zhongziso种子搜
首页
功能
磁力转BT
BT转磁力
使用教程
免责声明
关于
zhongziso
搜索
Computer Security Enthusiast
magnet:?xt=urn:btih:914FA10E4026771E4056E09EE5517D49474AC0F8&dn=Computer Security Enthusiast
磁力链接详情
Hash值:
914FA10E4026771E4056E09EE5517D49474AC0F8
点击数:
95
文件大小:
3.02 GB
文件数量:
379
创建日期:
2008-11-20 20:35
最后访问:
2024-12-25 16:16
访问标签:
Computer
Security
Enthusiast
文件列表详情
101 Spy Gadgets for the Evil Genius.pdf.7z 40.98 MB
1337 h4x0r h4ndb00k.chm.7z 1.82 MB
19 Deadly Sins of Software Security - Programming Flaws & How to Fix Them.chm.7z 1.37 MB
22 Radio & Receiver Projects for the Evil Genius.pdf.7z 5.71 MB
50 Awesome Auto Projects for the Evil Genius.pdf.7z 18.48 MB
51 High-Tech Practical Jokes for the Evil Genius.pdf.7z 10.03 MB
802.11 Security.pdf.7z 816.72 KB
A Classical Introduction to Cryptography Exercise Book.pdf.7z 7.75 MB
A Technical Guide to IPSec Virtual Private Networks.pdf.7z 4.76 MB
AAA & Network Security for Mobile Access - Radius, Diameter, EAP, PKI, & IP Mobility.pdf.7z 3.45 MB
Absolute OpenBSD - UNIX for the Practical Paranoid.chm.7z 1.02 MB
Access Denied - The Practice & Policy of Global Internet Filtering.pdf.7z 6.37 MB
Active Defense - A Comprehensive Guide to Network Security.pdf.7z 5.8 MB
Administering & Securing the Apache Server.chm.7z 13.61 MB
Advances in Elliptic Curve Cryptography.pdf.7z 1.79 MB
Aggressive Network Self-Defense.pdf.7z 80.93 MB
Ajax Security.pdf.7z 11.42 MB
Anti-Hacker Tool Kit, 2nd Ed..chm.7z 29.17 MB
Anti-Hacker Tool Kit, 3rd Ed..chm.7z 34.84 MB
Apache Security.chm.7z 1.61 MB
Applied Cryptanalysis - Breaking Ciphers in the Real World.pdf.7z 16.36 MB
Applied Cryptography & Network Security - 2nd International Conference, ACNS 2004.pdf.7z 8.14 MB
Applied Cryptography - Protocols, Algorithms, & Source COde in C, 2nd Ed..chm.7z 3.64 MB
AVIEN Malware Defense Guide for the Enterprise.pdf.7z 4.96 MB
Beginning Cryptography with Java.chm.7z 2.47 MB
BigNum Math - Implementing Cryptographic Multiple Precision Arithmetic.pdf.7z 3.23 MB
Biometrics & Network Security.chm.7z 1.11 MB
Black Hat Physical Device Security - Exploiting Hardware & Software.pdf.7z 76.12 MB
Blackjacking - Security Threats to BlackBerry Devices, PDAs, & Cell Phones in the Enterprise.pdf.7z 9.02 MB
Bluetooth Security.pdf.7z 691.85 KB
Botnets - The Killer Web App.pdf.7z 5.27 MB
Brute Force - Cracking the Data Encryption Standard.pdf.7z 1.53 MB
Buffer Overflow Attacks - Detect, Exploit, Prevent.pdf.7z 2.9 MB
Building DMZs for Enterprise Networks.pdf.7z 8.14 MB
Building Internet Firewalls, 2nd Ed..pdf.7z 4.66 MB
Building Secure Servers with Linux.chm.7z 1.16 MB
Building Secure Servers with Linux.pdf.7z 2.51 MB
Building Secure Wireless Networks with 802.11.pdf.7z 5.54 MB
Bulletproof Wireless Security - GSM, UMTS, 802.11, & Ad Hoc Security.pdf.7z 2.35 MB
CCNA Security Official Exam Certification Guide [Exam 640-553].pdf.7z 13.16 MB
CCSP Cisco Secure PIX Firewall Advanced Exam Certification Guide.pdf.7z 10.45 MB
CD & DVD Forensics.pdf.7z 4.4 MB
CD Cracking Uncovered - Protection Against Unsanctioned CD Copying.chm.7z 9.08 MB
CEH - Official Certified Ethical Hacker Review Guide [Exam 312-50].pdf.7z 3.1 MB
