Magnetic link has been copied to the cutting board

Name Computer Security Enthusiast

File Type package

Size 4.11GB

UpdateDate 2024-10-30

hash *****FE5C96E1466DEB7BDB63B2844598E80D82

Hot 1

Files 101 Spy Gadgets for the Evil Genius.pdf.7z | 40.98MB 1337 h4x0r h4ndb00k.chm.7z | 1.82MB 19 Deadly Sins of Software Security - Programming Flaws & How to Fix Them.chm.7z | 1.37MB 22 Radio & Receiver Projects for the Evil Genius.pdf.7z | 5.71MB 50 Awesome Auto Projects for the Evil Genius.pdf.7z | 18.48MB 51 High-Tech Practical Jokes for the Evil Genius.pdf.7z | 10.03MB 802.11 Security.pdf.7z | 816.72KB A Classical Introduction to Cryptography Exercise Book.pdf.7z | 7.75MB A Technical Guide to IPSec Virtual Private Networks.pdf.7z | 4.76MB A+, Network+, Security+ Exams in a Nutshell - A Desktop Quick Reference.pdf.7z | 4.00MB AAA & Network Security for Mobile Access - Radius, Diameter, EAP, PKI, & IP Mobility.pdf.7z | 3.45MB Absolute OpenBSD - UNIX for the Practical Paranoid.chm.7z | 1.02MB Access Denied - The Practice & Policy of Global Internet Filtering.pdf.7z | 6.37MB Active Defense - A Comprehensive Guide to Network Security.pdf.7z | 5.80MB Administering & Securing the Apache Server.chm.7z | 13.61MB Advanced CISSP Prep Guide - Exam Q&A.chm.7z | 1.64MB Advances in Elliptic Curve Cryptography.pdf.7z | 1.79MB Advances in Enterprise Information Technology Security.pdf.7z | 4.85MB Advances in Network & Distributed Systems Security.pdf.7z | 1.83MB Aggressive Network Self-Defense.pdf.7z | 80.93MB Ajax Security.pdf.7z | 11.42MB Anti-Hacker Tool Kit, 2nd Ed..chm.7z | 29.17MB Anti-Hacker Tool Kit, 3rd Ed..chm.7z | 34.84MB Apache Security.chm.7z | 1.61MB Applied Cryptanalysis - Breaking Ciphers in the Real World.pdf.7z | 16.36MB Applied Cryptography & Network Security - 2nd International Conference, ACNS 2004.pdf.7z | 8.14MB Applied Cryptography - Protocols, Algorithms, & Source COde in C, 2nd Ed..chm.7z | 3.64MB Applied Security Visualization.pdf.7z | 19.27MB Auditor's Guide to Information Systems Auditing.pdf.7z | 1.24MB AVIEN Malware Defense Guide for the Enterprise.pdf.7z | 4.96MB Beginning Cryptography with Java.chm.7z | 2.47MB BigNum Math - Implementing Cryptographic Multiple Precision Arithmetic.pdf.7z | 3.23MB Biometrics & Network Security.chm.7z | 1.11MB Black Hat Physical Device Security - Exploiting Hardware & Software.pdf.7z | 76.12MB Blackjacking - Security Threats to BlackBerry Devices, PDAs, & Cell Phones in the Enterprise.pdf.7z | 9.02MB Bluetooth Security.pdf.7z | 691.85KB Botnet Detection - Countering the Largest Security Threat.pdf.7z | 1.84MB Botnets - The Killer Web App.pdf.7z | 5.27MB Brute Force - Cracking the Data Encryption Standard.pdf.7z | 1.53MB Buffer Overflow Attacks - Detect, Exploit, Prevent.pdf.7z | 2.90MB Building an Effective Information Security Policy Architecture.pdf.7z | 2.34MB Building DMZs for Enterprise Networks.pdf.7z | 8.14MB Building Internet Firewalls, 2nd Ed..pdf.7z | 4.66MB Building Secure Servers with Linux.chm.7z | 1.16MB Building Secure Servers with Linux.pdf.7z | 2.51MB Building Secure Wireless Networks with 802.11.pdf.7z | 5.54MB Bulletproof Wireless Security - GSM, UMTS, 802.11, & Ad Hoc Security.pdf.7z | 2.35MB CCNA Security Official Exam Certification Guide [Exam 640-553].pdf.7z | 13.16MB CCSP Cisco Secure PIX Firewall Advanced Exam Certification Guide.pdf.7z | 10.45MB CD & DVD Forensics.pdf.7z | 4.40MB CD Cracking Uncovered - Protection Against Unsanctioned CD Copying.chm.7z | 9.08MB CEH - Official Certified Ethical Hacker Review Guide [Exam 312-50].pdf.7z | 3.10MB CEH Official Certified Ethical Hacker Review Guide.pdf.7z | 3.10MB Certified Ethical Hacker Exam Prep [Exam 312-50].chm.7z | 8.33MB Certified Ethical Hacking Official Course Material [Exam 312-50].chm.7z | 14.29MB Cisco ASA, PIX, & FWSM Firewall Handbook, 2nd Ed..pdf.7z | 7.48MB Cisco IOS Access Lists.pdf.7z | 1.28MB Cisco NAC Appliance - Enforcing Host Security with Clean Access.pdf.7z | 21.43MB Cisco Network Security Little Black Book.pdf.7z | 2.77MB Cisco Router Firewall Security.chm.7z | 5.83MB Cisco Secure Firewall Services Module (FWSM).pdf.7z | 1.92MB Cisco Secure