[Document] Ebook Hacker 4.1GB - Computer Security Enthusiast |
12/02/2014 11:15:05 (+0700) | #1 | 279727 |
|
tieuvinhlong
Member
|
0 |
|
|
Joined: 31/08/2006 12:36:06
Messages: 2
Offline
|
|
Torrent:
https://www.mediafire.com/?3t4m2i4an8b7dil
http://bitvn.org/details.php?id=5665&hit=1
- 101 Spy Gadgets for the Evil Genius.pdf
- 1337 h4x0r h4ndb00k.chm
- 19 Deadly Sins of Software Security - Programming Flaws & How to Fix Them.chm
- 22 Radio & Receiver Projects for the Evil Genius.pdf
- 50 Awesome Auto Projects for the Evil Genius.pdf
- 51 High-Tech Practical Jokes for the Evil Genius.pdf
- 802.11 Security.pdf
- A Classical Introduction to Cryptography Exercise Book.pdf
- A Technical Guide to IPSec Virtual Private Networks.pdf
- A , Network , Security Exams in a Nutshell - A Desktop Quick Reference.pdf
- AAA & Network Security for Mobile Access - Radius, Diameter, EAP, PKI, & IP Mobility.pdf
- Absolute OpenBSD - UNIX for the Practical Paranoid.chm
- Access Denied - The Practice & Policy of Global Internet Filtering.pdf
- Active Defense - A Comprehensive Guide to Network Security.pdf
- Administering & Securing the Apache Server.chm
- Advanced CISSP Prep Guide - Exam Q&A.chm
- Advances in Elliptic Curve Cryptography.pdf
- Advances in Enterprise Information Technology Security.pdf
- Advances in Network & Distributed Systems Security.pdf
- Aggressive Network Self-Defense.pdf
- Ajax Security.pdf
- Anti-Hacker Tool Kit, 2nd Ed..chm
- Anti-Hacker Tool Kit, 3rd Ed..chm
- Apache Security.chm
- Applied Cryptanalysis - Breaking Ciphers in the Real World.pdf
- Applied Cryptography & Network Security - 2nd International Conference, ACNS 2004.pdf
- Applied Cryptography - Protocols, Algorithms, & Source COde in C, 2nd Ed..chm
- Applied Security Visualization.pdf
- Auditor's Guide to Information Systems Auditing.pdf
- AVIEN Malware Defense Guide for the Enterprise.pdf
- Beginning Cryptography with Java.chm
- BigNum Math - Implementing Cryptographic Multiple Precision Arithmetic.pdf
- Biometrics & Network Security.chm
- Black Hat Physical Device Security - Exploiting Hardware & Software.pdf
- Blackjacking - Security Threats to BlackBerry Devices, PDAs, & Cell Phones in the Enterprise.pdf
- Bluetooth Security.pdf
- Botnet Detection - Countering the Largest Security Threat.pdf
- Botnets - The Killer Web App.pdf
- Brute Force - Cracking the Data Encryption Standard.pdf
- Buffer Overflow Attacks - Detect, Exploit, Prevent.pdf
- Building an Effective Information Security Policy Architecture.pdf
- Building DMZs for Enterprise Networks.pdf
- Building Internet Firewalls, 2nd Ed..pdf
- Building Secure Servers with Linux.chm
- Building Secure Servers with Linux.pdf
- Building Secure Wireless Networks with 802.11.pdf
- Bulletproof Wireless Security - GSM, UMTS, 802.11, & Ad Hoc Security.pdf
- CCNA Security Official Exam Certification Guide [Exam 640-553] .pdf
- CCSP Cisco Secure PIX Firewall Advanced Exam Certification Guide.pdf
- CD & DVD Forensics.pdf
- CD Cracking Uncovered - Protection Against Unsanctioned CD Copying.chm
- CEH - Official Certified Ethical Hacker Review Guide [Exam 312-50] .pdf
- CEH Official Certified Ethical Hacker Review Guide.pdf
- Certified Ethical Hacker Exam Prep [Exam 312-50] .chm
- Certified Ethical Hacking Official Course Material [Exam 312-50] .chm
- Cisco ASA, PIX, & FWSM Firewall Handbook, 2nd Ed..pdf
- Cisco IOS Access Lists.pdf
- Cisco NAC Appliance - Enforcing Host Security with Clean Access.pdf
