๐ŸŽฉ [penetration testing Book], Kali Magic, Cryptography, Hash Crack, Botnet, Rootkit, Malware, Spyware, Python, Go, C|EH.

BuggerBag BuggerBag Last update: Sep 01, 2022

penetration testing Book๐ŸŽฉ (2020, 2021, old best ever)

๐Ÿ•(search book in our repo,click following link) https://dry-coast-59035.herokuapp.com

Hi, every one

We have collected a series of books that are new and useful, they are also paid on online sites, but we put some of them here for free

โš ๏ธ Attention โš ๏ธ

So that such books do not fall into the hands of everyone and are not used criminally, We decided to encrypt all books and protect the rights of publishers. This internet link (git page) has been created to help the growth of science and to be used only in positive directions. The publishers of this link are not members of any organization or group and have scientific purposes.

โ˜• Practical Binary Analysis

https://practicalbinaryanalysis.com/
https://github.com/nakov/practical-cryptography-for-developers-book

Our Books๐Ÿ‘Œ

โ˜•new Books ๐Ÿฉ ๐Ÿฉ ๐Ÿฉ

โ˜•No Strach Press Books ๐Ÿฉ ๐Ÿฉ ๐Ÿฉ

Big thank's to My best Friend "Oysten" from Norway

We do not violate copyright law, so publishers can contact us by email. The purpose of this work is to help researchers in the field of security and the growth of science and nothing else.

[email protected] ๐Ÿ‡ฎ๐Ÿ‡ท or [email protected] ๐Ÿ‡ณ๐Ÿ‡ด

(If you are an author, be sure to enter the phrase "I am the author" in the subject line of your email)

โ˜•use CTRL+F to find your book then go to repo & clone it.

Main dir

โ™– Advanced Penetration Testing - Hacking the World_s Most Secure Networks by Wil Allsopp
โ™– Android_Malware_and_Analysis
โ™– Attacking-Network-Protocols-A-Hacker-s-Guide-to-Capture-Analysis-and-Exploitation
โ™– Automate the Boring Stuff with Python - Practical Programming for Total Beginners by Al Sweigart
โ™– Black Hat Python - Python Programming for Hackers and Pentesters by Justin Seitz
โ™– Black-Hat-Go_Go-Programming-For-Hackers-and-Pentesters
โ™– Computer Security and Cryptography
โ™– crackingcodeswithpython
โ™– cryptography and network security by William Stallings 5th edition
โ™– Cryptography-and-network-security-principles-and-practice 7th edition
โ™– Ethical Hacking With Kali Linux - Learn Fast How To Hack Like A Pro by HUGO HOFFMAN
โ™– Ghost in the Wires - My Adventures as the World_s Most Wanted Hacker by Kevin Mitnick
โ™– Hash Crack
โ™– Information Security Principles and Practice 2nd Edition - Stamp
โ™– Linux Basics for Hackers - Getting Started with Networking, Scripting, and Security in Kali by OccupyTheWeb
โ™– Metasploit - The Penetration Tester_s Guide by David Kennedy
โ™– No.Starch.The.Tangled.Web.Nov.2011
โ™– Penetration Testing A Hands-On Introduction to Hacking by Georgia Weidman
โ™– Practical.Binary.Analysis.2018
โ™– Practical_Malware_Analysis
โ™– Real-World Bug Hunting - A Field Guide to Web Hacking by Peter Yaworski
โ™– Rootkits and Bootkits Reversing Modern Malware and Next Generation Threats
โ™– Rtfm - Red Team Field Manual 1.0 Edition by Ben Clark
โ™– Secure by Design
โ™– Serious Cryptography A Practical Introduction to Modern Encryption
โ™– The Hacker Playbook 2
โ™– The Hacker Playbook 3 - Practical Guide To Penetration Testing by Peter Kim
โ™– The Hacker Playbook Practical Guide To Penetration Testing 2014
โ™– The Practice of Network Security Monitoring
โ™– thecarhackershandbook
โ™– The_Art_of_Human_Hacking
โ™– Wireshark for Security Professionals