CEH Official Certified Ethical Hacker Review Guide.pdf.7z 3.1 MB
Certified Ethical Hacker Exam Prep [Exam 312-50].chm.7z 8.33 MB
Certified Ethical Hacking Official Course Material [Exam 312-50].chm.7z 14.29 MB
Cisco ASA, PIX, & FWSM Firewall Handbook, 2nd Ed..pdf.7z 7.48 MB
Cisco IOS Access Lists.pdf.7z 1.28 MB
Cisco NAC Appliance - Enforcing Host Security with Clean Access.pdf.7z 21.43 MB
Cisco Network Security Little Black Book.pdf.7z 2.77 MB
Cisco Router Firewall Security.chm.7z 5.83 MB
Cisco Secure Firewall Services Module (FWSM).pdf.7z 1.92 MB
Cisco Secure Internet Security Solutions.pdf.7z 6.22 MB
Cisco Security Professional's Guide to Secure Intrusion Detection Systems.pdf.7z 12.16 MB
Cisco Wireless LAN Security.chm.7z 5.82 MB
Codes & Ciphers - Julius Caesar, the Enigma, & the Internet.pdf.7z 1.02 MB
Codes - The Guide to Secrecy from Ancient to Modern Times.pdf.7z 4.68 MB
Combating Spyware in the Enterprise.pdf.7z 7.14 MB
Complexity & Cryptography - An Introduction.pdf.7z 1.09 MB
CompTIA Security+ Study Guide & Practice Exam, 2nd Ed. [Exam JK0-010].pdf.7z 9.11 MB
Computer & Intrusion Forensics.pdf.7z 2.56 MB
Computer Network Security.pdf.7z 21.45 MB
Computer Security & Cryptography.pdf.7z 8.34 MB
Computer Security Basics, 2nd Ed..chm.7z 1.65 MB
Computer Security, Privacy, & Politics - Current Issues, Challenges, & Solutions.pdf.7z 1.63 MB
Computer Viruses & Malware.pdf.7z 9.15 MB
Computer Viruses - From Theory to Applications.pdf.7z 2.28 MB
Computer Viruses for Dummies.pdf.7z 2.33 MB
Configuring Juniper Networks NetScreen & SSG Firewalls.pdf.7z 9.33 MB
Configuring NetScreen Firewalls.pdf.7z 5.93 MB
Configuring SonicWALL Firewalls.pdf.7z 10.82 MB
Contemporary Cryptography.pdf.7z 2.37 MB
Core Security Patterns - Best Practices & Strategies for J2EE, Web Services, & Identity Management.chm.7z 7.3 MB
Covert Java - Techniques for Decompiling, Patching, & Reverse Engineering.pdf.7z 2.08 MB
Crackproof Your Software - Protect Your Software Against Crackers.pdf.7z 7.11 MB
Crimeware - Understanding New Attacks & Defenses.chm.7z 10.42 MB
Cryptography & Network Security, 4th Ed..chm.7z 12.52 MB
Cryptography & Security Services - Mechanisms & Applications.pdf.7z 4.4 MB
Cryptography - A Very Short Introduction.chm.7z 1.31 MB
Cryptography for Developers.pdf.7z 2.67 MB
Cryptography for Dummies.chm.7z 4.02 MB
Cryptography in C & C++.chm.7z 3.5 MB
Cryptology Unlocked.pdf.7z 1.81 MB
Cyber Crime Investigator's Field Guide.pdf.7z 1.54 MB
Cyber Forensics - A Field Manual for Collecting, Examining, & Preserving Evidence of Computer Crimes.pdf.7z 3.5 MB
Decrypted Secrets - Methods & Maxims of Cryptology, 4th, Revised & Extended Ed..pdf.7z 11.45 MB
Defend I.T. - Security by Example.chm.7z 1.33 MB
Defense & Detection Strategies against Internet Worms.pdf.7z 1.02 MB
Deploying Secure 802.11 Wireless Networks with Microsoft Windows.chm.7z 6.91 MB
Designing BSD Rootkits - An Introduction to Kernel Hacking.pdf.7z 5.35 MB
Developer's Guide to Web Application Security.pdf.7z 9.62 MB
Disassembling Code - IDA Pro & SoftICE.chm.7z 4.16 MB
