Saturday, June 2, 2007

HACKING E-BOOKS

BlackBerry Hacks



BlackBerry Hacks
By Dave Mabe
...............................................
Publisher: O'Reilly
Pub Date: October 2005
ISBN: 0-596-10115-5
Pages: 328

Table of Contents Index

The BlackBerry has become an invaluable tool for those of us who need to stay connected and in the loop. But most people take advantage of only a few features that this marvelous communications device offers. What if you could do much more with your BlackBerry than just web surfing and email?

BlackBerry Hacks will enhance your mobile computing with great tips and tricks. You'll learn that the BlackBerry is capable of things you never thought possible, and you'll learn how to make it an even better email and web workhorse:

Get the most out of the built-in applications

Take control of email with filters, searches, and more

Rev up your mobile gaming--whether you're an arcade addict or poker pro

Browse the web, chat over IM, and keep up with news and weblogs

Work with office documents, spell check your messages, and send faxes


Become more secure, lock down your BlackBerry and stash secure information somewhere safe

Manage and monitor the BlackBerry Enterprise Server (BES) and Mobile Data System (MDS)

Create web sites that look great on a BlackBerry

Develop and deploy BlackBerry applications

Whether you need to schedule a meeting from a trade show floor, confirm your child's next play date at the park, or just find the show times and secure movie tickets while at dinner, this book helps you use the remarkable BlackBerry to stay in touch and in-the-know--no matter where you are or where you go.



RAPIDSHARE.COM

Honeypots- Tracking Hackers




Book name: honeypots- tracking hackers
Writer: Lance Spitzner
Publisher: Addison Wesley


Create your own security – learn the easiest and effective way (even a school boy can learn) to hack proof your network!


Who need this book?


Pc/network hacked victim- don't be victimized again
Webmaster – for making their site secured
Website owner – hack proof their web site
Businessman – saving their online business from theft
General people – making your pc and network secured
Police – for stopping cyber crime
Military – prepared for cyber war
University and security research institute – get valuable materials from this book on honeypot
Money maker – making money by helping others to build hack proof network


The book is completely free for you. The benefits of this book are :


Ensure maximum security of your network.
Discover how to build hack proof network
Unleash the strategy that the hackers follow
Be the boss of the hackers
Detect intruders in your network and kill
Help to stop cyber crime
Be ahead of others by being prepared for future cyber warfare.
Turn this book into a cash machine! How? By helping others to build hack proof network!
Create extra confidence within you and others whom you help to build hack proof network
Take advantages of honeypots.


Get all these benefits completely free simply by downloading this book! Remember, completely free only for you!


Hurry up!
Your pc/network might be hacked now!
Protect it!
Be the boss of hackers!
Download now!


File type: PDF
Page: 223
File size: 1.86 mb

Download

The Oracle Hacker's Handbook


The Oracle Hacker's Handbook: Hacking and Defending Oracle
byDavid Litchfield
John Wiley & Sons 2007 (212 pages)
ISBN:9780470080221
Exploring every technique and tool used by black hat hackers to invade and compromise Oracle, this in-depth guide shows you how to find the weak spots in your databases so you can better defend them.
http://rapidshare.com

2600 The Hacker Quarterly


2600 The Hacker Quarterly Volume 24 Number 1 Spring 2007
http://rapidshare.com

Windows XP Hacks, 2nd Edition


Windows XP Hacks, 2nd Edition
By Preston Gralla

Publisher : O'Reilly
Pub Date : February 2005
ISBN : 0-596-00918-6
Pages : 572
Completely revised and updated, this smart collection of insider tips and tricks covers the XP operating system from start to finish, including all the new features that come with Service Pack 2 (SP2). You'll also find timesaving hacks for security, file distribution, digital media, web browsing, and more. An ideal all-in-one resource for XP beginners, as well as more experienced power users.
http://rapidshare.com

Web Site Measurement Hacks


Web Site Measurement Hacks
By Eric T. Peterson
...............................................
Publisher: O'Reilly
Pub Date: August 2005
ISBN: 0-596-00988-7
Pages: 430
http://rapidshare.com

Visual Studio Hacks


Visual Studio Hacks
By James Avery
...............................................
Publisher: O'Reilly
Pub Date: March 2005
ISBN: 0-596-00847-3
Pages: 500
This hands-on guide is designed for developers who want to go far beyond the obvious features of Visual Studio--the most powerful, feature-rich Integrated Development Environment (IDE) on the market today. It takes the reader on a detailed tour through code editor hacks, all manners of customization, even external tools such as PowerToys. Full of valuable tips, tools, and tricks.
http://rapidshare.com

Word Hacks


Word Hacks
By Andrew Savikas

Publisher : O'Reilly
Pub Date : November 2004
ISBN : 0-596-00493-1
Pages : 396
Become a power user with Word Hacks! Insider tips, tools, tricks, and hacks help you accomplish your pressing tasks, address your frequent annoyances, and solve even your most complex problems. The book examines Word's advanced (and often hidden) features and delivers clever, time-saving hacks on taming document bloat, customization, complex search and replace, tables and comments, XML, and even using Google without leaving Word!
http://rapidshare.com

Secrets of a Super Hacker


Paperback: 205 pages
Publisher: Loompanics Unlimited (January 1994)
Language: English
ISBN-10: 1559501065
http://rapidshare.com/