SandBox dir

โ™˜ 16 18 Hacking botnet by Unknown
โ™˜ A Bug Hunters Diary - A Guided Tour Through the Wilds of Software Security by Tobias Klein
โ™˜ Absolute OpenBSD UNIX for the practical paranoid by Michael W. Lucas
โ™˜ Android Security Internals An In-Depth Guide to Androidโ€™s Security Architecture by Nikolay Elenkov
โ™˜ Attack of the 50 Foot Blockchain Bitcoin, Blockchain, Ethereum Smart Contracts by David Gerard
โ™˜ Autotools A Practitioners Guide to GNU Autoconf, Automake, and Libtool by John Calcote
โ™˜ Beginning Ethereum Smart Contracts Programming. With Examples in Python, Solidity and JavaScript by Wei-Mengย Lee
โ™˜ Black Hat Physical Device Security Exploiting Hardware and Software by Drew Miller, Rob Shein, Michael Bednarczyk, Black Hat Services
โ™˜ Botnets The Killer Web Applications by Craig A Schiller David Harley Gadi Evron Carsten Willems Tony Bradley All authors
โ™˜ Break the Code Cryptography for Beginners by Bud Johnson
โ™˜ BSD UNIX toolbox 1000+ commands for FreeBSD, OpenBSD, and NetBSD power users by Chris Negus Franรงois Caen
โ™˜ Buffer Overflow Attacks Detect, Exploit, Prevent by Erik Pace Birkholz
โ™˜ CEH Certified Ethical Hacker All-In-One Exam Guide, Fourth Edition by Matt Walker
โ™˜ Complex Numbers from A to...Z by Titu Andreescu, Dorin Andrica
โ™˜ Cracking Codes with Python An Introduction to Building and Breaking Ciphers by Al Sweigart
โ™˜ Cryptographic and Information Security Approaches for Images and Videos by S. Ramakrishnan
โ™˜ DDoS attacks evolution, detection, prevention, reaction, and tolerance by Bhattacharyya, Dhruba Kumar Kalita, Jugal Kumar
โ™˜ DDoS Handbook The Ultimate Guide to Everything You Need to Know About DDoS Attacks by Radware
โ™˜ Ethical Hacking and Countermeasures Attack Phases by The Experts EC-Council
โ™˜ Ethical Hacking and Countermeasures Threats and Defense Mechanisms by EC-Council
โ™˜ FreeBSD Mastery Advanced ZFS (IT Mastery Book 9) by Lucas Michael W., Jude Allan
โ™˜ Game Hacking Developing Autonomous Bots for Online Games by Nick Cano
โ™˜ Google Hacking for Penetration Testers by Johnny Long, Bill Gardner, Justin Brown
โ™˜ Gray Hat C A Hackerโ€™s Guide To Creating And Automating Security Tools by Brandon Perry
โ™˜ Hacking Tools Introducing To Linux, Linux Mint, Wireless Networks, Penetrating Tests And Kali Linux Kali Linux Tools Tutorial by Palk, Stewart
โ™˜ Hacking VoIP Protocols, Attacks, and Countermeasures by Himanshu Dwivedi
โ™˜ Hacking Wireless Access Points. Cracking, Tracking, and Signal Jacking by Jennifer Ann Kurtz
โ™˜ Handbook of Elliptic and Hyperelliptic Curve Cryptography by Henri Cohen, Gerhard Frey, Roberto Avanzi
โ™˜ Hands on Hacking - Become an Expert at Next Gen Penetration Testing and Purple Teaming by Matthew Hickey, Jennifer Arcuri
โ™˜ Hash Crack Password Cracking Manual (v3) by Joshua Picolet
โ™˜ Introduction to Modern Cryptography Principles and Protocols by Jonathan Katz, Yehuda Lindell