Effective Oracle Database 10g Security by Design.chm.7z 2.98 MB
Electronic Gadgets for the Evil Genius - 28 Build-It-Yourself Projects.pdf.7z 54.93 MB
EnCase Computer Forensics - The Official EnCE-EnCase Certified Examiner Study Guide, 2nd Ed..pdf.7z 13.35 MB
Encyclopedia of Cryptology.chm.7z 2.26 MB
End-to-End Network Security - Defense-in-Depth.pdf.7z 11.07 MB
Enemy at the Water Cooler - Real-Life Stories of Insider Threats & Enterprise Security Management Countermeasures.pdf.7z 4.92 MB
Enterprise Java Security - Building Secure J2EE Applications.chm.7z 3.93 MB
Ethereal Packet Sniffing.chm.7z 17.3 MB
Expert Web Services Security in the .NET Platform.chm.7z 21.64 MB
Exploiting Software - How to Break Code.pdf.7z 4.44 MB
Fast Track to Security.pdf.7z 6.16 MB
File System Forensic Analysis.chm.7z 3.84 MB
Firewall Fundamentals.chm.7z 10.16 MB
Firewall Policies & VPN Configurations.pdf.7z 5.58 MB
Firewalls & Internet Security - Repelling the Wily Hacker, 2nd Ed..pdf.7z 56.81 MB
Firewalls - Jumpstart for Network & Systems Administrators.pdf.7z 1.47 MB
Firewalls for Dummies, 2nd Ed..pdf.7z 6.77 MB
Forensic Computer Crime Investigation.pdf.7z 2.25 MB
Forensic Computing - A Practitioner's Guide, 2nd Ed..pdf.7z 9.02 MB
Foundations of Computer Security.pdf.7z 1.79 MB
Foundations of Cryptography - A Primer.pdf.7z 748.64 KB
Foundations of Cryptography - Vol. 1, Basic Tools.pdf.7z 2.34 MB
Foundations of Mac OS X Leopard Security.pdf.7z 20.41 MB
Foundations of Security - What Every Programmer Needs to Know.pdf.7z 2.18 MB
Fundamentals of Cryptology - A Professional Reference & Interactive Tutorial.pdf.7z 26.18 MB
Fuzzing - Brute Force Vulnerability Discovery.pdf.7z 42.05 MB
Google Hacking for Penetration Testers, Vol. 2.pdf.7z 11.66 MB
Google Hacking for Penetration Testers.pdf.7z 9.62 MB
Gray Hat Hacking - The Ethical Hacker's Handbook, 2nd Ed..pdf.7z 8.03 MB
Guide to Elliptic Curve Cryptography.pdf.7z 2.36 MB
Hack Attacks Revealed - A Complete Reference with Custom Security Hacking Toolkit.chm.7z 6.35 MB
Hack I.T. - Security through Penetration Testing.chm.7z 4.62 MB
Hack Proofing ColdFusion - The Only Way to Stop a Hacker Is to Think Like One.pdf.7z 6.45 MB
Hack Proofing Linux - Your Guide to Open Source Security.pdf.7z 9.74 MB
Hack Proofing Sun Solaris 8 - Protect Your Solaris Network from Attack.pdf.7z 5.51 MB
Hack Proofing Windows 2000 Server.pdf.7z 9.53 MB
Hack Proofing XML - The Only Way to Stop a Hacker Is to Think Like One.pdf.7z 5.53 MB
Hack Proofing Your E-Commerce Site - The Only Way to Stop a Hacker Is to Think Like One.pdf.7z 6 MB
Hack Proofing Your Identity in the Information Age - Protect Your Family on the Internet!.pdf.7z 7.1 MB
Hack Proofing Your Network, 2nd Ed. - The Only Way to Stop a Hacker Is to Think Like One.pdf.7z 7.35 MB
Hack Proofing Your Network.pdf.7z 2.48 MB
Hack Proofing Your Web Applications - The Only Way to Stop a Hacker Is to Think Like One.pdf.7z 7.18 MB
Hack Proofing Your Wireless Network - Protect Your Wireless Network from Attack.pdf.7z 5.51 MB
Hack the Stack - Using Snort & Ethereal to Master the 8 Layers of an Insecure Network.pdf.7z 5.99 MB
