Hope this Book will give you some idea.

http://sodaphish.com/files/ebks/try2innovate.com/downloads/E-books/Hacking/Hacking%20Exposed-%20Network%20Security%20Secrets%20and%20Solutions%20(MCGraw-Hill-2001).pdf

or

http://hates.home.anadolu.edu.tr/books/Computer/Hacking/Hacking%20Exposed%20-%20Network%20Security%20Secrets%20&%20Solutions,%202nd%20Edition%20(2001).pdf


PPT: 
www.cs.cmu.edu/~srini/15-441/S05/lectures/26-security2.*ppt<http://www.cs.cmu.edu/~srini/15-441/S05/lectures/26-security2.ppt>
*
        
www.cs.cmu.edu/~srini/15-441/F02/lectures/lec21-security.*ppt<http://www.cs.cmu.edu/~srini/15-441/F02/lectures/lec21-security.ppt>
*


Regards,
0xN41K
On Sun, Jun 6, 2010 at 2:58 PM, nittbdb <[email protected]> wrote:

> pls share it................
>
> --
> You received this message because you are subscribed to the Google Groups
> "nforceit" group.
> To post to this group, send an email to [email protected].
> To unsubscribe from this group, send email to
> [email protected]<nforceit%[email protected]>
> .
> For more options, visit this group at
> http://groups.google.com/group/nforceit?hl=en-GB.
>
>

-- 
You received this message because you are subscribed to the Google Groups 
"nforceit" group.
To post to this group, send an email to [email protected].
To unsubscribe from this group, send email to 
[email protected].
For more options, visit this group at 
http://groups.google.com/group/nforceit?hl=en-GB.

Reply via email to