Register for free on http://www.xyzexploit.com and pick any three of the following books.

Start a thread or make a post and increase that to five.

• DNS and BIND, 5TH Edition
• DNS on Windows Server 2003
• DNS Spoofing
• Don’t Click on the Blue E!
• Encryption in a Windows Environment- EFS File, 802.1x Wireless, IPSec Transport, and S-MIME Exchange
• Enterprise SOA- Designing IT for Business Innovation
• Ethereal Packet Sniffing
• Ethernet Networks- Design, Implementation, Operation, Management 4th Edition
• Ethical Hacking & Countermeasures
• Ethical Hacking Agreement
• Exploiting Software- How to break Code
• Exploiting Stack Based Buffer Overflows
• FAQ Network Intrusion Detection Systems
• Firefox Hacks
• Firewalking- A Traceroute- Like Analysis IP Packet Responses to Determine Gateway Accesing
• Fixing Windows XP Annoyances
• FreeBSD Handbook 2006
• General Guidelines On Random Query Evaluation
• Google A hacker’s best friend
• Google Haking for Penetration Testers
• Google Secrets- How to Get A top 10 Ranking
• Google Spamguide
• GRC.com Denial Of Service Attack
• Groupware & Security
• GSM and GPRS
• Guide to Ellptic Curve Cryptography
• Guide To Using Google’s Buired Treasure
• Hack Attacks Reaveled A Complete Reference With Custom Security Hacking Toolkit
• Hack I.T Though Penetration Testing
• Hack Proofing Linux
• Hacker Disassembling Uncovered
• Hacker Web Exploitation Uncovered
• Hackers Beware
• Hacker’s Desk Reference
• Hacking- The Art Of Expliotation
• Hacking A Terror Network
• Hacking Exposed Web Applications
• Hacking Firefox- More Than 150 Hacks, Mods, and Customizations
• Hacking GPS
• Hacking Windows XP
• Hacking Wireless Networks For Dummies
• How SQL Slammer Works
• How to Build A Freebsd- Stable Firewall With ipfilter
• How to cheat at Designing a Windows Server Active Directory Infrastructure
• How to develop a Network Security Policy
• How to write Buffer Overflows
• ICMP Crafting and other uses
• Illustrated TCPIP- A graphic guide to the Protocol Suite
• Illustrated Windows XP 101 Hot Tips
• Information Security Management Handbook, 5th Edition
• Information Systems- The State of the Field
• Inside Network Perimeter Security, 2nd Edition
• Insider Threat- Protecting The Enterprise From Sabotage, Spying, And Theft
• Internet Denial of Service- Attack and Defense Mechanisms
• Open-Source Security Testing Methodology Manual
• PC Disaster and Recovery
• PC Hardware in a Nutshell, 2nd Edition
• PC networks
• PC Upgrade and Repair Bible Desktop Edition
• Peer to Peer- Harnessing the Power of Disruptive Technologies
• Penetration Testing Templates
• Placing Backdoors through Firewalls
• Practical VoIP Security
• Pro DNS and BIND
• Programming Applications for Micosoft Windows, 4th Edition
• Programming the Microsoft Windows Driver Model, 2nd Edition
• Programming with Micosoft Visual Driver Model, 2nd Edition
• Programming with Microsoft Visual C++. NET, 6th Edition
• Python in A nutshell, 2nd Edition
• Real 802.11 Security- Wi-Fi Protected Access and 802.11i
• Red Hat Fedora 5 Unleashed
• Red HAT Linux Networking and System Administration
• Red HAT Linux Security and Optimization
• Reversing- Secrets of Reversing Engineering
• RHCE Red Hat Certified Engineer Linux Study Guide (Exam RH302), 4th Edition
• Routers and Networking
• RSA Encryption Alogorithm, a simple example
• Sams Teach Yourself HTML in 10 minutes, 4th Edition
• Sams Teach Yourself Microsoft SQL Server 2005 Express in 24Hours
• Sarbanes- Oxley
• 100 Linux Tips and Tricks
• A Comparative Analysis of Methods of Defense against Buffer Overflow Attacks
• A Little bit about buffer Overflows
• Absolute Beginners Guide To Microsoft Windows XP, Second Edition
• Absolute Beginner’s Guide To Networking, 4th Edition
• Active Directory Cookbook, 2nd Edition
• Advanced Bash Shell Scripting Guide
• Advanced Buffer Overflow Expliots
• Advanced SQL Injection In SQL Server applications
• Advanced Wireless Networks- 4G Technologies
• Alternate Data Streams in NTFS
• An example of the RSA Algorithm
• Analysis of a Telenet Session Hijack via Spoofed MAC Addresses
• Anti-Hacker Tool Kit, Second Edition
• Apache Phrase Book- Essential Code and Commands
• Applied Microsoft .Net Framework Programming
• Beating IT Risks
• Blindfolded SQL Injection
• Bluetooth Security
• ]Broadband Security
• Broadband Packet Switching Technologies
• Broadband Telecommunications Handbook
• Buffer Overflow Attacks – Detect, Exploit, Prevent
• Bulding DMZs for Enterprise Networks
• Bulletproof Wierless Security- GSM, UMTS, 802.11, and AdHoc Security
• Bypassing Firewalls Tools and Techniques
• C# Programming Primer
• C++ Cookbook
• C++ How to Program, Fifth Edition
• Cabling- The Complete Guide to Network Wiring
• Certified Ethical Exam Pre
• CISCO – Password Recovery Procedures
• CISSP- Certified Information System Security Professional Study Guide, 3rd Edition
• Cleaning Windows XP For Dummies
• CompTIA Security+ Certification
• Computer Networks, 4th Edition
• Content Networking- Architecture, Protocols, and Practice
• Cross-Site Scripting
• Crypto- How the Code Rebels Beat the Government-Saving Privacy in the digital Age
• CYA-Securing Exchange Server 2003 and Outlook Web Access
• CYA-Securing IIS 6.0
• Cyber Terrorism- Political And Economic Implications
• Datacom Overview
• DDOS Atack Tools
• Defeating Sniffers and Intrusion Detection Systems
• Defend IT- Security by Example
• Designing and Developing Scalable IP Networks
• Designing Storage Area Networks – A Practical Reference for Implementing Fibre Channel and IP
• Detection of Promiscous Nodes Using ARP Packets