ISAC Cambodia (InfoSec)
DocumentsKnowledge

Hacking E-Book Collections

ការបម្រូលផ្តុំនូវសៀវភៅស្តីពី Hack ជាច្រើន

ខាងក្រោមគឺជាសៀវភៅអេឡិចត្រូនិចស្តីពីការ ​Hack ដែលត្រូវបានចងក្រងប្រមូលផ្តុំ។ សូមធ្វើការទាញយកដើមី្បអានធ្វើជាចំណេះដឹង៖

Syngress – Aggressive Network Self-Defense.pdf 82.85 MB
Syngress – Best Damn Windows Server 2003 Book Period.pdf 21.4 MB
Syngress – Botnets – The Killer Web App.pdf 6.98 MB
Syngress – Buffer Overflow Attacks.pdf 5.38 MB
Syngress – Building a VoIP Network with Multimedia Communication Server 5100.pdf 16.63 MB
Syngress – Building DMZs for Enterprise Networks.pdf 11.67 MB
Syngress – Building SANs with Brocade Fabric Switches.pdf 3.76 MB
Syngress – C#.NET Web Developer’s Guide.pdf 6.81 MB
Syngress – Check Point NG VPN-1 FireWall-1 Advanced Configuration and Troubleshooting.pdf 11.75 MB
Syngress – Cisco Security – Professional’s Guide to Secure Intrusion Detection Systems.pdf 15.21 MB
Syngress – Cisco Security – Specialist’s Guide to PIX Firewalls.pdf 10.79 MB
Syngress – Combating Spyware in the Enterprise.pdf 7.99 MB
Syngress – Creating Security Policies and Implementing Identity Management with Active Directory.pdf 2.81 MB
Syngress – Cyber Adversary Characterization – Auditing the Hacker Mind.pdf 4.15 MB
Syngress – Cyber Crime Investigations.pdf 9.18 MB
Syngress – Cyber Spying – Tracking your Family’s Secret Online Lives.pdf 105.88 MB
Syngress – Developer’s Guide to Web Application Security.pdf 10.91 MB
Syngress – Email Virus Protection Handbook.pdf 5.84 MB
Syngress – Enemy at the Water Cooler.pdf 6.3 MB
Syngress – Essential Computer Security.pdf 7.81 MB
Syngress – Google Hacking for Penetration Tester – Vol.1.pdf 13.44 MB
Syngress – Google Hacking for Penetration Tester – Vol.2.pdf 15.27 MB
Syngress – Google Talking.pdf 8.32 MB
Syngress – Hack Proofing Linux.pdf 11.81 MB
Syngress – Hack Proofing Sun Solaris.pdf 6.79 MB
Syngress – Hack Proofing Windows 2000 Server.pdf 12.48 MB
Syngress – Hack Proofing XML.pdf 7.13 MB
Syngress – Hack Proofing your Identity in the Information Age.pdf 8.9 MB
Syngress – Hack Proofing your Network – 2nd Edition.pdf 8.77 MB
Syngress – Hack Proofing your network.pdf 2.95 MB
Syngress – Hack Proofing your Web Applications.pdf 8.61 MB
Syngress – Hack Proofing your Wireless Network.pdf 6.6 MB
Syngress – Hack the Stack.pdf 7.19 MB
Syngress – How to Cheat at Securing a Wireless Network.pdf 11.7 MB
Syngress – InfoSec Career Hacking – Sell your Skillz not your Soul.pdf 83.88 MB
Syngress – Intrusion, Prevention and Active Response.pdf 84.83 MB
Syngress – LEGO Software Power Tools.pdf 14.89 MB
Syngress – Linksys WRT54G Ultimate Hacking.pdf 15.79 MB
Syngress – Metasploit Toolkit for Penetration Testing, Exploit Development and Vulnerability… 4.86 MB
Syngress – Microsoft Vista for IT Security Professionals.pdf 18.66 MB
Syngress – Nessus Network Auditing.pdf 4.62 MB
Syngress – Ninja Hacking – Unconventional Penetration Testing Tactics and Techniques.pdf 9.85 MB
Syngress – Nmap in the Enterprise – Your Guide to Network Scanning.pdf 6.07 MB
Syngress – OS X for Hackers at Heart.pdf 15.27 MB
Syngress – Penetration Tester’s Open Source Toolkit – Vol.1.pdf 34.31 MB