โ™˜ Invent Your Own Computer Games with Python by Al Sweigart
โ™˜ iOS Application Security The Definitive Guide for Hackers and Developers by David Thiel
โ™˜ Kali Linux Reference Guide A Pentesters Voyage by Sheimo, Matthew
โ™˜ Kali Linux Wireless Pentesting and Security for Beginners by Hardeep Singh
โ™˜ Learn Java the Easy Way A Hands-On Introduction to Programming by Bryson Payne
โ™˜ Linux Hardening in Hostile Networks. Server Security from TLS to Tor by Kyle Rankin
โ™˜ Linux Socket Programming by Example by Warren Gay
โ™˜ Malicious Bots An Inside Look into the Cyber-Criminal Underground of the Internet by Ken Dunham, Jim Melnick
โ™˜ Master Hacking, Master The Tools Understanding Process Of Hacking, Notions of Linux, Linux Mint, Kali Linux
โ™˜ Mastering Ethereum Building Smart Contracts and DApps by Andreas M. Antonopoulos, Gavin Wood Ph. D
โ™˜ Mission Python Code a Space Adventure Game by Sean McManus
โ™˜ Modern-Cryptography-Proof Techniques and Implementations
โ™˜ Nmap 6 Cookbook The Fat Free Guide to Network Security Scanning by Nicholas Marsh
โ™˜ Nmap Network Scanning The Official Nmap Project Guide to Network Discovery and Security Scanning by Gordon Fyodor Lyon_Compressed
โ™˜ Penetration Testing with Kali Linux by F3thinker
โ™˜ Pentesting Azure Applications The Definitive Guide to Testing and Securing Deployments by Matt Burrough
โ™˜ PGP GPG Email for the Practical Paranoid by Michael W Lucas
โ™˜ Prime numbers a computational perspective by Richard Crandall, Carl B. Pomerance
โ™˜ Red Hat RPM Guide by Eric Foster-Johnson
โ™˜ Reverse Engineering Code with IDA Pro by IOActive
โ™˜ Silence on the Wire A Field Guide to Passive Reconnaissance and Indirect Attacks by Michal Zalewski
โ™˜ SNMP Mastery by Michael W Lucas
โ™˜ Sockets, Shellcode, Porting, Coding. Reverse Engineering Exploits and Tool Coding for Security Professionals by James C. Foster and Mike Price
โ™˜ SSH Mastery OpenSSH, PuTTY, Tunnels and Keys by Michael W. Lucas
โ™˜ The art of memory forensics detectiong malware and threats in Windows, Linux, and Mac memory by Michael Hale Ligh, Andrew Case, Jamie Levy
โ™˜ The Book of PF, 3rd Edition A No-Nonsense Guide to the OpenBSD Firewall by Peter N. M. Hansteen
โ™˜ The Codebreakers The Comprehensive History of Secret Communication from Ancient Times to the Internet by David Kahn
โ™˜ The Codebreakers The Story Of Secret Writing by David Kahn
โ™˜ The CS Detective An Algorithmic Tale of Crime, Conspiracy and Computation by Jeremy Kubica
โ™˜ The Linux Command Line A Complete Introduction by William E. Shotts
โ™˜ The TCPIP Guide A Comprehensive, Illustrated Internet Protocols Reference by Charles M. Kozierok
โ™˜ The World Of Botnets
โ™˜ ubuntu and Centos linux server administration by MD. Tanvir Rahman
โ™˜ Virtual Honeypots From Botnet Tracking to Intrusion Detection by Niels Provos, Thorsten Holz
โ™˜ Zeus Botnet. The missing manual by Slavic Monster

