+ Reply + New Job/Topic
Results 1 to 3 of 3

Topic: This site is giving free books on hacking, networking, IT Certifications.....

  1. #1
    Member pipmaster's Avatar
    Join Date
    Jan 2010
    Posts
    50

    This site is giving free books on hacking, networking, IT Certifications.....

    Register for free on http://www.xyzexploit.com and pick any three of the following books.

    Start a thread or make a post and increase that to five.

    • DNS and BIND, 5TH Edition
    • DNS on Windows Server 2003
    • DNS Spoofing
    • Don’t Click on the Blue E!
    • Encryption in a Windows Environment- EFS File, 802.1x Wireless, IPSec Transport, and S-MIME Exchange
    • Enterprise SOA- Designing IT for Business Innovation
    • Ethereal Packet Sniffing
    • Ethernet Networks- Design, Implementation, Operation, Management 4th Edition
    • Ethical Hacking & Countermeasures
    • Ethical Hacking Agreement
    • Exploiting Software- How to break Code
    • Exploiting Stack Based Buffer Overflows
    • FAQ Network Intrusion Detection Systems
    • Firefox Hacks
    • Firewalking- A Traceroute- Like Analysis IP Packet Responses to Determine Gateway Accesing
    • Fixing Windows XP Annoyances
    • FreeBSD Handbook 2006
    • General Guidelines On Random Query Evaluation
    • Google A hacker’s best friend
    • Google Haking for Penetration Testers
    • Google Secrets- How to Get A top 10 Ranking
    • Google Spamguide
    • GRC.com Denial Of Service Attack
    • Groupware & Security
    • GSM and GPRS
    • Guide to Ellptic Curve Cryptography
    • Guide To Using Google’s Buired Treasure
    • Hack Attacks Reaveled A Complete Reference With Custom Security Hacking Toolkit
    • Hack I.T Though Penetration Testing
    • Hack Proofing Linux
    • Hacker Disassembling Uncovered
    • Hacker Web Exploitation Uncovered
    • Hackers Beware
    • Hacker’s Desk Reference
    • Hacking- The Art Of Expliotation
    • Hacking A Terror Network
    • Hacking Exposed Web Applications
    • Hacking Firefox- More Than 150 Hacks, Mods, and Customizations
    • Hacking GPS
    • Hacking Windows XP
    • Hacking Wireless Networks For Dummies
    • How SQL Slammer Works
    • How to Build A Freebsd- Stable Firewall With ipfilter
    • How to cheat at Designing a Windows Server Active Directory Infrastructure
    • How to develop a Network Security Policy
    • How to write Buffer Overflows
    • ICMP Crafting and other uses
    • Illustrated TCPIP- A graphic guide to the Protocol Suite
    • Illustrated Windows XP 101 Hot Tips
    • Information Security Management Handbook, 5th Edition
    • Information Systems- The State of the Field
    • Inside Network Perimeter Security, 2nd Edition
    • Insider Threat- Protecting The Enterprise From Sabotage, Spying, And Theft
    • Internet Denial of Service- Attack and Defense Mechanisms
    • Open-Source Security Testing Methodology Manual
    • PC Disaster and Recovery
    • PC Hardware in a Nutshell, 2nd Edition
    • PC networks
    • PC Upgrade and Repair Bible Desktop Edition
    • Peer to Peer- Harnessing the Power of Disruptive Technologies
    • Penetration Testing Templates
    • Placing Backdoors through Firewalls
    • Practical VoIP Security
    • Pro DNS and BIND
    • Programming Applications for Micosoft Windows, 4th Edition
    • Programming the Microsoft Windows Driver Model, 2nd Edition
    • Programming with Micosoft Visual Driver Model, 2nd Edition
    • Programming with Microsoft Visual C++. NET, 6th Edition
    • Python in A nutshell, 2nd Edition
    • Real 802.11 Security- Wi-Fi Protected Access and 802.11i
    • Red Hat Fedora 5 Unleashed
    • Red HAT Linux Networking and System Administration
    • Red HAT Linux Security and Optimization
    • Reversing- Secrets of Reversing Engineering
    • RHCE Red Hat Certified Engineer Linux Study Guide (Exam RH302), 4th Edition
    • Routers and Networking
    • RSA Encryption Alogorithm, a simple example
    • Sams Teach Yourself HTML in 10 minutes, 4th Edition
    • Sams Teach Yourself Microsoft SQL Server 2005 Express in 24Hours
    • Sarbanes- Oxley
    • 100 Linux Tips and Tricks
    • A Comparative Analysis of Methods of Defense against Buffer Overflow Attacks
    • A Little bit about buffer Overflows
    • Absolute Beginners Guide To Microsoft Windows XP, Second Edition
    • Absolute Beginner’s Guide To Networking, 4th Edition
    • Active Directory Cookbook, 2nd Edition
    • Advanced Bash Shell Scripting Guide
    • Advanced Buffer Overflow Expliots
    • Advanced SQL Injection In SQL Server applications
    • Advanced Wireless Networks- 4G Technologies
    • Alternate Data Streams in NTFS
    • An example of the RSA Algorithm
    • Analysis of a Telenet Session Hijack via Spoofed MAC Addresses
    • Anti-Hacker Tool Kit, Second Edition
    • Apache Phrase Book- Essential Code and Commands
    • Applied Microsoft .Net Framework Programming
    • Beating IT Risks
    • Blindfolded SQL Injection
    • Bluetooth Security
    • ]Broadband Security
    • Broadband Packet Switching Technologies
    • Broadband Telecommunications Handbook
    • Buffer Overflow Attacks – Detect, Exploit, Prevent
    • Bulding DMZs for Enterprise Networks
    • Bulletproof Wierless Security- GSM, UMTS, 802.11, and AdHoc Security
    • Bypassing Firewalls Tools and Techniques
    • C# Programming Primer
    • C++ Cookbook
    • C++ How to Program, Fifth Edition
    • Cabling- The Complete Guide to Network Wiring
    • Certified Ethical Exam Pre
    • CISCO – Password Recovery Procedures
    • CISSP- Certified Information System Security Professional Study Guide, 3rd Edition
    • Cleaning Windows XP For Dummies
    • CompTIA Security+ Certification
    • Computer Networks, 4th Edition
    • Content Networking- Architecture, Protocols, and Practice
    • Cross-Site Scripting
    • Crypto- How the Code Rebels Beat the Government-Saving Privacy in the digital Age
    • CYA-Securing Exchange Server 2003 and Outlook Web Access
    • CYA-Securing IIS 6.0
    • Cyber Terrorism- Political And Economic Implications
    • Datacom Overview
    • DDOS Atack Tools
    • Defeating Sniffers and Intrusion Detection Systems
    • Defend IT- Security by Example
    • Designing and Developing Scalable IP Networks
    • Designing Storage Area Networks – A Practical Reference for Implementing Fibre Channel and IP
    • Detection of Promiscous Nodes Using ARP Packets
    http://www.xyzexploit.com

