Mark Ludwig
American Eagle Publications, Inc.
ISBN 0-929408-02-0
1996
download here http://www.esnips.com/doc/541940b6-bfe4-4aef-848d-5c98bc4c4c31/the-little-black-book-of-computer-viruses
The Little Black Book of Computer Viruses
Posted by aditya147147 | Wednesday, October 14, 2009 | e books | 0 comments »Insider Attack and Cyber Security Beyond the Hacker
Posted by aditya147147 | Wednesday, October 14, 2009 | e books | 0 comments »Springer Science | ISBN- 13-978-0-387-77321-6 | Jan 2008 | English | PDF | 2.76 MB | 228 Pages
Introduction
Hackers, especially “terrorist hackers” or “cyberwar hackers” get lots of press. They do indeed pose a serious problem. However, the threat they pose pales be- fore that posed by those closest to us: the insiders. The cyberthreat posed by insiders isn’t new. Donn Parker’s seminal 1978 book Crime by Computer estimated that 95% of computer attacks were committed by authorized users of the system. Admittedly, this was in the pre-Internet era, when very few non-insiders had any access at all; still, the underlying issue – that em- ployees are not always trustable – remains. To be sure, this has always been true – thieving or otherwise corrupt workers have undoubtedly existed since commerce itself – but the power of computers (and our inability to secure them in the best of circumstances) makes the problem far worse today. In June 2007, a workshop (sponsored by Cliff Wang of the Army Research Of- fice) on the insider threat was held. Approximately 35 invitees attended, including security
researchers, vendors, practitioners, and representatives of organizations that perceive a serious insider threat. The goal was to develop a research commu-nity on the insider threat. Of necessity, our first steps were to understand the scope of the problem, to develop a common vocabulary, and to start sketching a research agenda. This volume consists of papers contributed by some of those at-tendees.
Types of Attack
Fundamentally, there are three different types of attack: misuse of access, defense bypass, and access control failure. Each must be approached differently.
download: http://www.ziddu.com/downloadfile/2106922/InsiderAttackandCyberSecurityBeyondtheHacke.pdf.html
The Little Black Book of Computer Viruses
Posted by aditya147147 | Wednesday, October 14, 2009 | e books | 0 comments »
by:
Mark Ludwig
American Eagle Publications, Inc.
ISBN 0-929408-02-0
1996
download:
http://www.esnips.com/doc/541940b6-bfe4-4aef-848d-5c98bc4c4c31/the-little-black-book-of-computer-viruses
Download Three Mistakes Of My Life - Chetan Bhagat
Posted by aditya147147 | Wednesday, October 14, 2009 | e books | 0 comments »
What strikes you first about Chetan Bhagat’s novels is the fact that this author writes about Indians and for Indians. His characters are young, ambitious and passionate and have the same moral, social and religious dilemmas as many of the young Indians today. At the same time their context and sensibility too is unabashedly Indian. The new and the third Bhagat book, “The3 mistakes of my life”, has all these qualities.
The setting is the city of Ahmedabad that though being urban is yet not as metropolitan as many of its metro counterparts. It retains its small town flavour in pols (colonies), traditional Indian households and small vegetarian joints. It has the protagonist Govind with his passion and acumen for accounts and business, it has Ishan for whom cricket is the element around which his life revolves and it has Omi, a priest’s son and a loyal friend who is game for anything that his friends are game for.
The book is based on real life events. It begins in a dramatic enough fashion with Bhagat receiving an e-mail from Govind who had taken many sleeping pills and was writing to him while waiting for the deadly sleep’s embrace. Chetan’s was shook enough by the incident to track the boy down to Ahmedabad hospital. Fortunately he was still alive to tell the tale. The book is loosely based on the three mistakes Govind made in his life.
What follows is a mix of cricket, religion, business, love and friendship. Govind sets up a sport shop along with his friends in the temple compound with Omi’s family’s help. The shop prospers as Ishan coaches young boys in cricket and Govind teaches maths to Ishan’s sister Vidya who also captures his heart. Ishan then meets Ali, a child master with hyper reflex condition that makes him hit each ball for a six. Ali becomes the talent Ishan never had and Ali’s destiny becomes his own.