Hacker Debugging Uncovered.chm.7z 14.42 MB
Hacker Disassembling Uncovered.chm.7z 4.77 MB
Hacker Linux Uncovered.chm.7z 4.51 MB
Hacker Web Exploitation Uncovered.chm.7z 554.28 KB
Hacker's Challenge - Test Your Incident Response Skills Using 20 Scenarios.pdf.7z 3.91 MB
Hacker's Delight.chm.7z 2.1 MB
Hackers - Heroes of the Computer Revolution.pdf.7z 2.02 MB
Hackers Beware - Defending Your Network from the Wiley Hacker.pdf.7z 4.31 MB
Hacking - The Art of Exploitation, 2nd Ed..chm.7z 4.71 MB
Hacking - The Art of Exploitation.chm.7z 1.4 MB
Hacking a Terror Network - The Silent Threat of Covert Channels.pdf.7z 6.25 MB
Hacking Exposed, 2nd Ed. - Network Security Secrets & Solutions.pdf.7z 7.41 MB
Hacking Exposed-Cisco Networks - Cisco Security Secrets & Solutions.chm.7z 9.92 MB
Hacking Exposed-Linux - Linux Security Secrets & Solutions.pdf.7z 88.82 MB
Hacking Exposed-Network Security - Secrets & Solutions, 2nd Ed..pdf.7z 7.41 MB
Hacking Exposed-Network Security - Secrets & Solutions, 3rd Ed..pdf.7z 4.66 MB
Hacking Exposed-VoIP - Voice Over IP Security Secrets & Solutions.chm.7z 16.53 MB
Hacking Exposed-Web 2.0 - Web 2.0 Security Secrets & Solutions.pdf.7z 3.94 MB
Hacking Exposed-Web Applications - Web Application Security Secrets & Solutions.pdf.7z 4 MB
Hacking Exposed-Windows - Windows Security Secrets & Solutions, 3rd Ed..pdf.7z 4.42 MB
Hacking Exposed-Wireless - Wireless Security Secrets & Solutions.chm.7z 12.37 MB
Hacking for Dummies, 2nd Ed..pdf.7z 4.08 MB
Hacking for Dummies.pdf.7z 5.32 MB
Hacking Wireless Networks for Dummies.pdf.7z 7.71 MB
HackNotes - Linux & Unix Security Portable Reference.pdf.7z 1.76 MB
HackNotes - Network Security Portable Reference.pdf.7z 1.98 MB
HackNotes - Web Security Portable Reference.pdf.7z 1.87 MB
HackNotes - Windows Security Portable Reference.pdf.7z 2.74 MB
Halting the Hacker - A Practical Guide to Computer Security, 2nd Ed..chm.7z 628.52 KB
Handbook of Digital & Multimedia Forensic Evidence.pdf.7z 1.74 MB
Hardening Apache.chm.7z 1.06 MB
Hardening Linux.chm.7z 9.48 MB
Hardening Linux.pdf.7z 2.11 MB
Hardening Network Infrastructure.chm.7z 17.12 MB
Hardening Windows Systems.chm.7z 23.73 MB
Hardening Windows, 2nd Ed..pdf.7z 3.85 MB
Hardening Windows.chm.7z 1.71 MB
Home Network Security Simplified.chm.7z 14.31 MB
Honeypots - Tracking Hackers.chm.7z 2.5 MB
Honeypots for Windows.chm.7z 16.2 MB
How to Cheat at Configuring Open Source Security Tools - The Perfect Reference for the Multitasked SysAdmin.pdf.7z 6.29 MB
How to Cheat at Securing Linux - The Perfect Reference for the Multitasked SysAdmin.pdf.7z 8.14 MB
How to Cheat at VolP Security.pdf.7z 40.86 MB
Implementing Email Security & Tokens - Current Standards, Tools, & Practices.pdf.7z 1.42 MB
Implementing NAP & NAC Security Technologies - The Complete Guide to Network Access Control.pdf.7z 5.33 MB
Implementing SSH - Strategies for Optimizing the Secure Shell.pdf.7z 5.75 MB
Incident Response & Computer Forensics, 2nd Ed..pdf.7z 9.34 MB
Incident Response - Computer Forensics Toolkit.pdf.7z 4.15 MB
Information Security Policies & Procedures - A Practitioner's Reference, 2nd Ed..pdf.7z 1.6 MB