Amazon Hacks


Amazon Hacks
By Paul Bausch
Publisher : O'Reilly
Pub Date : August 2003
ISBN : 0-596-00542-3
Pages : 304
Amazon Hacks is a collection of real-world tips, tricks, and full-scale solutions to practical uses of Amazon.com and the Amazon Web Services API . The book offers a variety of interesting ways for power users to get the most out of Amazon and its community, for Associates to hone their recommendations for better linking and more referral fees, for researchers to mine the enormous amount of information in Amazon's data store, and for developers to integrate Amazon Web Services into their applications and services.
http://rapidshare.com

HackNotes


HackNotes Web Security Pocket Reference
Book Description
Let consultant, trainer, and author Mike Shema show you how to guard against standard and uncommon network penetration methodologies and eliminate susceptibility to e-commerce hacking. Plus, learn to bolster Web application security and secure vulnerable hacking function areas.
http://rapidshare.com

Hacking GMail


Book Description

The first book to unlock the true power behind Gmail, Hacking Gmail will immediately appeal to Google and Gmail fans
This is serious, down-and-dirty, under-the-hood, code-level hacking that will have readers eliminating the default settings, customizing appearance, disabling advertising, and taking control over their Gmail accounts
Covers turning Gmail into an online hard drive for backing up files, using it as a blogging tool, and even creating customized Gmail tools and hacks
Shows readers how to check their Gmail without visiting the site; use Gmail APIs in Perl, Python, PHP, and other languages, or create their own; and maximize Gmail as a host for message boards, photo galleries, even a blog
http://rapidshare.com

Google Hacking for Penetration Testers


Book Description
Google, the most popular search engine worldwide, provides web surfers with an easy-to-use guide to the Internet, with web and image searches, language translation, and a range of features that make web navigation simple enough for even the novice user. What many users dont realize is that the deceptively simple components that make Google so easy to use are the same features that generously unlock security flaws for the malicious hacker. Vulnerabilities in website security can be discovered through Google hacking, techniques applied to the search engine by computer criminals, identity thieves, and even terrorists to uncover secure information. This book beats Google hackers to the punch, equipping web administrators with penetration testing applications to ensure their site is invulnerable to a hackers search.
http://rapidshare.com

Flickr Hacks


Over two million registered Flickr users and counting have discovered the ease and fun of organizing their photo libraries, showing off their favorite pictures to the world, and securely sharing their private pictures with friends, family, or ad hoc groups. But Flickr's own plethora of intuitive menus, options, and features just scratches the surface.
http://rapidshare.com

Firefox Hacks


Firefox Hacks
By Nigel McFarlane

Publisher : O'Reilly
Pub Date : March 2005
ISBN : 0-596-00928-3
Pages : 398
Firefox Hacks is ideal for power users who want to maximize the effectiveness of Firefox, the next-generation web browser that is quickly gaining in popularity. This highly-focused book offers all the valuable tips and tools you need to enjoy a superior and safer browsing experience. Learn how to customize its deployment, appearance, features, and functionality.
http://rapidshare.com

eBay Hacks, 2nd Edition


eBay Hacks, 2nd Edition
By David A. Karp
...............................................
Publisher: O'Reilly
Pub Date: June 2005
ISBN: 0-596-10068-X
Pages: 464
http://rapidshare.com

Google Maps Hacks


Google Maps Hacks
By Schuyler Erle, Rich Gibson
...............................................
Publisher: O'Reilly
Pub Date: January 2006
Print ISBN-10: 0-596-10161-9
Print ISBN-13: 978-0-59-610161-9
Pages: 366
http://rapidshare.com

Car PC Hacks


Car PC Hacks
By Damien Stolarz
...............................................
Publisher: O'Reilly
Pub Date: July 2005
ISBN: 0-596-00871-6
Pages: 382
http://rapidshare.com

Hack Proofing Your Network: Internet Tradecraft


Book Description
If you don’t hack your systems, who will?
One of the reasons I put this book project together is that I believe security professionals should be hackers. In this case, by hackers, I mean people who are capable of defeating security measures. This book purports to teach people how to be hackers. In reality, most of the people who buy this book will do so because they want to protect their own systems and those of their employer. So, how can you prevent break-ins to your system if you don’t know how they are accomplished? How do you test your security measures? How do you make a judgment about how secure a new system is?

When you’re through reading Hack Proofing Your Network, you’ll understand terms like “smashing the stack,” “blind spoofing,” “building a backward bridge,” “steganography,” “buffer overflow” and you’ll see why you need to worry about them. You will learn how to protect your servers from attacks by using a 5-step approach:

1. Planning
2. Network/Machine Recon
3. Research/Develop
4. Execute Attack and Achieve Goal
5. Cleanup
And you’ll understand the theory of hacking, how to fend off local and remote attacks, and how to report and evaluate security problems.

The Only Way to Stop a Hacker Is to Think Like One.
---Ryan Russell, Hack Proofing Your Network
http://rapidshare.com

BSD Hacks


BSD Hacks
By Dru Lavigne
Publisher: O'Reilly
Pub Date: May 2004
ISBN: 0-596-00679-9
Pages: 300
Looking for a unique set of practical tips, tricks, and tools for administrators and power
users of BSD systems? From hacks to customize the user environment to networking,
securing the system, and optimization, BSD Hacks takes a creative approach to saving time
and accomplishing more with fewer resources. If you want more than the average BSD
user--to explore and experiment, unearth shortcuts, create useful tools--this book is a must-have.
http://rapidshare.com