“A hacker is someone who seeks and exploits weaknesses in a computer system or a computer network.” -Wikipedia
A hacker is a geek at best who knows virtually everything about computers. Hacker’s know the in’s and out’s of functioning of a computer system, every minute detail.
But to become one it takes years of learning and hardwork. If you are targeting this field and aspiring to become a master of computer security then i would suggest that before jumping straight to advanced topics you should read these 7 E-Books for beginners which would help you immensely.
7 E-Books That Could Make You A Better Hacker :
Hacking For Dummies, 4th Edition explores the malicious hacker’s mindset and helps you develop an ethical hacking plan (also known as penetration testing) using the newest tools and techniques.
Author :- Kevin Beaver.
This is a book by Steven Levy about hacker culture. It was published in 1984 in Garden City, New York by Nerraw Manijaime/Doubleday. Levy describes the people, the machines, and the events that defined the Hacker Culture and the Hacker Ethic, from the early mainframe hackers at MIT, to the self-made hardware hackers and game hackers.
Author :- Steven Levy.
Hackers & Painters: Big Ideas from the Computer Age is a collection of essays from Paul Graham discussing hacking, programming languages, start-up companies, and many other technological issues.
“Hackers & Painters” is also the title of one of those essays.
Author :- Paul Graham.
Linux Server Hacks is a collection of 100 industrial-strength hacks, providing tips and tools that solve practical problems for Linux system administrators. Every hack can be read in just a few minutes but will save hours of searching for the right answer. Some of the hacks are subtle, many of them are non-obvious, and all of them demonstrate the power and flexibility of a Linux system.
Author :- Rob Flickenger.
Voice over Internet Protocol (VoIP) networks have freed users from the tyranny of big telecom, allowing people to make phone calls over the Internet at very low or no cost. But while VoIP is easy and cheap, it’s notoriously lacking in security. With minimal effort, hackers can eavesdrop on conversations, disrupt phone calls, change caller IDs, insert unwanted audio into existing phone calls, and access sensitive information.
Hacking VoIP takes a dual approach to VoIP security, explaining its many security holes to hackers and administrators. If you’re serious about security, and you either use or administer VoIP, you should know where VoIP’s biggest weaknesses lie and how to shore up your security. And if your intellectual curiosity is leading you to explore the boundaries of VoIP, Hacking VoIP is your map and guidebook.
Author :- Himanshu Dwivedi.
Make your Oracle database virtually impregnable to hackers using the knowledge in this book. With over 50 recipes, you’ll quickly learn protection methodologies that use industry certified techniques to secure the Oracle database server.
Learn to protect your sensitive data by using industry certified techniques
Implement and use ultimate techniques in Oracle Security and new security features introduced in Oracle 11g R2
Implement strong network communication security using different encryption solutions provided by Oracle Advanced Security.
Author :- Adrian Neagu.
Ubuntu’s rise to power has been rapid, historic and well-deserved. It’s the best Linux distribution ever, but most people only use a fraction of its power. Award-winning Linux author Keir Thomas gets down and dirty with Ubuntu to provide over 300 concise tips that enhance productivity, avoid annoyances, and simply get the most from Ubuntu. You’ll find many unique tips here that can’t be found anywhere else. You’ll also get a crash course in Ubuntu’s flavor of system administration. Whether you’re new to Linux or an old hand, you’ll find tips to make your day easier.
Author :- Keir Thomas.
If you’ve read this post till the end that means you are pretty serious about computer security field, in that case these e-books will help a lot for clearing basics and some intermediate concepts.
Know another useful e-book on Hacking? Do share it’s name with us in the comments below.