InfoSec Career Hacking - Sell Your Skillz, Not Your Soul.pdf.7z 82.21 MB
InfoSecurity 2008 Threat Analysis.pdf.7z 9.38 MB
Inside Java 2 Platform Security, 2nd Ed. - Architecture, API Design, & Implementation.chm.7z 1.17 MB
Inside Network Perimeter Security, 2nd Ed..chm.7z 8.65 MB
Inside the Spam Cartel - Trade Secrets from the Dark Side.chm.7z 6.04 MB
Insider Attack & Cyber Security - Beyond the Hacker.pdf.7z 2.19 MB
Insider Threat - Protecting the Enterprise from Sabotage, Spying, & Theft.pdf.7z 4.03 MB
Internet Denial of Service - Attack & Defense Mechanisms.chm.7z 2.06 MB
Internet Forensics.chm.7z 839.55 KB
Internet Security - Cryptographic Principles, Algorithms, & Protocols.pdf.7z 1.84 MB
Introduction to Communication Electronic Warfare Systems.pdf.7z 40.89 MB
Introduction to Cryptography - Principles & Applications, 2nd Ed..pdf.7z 2.02 MB
Intrusion Detection & Prevention.chm.7z 3.16 MB
Intrusion Prevention Fundamentals.chm.7z 2.12 MB
Jeff Duntemann's Drive-By Wi-Fi Guide.chm.7z 12.74 MB
Juniper Networks Field Guide & Reference.chm.7z 3.13 MB
Juniper Networks Secure Access SSL VPN Configuration Guide.pdf.7z 16.26 MB
Kismet Hacking.pdf.7z 3.77 MB
LAN Switch Security - What Hackers Know About Your Switches.pdf.7z 2.64 MB
Linux Firewalls - Attack Detection & Response with iptables, psad, & fwsnort.pdf.7z 3.85 MB
Linux Network Security.chm.7z 6.52 MB
Linux Security Cookbook.chm.7z 643.31 KB
Mac OS X Maximum Security.chm.7z 3.71 MB
Mac OS X Security.chm.7z 4.63 MB
Mainframe Basics for Security Professionals - Getting Started with RACF.pdf.7z 3.42 MB
Malicious Cryptography - Exposing Cryptovirology.pdf.7z 2.19 MB
Malware - Fighting Malicious Code.chm.7z 6.39 MB
Malware Detection.pdf.7z 14.25 MB
Malware Forensics - Investigating & Analyzing Malicious Code.pdf.7z 17.22 MB
Managing Cisco Network Security.pdf.7z 4.42 MB
Managing Security with Snort & IDS Tools.chm.7z 1.74 MB
Mastering FreeBSD & OpenBSD Security.chm.7z 1.33 MB
Mastering Network Security.pdf.7z 2.36 MB
Mastering Windows Network Forensics & Investigation.chm.7z 45.71 MB
Maximum Linux Security, 2nd Ed..pdf.7z 4 MB
Maximum Security, 4th Ed..chm.7z 2.93 MB
Maximum Wireless Security.chm.7z 4.24 MB
Metasploit Toolkit for Penetration Testing, Exploit Development, & Vulnerability Research.pdf.7z 3.58 MB
Microsoft Encyclopedia of Security.pdf.7z 7.27 MB
Microsoft Forefront Security Administration Guide.pdf.7z 16.17 MB
Microsoft Windows Security Inside Out for Windows XP & Windows 2000.chm.7z 19.47 MB
Mission Critical! Internet Security.pdf.7z 3.5 MB
Mobile & Wireless Network Security & Privacy.pdf.7z 2.93 MB
Mobility, Data Mining, & Privacy - Geographic Knowledge Discovery.pdf.7z 3.36 MB
Modern Cryptography - Theory & Practice.pdf.7z 11.07 MB
MORE Electronic Gadgets for the Evil Genius - 40 New Build-It-Yourself Projects.pdf.7z 56.02 MB
Multicast & Group Security.pdf.7z 2.36 MB
Multimedia Forensics & Security.pdf.7z 10.42 MB
Multimedia Security Technologies for Digital Rights Management.pdf.7z 2.66 MB
Nessus Network Auditing, 2nd Ed..pdf.7z 8.72 MB
