Home

Awesome

Hacking-Security-Ebooks

To Download all PDF eBooks, please <a href="https://www.yeahhub.com/biggest-hacking-security-ebooks-collection-free-download/" target="_blank">click here</a>.

<table width="100%" class="table"> <tr> <th>S.No</th> <th>E-Book (PDF Link)</th> <th>Total Pages</th> </tr> <tr><td>1.</td><td>Advanced Penetration Testing</td><td>269 Pages</td></tr> <tr><td>2.</td><td>The Basics of Web Hacking</td><td>179 Pages</td></tr> <tr><td>3.</td><td>The Basics of Hacking and Penetration Testing</td><td>178 Pages</td></tr> <tr><td>4.</td><td>The Art of Deception by Kevin Mitnick</td><td>577 Pages</td></tr> <tr><td>5.</td><td>SQL Injection Attacks and Defense</td><td>761 Pages</td></tr> <tr><td>6.</td><td>Metasploit - The Penetration Tester's Guide</td><td>332 Pages</td></tr> <tr><td>7.</td><td>Ethical Hacking and Penetration Testing Guide</td><td>523 Pages</td></tr> <tr><td>8.</td><td>Network Attacks and Exploitation - A Framework</td><td>219 Pages</td></tr> <tr><td>9.</td><td>Python Web Penetration Testing Cookbook</td><td>224 Pages</td></tr> <tr><td>10.</td><td>Wireshark for Security Professionals</td><td>391 Pages</td></tr> <tr><td>11.</td><td>Mastering Modern Web Penetration Testing</td><td>298 Pages</td></tr> <tr><td>12.</td><td>The Shellcoder's Handbook</td><td>745 Pages</td></tr> <tr><td>13.</td><td>The Little Black Book of Computer Viruses</td><td>183 Pages</td></tr> <tr><td>14.</td><td>XSS Attacks - Cross Site Scripting Exploits and Defense</td><td>482 Pages</td></tr> <tr><td>15.</td><td>The Web Application Hacker's Handbook</td><td>771 Pages</td></tr> <tr><td>16.</td><td>Ethical Hacking and Countermeasures</td><td>239 Pages</td></tr> <tr><td>17.</td><td>Reversing - Secrets of Reverse Engineering</td><td>619 Pages</td></tr> <tr><td>18.</td><td>Network Security Bible</td><td>697 Pages</td></tr> <tr><td>19.</td><td>Hacking Web Applications - Hacking Exposed</td><td>416 Pages</td></tr> <tr><td>20.</td><td>Hacking for Dummies</td><td>387 Pages</td></tr> <tr><td>21.</td><td>Hacking Wireless Network for Dummies</td><td>387 Pages</td></tr> <tr><td>22.</td><td>Ninja Hacking - Unconventional Penetration Testing Tacting and Techniques</td><td>314 pages</td></tr> <tr><td>23.</td><td>Professional Penetration Testing</td><td>525 Pages</td></tr> <tr><td>24.</td><td>Gray Hat Hacking - The Ethical Hacker's Handbook</td><td>577 Pages</td></tr> <tr><td>25.</td><td>Hack Attacks Testing</td><td>561 Pages</td></tr> <tr><td>26.</td><td>Basic Security Testing with Kali Linux</td><td>242 Pages</td></tr> <tr><td>27.</td><td>Mastering Kali Linux for Advanced Penetration Testing</td><td>356 Pages</td></tr> <tr><td>28.</td><td>Kali Linux CTF Blueprints</td><td>190 Pages</td></tr> <tr><td>29.</td><td>Kali Linux Cookbook</td><td>261 Pages</td></tr> <tr><td>30.</td><td>Kali Linux - Assuring Security by Penetration Testing</td><td>454 Pages</td></tr> <tr><td>31.</td><td>Information Security Management Handbook</td><td>3206 Pages</td></tr> <tr><td>32.</td><td>Computer and Information Security Handbook</td><td>877 Pages</td></tr> <tr><td>33.</td><td>CISSP - Certified Information Systems Security Professional</td><td>804 Pages</td></tr> <tr><td>34.</td><td>Computer Security and Cryptography</td><td>542 Pages</td></tr> <tr><td>35.</td><td>Python for Kids</td><td>348 Pages</td></tr> <tr><td>36.</td><td>End to End Network Security - Defense-in-Depth</td><td>469 Pages</td></tr> <tr><td>37.</td><td>A Guide to Computer Network Security</td><td>483 Pages</td></tr> <tr><td>38.</td><td>Essential Computer Security</td><td>321 Pages</td></tr> <tr><td>39.</td><td>Security in Wireless Mesh Networks</td><td>548 Pages</td></tr> <tr><td>40.</td><td>Hacking Windows XP (OLD)</td><td>379 Pages</td></tr> <tr><td>41.</td><td>Hacking Exposed - Windows Security, Secrets and Solutions</td><td>482 Pages</td></tr> <tr><td>42.</td><td>Hacking Exposed - Network Security, Secrets and Solutions</td><td>736 Pages</td></tr> <tr><td>43.</td><td>Information Security - Principles and Pratice</td><td>413 Pages</td></tr> <tr><td>44.</td><td>Nessus, Snort and Ethereal Power Tools</td><td>472 Pages</td></tr> <tr><td>45.</td><td>Active Defense - A Comprehensive Guide to Network Security</td><td>374 Pages</td></tr> <tr><td>46.</td><td>Information Security Fundamentals</td><td>262 Pages</td></tr> <tr><td>47.</td><td>Wireless Network Security</td><td>422 Pages</td></tr> <tr><td>48.</td><td>Red Hat Linux Security and Optimization</td><td>721 Pages</td></tr> <tr><td>49.</td><td>Windows Forensics Analysis</td><td>386 Pages</td></tr> <tr><td>50.</td><td>Mobile and Wireless Network Security and Privacy</td><td>232 Pages</td></tr> <tr><td>51.</td><td>Firewalls and Internet Security</td><td>456 Pages</td></tr> <tr><td>52.</td><td>An Introduction to Computer Security - The NIST Handbook</td><td>290 Pages</td></tr> <tr><td>53.</td><td>Unauthorized Access - Physical Penetration Testing for IT Security Teams</td><td>309 Pages</td></tr> <tr><td>54.</td><td>Testing Web Security</td><td>297 Pages</td></tr> <tr><td>55.</td><td>Maximum Security - A Hacker's Guide to Protecting Your Internet Site and Network</td><td>670 Pages</td></tr> <tr><td>56.</td><td>Information Resource Guide - Computer, Internet and Network Systems Security</td><td>325 Pages</td></tr> <tr><td>57.</td><td>The Hacker's Underground Handbook</td><td>116 Pages</td></tr> <tr><td>58.</td><td>Guide to SCADA and Industrial Control Systems Security</td><td>164 Pages</td></tr> <tr><td>59.</td><td>The International Handbook of Computer Security</td><td>274 Pages</td></tr> <tr><td>60.</td><td>The Code Book - How to Make It, Break It, Hack It, Crack It</td><td>273 Pages</td></tr> <tr><td>61.</td><td>Linux 101 Hacks</td><td>271 Pages</td></tr> <tr><td>62.</td><td>Introduction to Linux - A Hands on Guide</td><td>223 Pages</td></tr> <tr><td>63.</td><td>Bluetooth Security</td><td>222 Pages</td></tr> <tr><td>64.</td><td>IT Governance - A Manager's Guide to Data Security and ISO 27001/27002</td><td>385 Pages</td></tr> <tr><td>65.</td><td>Batch File Programming</td><td>155 Pages</td></tr> <tr><td>66.</td><td>Cracking the Coding Interview</td><td>310 Pages</td></tr> <tr><td>67.</td><td>Dictionary of Networking</td><td>465 Pages</td></tr> <tr><td>68.</td><td>Hacking Gmail</td><td>310 Pages</td></tr> <tr><td>69.</td><td>Linux Complete Command Reference</td><td>1528 Pages</td></tr> <tr><td>70.</td><td>Practical Hacking Techniques and Countermeasures</td><td>752 Pages</td></tr> <tr><td>71.</td><td>The Art of Intrusion by Kevin Mitnick</td><td>291 Pages</td></tr> <tr><td>72.</td><td>Hack Notes - Windows Security Portable Reference</td><td>289 Pages</td></tr> <tr><td>73.</td><td>Hacking - The Next Generation</td><td>298 Pages</td></tr> <tr><td>74.</td><td>Hacking the Cable Modem</td><td>330 Pages</td></tr> <tr><td>75.</td><td>Hackers Beware - Defending Your Network From The Wiley Hacker</td><td>817 Pages</td></tr> <tr><td>76.</td><td>Hack Proofing Your Network</td><td>826 Pages</td></tr> <tr><td>77.</td><td>Hack Attacks Revealed</td><td>837 Pages</td></tr> <tr><td>78.</td><td>Dissecting the Hack - The F0rb1dd3n Network</td><td>441 Pages</td></tr> <tr><td>79.</td><td>TCP/IP Guide</td><td>1671 Pages</td></tr> <tr><td>80.</td><td>Offensive Security - Wireless Attacks - WiFu</td><td>385 Pages</td></tr> <tr><td>81.</td><td>Google Hacking - For Penetration Testers</td><td>529 Pages</td></tr> <tr><td>82.</td><td>Computer Forensics Investigating Network Intrusions and Cyber Crime</td><td>394 Pages</td></tr> <tr><td>83.</td><td>Hakin9 Bible</td><td>207 Pages</td></tr> <tr><td>84.</td><td>Network Forensics - Tracking Hackers Through Cyberspace</td><td>574 Pages</td></tr> <tr><td>85.</td><td>Computer Forensics - Investigating Data and Image Files</td><td>227 Pages</td></tr> <tr><td>86.</td><td>Penetration Testing and Network Defense</td><td>625 Pages</td></tr> <tr><td>87.</td><td>Hacking Exposed - Malware and Rootkits</td><td>401 Pages</td></tr> <tr><td>88.</td><td>Malware Analyst's Cookbook</td><td>746 Pages</td></tr> <tr><td>89.</td><td>Mobile Malware - Attacks and Defense</td><td>386 Pages</td></tr> <tr><td>90.</td><td>Java 2 Network Security</td><td>702 Pages</td></tr> <tr><td>91.</td><td>A Bug Hunter's Diary</td><td>212 Pages</td></tr> <tr><td>92.</td><td>Viruses Revealed - Understand and Counter Malicious Software</td><td>721 Pages</td></tr> <tr><td>93.</td><td>Figital Forensics With Open Source Tools</td><td>289 Pages</td></tr> <tr><td>94.</td><td>SSH, The Secure Shell - The Definitive Guide</td><td>438 Pages</td></tr> <tr><td>95.</td><td>Pro PHP Security</td><td>369 Pages</td></tr> <tr><td>96.</td><td>Zero Day Exploit - Countdown to Darkness</td><td>363 Pages</td></tr> <tr><td>97.</td><td>Metasploit Penetration Testing Cookbook</td><td>269 Pages</td></tr> <tr><td>98.</td><td>24 Deadly Sins of Software Securtiy</td><td>433 Pages</td></tr> <tr><td>99.</td><td>Botnets - The Killer Web App</td><td>482 Pages</td></tr> <tr><td>100.</td><td>Hacker Highschool - Hack School for Beginners (ZIP)</td><td>12 Books</td></tr> </table>

For any broken link, please drop a mail at yeahhub@gmail.com