  2. #2
    Member pipmaster's Avatar
    Join Date
    Jan 2010
    Posts
    50

    Re: This site is giving free books on hacking, networking, IT Certifications.....

    How do you get the books?

    After registration, send an email containing the list of your selected books, user name on the forum(i.e on http://www.xyzexploit.com) and the the word naijahotjobs(so I will know where you are coming from.

    Send emails to [email protected]

    http://www.xyzexploit.com

  3. #3
    Member pipmaster's Avatar
    Join Date
    Jan 2010
    Posts
    50

    Re: This site is giving free books on hacking, networking, IT Certifications.....

    Ok, you just reply in the post welcoming new members stating which of the books you will like.
    http://www.xyzexploit.com

+ Reply

Similar Topics

  1. Info Networking site needs Writers.
    By protegesolutions in forum Low Profile Jobs
    Replies: 0
    Last Post: Mar 5th, 11, 12:53 am
  2. Replies: 0
    Last Post: Jun 17th, 10, 06:32 pm
  3. Replies: 1
    Last Post: Feb 3rd, 10, 08:24 am
  4. This site is giving free boks on network security, hacking, IT certifications...
    By pipmaster in forum Self Development and Training
    Replies: 0
    Last Post: Feb 2nd, 10, 05:44 pm

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •