Sunday, August 5, 2007

Free Books on Security

  • Program Stack vulnerability [txt]

  • Non-executable Program Stack vulnerability [txt]

  • Strange Attractors and TCP/IP Sequence Number Analysis [link]

  • Rainbow book series [link]

  • Kernel Level Vulnerabilities, Behind the Scenes of the 5th Argus Hacking Challenge [pdf]

  • Attacks on and Countermeasures for USB Hardware Token Devices [pdf]

  • UNIX Assembly Codes Development for Vulnerabilities Illustration Purposes [pdf]

  • Countermeasures against Buffer Overflow Attacks [pdf]

  • Integrating Flexible Support for Security Policies into the Linux Operating System [pdf]

  • Flaw in NTRU Signature Scheme (NSS) [pdf]

  • Meeting Critical Security Objectived with Security-Enhanced Linux [pdf]

  • Secure Programming with Linux and Unix [pdf]

  • Reverse Compilation Techniques [pdf]

  • What Should be Hidden and Open in Computer Security: Lessons from Deception, the Art of War, Law, and Economic Theory [pdf]

  • Stack Smashing Vulnerabilities in the UNIX Operation System [pdf]

  • Free Books on Security Free Books on Security Free Books on Security Free Books on Security Free Books on Security

    AddThis Social Bookmark Button

    0 Comments: