#webscene

#The biggest in small world

Tutorials published by nimaarek

Windows NT/2000 Native API Reference

# Windows NT/2000 Native API Reference

Windows NT/2000 Native API Reference is absolutely unique. Currently, documentation on WIndows NT's native APIs can only be foun...

Android Security: Attacks and Defenses

# Android Security: Attacks and Defenses

Android Security: Attacks and Defenses is for anyone interested in learning about the strengths and weaknesses of the Android pl...

The Shellcoder's Handbook: Discovering and Exploit

# The Shellcoder's Handbook: Discovering and Exploit

- Examines where security holes come from, how to discover them, how hackers exploit them and take control of systems on a daily...

Android Security Internals

# Android Security Internals

There are more than one billion Android devices in use today, each one a potential target. Unfortunately, many fundamental Andro...

Identifying Malicious Code Through Reverse Enginee

# Identifying Malicious Code Through Reverse Enginee

Attacks take place everyday with computers connected to the internet, because of worms, viruses or due to vulnerable software. T...

Android Security Cookbook

# Android Security Cookbook

Android Security Cookbook' breaks down and enumerates the processes used to exploit and remediate Android app security vulnerabi...

Secure Coding in C and C++

# Secure Coding in C and C++

Learn the Root Causes of Software Vulnerabilities and How to Avoid Them Commonly exploited software vulnerabilities are usually...

Android Malware

# Android Malware

Mobile devices, such as smartphones, have achieved computing and networking capabilities comparable to traditional personal comp...

Android Application Security Essentials

# Android Application Security Essentials

Security has been a bit of a hot topic with Android so this guide is a timely way to ensure your apps are safe. Includes everyth...

Rootkits : Subverting the Windows Kernel

# Rootkits : Subverting the Windows Kernel

This book is an essential read for anyone responsible for Windows security. Security professionals, Windows system administrator...

Application Security for the Android Platform

# Application Security for the Android Platform

With the Android platform fast becoming a target of malicious hackers, application security is crucial. This concise book provid...

19 Deadly Sins of Software Security

# 19 Deadly Sins of Software Security

This essential book for all software developers~~regardless of platform, language, or type of application~~outlines the “19 dead...

Sockets, Shellcode, Porting & Coding

# Sockets, Shellcode, Porting & Coding

The book is logically divided into 5 main categories with each category representing a major skill set required by most security...

The Art of Software Security Assessment

# The Art of Software Security Assessment

This is one of the most detailed, sophisticated, and useful guides to software security auditing ever written. The authors are l...

Metasploit Toolkit for Penetration Testing, Exploi

# Metasploit Toolkit for Penetration Testing, Exploi

This book discusses how to use the Metasploit Framework (MSF) as an exploitation platform. The book begins with a detailed discu...