- Cisco Network Security Little Black Book.pdf
- Cisco Router Firewall Security.chm
- Cisco Secure Firewall Services Module (FWSM).pdf
- Cisco Secure Internet Security Solutions.pdf
- Cisco Security Agent.chm
- Cisco Security Professional's Guide to Secure Intrusion Detection Systems.pdf
- Cisco Wireless LAN Security.chm
- CISSP - Certified Information Systems Security Professional Study Guide, 3rd Ed..pdf
- CISSP - Certified Information Systems Security Professional Study Guide, 4th Ed..pdf
- CISSP Certification All-in-One Exam Guide, 4th Ed..pdf
- CISSP for Dummies, 2nd Ed..chm
- Codes & Ciphers - Julius Caesar, the Enigma, & the Internet.pdf
- Codes - The Guide to Secrecy from Ancient to Modern Times.pdf
- Combating Spyware in the Enterprise.pdf
- Complete Guide to CISM Certification.pdf
- Complexity & Cryptography - An Introduction.pdf
- CompTIA A Exam Prep [Exams A Essentials, 220-602, 220-603, & 220-604] .chm
- CompTIA Security Study Guide & Practice Exam, 2nd Ed. [Exam JK0-010] .pdf
- Computer & Intrusion Forensics.pdf
- Computer Network Security.pdf
- Computer Security & Cryptography.pdf
- Computer Security Basics, 2nd Ed..chm
- Computer Security, Privacy, & Politics - Current Issues, Challenges, & Solutions.pdf
- Computer Viruses & Malware.pdf
- Computer Viruses - From Theory to Applications.pdf
- Computer Viruses for Dummies.pdf
- Configuring Juniper Networks NetScreen & SSG Firewalls.pdf
- Configuring NetScreen Firewalls.pdf
- Configuring SonicWALL Firewalls.pdf
- Contemporary Cryptography.pdf
- Core Security Patterns - Best Practices & Strategies for J2EE, Web Services, & Identity Management.chm
- Covert Java - Techniques for Decompiling, Patching, & Reverse Engineering.pdf
- Crackproof Your Software - Protect Your Software Against Crackers.pdf
- Crimeware - Understanding New Attacks & Defenses.chm
- Critical Incident Management.chm
- Cryptography & Network Security, 4th Ed..chm
- Cryptography & Security Services - Mechanisms & Applications.pdf
- Cryptography - A Very Short Introduction.chm
- Cryptography for Developers.pdf
- Cryptography for Dummies.chm
- Cryptography in C & C .chm
- Cryptology Unlocked.pdf
- Cyber Crime Investigator's Field Guide.pdf
- Cyber Forensics - A Field Manual for Collecting, Examining, & Preserving Evidence of Computer Crimes.pdf
- Cyber Spying - Tracking Your Family's (Sometimes) Secret Online Lives.pdf
- Cyber Warfare & Cyber Terrorism.pdf
- Decrypted Secrets - Methods & Maxims of Cryptology, 4th, Revised & Extended Ed..pdf
- Defend I.T. - Security by Example.chm
- Defense & Detection Strategies against Internet Worms.pdf
- Deploying Secure 802.11 Wireless Networks with Microsoft Windows.chm
- Designing BSD Rootkits - An Introduction to Kernel Hacking.pdf
- Developer's Guide to Web Application Security.pdf
- Digital Evidence & Computer Crime - Forensic Science, Computers, & the Internet, 2nd Ed..chm
- Disassembling Code - IDA Pro & SoftICE.chm
- Effective Oracle Database 10g Security by Design.chm
- Electronic Gadgets for the Evil Genius - 28 Build-It-Yourself Projects.pdf
- EnCase Computer Forensics - The Official EnCE-EnCase Certified Examiner Study Guide, 2nd Ed..pdf
- Encyclopedia of Cryptology.chm
- End-to-End Network Security - Defense-in-Depth.pdf
- Enemy at the Water Cooler - Real-Life Stories of Insider Threats & Enterprise Security Management Countermeasures.pdf
- Enterprise Information Systems Assurance & System Security - Managerial & Technical Issues.pdf