Firend Books

โ™• 101 Creative Problem Solving Techniques The Handbook of New Ideas for Business by James M. Higgins
โ™• A Passion for Mathematics - Numbers, Puzzles, Madness, Religion, and the Quest for Reality by Clifford A. Pickover
โ™• An-Introduction-to-HTML5-Game-Development-with-Phaserjs
โ™• Basic Security Testing with Kali Linux 2 by Daniel W. Dieterle
โ™• Basic Security Testing with Kali Linux by Daniel W. Dieterle
โ™•Blue Team Field Manual (BTFM) by Alan J White, Ben Clark
โ™• Blue Team Handbook - SOC, SIEM Threats Hunting Use Cases Notes from Fields (v1.02) by Don Murdoch
โ™• Crypto Dictionary by Jean-Philippe Aumasson [Jean-Philippe Aumasson]
โ™• Data Structures and Algorithms Made Easy Data Structures and Algorithmic Puzzles by Narasimha Karumanchi
โ™• Designing BSD Rootkits An Introduction to Kernel Hacking by Joseph Kong
โ™• Foundations of Information Security A Straightforward Introduction by Jason Andress
โ™• Gray Hat Python Python Programming for Hackers and Reverse Engineers by Justin Seitz
โ™• Hacking The Art of Exploitation by Jon Erickson
โ™• Hacking with Kali Linux A Guide to Ethical Hacking A Beginners Guide with Practical Examples to Test Infrastructure Security with Kali Linux Learning
โ™• Hacklog Volume 1 Anonymity IT Security Ethical Hacking Handbook by Stefano Novelli, Marco Stefano Doria, Marco Silvestri
โ™• Hacklog Volume 2 Web Hacking Handbook on IT Security and Ethical Hacking by Stefano Novelli, Marco Silvestri
โ™• Kali Linux Revealed Mastering the Penetration Testing Distribution by Raphaรซl Hertzog Jim Oโ€™Gorman Mati Aharoni
โ™• Linux Firewalls Attack Detection and Response with iptables, psad, and fwsnort by Michael Rash
โ™• Malware Analysts Cookbook and DVD Tools and Techniques for Fighting Malicious Code by Michael Ligh, Steven Adair, Blake Hartstein, Matthew Richard
โ™• Penetration Testing A Hands-On Introduction to Hacking by Georgia Weidman
โ™• Phishing and Countermeasures Understanding the Increasing Problem of Electronic Identity Theft by Markus Jakobsson, Steven Myers
โ™• Postexploitation
โ™• Practical Forensic Imaging, Securing Digital Evidence with Linux Tools by Bruce Nikkel
โ™• Python and Hacking Made Simple Full Beginners Bundle To Master Python Hacking by Project Syntax
โ™• The Art of Intrusion The Real Stories Behind the Exploits of Hackers, Intruders Deceivers by Kevin D. Mitnick, William L. Simon
โ™• The Art of Invisibility The Worlds Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data by Kevin David Mitnick, Robert Vamosi
โ™• The Code Book How to Make It, Break It, Hack It, Crack It by Simon Singh
โ™• The Complete Cyber Security Course, Volume 1 Hackers Exposed by Nathan House
โ™• The Hackers Underground Handbook Learn how to hack and what it takes to crack even the most secure systems (Volume 1) by David Melnichuk
โ™• The Linux Command Line A Complete Introduction by William E. Shotts
โ™• The Pentester BluePrint Starting a Career as an Ethical Hacker by Phillip L. Wylie Kim Crawley
โ™• Tor and The Dark Net Remain Anonymous and Evade NSA Spying by James Smith
โ™• Understanding Network Hacks Attack and Defense with Python by Bastian Ballmann (auth.)
โ™• Web Security for Developers - Malcolm McDonald by F3thinker
โ™• Wicked Cool Shell Scripts 101 Scripts for Linux, OS X, and UNIX Systems by Dave Taylor, Brandon Perry
โ™• Write Portable Code An Introduction to Developing Software for Multiple Platforms by Brian Hook