Syngress – Penetration Tester’s Open Source Toolkit – Vol.2.pdf 27.06 MB
Syngress – Phishing Exposed.pdf 8.28 MB
Syngress – Practical VoIP Security.pdf 9.68 MB
Syngress – Programmer’s Ultimate Security Deskref.pdf 4.51 MB
Syngress – RFID Security.pdf 5.94 MB
Syngress – Scene of the Cybercrime – Computer Forensics Handbook.pdf 5.05 MB
Syngress – Scripting VMware Power Tools.pdf 5.01 MB
Syngress – Secure Your Network for Free.pdf 7.2 MB
Syngress – Securing the Cloud – Cloud Computer Security Techniques and Tactics.pdf 3.27 MB
Syngress – Security Assessment Case Studies for Implementing the NSA IAM.pdf 4.96 MB
Syngress – Security Log Management – Identifying Patterns in the Chaos.pdf 6.64 MB
Syngress – Security Sage’s Guide to Hardening the Network.pdf 11.32 MB
Syngress – Security+ Study Guide.pdf 11.45 MB
Syngress – Snort 2.0 Intrusion Detection.pdf 7.08 MB
Syngress – Snort 2.1 Intrusion Detection – 2nd Edition.pdf 12.13 MB
Syngress – Snort IDS and IPS Toolkit.pdf 8.37 MB
Syngress – Sockets, Shellcode, Porting and Coding – Reverse Engineering Exploits.pdf 112.33 MB
Syngress – Special Ops – Host and Network Security for Microsoft, UNIX, and Oracle.pdf 16.94 MB
Syngress – SQL Injection Attacks and Defense.pdf 6.55 MB
Syngress – Stealing the Network – How to Own a Shadow.pdf 9.13 MB
Syngress – Stealing the Network – How to Own the Box.pdf 4.59 MB
Syngress – Systems Security Certification Practitioner Study Guide.pdf 6.26 MB
Syngress – The Mezonic Agenda – Hacking the Presidency.pdf 16.29 MB
Syngress – VB.NET Developer’s Guide.pdf 6.41 MB
Syngress – WarDriving and Wireless Penetration Testing.pdf 20.84 MB
Syngress – Wireless Hacking – Projects for Wi-Fi Enthusiasts.pdf 18.31 MB
Syngress – Wireshark and Ethereal – Network Protocol Analyzer Toolkit.pdf 13.21 MB
Syngress – Writing Security Tools and Exploits.pdf 11.15 MB
Syngress – XSS Attacks.pdf 7.34 MB
Syngress – Zen and the Art of Information Security.pdf 5.17 MB
Syngress – Zero Day Exploit – Countdown to Darkness.pdf 3.75 MB
The Hackademy – Hors Serie 1.pdf 12.22 MB
The Hackademy – Hors Serie 2.pdf 36.36 MB
The Hackademy – Hors Serie 3.pdf 13.98 MB
The Hackademy Prog – Apprendre à Programmer en C.pdf 13.58 MB
The Hackademy Prog – Apprendre à Programmer en PHP.pdf 34.13 MB
The Hackademy School – Hack Newbie.pdf 3.49 MB
The Hackademy School – Hack Security Pro.pdf 6.39 MB
The Hackademy School – Linux.pdf 18.75 MB
The Hackademy School – Mini Guide Anonymat.pdf 2.25 MB
The Hackademy School – Newbie – part 1.pdf 10.41 MB
The Hackademy School – Newbie – part 2.pdf 9.86 MB
The Hackademy School – Newbie – part 3.pdf 10.65 MB
The Hackademy School – Newbie – part 4.pdf 9.2 MB
The Hackademy School – Securite wifi.pdf 1.33 MB
ZI Hackademy – Newbie 1.pdf 24.92 MB
ZI Hackademy – Newbie 2.pdf 41.43 MB
ZI Hackademy – Newbie 3.pdf 30.67 MB
Security and Hacking Books 02
[0 – List].txt 9.61 KB
[CLUSIF] Les Virus Informatiques.pdf 505.14 KB
[EDIGO] Le piratage de A a Z.pdf 33.58 MB
[HACKADEMY] Cours deuxieme niveau partie .pdf 9.2 MB
[HACKADEMY] Cours deuxieme niveau partie 1.pdf 10.65 MB
[HACKADEMY] Cours Newbie+.pdf 19.85 MB
