- Windows_XP_Hacks_2nd.edition
- Hacking Exposed VoIP: Voice Over IP Security Secrets & Solutions
- The Database Hacker's Handbook
- Quantum malware
- Malware analysis for windows administrators
- Disassembled Code Analyzer for Malware (DCAM)
- Cryptography and Security Services: Mechanisms and Applications
- Hacking Exposed Web 2.0 : Web 2.0 Security Secrets and Solutions
- NMAP Secret Training Course
- Security Education, Awareness and Training
- Using Google Hacking to Enhance Defense Strategies
- Securing Biometrics Applications
- Hacking_GMail
- The changing face of malware
- Defacing websites via SQL injection
- 2008 security predictions roll in
- Advanced SQL Injection In SQL Server Applications
- [Ebook] Wireless Crime and Forensic Investigation
- Hacking: The Art of Exploitation, 2nd Edition
- Microsoft Forefront Security Administration Guide
- Information Security Management Handbook, Sixth Edition, Volume 2
- [PDF] Gray Hat Hacking, Second Edition
- Vulnerabilities in Not-So-Embedded Systems
- Session ID Brute Force Exploitation
- Anti Brute Force Resource Metering
- 108_1009 สารพันฟัญหาคอมพิวเตอร์ รวมวิธีแก้ไว้ที่นี่หมดแล้ว
- Practical Internet Security
- Pro Php security
- The Craft of System Security
- SocksCap Tutorial
- socket,shellcode,porting and coding revers engineer exploits and tool
- [Thai] เจาะระบบ TCP-IP
- Rootkits Analysis and Detection
- [PDF] Metasploit Toolkit
- Virtual Honeypots: From Botnet Tracking to Intrusion Detection
- Handbook of Research on Wireless Security
- Google Apps Hacks
- Hacking the IT Cube: The Information Technology Department Survival Guide
- LAN Switch Security
- Crimeware: Understanding New Attacks and Defenses
- Foundations of Mac OS X Leopard Security (Books for Professionals by Professionals)
- Software Security Engineering: A Guide for Project Managers
- Windows Server 2008 Security Resource Kit
- เอาหนังสือมาแบ่งให้อ่าน 8 เล่ม ( hacking e-books )
- Cybersecurity Operations Handbook
- Fuzzing: Brute Force Vulnerability Discovery
- ~ lateral SQL Injection ~
- ~ Cursor Injection ~
- Security and Quality of Service in Ad Hoc Wireless Networks
- hacking ebook
- web hack
- Software Security: Building Security In
- Preventing Web Attacks with Apache
- Intrusion Detection Systems (Advances in Information Security)
- Perl Hacks - Tips And Tools For Programming Debugging And Surviving (2006)
- No Tech Hacking: A Guide to Social Engineering, Dumpster Diving, and Shoulder Surfing
- Nmap in the Enterprise: Your Guide to Network Scanning
- SQL injection attrack for Oracle Developers
- รวม Ebook ด้าน Computer Security หายากต่างๆเกือบ 70 เรื่อง
- 1000 hacking tutorials- The Best of 2008
- [PDF] Hacker's Challenge : Test Your Incident Response Skills Using 20 Scenarios
- Big Book of Windows Hacks (PDF)
- อยากเป็นHACKERต้องมี The Most Wanted Hacking Books
- Crackers Matrix (Ebooks)
- Hacker Debugging Uncovered (Uncovered series)
- HACKING SECRETS REVEALED (ควาลับของแฮกเกอร์) file.pdf Eng.
- Linux Server Hacks: 100 Industrial-Strength Tips and Tools
- Hacking GPS
- Hacking Windows XP
- Kismet Hacking
- Wardriving & Wireless Penetration Testing
- Network Security: Know It All
- [PDF] Insider Attack and Cyber Security: Beyond the Hacker
- XML Security
- Active Defense: A Comprehensive Guide to Network Security
- Hack Attacks Denied: Complete Guide to Network LockDown
- Crackproof Your Software: Protect Your Software Against Crackers
- Access Denied: The Practice and Policy of Global Internet Filtering
- Hacking Exposed Linux (Third Edition)
- Guide to Computer Network Security
- Hardware-based Computer Security Techniques to Defeat Hackers: From Biometrics to Quantum Cryptography
- SAP Security Configuration and Deployment: The IT Administrator's Guide to Best
- Next Generation SSH2 Implementation: Securing Data in Motion
- Security Monitoring: Proven Methods for Incident Detection on Enterprise Networks
- Web Security Testing Cookbook: Systematic Techniques to Find Problems Fast
- Wi-Foo: The Secrets of Wireless Hacking
- ~Google Hacking for Penetration Testers, Volume 2 (Paperback)~
- Getting Started with IDA Pro Guide
- Ebook reverse engineer ที่เน้นเกี่ยวกับ protection(packer)
- เหล่าเซียนไม่ควรพลาด +++คู่มือแฮก+++ Counter Hack Reloaded: Step-by-Step Guide to Computer Attack
- THe Best 42 Books H4cking Collection !!!
- +++New eBook!!! Hacking Exposed, 6th Edition (Jan.2009)
- Web 2.0 Security - Defending AJAX, RIA, AND SOA
- How To Hack A Coke Machine
- Shellcoder’s Programming Uncovered [E-book]
- [E-book]Writing security tools and exploits (eng) -James C. Foster
- E-Book Hack Windows XP 2009
- Buffer Overflow Complete
- Hacking - The Art of Exploitation 2nd Edition Live CD
- Hacking Wireless Networks for Dummies
- Mafiaboy: How I Cracked the Internet and Why It's Still Broken
- Chained Exploits: Advanced Hacking Attacks from Start to Finish
- Open Source E-mail Security
- Mastering Windows Network Forensics and Investigation
- Cain & Abel Crack MySQL old_password using Rainbow Table
- GOOGLE HACK FOR PEN TEST
- Security Warrior
- Ebook - Debugging with GDB
- The Mac Hacker's Handbook
- Hacking Exposed 6th Network Security Secrets and Solutions
- Malicious Bots: An Inside Look into the Cyber-Criminal Underground of the Internet
- สอน Sniffing Cleartext Passwords ด้วย Cain and Abel กับเว็ป....
- Stopping Spyware: Protecting Your Computer, Your Data, and Your Privacy
- Linux 101 Hacks
- Computer Network Security: Theory and Practice
- Hacking VoIP:Protocols, Attacks, and Countermeasures
- [PDF] Advanced Windows Debugging
- Hacking Ebooks
- (X)cross-Site Scripting
- Hack Proofing XML
- Cyberspace Security and Defense
- Hacking: The Next Generation
- SQL Injection Attacks and Defense
- Hacking Exposed Computer Forensics, Second Edition: Computer Forensics Secrets & Solutions
- CEH Certified Ethical Hacker Certification Exam 2009
- Hacking Exposed Malware and Rootkits
- Cloud Security and Privacy
- The Hackers Underground Handbook
- E-book HACKING SECRETS
- 24 Deadly Sins of Software Security: Programming Flaws and How to Fix Them
- HAKiN9 Magazine 2010-04
- แจกอีบุค HITB Magazine (Hack In the Box Magazine)
- clip บทสัมภาษณ์ Steven Levy ผู้เขียนหนังสือด้าน Hacker เล่มแรกของโลก