Sign up for ISW's Newsletter

Application, Coding & Malware books:

Application, Coding & Malware /

Astalavista Security Toolbox DVD v1.0 by Astalavista
DVD featuring:
- 5000 Tools
- Sorted archive with detailed descriptions(about 440 categories)
- Large archive of Ebooks
Cryptography in the Database by Kevin Kenan
Kevin Kenan presents a start-to-finish blueprint and execution plan for designing and building—or selecting and integrating—a complete database cryptosystem. Kenan systematically shows how to eliminate weaknesses, overcome pitfalls, and defend against attacks that can compromise data even if it's been protected by strong encryption.
Exploiting Software: How to Break Code by Greg Hoglund
Loaded with examples of real attacks, attack patterns, tools, and techniques used by bad guys to break software.
Malicious Cryptography: Exposing Cryptovirology by Adam L. Young, Moti Yung
Hackers have uncovered the dark side of cryptography--that device developed to defeat Trojan horses, viruses, password theft, and other cyber-crime. It’s called cryptovirology, the art of turning the very methods designed to protect your data into a means of subverting it.
Malware: Fighting Malicious Code by Ed Skoudis, Lenny Zeltser
Reveals how attackers install malicious code and how they evade detection. Shows how you can defeat their schemes and keep your computers and network safe! Details viruses, worms, backdoors, Trojan horses, RootKits, and other threats. Explains how to handle today's threats, with an eye on handling the threats to come
Rootkits: Subverting the Windows Kernel by Greg Hoglund & James Butler
Rootkits are the ultimate backdoor, giving hackers ongoing and virtually undetectable access to the system's they exploit. This book will help one understand, create and protect against such malicious attacks.
Security Warrior by Anton Chuvakin
Covering everything from reverse engineering to SQL attacks, and including topics like social engineering, antiforensics, and common attacks against UNIX and Windows systems, this book teaches you to know your enemy and how to be prepared to do battle.
The Art of Computer Virus Research and Defense by Peter Szor
Symantec's chief antivirus researcher has written the definitive guide to contemporary virus threats, defense techniques, and analysis tools.
The Shellcoders Handbook by Jack Koziol\David Litchfield\Dave
This well written book will show you how to find security holes, where they come from, and how to close them. It will teach you how to pinpoint vulnerabilities in the most popular operating systems including Windows, Linux and Solaris. You will also learn how to write exploits to understand how to protect these systems.

All images, content & text (unless other ownership applies) are © copyrighted 2000 -  , All rights reserved. Comments are property of the respective posters.