Island Box

โ™š Advanced Compiler Design and Implementation by Steven S. Muchnick
โ™š Compilers Principles Techniques And Tools by by Alfred V. Aho, Ravi Sethi, Jeffrey D. Ullman
โ™š Compilers Principles, Techniques, and Tools by Alfred V. Aho, Monica S. Lam, Ravi Sethi, Jeffrey D. Ullman
โ™š Deno - A Complete Guide to Programming With Deno by Jana Bergant
โ™š Get Programming with Go by Nathan Youngman, Roger Peppรฉ
โ™š Git Learn Version Control with Git A step-by-step Ultimate beginners Guide by Hutten, Dennis
โ™š GIT The Ultimate Guide for Beginners to Learn Git Version Control by Jameson Garner
โ™š Implementing SSLTLS Using Cryptography and PKI by Joshua Davies
โ™š Introduction to Automata Theory, Languages, and Computations by John E. Hopcroft, Rajeev Motwani, Jeffrey D. Ullman
โ™š JavaScript The Definitive Guide Master the Worlds Most-Used Programming Language by David Flanagan
โ™š Malicious Cryptography Exposing Cryptovirology by Adam Young, Moti Yung
โ™š Modern Compiler Design by Dick Grune, Kees van Reeuwijk, Henri E. Bal, Ceriel J.H. Jacobs, Koen Langendoen
โ™š Modern Javascript for the Impatient by Cay S. Horstmann
โ™š Network Security with OpenSSL by John Viega, Matt Messier, Pravir Chandra
โ™š Operating System Concepts by Abraham Silberschatz, Greg Gagne, Peter B. Galvin
โ™š Pki Implementing and Managing E-Security by Andrew Nash ,Derek Brink ,William Duane
โ™š PowerShell 7 for IT Pros by Thomas Lee
โ™š PowerShell Cookbook, 4th Edition by Lee Holmes
โ™š Practical cryptography by Niels Ferguson, Bruce Schneier
โ™š Practical Cryptography for Developers by it-ebooks
โ™š Public Key Infrastructure and Implementation and Design by Suranjan Choudhury
โ™š Python for Excel by Felix Zumstein
โ™š Secrets of the JavaScript Ninja by John Resig, Bear Bibeault, Josip Maras
โ™š SSH, The Secure Shell The Definitive Guide by Daniel J. Barrett, Richard E. Silverman, Robert G. Byrnes
โ™š SSL TLS Essentials Securing the Web by Stephen A. Thomas
โ™š The compiler design handbook optimizations and machine code generation by Y.N. Srikant, Priti Shankar-new
โ™š The compiler design handbook optimizations and machine code generation by Y.N. Srikant, Priti Shankar
โ™š The Cyber Plumberโ€™s Handbook The definitive guide to SSH tunneling, port redirection, and bending traffic like a boss. by Brennon Thomas
โ™š The Definitive ANTLR 4 Reference, 2nd Edition by Terence Parr
โ™š The Grumpy Programmers PHPUnit Cookbook by Chris Hartjes
โ™š Writing an interpreter in Go by Thorsten Ball

AWS repo

โ™š Advanced Persistent Threat Hacking The Art and Science of Hacking Any Organization by Tyler Wrightson
โ™š Breaking and Entering The Extraordinary Story of a Hacker Called Alien by Jeremy Smith
โ™š Buku Sakti Hacker by Efvy Zam
โ™š Countdown to Zero Day Stuxnet and the Launch of the Worlds First Digital Weapon by Kim Zetter
โ™š Cult of the Dead Cow How the Original Hacking Supergroup Might Just Save the World by Joseph Menn
โ™š Cyber Mercenaries The State, Hackers, and Power by Tim Maurer
โ™š Cyber security policy guidebook by Jennifer L. Bayuk, Jason Healey, Paul Rohmeyer, Marcus Sachs, Jeffrey Schmidt, Joseph Weiss
โ™š Dark Web by BREARTON T J
โ™š Dawn of the Code War Americaโ€™s Battle Against Russia, China, and the Rising Global Cyber Threat by John P. Carlin Garrett M. Graff
โ™š Ethical Hacking 3 in 1- A Comprehensive Beginnerโ€™s Guide + Complete Tips And Tricks To Ethical Hacking
โ™š Extreme Exploits Advanced Defenses Against Hardcore Hacks by Victor Oppleman, Oliver Friedrichs, Brett Watson
โ™š Hackers WhiteBook (Espaรฑol) Guรญa Practica para Convertirte en Hacker Profesional Desde Cero by Pablo Salazar
โ™š Hacking the hacker learn from the experts who take down hackers by Grimes, Roger A
โ™š Infinity Ethical Hacking Learn basic to advance hacks by Arthur S Sapp [Sapp, Arthur S]
โ™š Infinity Ethical Hacking Learn basic to advance hacks by Arthur S. Sapp
โ™š THE ADVANCED PENETRATING TESTING Step-By-Step Guide To Ethical Hacking and Penetration Testing Made Easy by JEFF, DR. PATRICK
โ™š The Fifth Domain Defending Our Country, Our Companies, and Ourselves in the Age of Cyber Threats by Richard A. Clarke, Robert K. Knake
โ™š The Hacker and the State by F3thinker
โ™š The Hardware Hacker Adventures in Making and Breaking Hardware by Andrew bunnie Huang
โ™š Tor Accessing The Deep Web Dark Web With Tor How To Set Up Tor, Stay Anonymous Online
โ™š Tรฉcnicas de Invasรฃo Aprenda as tรฉcnicas usadas por hackers em invasรตes reais by Bruno Fraga
โ™š Weaving the Dark Web Legitimacy on Freenet, Tor, and I2P by Robert W Gehl