Nessus, Snort, & Ethereal Power Tools - Customizing Open Source Security Applications.pdf.7z 4.32 MB
Netcat Power Tools.pdf.7z 8.52 MB
Network Administrator Street Smarts - A Real World Guide to CompTIA Network+ Skills.pdf.7z 9.75 MB
Network Intrusion Detection, 3rd Ed..pdf.7z 2.03 MB
Network Perimeter Security - Building Defense In-Depth.chm.7z 3.56 MB
Network Security - Know It All.pdf.7z 4.96 MB
Network Security Assessment - From Vulnerability to Patch.pdf.7z 7.5 MB
Network Security Assessment - Know Your Network, 2nd Ed..pdf.7z 4.07 MB
Network Security Assessment - Know Your Network.chm.7z 1.68 MB
Network Security Bible.pdf.7z 5.58 MB
Network Security Hacks - 100 Industrial-Strength Tips & Tools.chm.7z 1.62 MB
Network Security Hacks - Tips & Tools for Protecting Your Privacy, 2nd Ed..chm.7z 3.88 MB
Network Security Illustrated.pdf.7z 8.43 MB
Network Security JumpStart.pdf.7z 1.42 MB
Network Security Technologies & Solutions.chm.7z 26.27 MB
Network Security Tools - Writing, Hacking, & Modifying Security Tools.chm.7z 1.29 MB
Network Security with OpenSSL.pdf.7z 1.28 MB
Network Warrior.pdf.7z 5.19 MB
No Tech Hacking - A Guide to Social Engineering, Dumpster Diving, & Shoulder Surfing.pdf.7z 20.59 MB
Open Source Fuzzing Tools.pdf.7z 2.91 MB
Open Source Security Tools - A Practical Guide to Security Applications.chm.7z 5.67 MB
Oracle Security.chm.7z 1.3 MB
OS X Exploits & Defense.pdf.7z 6.71 MB
OS X for Hackers at Heart - The Apple of Every Hacker's Eye.pdf.7z 13.36 MB
Penetration Tester's Open Source Toolkit, Vol. 2.pdf.7z 20.61 MB
Penetration Tester's Open Source Toolkit.pdf.7z 25.47 MB
Penetration Testing & Network Defense.chm.7z 14.75 MB
Perfect Passwords - Selection, Protection, Authentication.pdf.7z 1.22 MB
Perl Scripting for Windows Security - Live Response, Forensic Analysis, & Monitoring.pdf.7z 4.11 MB
PGP & GPG - Email for the Practical Paranoid.pdf.7z 1.75 MB
Phishing - Cutting the Identity Theft Line.pdf.7z 6.43 MB
PHP Oracle Web Development - Data processing, Security, Caching, XML, Web Services, & AJAX.pdf.7z 3.05 MB
Physical & Logical Security Convergence - Powered By Enterprise Security Management.pdf.7z 7.53 MB
Practical Guide for Implementing Secure Intranets & Extranets.chm.7z 5.49 MB
Practical Hacking Techniques & Countermeasures.pdf.7z 63.85 MB
Practical Oracle Security - Your Unauthorized Guide to Relational Database Security.pdf.7z 3.35 MB
Practical Packet Analysis - Using Wireshark to Solve Real-World Network Problems.pdf.7z 7.31 MB
Practical Unix & Internet Security, 3rd Ed..chm.7z 2.4 MB
Practical VoIP Security.pdf.7z 6.12 MB
Preventing Web Attacks with Apache.chm.7z 6.06 MB
Privacy Preserving Data Mining.pdf.7z 5.63 MB
Privacy Protection & Computer Forensics, 2nd Ed..pdf.7z 2.52 MB
Privacy, Security, & Trust within the Context of Pervasive Computing.pdf.7z 1.82 MB
Probabilistic & Statistical Methods in Cryptology - An Introduction by Selected Topics.pdf.7z 1 MB
Professional Rootkits.chm.7z 7.92 MB
Professional Windows Desktop & Server Hardening.chm.7z 14.05 MB
Real 802.11 Security - Wi-Fi Protected Access & 802.11i.chm.7z 2.95 MB