Enter Omi’s Bitoo mama, a communal party man bent on converting the young into fighters in the name of Hinduism. Situations come to a head and Ahmedabad burns in riot fires. Omi dies saving Ali and Ishan finds out about Vidya and Govind, a betrayal he does not forgive. These events lead Govind to his death-bed and that is when he writes the email to Bhagat.
Perhaps, this is the biggest compliment an author can receive. Its not when New York Times describes as you the biggest selling English language author in the country and not when you have sold more than two million books but it is definitely when someone chooses to remember him in his last minutes. After all, the purpose of all writing is to touch someone’s heart. And Bhagat seems to have done just that.
“The 3 mistakes of my life” is written simply and has the quality that makes one want to read the book cover to cover in one sitting. The pricing of the book is just right for his target audience. At Rs95, this book is indeed value for money and time. Bhagat’s other book, One night at the rate of call centre is already being made into a Bollywood multi-starer. This book too has all the masala, emotion and pace to become a potential blockbuster.
P.S. Neither i have scanned it nor uploaded it. I am not at all responsible if it violates any copyright act.
You may purchase this book from HERE
One Night At Call Centre Download
Posted by aditya147147 | Wednesday, October 14, 2009 | e books | 0 comments »Ebooks for sale - pay 0 $ for each
Posted by aditya147147 | Wednesday, October 14, 2009 | cool links, e books | 0 comments »Well first of all i am sorry for not being active here from past 1 month. Now i am back. I got something for all you people. Hope you will like it.
Books for sale here
download from here
http://www.countrymomnv.com/allebooks21/
total around 2.75GB
Sharing is CaringNet Tools 5.0 (build 70)
Posted by aditya147147 | Wednesday, October 14, 2009 | ethical hacking tools, net tools | 0 comments »contains a whole variety of network tools. Here is a list of the most important tools:
1) IP Address Scanner
2) IP Calculator
3) IP Converter
4) Port Listener
5) Port Scanner
6) Ping
7) NetStat (2 ways)
Trace Route (2 ways)
9) TCP/IP Configuration
10) Online - Offline Checker
11) Resolve Host & IP
12) Time Sync
13) Whois & MX Lookup
14) Connect0r
15) Connection Analysator and protector
16) Net Sender
17) E-mail seeker
18) Net Pager
19) Active and Passive port scanner
20) Spoofer
21) Hack Trapper
22) HTTP flooder (DoS)
23) Mass Website Visiter
24) Advanced Port Scanner
25) Trojan Hunter (Multi IP)
26) Port Connecter Tool
27) Advanced Spoofer
28) Advanced Anonymous E-mailer
29) Simple Anonymous E-mailer
30) Anonymous E-mailer with Attachment Support
31) Mass E-mailer
32) E-mail Bomber
33) E-mail Spoofer
34) Simple Port Scanner (fast)
35) Advanced Netstat Monitoring
36) X Pinger
37) Web Page Scanner
38) Fast Port Scanner
39) Deep Port Scanner
40) Fastest Host Scanner (UDP)
41) Get Header
42) Open Port Scanner
43) Multi Port Scanner
44) HTTP scanner (Open port 80 subnet scanner)
45) Multi Ping for Cisco Routers
46) TCP Packet Sniffer
47) UDP flooder
48) Resolve and Ping
49) Multi IP ping
50) File Dependency Sniffer
51) EXE-joiner (bind 2 files)
52) Encrypter
53) Advanced Encryption
54) File Difference Engine
55) File Comparasion
56) Mass File Renamer
57) Add Bytes to EXE
58) Variable Encryption
59) Simple File Encryption
60) ASCII to Binary (and Binary to ASCII)
61) Enigma
62) Password Unmasker
63) Credit Card Number Validate and Generate
64) Create Local HTTP Server
65) eXtreme UDP Flooder
66) Web Server Scanner
67) Force Reboot
68) Webpage Info Seeker