Rest at Home

โ™™ A Smarter Way to Learn Python_ Learn it faster. Remember it longer
โ™™ Automate the Boring Stuff with Python - Practical Programming for Total Beginners by Al Sweigart
โ™™ Hackers Beware - The Ultimate Guide to Network Security by Eric Cole
โ™™ Hacking - Beginner to Expert Guide to Computer Hacking, Basic Security, and Penetration Testing (Computer Science Series) by James Patterson
โ™™ Hacking Easy Hacking for Beginners - How to Hack Computers, Penetration Testing and Cracking Security by Andrew Mckinsey
โ™™ Hacking for Beginners The Complete Guide by Barnes Tim
โ™™ Hacking The Beginners Complete Guide To Computer Hacking And Penetration Testing by Miles Price
โ™™ How to Hack Computers how to hack computers, hacking for beginners, penetration testing, hacking for dummies, computer security
โ™™ Java The Ultimate Beginners Guide to Java Programming by Steve Tale
โ™™ Kali Linux Wireless Penetration
โ™™ Linux The Ultimate Beginners Guide to Linux Operating System by Tale, Steve
โ™™ Penetration Testing - 3 Manuscriptsโ€”Wireless Hacking, Tor and the Dark Net, and Powershell by Logan Styles
โ™™ Python Crash Course, 2nd Edition - A Hands-On, Project-Based Introduction to Programming by Eric Matthes
โ™™ Red Team - How to Succeed by Thinking Like the Enemy by Micah Zenko
โ™™ The Shellcoder_s Handbook - Discovering and Exploiting Security Holes by Chris Anley, John Heasman, Felix Lindner and Gerardo Richarte
โ™™ Violent Python - A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers by TJ O_Connor
โ™™ Youtube Algorithms Hack the Youtube Algorithm Pro Guide on How to Make Money Online Using your Youtube Channel