Reverse Engineering of Object Oriented Code.pdf.7z 4.81 MB
Reversing - Secrets of Reverse Engineering.pdf.7z 3.83 MB
Rootkits - Subverting the Windows Kernel.chm.7z 1.6 MB
Rootkits for Dummies.pdf.7z 3.27 MB
Router Security Strategies - Securing IP Network Traffic Planes.pdf.7z 2.55 MB
RSA Security's Official Guide to Cryptography.pdf.7z 7.65 MB
Secure Coding - Principles & Practices.chm.7z 634.61 KB
Secure Computer & Network Systems - Modeling, Analysis, & Design.pdf.7z 1.71 MB
Secure Programming Cookbook for C & C++.chm.7z 1.35 MB
Secure Programming with Static Analysis.pdf.7z 3.64 MB
Securing & Optimizing Linux - The Hacking Solution.pdf.7z 5 MB
Securing IM & P2P Applications for the Enterprise.pdf.7z 4.48 MB
Securing the Information Infrastructure.pdf.7z 2.31 MB
Securing VoIP Networks - Threats, Vulnerabilities, & Countermeasures.pdf.7z 4.69 MB
Securing Web Services with WS-Security - Demystifying WS-Security, WS-Policy, SAML, XML Signature, & XML Encryption.chm.7z 3.83 MB
Securing Windows Server 2003.chm.7z 3.42 MB
Securing Windows Server 2008 - Prevent Attacks from Outside & Inside Your Organization.pdf.7z 12.07 MB
Securing Your Business with Cisco ASA & PIX Firewalls.chm.7z 4.78 MB
Security & Quality of Service in Ad Hoc Wireless Networks.pdf.7z 2.38 MB
Security for Microsoft Visual Basic .NET.chm.7z 7.69 MB
Security for Wireless Ad Hoc Networks.pdf.7z 3.23 MB
Security in Computing, 3rd Ed..chm.7z 4.91 MB
Security in Computing, 4th Ed..chm.7z 7.83 MB
Security in Distributed, Grid, Mobile, & Pervasive Computing.pdf.7z 2.89 MB
Security in Wireless LANs & MANs.pdf.7z 1.32 MB
Security Power Tools.pdf.7z 8.52 MB
Security Technologies for the World Wide Web, 2nd Ed..pdf.7z 2.45 MB
Security Warrior.chm.7z 4.54 MB
Security, Privacy, & Trust in Modern Data Management.pdf.7z 2.99 MB
Self-Defending Networks - The Next Generation of Network Security.pdf.7z 16.5 MB
SELinux - NSA's Open Source Security Enhanced Linux.chm.7z 1.05 MB
SELinux by Example - Using Security Enhanced Linux.chm.7z 3.96 MB
Shellcoder's Programming Uncovered.chm.7z 11.7 MB
Simple Computer Security - Disinfect Your PC.pdf.7z 4.86 MB
Snort 2.1 Intrusion Detection, 2nd Ed..pdf.7z 5.06 MB
Snort Cookbook.chm.7z 2.49 MB
Snort IDS & IPS Toolkit.pdf.7z 6.8 MB
Special Ops - Host & Network Security for Microsoft, UNIX, & Oracle.pdf.7z 10.78 MB
SSH, The Secure Shell - The Definitive Guide.pdf.7z 4.2 MB
SSL & TLS Essentials - Securing the Web.pdf.7z 1.01 MB
SSL Remote Access VPNs.pdf.7z 11.63 MB
Static & Dynamic Reverse Engineering Techniques for Java Software Systems.pdf.7z 1.01 MB
Static & Dynamic Reverse Engineering Techniques for Java Software Sytems.pdf.7z 1.01 MB
Steal This Computer Book 3 - What They Won't Tell You About the Internet.chm.7z 13.89 MB
Stealing the Network - How to Own a Continent.chm.7z 2.76 MB
Stealing the Network - How to Own a Shadow.pdf.7z 8.09 MB
Stealing the Network - How to Own an Identity.pdf.7z 5.77 MB
Stealing the Network - How to Own the Box.pdf.7z 3.4 MB
Surveillance & Security - Technological Politics & Power in Everyday Life.pdf.7z 2.65 MB