- Enterprise Java Security - Building Secure J2EE Applications.chm
- Essential Computer Security - Everyone's Guide to Email, Internet, & Wireless Security.pdf
- Essential PHP Security.chm
- Ethereal Packet Sniffing.chm
- Expert Web Services Security in the .NET Platform.chm
- Exploiting Software - How to Break Code.pdf
- Fast Track to Security.pdf
- File System Forensic Analysis.chm
- Firewall Fundamentals.chm
- Firewall Policies & VPN Configurations.pdf
- Firewalls & Internet Security - Repelling the Wily Hacker, 2nd Ed..pdf
- Firewalls - Jumpstart for Network & Systems Administrators.pdf
- Firewalls for Dummies, 2nd Ed..pdf
- Forensic Computer Crime Investigation.pdf
- Forensic Computing - A Practitioner's Guide, 2nd Ed..pdf
- Foundations of Computer Security.pdf
- Foundations of Cryptography - A Primer.pdf
- Foundations of Cryptography - Vol. 1, Basic Tools.pdf
- Foundations of Mac OS X Leopard Security.pdf
- Foundations of Security - What Every Programmer Needs to Know.pdf
- Fundamentals of Cryptology - A Professional Reference & Interactive Tutorial.pdf
- Fuzzing - Brute Force Vulnerability Discovery.pdf
- Google Hacking for Penetration Testers, Vol. 2.pdf
- Google Hacking for Penetration Testers.pdf
- Gray Hat Hacking - The Ethical Hacker's Handbook, 2nd Ed..pdf
- Grid Computing Security.pdf
- Guide to Elliptic Curve Cryptography.pdf
- Hack Attacks Revealed - A Complete Reference with Custom Security Hacking Toolkit.chm
- Hack I.T. - Security through Penetration Testing.chm
- Hack Proofing ColdFusion - The Only Way to Stop a Hacker Is to Think Like One.pdf
- Hack Proofing Linux - Your Guide to Open Source Security.pdf
- Hack Proofing Sun Solaris 8 - Protect Your Solaris Network from Attack.pdf
- Hack Proofing Windows 2000 Server.pdf
- Hack Proofing XML - The Only Way to Stop a Hacker Is to Think Like One.pdf
- Hack Proofing Your E-Commerce Site - The Only Way to Stop a Hacker Is to Think Like One.pdf
- Hack Proofing Your Identity in the Information Age - Protect Your Family on the Internet!.pdf
- Hack Proofing Your Network, 2nd Ed. - The Only Way to Stop a Hacker Is to Think Like One.pdf
- Hack Proofing Your Network.pdf
- Hack Proofing Your Web Applications - The Only Way to Stop a Hacker Is to Think Like One.pdf
- Hack Proofing Your Wireless Network - Protect Your Wireless Network from Attack.pdf
- Hack the Stack - Using Snort & Ethereal to Master the 8 Layers of an Insecure Network.pdf
- Hacker Debugging Uncovered.chm
- Hacker Disassembling Uncovered.chm
- Hacker Linux Uncovered.chm
- Hacker Web Exploitation Uncovered.chm
- Hacker's Challenge - Test Your Incident Response Skills Using 20 Scenarios.pdf
- Hacker's Delight.chm
- Hackers - Heroes of the Computer Revolution.pdf
- Hackers Beware - Defending Your Network from the Wiley Hacker.pdf
- Hacking - The Art of Exploitation, 2nd Ed..chm
- Hacking - The Art of Exploitation.chm
- Hacking a Terror Network - The Silent Threat of Covert Channels.pdf
- Hacking Exposed, 2nd Ed. - Network Security Secrets & Solutions.pdf
- Hacking Exposed-Cisco Networks - Cisco Security Secrets & Solutions.chm
- Hacking Exposed-Linux - Linux Security Secrets & Solutions, 3rd Ed..pdf
- Hacking Exposed-Linux - Linux Security Secrets & Solutions.pdf
- Hacking Exposed-Network Security - Secrets & Solutions, 2nd Ed..pdf
- Hacking Exposed-Network Security - Secrets & Solutions, 3rd Ed..pdf
- Hacking Exposed-VoIP - Voice Over IP Security Secrets & Solutions.chm
- Hacking Exposed-Web 2.0 - Web 2.0 Security Secrets & Solutions.pdf
- Hacking Exposed-Web Applications - Web Application Security Secrets & Solutions.pdf
- Hacking Exposed-Windows - Windows Security Secrets & Solutions, 3rd Ed..pdf
- Hacking Exposed-Wireless - Wireless Security Secrets & Solutions.chm
- Hacking for Dummies, 2nd Ed..pdf
- Hacking for Dummies.pdf
- Hacking the Cable Modem - What Cable Companies Don't Want You to Know.pdf
- Hacking Wireless Networks for Dummies.pdf
- HackNotes - Linux & Unix Security Portable Reference.pdf
- HackNotes - Network Security Portable Reference.pdf
- HackNotes - Web Security Portable Reference.pdf
- HackNotes - Windows Security Portable Reference.pdf
- Halting the Hacker - A Practical Guide to Computer Security, 2nd Ed..chm
- Handbook of Database Security - Applications & Trends.pdf
- Handbook of Digital & Multimedia Forensic Evidence.pdf
- Handbook of Research on Wireless Security.pdf
- Hardening Apache.chm
- Hardening Linux.chm
- Hardening Linux.pdf
- Hardening Network Infrastructure.chm
- Hardening Windows Systems.chm
- Hardening Windows, 2nd Ed..pdf
- Hardening Windows.chm
- High-Assurance Design - Architecting Secure & Reliable Enterprise Applications.chm
- Home Network Security Simplified.chm
- Honeypots - Tracking Hackers.chm
- Honeypots for Windows.chm
- How to Cheat at Configuring Open Source Security Tools - The Perfect Reference for the Multitasked SysAdmin.pdf
- How to Cheat at Deploying & Securing RFID.pdf
- How to Cheat at Designing Security for a Windows Server 2003 Network.pdf
- How to Cheat at Managing Information Security.pdf
- How to Cheat at Securing a Wireless Network.pdf
- How to Cheat at Securing Linux - The Perfect Reference for the Multitasked SysAdmin.pdf
- How to Cheat at VolP Security.pdf
- How to Cheat at Windows System Administration Using Command Line Scripts.pdf
- IM Instant Messaging Security.pdf
- Implementing Email Security & Tokens - Current Standards, Tools, & Practices.pdf
- Implementing NAP & NAC Security Technologies - The Complete Guide to Network Access Control.pdf
- Implementing SSH - Strategies for Optimizing the Secure Shell.pdf
- Incident Response & Computer Forensics, 2nd Ed..pdf
- Incident Response - A Strategic Guide to Handling System & Network Security Breaches.chm
- Incident Response - Computer Forensics Toolkit.pdf
- Information Security - Principles & Practice.pdf
- Information Security Management Handbook, 5th Ed..pdf
- Information Security Policies & Actions in Modern Integrated Systems.chm
- Information Security Policies & Procedures - A Practitioner's Reference, 2nd Ed..pdf
- Information Technology Security - Advice from Experts.chm
- InfoSec Career Hacking - Sell Your Skillz, Not Your Soul.pdf
- InfoSecurity 2008 Threat Analysis.pdf
- Inside Java 2 Platform Security, 2nd Ed. - Architecture, API Design, & Implementation.chm
- Inside Network Perimeter Security, 2nd Ed..chm
- Inside the Spam Cartel - Trade Secrets from the Dark Side.chm
- Insider Attack & Cyber Security - Beyond the Hacker.pdf
- Insider Threat - Protecting the Enterprise from Sabotage, Spying, & Theft.pdf
- Internet & Intranet Security Management - Risks & Solutions.pdf
- Internet & Intranet Security.chm
- Internet Denial of Service - Attack & Defense Mechanisms.chm
- Internet Forensics.chm
- Internet Security - A Jumpstart for Systems Administrators & IT Managers.chm
- Internet Security - Cryptographic Principles, Algorithms, & Protocols.pdf
- Introduction to Communication Electronic Warfare Systems.pdf