[HACKADEMY] Cours Newbie.pdf 30.14 MB
[SPRINGER] Les virus informatiques – theorie, practique et applications.pdf 19.57 MB
A Closer Look At Ethical Hacking And Hackers.pdf.7z 74.15 KB
Analyse Apres L’attaque.pdf.7z 211.84 KB
Analyse De Code Malveillant.pdf.7z 1.47 MB
ARP Cache Poisonning.pdf 71.45 KB
ARP Poisonning.pdf 244.32 KB
Attacking The DNS Protocol.pdf 322.42 KB
Avantages Et Faiblesses Du Protocole SSH.pdf.7z 1.64 MB
Buffer Overflow.pdf 603.14 KB
CERTA – Les Mots De Passe.pdf.7z 38.39 KB
CERTA%20-%20Les%20Bons%20R%c3%a9flexes%20En%20Cas%20d%e2%2580%2599Intrusion%20Sur%20Un%20Syst%c3%… 50.15 KB
Certified Ethical Hacker (CEH) v3.0 Official Course.pdf 25.89 MB
Cle De Registre Suspecte.pdf.7z 462.26 KB
Codage De Huffman.pdf.7z 11.56 KB
Cognitive Hacking.pdf.7z 396.87 KB
Commande DOS.rtf 2.04 KB
Cracker Les SSHA Sous LDAP.pdf.7z 286.91 KB
Credit Card Hacking.pdf 223.34 KB
Cross Site Request Forgery II.pdf 2.4 MB
Cross Site Request Forgery.pdf 605.38 KB
CSTA Ethical Hacking Hands On.pdf.7z 311.65 KB
Culture Du Don Dans Le Logiciel Libre.pdf.7z 161.73 KB
Dangerous Google Searching for Secrets.pdf.7z 1.72 MB
Dangerous Google.pdf 2.11 MB
Data Breach Hacking Category Summary 2007.pdf.7z 13.97 KB
Data Breach Hacking Category Summary 2008.pdf.7z 14.13 KB
Database Security Using White-Hat Google Hacking.pdf.7z 116.17 KB
Debugging Session – Anti-Anti-ptrace Or Fooling The Debugger Fooler.pdf.7z 86.54 KB
Decimalisation Table Attacks For PIN Cracking.pdf.7z 90 KB
Ebay Hacks 100 Industrial-Strength Tips And Tools.pdf.7z 4.05 MB
eBook Fr – 2020 Hackers – 214 Pages Pour Apprendre Le Hacking En Francais – Cours De… 376.62 KB
Ethical Hacking And Countermeasures.pdf.7z 275.82 KB
Ethical Hacking.pdf.7z 12.82 MB
Extensions Personnalisees Pour IPTables.pdf.7z 1.1 MB
Faille XSS.txt 4 KB
Forensics Analysis Of Hacking Cases.pdf.7z 493.17 KB
Game Hacking.pdf.7z 1.6 MB
Google Hack.pdf 2.85 MB
Guide De Securite.pdf.7z 195.52 KB
Hack I.T.pdf 12.27 MB
Hack It Security Through Penetration Testing.pdf.7z 9.06 MB
Hack Proofing Your Network .pdf 2.95 MB
Hack Proofing Your Network Internet Tradecraft.pdf.7z 2.48 MB
Hackademy – Cours 3.pdf 31.35 KB
Hackademy.hs2.rar 9.7 MB
Hackademy.Magazine.Hors Serie.N1.rar 12.8 MB
Hackademy_cours_anonymat.PDF 2.25 MB
Hacker’s Handbook.pdf 278.04 KB
Hacker.news.magazine.N21.French.Ebook.rar 22.78 MB
Hacker_Mag_N_20_MtBlog.rar 14.97 MB
HackernewsmagazineN18.rar 32.1 MB
Hacking – The Art Of Exploitation.chm.7z 1.4 MB
Hacking For Profit.pdf.7z 560.24 KB
Hacking GMail.pdf 5.29 MB
Hacking Into Computer Systems.pdf.7z 552.98 KB
Hacking Intranet Website From The Outside.pdf.7z 5.4 MB
Hacking jBoss.pdf.7z 457.65 KB
Hacking Leopard.pdf.7z 942.4 KB
Hacking Mashing Gluing.pdf.7z 1.81 MB
Hacking Matter.pdf.7z 2.13 MB
Hacking Offences.pdf.7z 108 KB
Hacking Practices And Software Development.pdf.7z 1.67 MB
Hacking Primes.pdf.7z 1.51 MB
Hacking Secrets Revealed.pdf.7z 437.66 KB
Hacking Securite Hand-Book.pdf.7z 2.48 MB
Hacking The Frozen WASTE For Cool Objects.pdf.7z 47.52 KB
Hacking The Genome.pdf.7z 258.74 KB
Hacking The Windows Regisrty.pdf 221.84 KB
Hacking The Windows Registry.pdf.7z 167.34 KB