cryptography & cipher

โ™— Advanced Persistent Threat Hacking The Art and Science of Hacking Any Organization by Tyler Wrightson
โ™— Applied Cryptography Protocols, Algorithms and Source Code in C by Bruce Schneier
โ™— Blockchain technologies and Crypto-currencies by Johan Pehcevski
โ™— CEH v10 - 2019 by F3thinker
โ™— Cracking DES Secrets of Encryption Research, Wiretap Politics Chip Design by Electronic Frontier Foundation
โ™— Cryptanalysis of RSA and Its Variants by M. Jason Hinek
โ™— Cryptography Theory And Practice by Douglas Stinson
โ™— Demystifying the IPSec Puzzle by Sheila Frankel
โ™— Digital image watermarking theoretical and computational advances by Borra, Surekha Dey, Nilanjan Thanki, Rohit
โ™— Digital Media Steganography Principles, Algorithms, and Advances by Mahmoud Hassaballah
โ™— Digital Watermarking and Steganography Fundamentals and Techniques by Shih, Frank Y
โ™— Digital Watermarking and Steganography Fundamentals and Techniques by Frank Y. Shih
โ™— Feistel Ciphers Security Proofs and Cryptanalysis by Valerie Nachef, Jacques Patarin, Emmanuel Volte
โ™— Grokking Bitcoin by Kalle Rosenbaum
โ™— Hackerโ€™s Elusive Thoughts The Web by Gerasimos Kassaras
โ™— Handbook of Image-based Security Techniques by Agarwal, Suneeta Shivani, Shivendra Suri, Jasjit S
โ™— Hiding in Plain Sight Steganography and the Art of Covert Communication by Eric Cole
โ™— Implementing Cryptography Using Python by Shannon Bray
โ™— IPSec by Naganand Doraswamy
โ™— IPSec The New Security Standard for the Internet, Intranets, and Virtual Private Networks by Naganand Doraswamy, Dan Harkins
โ™— IPSec the new security standart for the internet, intranets and virtual private networks by Doraswamy, Naganand Harkins, Dan
โ™— Malware Von Viren, Wรผrmern, Hackern und Trojanern und wie man sich vor ihnen schรผtzt by Eugene Kaspersky
โ™— Noiseless Steganography The Key to Covert Communications by Abdelrahman Desoky
โ™— Reversible Steganography and Authentication via Transform Encoding by Jyotsna Kumar Mandal
โ™— RSA and Public-Key Cryptography by Richard A. Mollin
โ™— Security of Block Ciphers From Algorithm Design to Hardware Implementation by Kazuo Sakiyama, Yu Sasaki, Yang Li
โ™— Steganography in Digital Media Principles, Algorithms, and Applications by Jessica Fridrich
โ™— Surreptitious Software Obfuscation, Watermarking, and Tamperproofing for Software Protection by Christian Collberg, Jasvir Nagra
โ™— The Block Cipher Companion by Lars R. Knudsen, Matthew J.B. Robshaw
โ™— The Design Of Rijndael The Advanced Encryption Standard (AES) by Joan Daemen, Vincent Rijmen
โ™— The Mathematics of Secrets Cryptography from Caesar Ciphers to Digital Encryption by Joshua Holden
โ™— VPNs Illustrated Tunnels, VPNs, and IPsec by Jon C. Snader
โ™— Watermarking Techniques for Copyright Protection of Videos by Ashish M. Kothari, Vedvyas Dwivedi, Rohit M. Thanki

Model Driven (Software Design)

