Загрузка не удалась. Возможно, проблемы с правами доступа?

Различия

Здесь показаны различия между двумя версиями данной страницы.

Ссылка на это сравнение

Предыдущая версия справа и слева Предыдущая версия
книги [2017/10/01 01:02]
Denis Mitin Заголовки в ОС, Сет. без., Пентест и этич. хакинг.
книги [2017/10/01 16:04] (текущий)
Denis Mitin Изменены все названия
Строка 86: Строка 86:
 ===== Пентест и этичный хакинг ===== ===== Пентест и этичный хакинг =====
 ---- ----
-{{:​книги:​metasploit_the_penetration_testers_guide_2011.pdf|}}\\ +{{:​книги:​metasploit_the_penetration_testers_guide_2011.pdf|Metasploit: The Penetration Tester'​s Guide. D. Kennedy, J. O'​Gorman,​ D. Kearns, M> Aharoni. Eng.}}\\ 
-{{:​книги:​ninja_hacking_unconventional_penetration_testing_tactics_and_techniques_2011.pdf|}}\\ +{{:​книги:​ninja_hacking_unconventional_penetration_testing_tactics_and_techniques_2011.pdf|Ninja Hacking: Unconventioonal Penetration Testing Tactics and Techniques. T. Wilhelm & J. Andress. Eng.}}\\ 
-{{:​documents_closed:​offensive_security_backtrack_to_the_max_cracking_the_perimeter_v1-0.pdf|}}\\ +{{:​documents_closed:​offensive_security_backtrack_to_the_max_cracking_the_perimeter_v1-0.pdf|Offensive Security: Backtrack ​ To The Max Cracking The Perimeter. M. Aharoni. Eng.}}\\ 
-{{:​documents_closed:​offensive_security_labs.pdf|}}\\ +{{:​documents_closed:​offensive_security_labs.pdf|Offensive Security: Lab Exercises. M. Aharoni. Eng.}}\\ 
-{{:​documents_closed:​offensive_security_penetration_testing_with_backtrack_lab_guide_v3-0.pdf|}}\\ +{{:​documents_closed:​offensive_security_penetration_testing_with_backtrack_lab_guide_v3-0.pdf|Offensive Security: Penetration Testing With Backtrack v3.0. Eng. }}\\ 
-{{:​documents_closed:​offensive_security_penetration_testing_with_backtrack_lab_guide_v3-2.pdf|}}\\ +{{:​documents_closed:​offensive_security_penetration_testing_with_backtrack_lab_guide_v3-2.pdf|Offensive Securit: Penetration Testing With Backtrack v3.2. Eng.}}\\ 
-{{:​documents_closed:​offensive_security_penetration_testing_with_kali_2014.pdf|}}\\ +{{:​documents_closed:​offensive_security_penetration_testing_with_kali_2014.pdf|Offensive Security: Penetration Testing with Kali. Eng.}}\\ 
-{{:​книги:​professional_penetration_testing_creating_and_operating_2010.pdf|}}\\ +{{:​книги:​professional_penetration_testing_creating_and_operating_2010.pdf|Proffesional Penetration Testing: Creating & Operating A Fromal Hacking Lab. T. Wilhelm. Eng.}}\\ 
-{{:​книги:​professional_penetration_testing_creating_and_operating_a_formal_hacking_lab_2010.pdf|}}\\ +{{:​книги:​professional_penetration_testing_creating_and_operating_a_formal_hacking_lab_2010.pdf|Proffesional Penetration Testing: Creating & Operating A Fromal Hacking Lab. T. Wilhelm. Eng.}}\\ 
-{{:​книги:​the_comprehensive_guide_to_certified_ethical_hacking.pdf|}}\\ +{{:​книги:​the_comprehensive_guide_to_certified_ethical_hacking.pdf|The Comprehensive Guide To Certified Ethical Hacking. R. Krutz & R. Vines. Eng.}}\\ 
