A Guide to Cyber Crime Security in 2010
Assault on PHP Applications
Simple it in Action
Scapy Packet Forgery
Understanding SEH Structured Exception Handler Exploitation 2009
Penetration Testing Learning Kit
Building Your Own Shell
Vulnerability Scanning With Nessus
A Post-Mortem of Yahoo! Account Security
WireShark Complete Users Guide
HTTP Parameter Pollution
Fragmentation Attack in Practice
Packet Sniffing
Windows Local Shellcode Injection WLSI
Tutorial About Format Bugs
Trojan Whitepaper
Xss Attacks Faq
Quantitative Vulnerability Assessment
Tenable Web App Scanning
Top 25 Most Dangerous Programming Errors List