โ™– POSA (vol 1 to vol 5)
โ™– A Pattern Language Towns, Buildings, Construction (Cess Center for Environmental) by Christopher Alexander, Sara Ishikawa, Murray Silverstein
โ™– Beyond Software Architecture Creating and Sustaining Winning Solutions by Luke Hohmann
โ™– Common warehouse metamodel an introduction to the standard for data warehouse integration by John Poole, Dan Chang, Douglas Tolbert, David Mellor
โ™– Designing Interfaces Patterns for Effective Interaction Design by Jenifer Tidwell, Charles Brewer, Aynne Valencia_Compressed
โ™– Dive Into Design Patterns by Alexander Shvets
โ™– Dive Into Refactoring by Alexander Shvets
โ™– Domain-Driven Design in PHP by Carlos Buenosvinos
โ™– Domain-Driven Design Quickly by Abel Avram, Floyd Marinescu
โ™– Domain-Driven Design Tackling Complexity in the Heart of Software by Eric Evans
โ™– Domain-Driven Design The First 15 Years Essays from the DDD Community by Leanpub book
โ™– Domain-Specific Languages by Martin Fowler
โ™– Domain-Specific Modeling by Steven Kelly, Juha-Pekka Tolvanen
โ™– Eclipse Modeling Project A Domain-Specific Language (DSL) Toolkit by Richard C. Gronback
โ™– Enterprise Integration Patterns Designing, Building and Deploying Messaging Solutions A Martin Fowler Signature Book
โ™– Enterprise Patterns and MDA Building Better Software with Archetype Patterns and UML by Jim Arlow, Ila Neustadt
โ™– Fundamentals of Software Architecture An Engineering Approach by Mark Richards Neal Ford
โ™– Head First Design Patterns Building Extensible and Maintainable Object-Oriented Software by Eric Freeman, Elisabeth Robson
โ™– Implementing Domain-Driven Design by Vaughn Vernon
โ™– Just Enough Software Architecture A Risk-Driven Approach by George H. Fairbanks
โ™– Language Implementation Patterns Create Your Own Domain-Specific and General Programming Languages (Pragmatic Programmers)
โ™– Model-Driven Domain Analysis and Software Development Architectures and Functions by Janis Osis, Janis Osis, Erika Asnina
โ™– Model-Driven Software Development Technology, Engineering, Management by Thomas Stahl, Markus Voelter, Krzysztof Czarnecki
โ™– Object Constraint Language, The Getting Your Models Ready for MDA by Jos Warmer, Anneke Kleppe
โ™– Patterns of Enterprise Application Architecture by Martin Fowler
โ™– Real-Life MDA Solving Business Problems with Model Driven Architecture by Michael Guttman, John Parodi
โ™– Real-World Software Development - A Project-Driven Guide to Fundamentals in Java. by Raoul-Gabriel Urma, Richard Warburton
โ™– Refactoring at Scale Regaining Control of Your Codebase by Maude Lemaire
โ™– Refactoring for Software Design Smells Managing Technical Debt by Girish Suryanarayana, Ganesh Samarthyam, Tushar Sharma
โ™– Refactoring Improving the Design of Existing Code by Martin Fowler
โ™– Software Architecture for Developers by Simon Brown
โ™– Software Architecture for Developers Vol 1 Technical leadership and the balance with agility by Simon Brown
โ™– Software Architecture for Developers Vol 2 Visualise, document and explore your software architecture by Simon Brown
โ™– Software Engineering at Google by Hyrum Wright, Tom Manshreck, Titus Winters
โ™– Software Evolution With UML and XML by Hongji Yang
โ™– Software Language Engineering Creating Domain-Specific Languages Using Metamodels by Anneke Kleppe
โ™– Storytelling in Design Defining, Designing, and Selling Multidevice Products by Anna Dahlstrรถm

๐ŸŽฉGood News๐ŸŽฉ

BigThank's to [email protected] that purchased & email us.
Bigthank's to [email protected] that purchase & email us.
Bigthank's to [email protected] that purchase & email us.
Bigthank's to [email protected] that purchase & email us.
Bigthank's to [email protected] that purchase & email us.
Bigthank's to [email protected] that purchase & email us.
Bigthank's to [email protected] that purchase & email us.
Bigthank's to [email protected] that purchase & email us.
Bigthank's to [email protected] that purchase & email us.
Bigthank's to [email protected] that purchase & email us.
Bigthank's to [email protected] that purchase & email us.
Bigthank's to [email protected] that purchase & email us.
Bigthank's to [email protected] that purchase & email us.
Bigthank's to [email protected] that purchase & email us.
gift to [email protected].
gift to [email protected].
@12 auther mail us and wants our library (We send them as gift).
@29 people Buy it :) from us. Thank you all!

๐Ÿ’ฐ๐Ÿ’ฐ Donate $10 (USD) to get the password, take a photo of the payment page and email it ([email protected]). Password will be sent in less than 24 hours.

...

Don't know What is Bitcoin/Ethereum?! (Ok, I will tell you)

If you are unfamiliar with the Bitcoin and Ethereum payment system, read the following:To create a Bitcoin and Ethereum account, you can go to http://blockchain.com and then create an account.
Then you can directly increase the credit of your wallet account
(if you are in a country like Iran that is under sanctions, you can increase your account through an exchange office or deposit directly to the payment address).
Finally, pay the deposit amount to the Bitcoin or Ethereum address introduced by us and send us email as we mentioned before.For more information on the Internet, search for "Bitcoin account creation tutorial"

In the near future Some Security powerpoint will be added

Oysten tell me that "In the near future, a robot will be built for this repository" (Great Job!)


we update this repo soon ...
we are working on downino website for this repository, also we develop a pythonBot too ... (comming soon!)

Subscribe to our newsletter