- Introduction to Cryptography - Principles & Applications, 2nd Ed..pdf
- Intrusion Detection & Prevention.chm
- Intrusion Prevention & Active Response - Deploying Network & Host IPS.pdf
- Intrusion Prevention Fundamentals.chm
- Investigating Computer-Related Crime - A Handbook for Corporate Investigators.pdf
- Investigative Data Mining for Security & Criminal Detection.chm
- IPSec - The New Security Standard for the Internet, Intranets, & Virtual Private Networks, 2nd Ed..chm
- IPSec VPN Design.chm
- IPTV Security - Protecting High-Value Digital Contents.pdf
- IT Auditing - Using Controls to Protect Information Assets.chm
- IT Security Interviews Exposed - Secrets to Landing Your Next Information Security Job.pdf
- J2EE Security for Servlets, EJBs, & Web Services.chm
- Jeff Duntemann's Drive-By Wi-Fi Guide.chm
- Juniper Networks Field Guide & Reference.chm
- Juniper Networks Secure Access SSL VPN Configuration Guide.pdf
- Kismet Hacking.pdf
- LAN Switch Security - What Hackers Know About Your Switches.pdf
- Linux Firewalls - Attack Detection & Response with iptables, psad, & fwsnort.pdf
- Linux Network Security.chm
- Linux Security Cookbook.chm
- Mac OS X Maximum Security.chm
- Mac OS X Security.chm
- Mainframe Basics for Security Professionals - Getting Started with RACF.pdf
- Malicious Cryptography - Exposing Cryptovirology.pdf
- Malware - Fighting Malicious Code.chm
- Malware Detection.pdf
- Malware Forensics - Investigating & Analyzing Malicious Code.pdf
- Managing Cisco Network Security.pdf
- Managing Security with Snort & IDS Tools.chm
- Mastering FreeBSD & OpenBSD Security.chm
- Mastering Network Security.pdf
- Mastering Windows Network Forensics & Investigation.chm
- Maximum Linux Security, 2nd Ed..pdf
- Maximum Security, 4th Ed..chm
- Maximum Wireless Security.chm
- MCSA-MCSE Implementing & Administering Security in a Microsoft Windows Server 2003 Network Self-Paced Training Kit [Exam 70-299] .pdf
- MCSE Core Elective Exams in a Nutshell - A Desktop Quick Reference.chm
- MCSE Designing Security for a Microsoft Windows Server 2003 Network Self-Paced Training Kit [Exam 70-298] .chm
- MCSE Implementing & Administering Security in a Windows 2003 Network Exam Cram 2 [Exam 70-299] .chm
- Metasploit Toolkit for Penetration Testing, Exploit Development, & Vulnerability Research.pdf
- Microsoft Encyclopedia of Security.pdf
- Microsoft Forefront Security Administration Guide.pdf
- Microsoft Log Parser Toolkit.pdf
- Microsoft Windows Security Inside Out for Windows XP & Windows 2000.chm
- Microsoft Windows Server 2003 PKI & Certificate Security.pdf
- Mission Critical! Internet Security.pdf
- Mobile & Wireless Network Security & Privacy.pdf
- Mobility, Data Mining, & Privacy - Geographic Knowledge Discovery.pdf
- Modern Cryptography - Theory & Practice.pdf
- MORE Electronic Gadgets for the Evil Genius - 40 New Build-It-Yourself Projects.pdf
- Multicast & Group Security.pdf
- Multimedia Forensics & Security.pdf
- Multimedia Security Technologies for Digital Rights Management.pdf
- Nessus Network Auditing, 2nd Ed..pdf
- Nessus, Snort, & Ethereal Power Tools - Customizing Open Source Security Applications.pdf
- Netcat Power Tools.pdf
- Network Administrator Street Smarts - A Real World Guide to CompTIA Network Skills.pdf
- Network Intrusion Detection, 3rd Ed..pdf
- Network Perimeter Security - Building Defense In-Depth.chm
- Network Security - Know It All.pdf