Syngress Force Emerging Threat Analysis - From Mischief to Malicious.pdf.7z 6.07 MB
Tangled Web - Tales of Digital Crime from the Shadows of Cyberspace.pdf.7z 2.03 MB
The Apache Modules Book - Application Development with Apache.pdf.7z 1.47 MB
The Art of Computer Virus Research & Defense.chm.7z 6.76 MB
The Art of Deception - Controlling the Human Element of Security.pdf.7z 3.57 MB
The Art of Intrusion - The Real Stories Behind the Exploits of Hackers, Intruders, & Deceivers.pdf.7z 1.15 MB
The Art of Software Security Assessment - Identifying & Preventing Software Vulnerabilities.chm.7z 4.54 MB
The Best Damn Firewall Book Period, 2nd Ed..pdf.7z 32.54 MB
The Best Damn Firewall Book Period.pdf.7z 15.35 MB
The Best Damn IT Security Management Book Period.pdf.7z 15.5 MB
The Book of PF - A No-Nonsense Guide to the OpenBSD Firewall.pdf.7z 4.12 MB
The Business Case for Network Security - Advocacy, Governance, & ROI.chm.7z 4.74 MB
The Craft of System Security.chm.7z 5.33 MB
The Database Hacker's Handbook - Defending Database Servers.chm.7z 1.13 MB
The Ethical Hack - A Framework for Business Value Penetration Testing.pdf.7z 3.43 MB
The Giant Black Book of Computer Viruses.pdf.7z 4.69 MB
The Naked Employee - How Technology Is Compromising Workplace Privacy.chm.7z 629.13 KB
The Oracle Hacker's Handbook - Hacking & Defending Oracle.chm.7z 483.62 KB
The Shellcoder's Handbook - Discovering & Exploiting Security Holes.chm.7z 2.11 MB
The Tao of Network Security Monitoring - Beyond Intrusion Detection.chm.7z 15.58 MB
The Web Application Hacker's Handbook - Discovering & Exploiting Security Flaws.pdf.7z 4.72 MB
Understanding Forensic Digital Imaging.pdf.7z 13.71 MB
UNIX & Linux Forensic Analysis DVD Toolkit.pdf.7z 3.85 MB
Virtual Honeypots - From Botnet Tracking to Intrusion Detection.chm.7z 4.1 MB
WAP, Bluetooth, & 3G Programming - Cracking the Code.pdf.7z 6.87 MB
Wardriving & Wireless Penetration Testing.pdf.7z 16.53 MB
WarDriving-Drive, Detect, Defend - A Guide to Wireless Security.chm.7z 37.51 MB
Web Application Vulnerabilities - Detect, Exploit, Prevent.pdf.7z 14.13 MB
Web Hacking - Attacks & Defense.chm.7z 6.38 MB
Web Security & Commerce.pdf.7z 2.92 MB
Web Security, Privacy, & Commerce, 2nd Ed..chm.7z 6.17 MB
Web Services Security & E-Business.pdf.7z 4.31 MB
Web Services Security.chm.7z 3.96 MB
Webster's New World Hacker Dictionary.pdf.7z 1.86 MB
Wi-Foo - The Secrets of Wireless Hacking.chm.7z 6.78 MB
Windows Forensic Analysis.pdf.7z 41.81 MB
Windows Forensics & Incident Recovery.chm.7z 7.23 MB
Windows Server 2003 Security Guide.pdf.7z 1.13 MB
Windows XP Hacks & Mods For Dummies.pdf.7z 10.65 MB
Wireless Network Hacks & Mods for Dummies.pdf.7z 3.66 MB
Wireless Operational Security.chm.7z 1.48 MB
Wireless Personal Area Networks - Performance, Interconnection, & Security with IEEE 802.15.4.pdf.7z 2.02 MB
Wireless Security Handbook.pdf.7z 8.43 MB
Wireshark & Ethereal Network Protocol Analyzer Toolkit.pdf.7z 10.52 MB
Writing Security Tools & Exploits.pdf.7z 6.62 MB
XSS Attacks - Cross Site Scripting Exploits & Defense.pdf.7z 4.88 MB
Zero-Day Exploit - Countdown to Darkness.pdf.7z 2.45 MB
其他位置