#webscene

#The biggest in small world

Tutorials published by nimaarek

Windows NT/2000 Native API Reference

# Windows NT/2000 Native API Reference

Windows NT/2000 Native API Reference is absolutely unique. Currently, documentation on WIndows NT's native APIs can only be foun...

Android Security: Attacks and Defenses

# Android Security: Attacks and Defenses

Android Security: Attacks and Defenses is for anyone interested in learning about the strengths and weaknesses of the Android pl...

The Shellcoder's Handbook: Discovering and Exploit

# The Shellcoder's Handbook: Discovering and Exploit

- Examines where security holes come from, how to discover them, how hackers exploit them and take control of systems on a daily...

Android Security Internals

# Android Security Internals

There are more than one billion Android devices in use today, each one a potential target. Unfortunately, many fundamental Andro...

Identifying Malicious Code Through Reverse Enginee

# Identifying Malicious Code Through Reverse Enginee

Attacks take place everyday with computers connected to the internet, because of worms, viruses or due to vulnerable software. T...

Android Security Cookbook

# Android Security Cookbook

Android Security Cookbook' breaks down and enumerates the processes used to exploit and remediate Android app security vulnerabi...

Secure Coding in C and C++

# Secure Coding in C and C++

Learn the Root Causes of Software Vulnerabilities and How to Avoid Them Commonly exploited software vulnerabilities are usually...

Android Application Security Essentials

# Android Application Security Essentials

Security has been a bit of a hot topic with Android so this guide is a timely way to ensure your apps are safe. Includes everyth...

Android Malware

# Android Malware

Mobile devices, such as smartphones, have achieved computing and networking capabilities comparable to traditional personal comp...

Rootkits : Subverting the Windows Kernel

# Rootkits : Subverting the Windows Kernel

This book is an essential read for anyone responsible for Windows security. Security professionals, Windows system administrator...

Application Security for the Android Platform

# Application Security for the Android Platform

With the Android platform fast becoming a target of malicious hackers, application security is crucial. This concise book provid...

19 Deadly Sins of Software Security

# 19 Deadly Sins of Software Security

This essential book for all software developers~~regardless of platform, language, or type of application~~outlines the “19 dead...

Sockets, Shellcode, Porting & Coding

# Sockets, Shellcode, Porting & Coding

The book is logically divided into 5 main categories with each category representing a major skill set required by most security...

Metasploit Toolkit for Penetration Testing, Exploi

# Metasploit Toolkit for Penetration Testing, Exploi

This book discusses how to use the Metasploit Framework (MSF) as an exploitation platform. The book begins with a detailed discu...

The Art of Software Security Assessment

# The Art of Software Security Assessment

This is one of the most detailed, sophisticated, and useful guides to software security auditing ever written. The authors are l...