- Network Security Assessment - From Vulnerability to Patch.pdf
- Network Security Assessment - Know Your Network, 2nd Ed..pdf
- Network Security Assessment - Know Your Network.chm
- Network Security Bible.pdf
- Network Security Hacks - 100 Industrial-Strength Tips & Tools.chm
- Network Security Hacks - Tips & Tools for Protecting Your Privacy, 2nd Ed..chm
- Network Security Illustrated.pdf
- Network Security JumpStart.pdf
- Network Security Technologies & Solutions.chm
- Network Security Tools - Writing, Hacking, & Modifying Security Tools.chm
- Network Security with OpenSSL.pdf
- Network Warrior.pdf
- Networking with Microsoft Windows Vista - Your Guide to Easy & Secure Windows Vista Networking.pdf
- Nmap in the Enterprise - Your Guide to Network Scanning.pdf
- No Tech Hacking - A Guide to Social Engineering, Dumpster Diving, & Shoulder Surfing.pdf
- Official (ISC)2 Guide to the CISSP Exam.pdf
- Online Business Security Systems.pdf
- Open Source Fuzzing Tools.pdf
- Open Source Security Tools - A Practical Guide to Security Applications.chm
- Oracle Security.chm
- OS X Exploits & Defense.pdf
- OS X for Hackers at Heart - The Apple of Every Hacker's Eye.pdf
- OSSEC Host-Based Intrusion Detection Guide.pdf
- PCI Compliance - Understand & Implement Effective PCI Data Security Standard Compliance.pdf
- Penetration Tester's Open Source Toolkit, Vol. 2.pdf
- Penetration Tester's Open Source Toolkit.pdf
- Penetration Testing & Network Defense.chm
- Perfect Passwords - Selection, Protection, Authentication.pdf
- Perl Scripting for Windows Security - Live Response, Forensic Analysis, & Monitoring.pdf
- PGP & GPG - Email for the Practical Paranoid.pdf
- Phishing - Cutting the Identity Theft Line.pdf
- Phishing Exposed.pdf
- PHP Oracle Web Development - Data processing, Security, Caching, XML, Web Services, & AJAX.pdf
- Physical & Logical Security Convergence - Powered By Enterprise Security Management.pdf
- Practical Guide for Implementing Secure Intranets & Extranets.chm
- Practical Hacking Techniques & Countermeasures.pdf
- Practical Oracle Security - Your Unauthorized Guide to Relational Database Security.pdf
- Practical Packet Analysis - Using Wireshark to Solve Real-World Network Problems.pdf
- Practical Unix & Internet Security, 3rd Ed..chm
- Practical VoIP Security.pdf
- Preventing Web Attacks with Apache.chm
- Privacy Defended - Protecting Yourself Online.chm
- Privacy Preserving Data Mining.pdf
- Privacy Protection & Computer Forensics, 2nd Ed..pdf
- Privacy, Security, & Trust within the Context of Pervasive Computing.pdf
- Probabilistic & Statistical Methods in Cryptology - An Introduction by Selected Topics.pdf
- Professional Rootkits.chm
- Professional Windows Desktop & Server Hardening.chm
- Real 802.11 Security - Wi-Fi Protected Access & 802.11i.chm
- Reverse Engineering Code with IDA Pro.pdf
- Reverse Engineering of Object Oriented Code.pdf
- Reversing - Secrets of Reverse Engineering.pdf
- RFID Handbook - Applications, Technology, Security, & Privacy.pdf
- RFID Security.pdf
- Rootkits - Subverting the Windows Kernel.chm
- Rootkits for Dummies.pdf
- Router Security Strategies - Securing IP Network Traffic Planes.pdf
- RSA Security's Official Guide to Cryptography.pdf
- Sarbanes-Oxley IT Compliance Using COBIT & Open Source Tools.chm
- Sarbanes-Oxley IT Compliance Using Open Source Tools, 2nd Ed..pdf
- Secrets Stolen, Fortunes Lost - Preventing Intellectual Property Theft & Economic Espionage in the 21st Century.pdf