How Hackers Do It.pdf.7z 61.88 KB
How To Make Key Generators.pdf.7z 6.78 KB
How To Steal An Election By Hacking The Vote.pdf.7z 2.84 MB
Injection SQL Part II.html 295 bytes
Injection SQL.html 287 bytes
Kevin_Mitnick_-_The_Art_of_Intrusion.rar 1.17 MB
L’ethique Hacker De Pekka Himanen.pdf.7z 39.44 KB
Le Vrai Visage De La Matrice.pdf.7z 33.23 KB
Les .htaccess.txt 6.77 KB
Les Dumps Memoires.pdf.7z 1.33 MB
Les Systemes De Detection D’intrusion Vus De L’interieur.pdf.7z 642.2 KB
Menace 650.pdf 50.08 KB
Microsoft SQL Server Passwords.pdf.7z 105.2 KB
More Than 40 Million Credit And Debit Card Numbers Stolen.pdf.7z 27.35 KB
O’Reilly – Network Security with OpenSSL Ebook – Fly.rar 1.29 MB
O’Reilly.-.Network.Security.Hacks.rar 1.61 MB
offensive-security-labs-os-2402.pdf 5.98 MB
Offensive-Security.pdf 154.86 KB
Preventing Web App Hacking.pdf.7z 89.55 KB
Righttoleft Override.pdf.7z 833.79 KB
Rootkits Sous Oracle.pdf.7z 739.1 KB
Secrets of a Hacker.pdf 711.74 KB
Securing IIS By Breaking.pdf.7z 23.81 KB
Securing-Optimizing-Linux-RH-Edition-v1.3.pdf 4.9 MB
Securiser Ses Serveurs Avec Les Tests De Vulnerabilites.pdf.7z 1.05 MB
Securite Informatique Principes Et Methode.pdf.7z 1.85 MB
Security IIS.pdf 31 KB
Security_Plus_Fast_Pass_-_Sybex.pdf 5.75 MB
Steganographie – Techniques.pdf.7z 798.61 KB
Tests d’Intrusion Des Acces Internet.pdf.7z 100.38 KB
Tests De Penetration Internes.pdf.7z 233.13 KB
The Hackademy Prog n1 Ebook Fr-Library.pdf 34.13 MB
The Hackers Handbook 2.pdf.7z 209.52 KB
The Hackers Handbook.pdf.7z 11.24 MB
The Performance Of Technology.pdf.7z 84.75 KB
The Web Hacking Incidents Database Annual Report 2007.pdf.7z 445.32 KB
They are Hacking Our Clients.pdf.7z 191.58 KB
Thinking Like A Hacker.pdf.7z 30.92 KB
Zi Hackademy – Cours 1.pdf 35.93 KB
Zi Hackademy – Cours 2.pdf 50.3 KB
Security and Hacking Books 03
[0 – List].txt 4.7 KB
Advanced Exploitation Of Buffer Overflow.pdf.7z 241.25 KB
ASLR Smack.pdf.7z 443.29 KB
ASLR.pdf.7z 207.67 KB
Attacking The DNS Protocol.pdf.7z 309.61 KB
Attaque Man In The Middle Sur La Connexion Chiffree De Jabber.pdf.7z 443.45 KB
Attaque Par Factorisation Contre RSA.pdf.7z 353.68 KB
CERTA – Securite Des Reseaux Sans Fil.pdf.7z 54.87 KB
CERTA – Sécurité Des Applications Web Et Vulnérabilité De Type Injection De Données.pdf.7z 36.48 KB
Comment Contourner La Protection Aleatoire De La Pile Sur Le Noyau 2.6.pdf.7z 887.4 KB
Cracking SQL Passwords.pdf 160.12 KB
Creation De Portes Derobees Sophistiquees Sous Linux – Reniflage De Paquets.pdf.7z 304.45 KB
Creation Des Shellcodes Sous Architecture Linux x86.pdf.7z 60.47 KB
Creer Un Shellcode Polymorphique.pdf.7z 1.38 MB
Cross-Site Tracing (XST).pdf.7z 195.55 KB
Cryptographie Classique – Exercice 1.pdf.7z 14.02 KB
En Memoire Aux Timing Attacks.pdf.7z 524.16 KB
Exploitation Avancee Buffer Overflow.pdf.7z 892.28 KB
Exploitation Et Defense Des Applications Flash.pdf.7z 657.34 KB
Feed Injection In Web 2.0.pdf.7z 107.03 KB
Google Dangereux – A La Recherche Des Informations Confidentielles.pdf.7z 1.88 MB
Google Hacking Of Oracle Technologies V1.02.pdf.7z 38.28 KB
Google Hacking.pdf.7z 3.77 MB
Google Hacks.pdf.7z 2.43 MB