-{{:​книги:​web_penetration_testing_with_kali_linux.pdf|}}\\ +{{:​книги:​web_penetration_testing_with_kali_linux.pdf|Web Penetration Test with Kali Linux. J. Muniz & A. Lakhani. Eng.}}\\ 
-{{:​книги:​web_security_testing_cookbook.pdf|}}\\ +{{:​книги:​web_security_testing_cookbook.pdf|Web Security Testing Cookbook. P. Hope & B. Walther. Eng.}}\\ 
-{{:​книги:​gray_hat_hackin_the_ethical_hackers_handbook_3ed_2011.pdf|}}\\ +{{:​книги:​gray_hat_hackin_the_ethical_hackers_handbook_3ed_2011.pdf|Gray Hat Hacking: The Ethical Hacker'​s Handbook. Eng.}}\\ 
-{{:​книги:​advanced_penetration_testing_for_highly_secured_environments.pdf|}}\\+{{:​книги:​advanced_penetration_testing_for_highly_secured_environments.pdf|Advanced Penetration Testing For Highly-Secured Enviroments:​ The Ultimate Security Guide. L. Allen. Eng.}}\\
  
 </​WRAP>​ </​WRAP>​
Строка 107: Строка 107:
 ---- ----
 {{:​documents_all:​w_make156.pdf|Smartphone Viruses Are Real: How To Stay Protected}}\\ {{:​documents_all:​w_make156.pdf|Smartphone Viruses Are Real: How To Stay Protected}}\\
-{{:​книги:​android_apps_security.pdf|}}\\ +{{:​книги:​android_apps_security.pdf|Android Apps Security. S.Gunasekera. Eng.}}\\ 
-{{:​книги:​android_security_attacks_and_defance.pdf|}}\\ +{{:​книги:​android_security_attacks_and_defance.pdf|Android Security: Attack & Defenses. A. Dubey & A. Misra. Eng.}}\\ 
-{{:​книги:​application_security_for_the_android_platform.pdf|}}\\ +{{:​книги:​application_security_for_the_android_platform.pdf|Application Security For Android Platform. J. Six. Eng.}}\\ 
-{{:​книги:​hacking_and_securing_ios_applications_2012.pdf|}}\\ +{{:​книги:​hacking_and_securing_ios_applications_2012.pdf|Hacking & Securing iOS Applications. J. Zdziarski. Eng.}}\\ 
-{{:​книги:​learning_pentesting_for_android_devices.pdf|}}\\+{{:​книги:​learning_pentesting_for_android_devices.pdf|Learning Penetration For Android Devices. E. Shapira. Eng.}}\\
  
 ===== Программирование ===== ===== Программирование =====
 ---- ----
 [[книги:​конспект_лекций-ассемблер|Конспект лекций. Ассемблер]]\\ [[книги:​конспект_лекций-ассемблер|Конспект лекций. Ассемблер]]\\
-{{:​книги:​writing_secure_code.pdf|}}\\+{{:​книги:​writing_secure_code.pdf|Writing Secure Code. M. Howard & D. LeBlank}}\\
 ===== CISSP ===== ===== CISSP =====
 ---- ----
-{{:​книги:​cissp_all_in_one_exam_guide_6ed_2013.pdf|}}\\ +{{:​книги:​cissp_all_in_one_exam_guide_6ed_2013.pdf|CISSP: All in One. Exam Guide. S. Harris. Eng.}}\\ 
-{{:​книги:​cissp_exam_guide_2011.pdf|}}\\ +{{:​книги:​cissp_exam_guide_2011.pdf|CISSP: Руководство для подготовки к экзамену v1.0. Ш. Харрис}}\\ 
-{{:​книги:​cissp_rus_v11.pdf|}}\\ +{{:​книги:​cissp_rus_v11.pdf|CISSP: Руководство для подготовки к экзамену v2.0 Ш. Харрис ​}}\\ 
-{{:​книги:​cissp_study_guide_2ed_2012.pdf|}}\\+{{:​книги:​cissp_study_guide_2ed_2012.pdf|CISSP: Study Guide. E. Conrad, S. Misenar, J. Feldman. Eng.}}\\
  
  
Строка 139: Строка 139:
 ===== Без категории ===== ===== Без категории =====