- Secure Coding - Principles & Practices.chm
- Secure Communicating Systems - Design, Analysis, & Implementation.pdf
- Secure Computer & Network Systems - Modeling, Analysis, & Design.pdf
- Secure Data Management in Decentralized Systems.pdf
- Secure Programming Cookbook for C & C .chm
- Secure Programming with Static Analysis.pdf
- Securing & Optimizing Linux - The Hacking Solution.pdf
- Securing IM & P2P Applications for the Enterprise.pdf
- Securing the Information Infrastructure.pdf
- Securing VoIP Networks - Threats, Vulnerabilities, & Countermeasures.pdf
- Securing Web Services with WS-Security - Demystifying WS-Security, WS-Policy, SAML, XML Signature, & XML Encryption.chm
- Securing Windows Server 2003.chm
- Securing Windows Server 2008 - Prevent Attacks from Outside & Inside Your Organization.pdf
- Securing Your Business with Cisco ASA & PIX Firewalls.chm
- Security & Quality of Service in Ad Hoc Wireless Networks.pdf
- Security & Usability - Designing Secure Systems that People Can Use.chm
- Security for Microsoft Visual Basic .NET.chm
- Security for Wireless Ad Hoc Networks.pdf
- Security in Computing, 3rd Ed..chm
- Security in Computing, 4th Ed..chm
- Security in Distributed, Grid, Mobile, & Pervasive Computing.pdf
- Security in Wireless LANs & MANs.pdf
- Security Log Management - Identifying Patterns in the Chaos.pdf
- Security Power Tools.pdf
- Security Technologies for the World Wide Web, 2nd Ed..pdf
- Security Warrior.chm
- Security Study Guide, 2nd Ed. [SYO-101] .pdf
- Security, Privacy, & Trust in Modern Data Management.pdf
- Self-Defending Networks - The Next Generation of Network Security.pdf
- SELinux - NSA's Open Source Security Enhanced Linux.chm
- SELinux by Example - Using Security Enhanced Linux.chm
- Shellcoder's Programming Uncovered.chm
- Simple Computer Security - Disinfect Your PC.pdf
- Snort 2.1 Intrusion Detection, 2nd Ed..pdf
- Snort Cookbook.chm
- Snort IDS & IPS Toolkit.pdf
- Sockets, Shellcode, Porting, & Coding - Reverse Engineering Exploits & Tool Coding for Security Professionals.pdf
- Software Piracy Exposed.pdf
- Special Ops - Host & Network Security for Microsoft, UNIX, & Oracle.pdf
- SSH, The Secure Shell - The Definitive Guide.pdf
- SSL & TLS Essentials - Securing the Web.pdf
- SSL Remote Access VPNs.pdf
- Static & Dynamic Reverse Engineering Techniques for Java Software Systems.pdf
- Static & Dynamic Reverse Engineering Techniques for Java Software Sytems.pdf
- Steal This Computer Book 3 - What They Won't Tell You About the Internet.chm
- Stealing the Network - How to Own a Continent.chm
- Stealing the Network - How to Own a Shadow.pdf
- Stealing the Network - How to Own an Identity.pdf
- Stealing the Network - How to Own the Box.pdf
- Strategic Information Security.chm
- Surveillance & Security - Technological Politics & Power in Everyday Life.pdf
- Syngress Force Emerging Threat Analysis - From Mischief to Malicious.pdf
- Tangled Web - Tales of Digital Crime from the Shadows of Cyberspace.pdf
- The Apache Modules Book - Application Development with Apache.pdf
- The Art of Computer Virus Research & Defense.chm
- The Art of Deception - Controlling the Human Element of Security.pdf
- The Art of Intrusion - The Real Stories Behind the Exploits of Hackers, Intruders, & Deceivers.pdf
- The Art of Software Security Assessment - Identifying & Preventing Software Vulnerabilities.chm
- The Best Damn Firewall Book Period, 2nd Ed..pdf
- The Best Damn Firewall Book Period.pdf