69) Bouncer
70) Advanced Packet Sniffer
71) IRC server creater
72) Connection Tester
73) Fake Mail Sender
74) Bandwidth Monitor
75) Remote Desktop Protocol Scanner
76) MX Query
77) Messenger Packet Sniffer
78) API Spy
79) DHCP Restart
80) File Merger
81) E-mail Extractor (crawler / harvester bot)
82) Open FTP Scanner
83) Advanced System Locker
84) Advanced System Information
85) CPU Monitor
86) Windows Startup Manager
87) Process Checker
88) IP String Collecter
89) Mass Auto-Emailer (Database mailer; Spammer)
90) Central Server (Base Server; Echo Server; Time Server; Telnet Server; HTTP Server; FTP Server)
91) Fishing Port Scanner (with named ports)
92) Mouse Record / Play Automation (Macro Tool)
93) Internet / LAN Messenger Chat (Server + Client)
94) Timer Shutdown/Restart/Log Off/Hibernate/Suspend/ Control
95) Hash MD5 Checker
96) Port Connect - Listen tool
97) Internet MAC Address Scanner (Multiple IP)
98) Connection Manager / Monitor
99) Direct Peer Connecter (Send/Receive files + chat)
100) Force Application Termination (against Viruses and Spyware)
101) Easy and Fast Screenshot Maker (also Web Hex Color Picker)
102) COM Detect and Test
103) Create Virtual Drives
104) URL Encoder
105) WEP/WPA Key Generator
106) Sniffer.NET
107) File Shredder
108) Local Access Enumerater
109) Steganographer (Art of hiding secret data in pictures)
110) Subnet Calculater
111) Domain to IP (DNS)
112) Get SNMP Variables
113) Internet Explorer Password Revealer
114) Advanced Multi Port Scanner
115) Port Identification List (+port scanner)
116) Get Quick Net Info
117) Get Remote MAC Address
118) Share Add
119) Net Wanderer
120) WhoIs Console
121) Cookies Analyser
122) Hide Secret Data In Files
123) Packet Generator
124) Secure File Splitting
125) My File Protection (Password Protect Files, File Injections)
126) Dynamic Switch Port Mapper
127) Internet Logger (Log URL)
128) Get Whois Servers
129) File Split&Merge
130) Hide Drive
131) Extract E-mails from Documents
132) Net Tools Mini (Client/Server, Scan, ICMP, Net Statistics, Interactive, Raw Packets, DNS, Whois, ARP, Computer’s IP, Wake On LAN)
133) Hook Spy
134) Software Uninstaller
135) Tweak & Clean XP
136) Steganographic Random Byte Encryption
137) NetTools Notepad (encrypt your sensitive data)
138) File Encrypter/Decrypter
139) Quick Proxy Server
140) Connection Redirector (HTTP, IRC, … All protocols supported)
141) Local E-mail Extractor
142) Recursive E-mail Extractor
143) Outlook Express E-mail Extractor
144) Telnet Client
145) Fast Ip Catcher
146) Monitor Host IP
147) FreeMAC (MAC Address Editor)
148) QuickFTP Server (+user accounts support)
149) NetTools Macro Recorder/Player (Keybord and Mouse Hook)
150) Network Protocol Analyzer
151) Steganographic Tools (Picture, Sounds, ZIP Compression and Misc Methods)
152) WebMirror (Website Ripper)
153) GeoLocate IP
154) Google PageRank Calculator
155) Google Link Crawler (Web Result Grabber)
156) Network Adapter Binder
157) Remote LAN PC Lister
158) Fast Sinusoidal Encryption
159) Software Scanner
160) Fast FTP Client
161) Network Traffic Analysis
162) Network Traffic Visualiser
163) Internet Protocol Scanner
164) Net Meter (Bandwidth Traffic Meter)
165) Net Configuration Switcher
166) Advanced System Hardware Info
167) Live System Information
168) Network Profiler
169) Network Browser
170) Quick Website Maker and Web Gallery Creator
171) Remote PC Shutdown
172) Serial Port Terminal
173) Standard Encryptor
174) Tray Minimizer
175) Extra Tools (nmap console & win32 version)
Many extra features and utilities are included in this package!
Download from
http://groups.yahoo.com/group/IndianProfessionals
or from