 ---- ----
-{{:​книги:​botnet_detection_2008.pdf|}}\\ +{{:​книги:​botnet_detection_2008.pdf|Botnet Detection: Countering The Largest Security Threat. W. Lee, C. Wang, D. Dagon. Eng.}}\\ 
-{{:​книги:​bug_hunters_diary_a_guided_tour_through_the_wilds_of_software_security_2010.pdf|}}\\ +{{:​книги:​bug_hunters_diary_a_guided_tour_through_the_wilds_of_software_security_2010.pdf|A Bug Hunter'​s Diary: A Guided Tour Through The Wilds of Software Security. T. Clein. Eng.}}\\ 
-{{:​книги:​catch_me_if_you_know_how_2011.pdf|}}\\ +{{:​книги:​catch_me_if_you_know_how_2011.pdf|Catch Me If You Know How. T. Morgan. Eng.}}\\ 
-{{:​книги:​computer_fraude_casebook_2009.pdf|}}\\ +{{:​книги:​computer_fraude_casebook_2009.pdf|Computer Fraude Casebook: The Bytes That Bite. J. Wells. Eng.}}\\ 
-{{:​книги:​cyber_crime_field_handbook.pdf|}}\\ +{{:​книги:​cyber_crime_field_handbook.pdf|Cyber Crime Field Handbook. B. Middleton. Eng. }}\\ 
-{{:​книги:​cyber_warfare_techniques_tactics_tools.pdf|}}\\ +{{:​книги:​cyber_warfare_techniques_tactics_tools.pdf|Cyber Warfare: Techniques, Tactics and Tools for Security Practitioners. J. Andress & S. Winterfeld. Eng.}}\\ 
-{{:​книги:​cybersecurity_public_sector_threats_and_responses_2012.pdf|}}\\ +{{:​книги:​cybersecurity_public_sector_threats_and_responses_2012.pdf|Cybersecurity:​ Public Sector Threats anb Responses. K. Andreasson. Eng.}}\\ 
-{{:​книги:​deadliest_microsoft_attacks_2010.pdf|}}\\ +{{:​книги:​deadliest_microsoft_attacks_2010.pdf|7 Deadliest Microsoft Attacks. Eng.}}\\ 
-{{:​книги:​digital_forensics_for_network_internet_and_cloud_computing_2010.pdf|}}\\ +{{:​книги:​digital_forensics_for_network_internet_and_cloud_computing_2010.pdf|Digital Forensics For Network Internet, and Cloud Computing. C. Garrison. Eng.}}\\ 
-{{:​книги:​dissecting_the_hack_the_f0rb1dd3n_network.pdf|}}\\ +{{:​книги:​dissecting_the_hack_the_f0rb1dd3n_network.pdf|Dissecting The Hack: The F0rb1dd3n Network. J. Street & K. Nabors. Eng.}}\\ 
-{{:​книги:​elements_of_computer_security_2010.pdf|}}\\ +{{:​книги:​elements_of_computer_security_2010.pdf|Elements of Computer Security. D. Salomon. Eng.}}\\ 
-{{:​книги:​exploring_and_data_mining_the_dark_side_of_the_web_2012.pdf|}}\\ +{{:​книги:​exploring_and_data_mining_the_dark_side_of_the_web_2012.pdf|Dark Web: Exploring and Data Mining The Dark Side of The Web. H. Chen. Eng.}}\\ 
-{{:​книги:​hacking_exposed_6ed.pdf|}}\\ +{{:​книги:​hacking_exposed_6ed.pdf|Hacking Exposed 6: Network Security, Secrets ​ & Solutions. S. McClure, J. Scambray, G. Kurtz. Eng.}}\\ 
-{{:​книги:​hacking_exposed_malware_and_rootkits_2010.pdf|}}\\ +{{:​книги:​hacking_exposed_malware_and_rootkits_2010.pdf|Hacking Exposed: Malware & Rootkits Reviews. M. Davis, S. Bodmer, A. LeMasters. Eng.}}\\ 
-{{:​книги:​hacking_exposed_network_security_secrets_n_solutions_2012.pdf|}}\\ +{{:​книги:​hacking_exposed_network_security_secrets_n_solutions_2012.pdf|Hacking Exposed 7: Network Security Secrets & Solutions. S.McClure, J. Scambray, G. Kurtz, Eng.}}\\ 
-{{:​книги:​hacking_exposed_web_2-0.pdf|}}\\ +{{:​книги:​hacking_exposed_web_2-0.pdf|Hacking Exposed: Web 2.0 Reviews. R. Cannings, H. Dwivedi, Z. Lackey. Eng.}}\\ 
-{{:​книги:​hacking_exposed_web_applications_3ed.pdf|}}\\ +{{:​книги:​hacking_exposed_web_applications_3ed.pdf|Hacking Exposed: Web Application Security Secrets and Solutions. J. Scambray, V. Liu, C. Sima. Eng.}}\\ 
-{{:​книги:​hacking_exposed_windows_3ed.pdf|}}\\ +{{:​книги:​hacking_exposed_windows_3ed.pdf|Hacking Exposed: Windows Security Secrets and Solutions. J. Scambray, S. McClure. Eng.}}\\ 
-{{:​книги:​hacking_exposed_wireless_2ed_2010.pdf|}}\\ +{{:​книги:​hacking_exposed_wireless_2ed_2010.pdf|Hacking Exposed: Wirelles Security Secrets and Solutions. J. Cache, J. Wright, V. Liu. Eng.}}\\ 
-{{:​книги:​how_to_secure_your_website_5ed_2011.pdf|}}\\ +{{:​книги:​how_to_secure_your_website_5ed_2011.pdf|How to Secure Your Website. Eng.}}\\ 
-{{:​книги:​immunity_based_technique_to_characterize_intrusions_in_computer_networks.pdf|}}\\ +{{:​книги:​immunity_based_technique_to_characterize_intrusions_in_computer_networks.pdf|An Immunity-Based Technique to Characterize Intrusions in Computer Networks. D. Dasgupta & F. Gonzalez. Eng.}}\\ 
-{{:​книги:​information_security_the_complete_reference_2ed.pdf|}}\\ +{{:​книги:​information_security_the_complete_reference_2ed.pdf|Infromation Security: The Complete Reference. M. Rhodes-Ousley. Eng.}}\\ 
-{{:​книги:​inside_cyber_warfare_2ed_2011.pdf|}}\\ +{{:​книги:​inside_cyber_warfare_2ed_2011.pdf|Inside Cyber Warfare. J. Carr. Eng.}}\\ 
-{{:​книги:​malicious_bots_an_insede_look_into_the_cyber_criminal_underground_2009.pdf|}}\\ +{{:​книги:​malicious_bots_an_insede_look_into_the_cyber_criminal_underground_2009.pdf|Malicious Bots: An Inside Look Into The Cyber Criminal Underground Of The Internet. K. Dunham, J. Melnick. Eng.}}\\ 
-{{:​книги:​microsoft_sql_server_2012_security_cookbook.pdf|}}\\+{{:​книги:​microsoft_sql_server_2012_security_cookbook.pdf|Microsoft SQL Server 2012 Security Cookbook. R. Bruchez. Eng.}}\\
 {{:​книги:​offensive_security_wireless_attacks_wifu_v2-0.pdf|}}\\ {{:​книги:​offensive_security_wireless_attacks_wifu_v2-0.pdf|}}\\
-{{:​книги:​practical_malware_analysis_2012.pdf|}}\\ +{{:​книги:​practical_malware_analysis_2012.pdf|Practical Malware Analysis: The Hands-on Guide To Dissecting Malicious Software. M.Sikorski & A. Honig. Eng.}}\\ 
-{{:​книги:​scene_of_the_cybercrime_computer_forensics_handbook_2002.pdf|}}\\ +{{:​книги:​scene_of_the_cybercrime_computer_forensics_handbook_2002.pdf|Scene Of The Cybercrime: Computer Forensics Handbook. D. Shinder & Ed Tittel. Eng.}}\\ 
-{{:​книги:​seven_deadliest_web_application_attacks_2010.pdf|}}\\ +{{:​книги:​seven_deadliest_web_application_attacks_2010.pdf|7 Deadliest Web Application Attacks. M. Shema. Eng.}}\\ 
-{{:​книги:​sql_injection_attacks_and_defense_1_2009.pdf|}}\\ +{{:​книги:​sql_injection_attacks_and_defense_1_2009.pdf|SQL Injection: Attack & Defence №1: J. Clarke. Eng.}}\\ 
-{{:​книги:​sql_injection_attacks_and_defense_2_2012.pdf|}}\\ +{{:​книги:​sql_injection_attacks_and_defense_2_2012.pdf|SQL Injection: Attack & Defence №2: J. Clarke. Eng.}}\\ 
-{{:​книги:​the_book_of_xen_practical_guide_for_the_system_administrator_2010.pdf|}}\\ +{{:​книги:​the_book_of_xen_practical_guide_for_the_system_administrator_2010.pdf|The Book Of Xen:  A Practical Guide For The System Administrator. C. Takemura & L. Crawford. Eng.}}\\ 
-{{:​книги:​the_investigator_guide_to_computer_crime_2006.pdf|}}\\ +{{:​книги:​the_investigator_guide_to_computer_crime_2006.pdf|The Investigator Guide To Computer Crime. C. Franklin. Eng.}}\\ 
-{{:​книги:​the_myths_of_security_what_the_computer_security_industry_doesnt_want_you_to_know.pdf|}}\\ +{{:​книги:​the_myths_of_security_what_the_computer_security_industry_doesnt_want_you_to_know.pdf|The Myths Of Security: What The Computer Security Industry Doesn'​t Want You To Know. J. Viega. Eng.}}\\ 
-{{:​книги:​the_tangled_web_a_guide_to_securing_modern_web_applications_2011.pdf|}}\\ +{{:​книги:​the_tangled_web_a_guide_to_securing_modern_web_applications_2011.pdf|The Tangled Web: A Guide To Securing Modern Web Applications. M. Zalewski. Eng.}}\\ 
-{{:​книги:​tracking_ghostnet_investigating_cyber_espionage_network_2009.pdf|}}\\ +{{:​книги:​tracking_ghostnet_investigating_cyber_espionage_network_2009.pdf|Tracking GhostNet: Investigating Cyber Espionage Network. Eng.}}\\ 
-{{:​книги:​web_application_vulnerabilities_detect_exploit_prevent_2007.pdf|}}\\ +{{:​книги:​web_application_vulnerabilities_detect_exploit_prevent_2007.pdf|Web Applications Vulnerabilities:​ Detect, Exploit, Prevent. Eng.}}\\ 
-{{:​книги:​websters_new_world_hacker_dictionary_2006.pdf|}}\\ +{{:​книги:​websters_new_world_hacker_dictionary_2006.pdf|Webster'​s New World: Hacker Dictionary. B. Schell & C. Martin. Eng. }}\\ 
-{{:​книги:​wireless_and_mobile_networks_security.pdf|}}\\ +{{:​книги:​wireless_and_mobile_networks_security.pdf|Wirelles and Mobile Network Security. H. Chaouchi & M. Laurent-Maknavicius. Eng.}}\\ 
-{{:​книги:​zashchita_informacii_tekhnicheskimi_sredstvami_2012.pdf|}}\\ +{{:​книги:​zashchita_informacii_tekhnicheskimi_sredstvami_2012.pdf|Защита информации техническими средствами. Ю. Каторин,​ А. Разумовский,​ А. Спивак.}}\\ 
-{{:​книги:​zashchita_komputernoj_informacii_ehffektivnye_metody_2010.pdf|}}\\{{:​книги:​prakticheskoe_rukovodstvo_po_vyyavleniyu_specialnyh_tekhnicheskih_sredstv_nesankcionirovannogo_polucheniya_informacii_2010.pdf|}}\\+{{:​книги:​zashchita_komputernoj_informacii_ehffektivnye_metody_2010.pdf|Защита компьютерной информации:​ Эффективные методы и средства. В. Шаньгин.}}\\ {{:​книги:​prakticheskoe_rukovodstvo_po_vyyavleniyu_specialnyh_tekhnicheskih_sredstv_nesankcionirovannogo_polucheniya_informacii_2010.pdf|Практическое руководство по выявлению специальных технических средств несанкционированного получения информации. Г. Бузов}}\\
 </​WRAP>​ </​WRAP>​