GSM – Qui Peut Ecouter Mon Portable.pdf.7z 435.32 KB
Guide De Securite PHP 1.0.pdf.7z 195.53 KB
Hacking Bluetooth Enabled Mobile Phones And Beyond.pdf.7z 295.55 KB
Hacking Du Noyau Et Anti-Forensics.pdf.7z 296.48 KB
Hacking Gmail.pdf.7z 2.59 MB
Hacking The Invisible Network.pdf.7z 281.71 KB
Hacking VoIP Exposed.pdf.7z 3.49 MB
Hacking Web Applications Using Cookie Poisoning.pdf.7z 129.2 KB
How To Make Keygens.pdf 9.6 KB
Image Anti-bot Et Fichier Wav .pdf.7z 134.4 KB
Ingenierie Inverse Du Code Executable ELF Dans L’analyse Apres Intrusion.pdf.7z 181.62 KB
Injection HTML Hackin9.pdf.7z 909.33 KB
Injections SQL Les bases.pdf.7z 156.81 KB
Introduction Aux Audits De Sécurités Dans Des Applications.pdf.7z 252.15 KB
Introduction Aux Vulnérabilités Web.pdf.7z 219.6 KB
Invisibilite Des Rootkits.pdf.7z 452.79 KB
Le Phishing.pdf.7z 579.07 KB
Le Scannage De Ports Vu Par L’administrateur.pdf.7z 165.36 KB
Linux Security Modules – General Security Hooks For Linux.pdf.7z 57 KB
NC commands.pdf 76.95 KB
Netcat tuto.txt 7.32 KB
Netcat.txt 14.27 KB
Securite Wi-Fi – WEP WPA et WPA2.pdf.7z 696.51 KB
Securites Des Comptes Sous Unix.pdf.7z 128.39 KB
Shell Netcat.txt 1.37 KB
Shells Restreints – Comment Les Detourner.pdf.7z 531.91 KB
Systemes Includes Secure.pdf.7z 87.64 KB
Sécurisation Script PHP et Mysql.pdf.7z 310.06 KB
Type-Assisted Dynamic Buffer Overflow Detection.pdf.7z 57.88 KB
Unixgarden – Techniques Obfuscation De Code – Chiffrer Du Clair Avec Du Clair.pdf.7z 306.02 KB
Unixgarden – Timing Attack Et Hyperthreading.pdf.7z 302.59 KB
Vulnerabilités De Type Format String.pdf.7z 436.22 KB
Yahoo Hacking Of Oracle Technologies.pdf.7z 40.21 KB
Security and Hacking Books 04
1. addison wesley – advanced programming languages design.pdf 1.22 MB
2. compiler construction manual.pdf 2.15 MB
3. compilers and compiler generators in C++.pdf 1.18 MB
4. morgan kaufmann – engineering a compiler (Draft).pdf 2.59 MB
5. Algorithms For Compiler Design.pdf 12.67 MB
Art of Intel x86 Assembly.pdf 4.28 MB
DEFCON-18-Ahmad-WPA-Too.pdf 1004.99 KB
O’Reilly – Practical C Programming, 3Rd Edition.pdf 5.87 MB
Prentice Hall – Expert C Programming – Deep C Secretes.pdf 2.15 MB
Prentice Hall – The ANSI C Programming Language 2nd ed. by Brian W. Kernighan and Dennis M…. 2.77 MB
The Art Of Assembly Language Programming.pdf 19.39 MB
Low Tech Hacking -Street Smarts for Security Professionals [NepsterJay].pdf 31.59 MB
Low.Tech.Hacking.epub 3.59 MB
Low.Tech.Hacking.pdf 7.65 MB

សូមធ្វើការទាញយកតាមរយៈតណភ្ជាប់ខាងក្រោម៖

 

Show More

Phannarith

Mr. OU Phannarith is one of the well-known cybersecurity experts in Cambodia and the region. He is the founder of the first leading information security website (www.secudemy.com) in Cambodia. He has been invited to present in global conferences, forums, and seminars and he was awarded in Information Security Leadership Achievements (ISLA) in 2016 by (ISC)2 and in December 2012 as one of the top 10 Chief Information Security Officers (CISO) in ASEAN by the International Data Group (IDG). Mr. OU has been the Professor specializing in Cybersecurity.

Related Articles

Back to top button