalinovsky
@haltandcatchfire
Added on

2 Readers 4