- The Best Damn IT Security Management Book Period.pdf
- The Book of PF - A No-Nonsense Guide to the OpenBSD Firewall.pdf
- The Business Case for Network Security - Advocacy, Governance, & ROI.chm
- The CISSP & CAP Prep Guide - Platinum Ed..chm
- The CISSP Prep Guide - Gold Ed..pdf
- The CISSP Prep Guide - Mastering the Ten Domains of Computer Security.pdf
- The Complete Idiot's Guide to Protecting Yourself Online.pdf
- The Craft of System Security.chm
- The Database Hacker's Handbook - Defending Database Servers.chm
- The Ethical Hack - A Framework for Business Value Penetration Testing.pdf
- The Giant Black Book of Computer Viruses.pdf
- The International Handbook of Computer Security.pdf
- The IT Regulatory & Standards Compliance Handbook - How to Survive an Information Systems Audit & Assessments.pdf
- The Naked Employee - How Technology Is Compromising Workplace Privacy.chm
- The Official CHFI Study Guide for Computer Hacking Forensics Investigators [Exam 312-49] .pdf
- The Oracle Hacker's Handbook - Hacking & Defending Oracle.chm
- The Shellcoder's Handbook - Discovering & Exploiting Security Holes.chm
- The Tao of Network Security Monitoring - Beyond Intrusion Detection.chm
- The Web Application Hacker's Handbook - Discovering & Exploiting Security Flaws.pdf
- Understanding Forensic Digital Imaging.pdf
- UNIX & Linux Forensic Analysis DVD Toolkit.pdf
- Virtual Honeypots - From Botnet Tracking to Intrusion Detection.chm
- WAP, Bluetooth, & 3G Programming - Cracking the Code.pdf
- Wardriving & Wireless Penetration Testing.pdf
- WarDriving-Drive, Detect, Defend - A Guide to Wireless Security.chm
- Web Application Vulnerabilities - Detect, Exploit, Prevent.pdf
- Web Hacking - Attacks & Defense.chm
- Web Security & Commerce.pdf
- Web Security, Privacy, & Commerce, 2nd Ed..chm
- Web Services Security & E-Business.pdf
- Web Services Security.chm
- Webster's New World Hacker Dictionary.pdf
- Wi-Foo - The Secrets of Wireless Hacking.chm
- Windows Forensic Analysis.pdf
- Windows Forensics & Incident Recovery.chm
- Windows Server 2003 Security Guide.pdf
- Windows Server 2008 Networking & Network Access Protection (NAP).pdf
- Windows Server 2008 Security Resource Kit.pdf
- Windows Vista Security - Securing Vista Against Malicious Attacks.chm
- Windows XP Hacks & Mods For Dummies.pdf
- Wireless Network Hacks & Mods for Dummies.pdf
- Wireless Operational Security.chm
- Wireless Personal Area Networks - Performance, Interconnection, & Security with IEEE 802.15.4.pdf
- Wireless Security Handbook.pdf
- Wireshark & Ethereal Network Protocol Analyzer Toolkit.pdf
- Writing Secure Code for Windows Vista.chm
- Writing Secure Code, 2nd Ed..chm
- Writing Secure Code.pdf
- Writing Security Tools & Exploits.pdf
- XSS Attacks - Cross Site Scripting Exploits & Defense.pdf
- Zero-Day Exploit - Countdown to Darkness.pdf
|
|
|
|
|
[Document] Ebook Hacker 4.1GB - Computer Security Enthusiast |
12/02/2014 11:51:58 (+0700) | #2 | 279729 |
smartking91
Member
|
0 |
|
|
Joined: 25/03/2010 21:41:46
Messages: 16
Offline
|
|
Cảm ơn đã chia sẻ, nhưng mà sao nhiều thế? Nhơn hơn 4GB :-o |
|
|
[Document] Ebook Hacker 4.1GB - Computer Security Enthusiast |
16/02/2014 02:32:59 (+0700) | #3 | 279777 |
C37c4s69vScCm
Member
|
0 |
|
|
Joined: 20/01/2014 11:20:10
Messages: 2
Offline
|
|
Users currently in here |
1 Anonymous
|
|
Powered by JForum - Extended by HVAOnline
hvaonline.net | hvaforum.net | hvazone.net | hvanews.net | vnhacker.org
1999 - 2013 ©
v2012|0504|218|
|
|