Internet Security Solutions.pdf.7z | 6.22MB Cisco Security Agent.chm.7z | 25.98MB Cisco Security Professional's Guide to Secure Intrusion Detection Systems.pdf.7z | 12.16MB Cisco Wireless LAN Security.chm.7z | 5.82MB CISSP - Certified Information Systems Security Professional Study Guide, 3rd Ed..pdf.7z | 5.31MB CISSP - Certified Information Systems Security Professional Study Guide, 4th Ed..pdf.7z | 8.08MB CISSP Certification All-in-One Exam Guide, 4th Ed..pdf.7z | 18.84MB CISSP for Dummies, 2nd Ed..chm.7z | 1.36MB Codes & Ciphers - Julius Caesar, the Enigma, & the Internet.pdf.7z | 1.02MB Codes - The Guide to Secrecy from Ancient to Modern Times.pdf.7z | 4.68MB Combating Spyware in the Enterprise.pdf.7z | 7.14MB Complete Guide to CISM Certification.pdf.7z | 9.70MB Complexity & Cryptography - An Introduction.pdf.7z | 1.09MB CompTIA A+ Exam Prep [Exams A+ Essentials, 220-602, 220-603, & 220-604].chm.7z | 49.58MB CompTIA Security+ Study Guide & Practice Exam, 2nd Ed. [Exam JK0-010].pdf.7z | 9.11MB Computer & Intrusion Forensics.pdf.7z | 2.56MB Computer Network Security.pdf.7z | 21.45MB Computer Security & Cryptography.pdf.7z | 8.34MB Computer Security Basics, 2nd Ed..chm.7z | 1.65MB Computer Security, Privacy, & Politics - Current Issues, Challenges, & Solutions.pdf.7z | 1.63MB Computer Viruses & Malware.pdf.7z | 9.15MB Computer Viruses - From Theory to Applications.pdf.7z | 2.28MB Computer Viruses for Dummies.pdf.7z | 2.33MB Configuring Juniper Networks NetScreen & SSG Firewalls.pdf.7z | 9.33MB Configuring NetScreen Firewalls.pdf.7z | 5.93MB Configuring SonicWALL Firewalls.pdf.7z | 10.82MB Contemporary Cryptography.pdf.7z | 2.37MB Core Security Patterns - Best Practices & Strategies for J2EE, Web Services, & Identity Management.chm.7z | 7.30MB Covert Java - Techniques for Decompiling, Patching, & Reverse Engineering.pdf.7z | 2.08MB Crackproof Your Software - Protect Your Software Against Crackers.pdf.7z | 7.11MB Crimeware - Understanding New Attacks & Defenses.chm.7z | 10.42MB Critical Incident Management.chm.7z | 2.59MB Cryptography & Network Security, 4th Ed..chm.7z | 12.52MB Cryptography & Security Services - Mechanisms & Applications.pdf.7z | 4.40MB Cryptography - A Very Short Introduction.chm.7z | 1.31MB Cryptography for Developers.pdf.7z | 2.67MB Cryptography for Dummies.chm.7z | 4.02MB Cryptography in C & C++.chm.7z | 3.50MB Cryptology Unlocked.pdf.7z | 1.81MB Cyber Crime Investigator's Field Guide.pdf.7z | 1.54MB Cyber Forensics - A Field Manual for Collecting, Examining, & Preserving Evidence of Computer Crimes.pdf.7z | 3.50MB Cyber Spying - Tracking Your Family's (Sometimes) Secret Online Lives.pdf.7z | 104.27MB Cyber Warfare & Cyber Terrorism.pdf.7z | 4.62MB Decrypted Secrets - Methods & Maxims of Cryptology, 4th, Revised & Extended Ed..pdf.7z | 11.45MB Defend I.T. - Security by Example.chm.7z | 1.33MB Defense & Detection Strategies against Internet Worms.pdf.7z | 1.02MB Deploying Secure 802.11 Wireless Networks with Microsoft Windows.chm.7z | 6.91MB Designing BSD Rootkits - An Introduction to Kernel Hacking.pdf.7z | 5.35MB Developer's Guide to Web Application Security.pdf.7z | 9.62MB Digital Evidence & Computer Crime - Forensic Science, Computers, & the Internet, 2nd Ed..chm.7z | 31.40MB Disassembling Code - IDA Pro & SoftICE.chm.7z | 4.16MB Effective Oracle Database 10g Security by Design.chm.7z | 2.98MB Electronic Gadgets for the Evil Genius - 28 Build-It-Yourself Projects.pdf.7z | 54.93MB EnCase Computer Forensics - The Official EnCE-EnCase Certified Examiner Study Guide, 2nd Ed..pdf.7z | 13.35MB Encyclopedia of Cryptology.chm.7z | 2.26MB End-to-End Network Security - Defense-in-Depth.pdf.7z | 11.07MB Enemy at the Water Cooler - Real-Life Stories of Insider Threats & Enterprise Security Management Countermeasures.pdf.7z | 4.92MB Enterprise Information Systems Assurance & System Security - Managerial & Technical Issues.pdf.7z | 5.73MB Enterprise Java Security - Building Secure J2EE Applications.chm.7z | 3.93MB Essential Computer Security - Everyone's Guide to Email, Internet, & Wireless Security.pdf.7z | 6.28MB Essential PHP Security.chm.7z | 358.95KB Ethereal Packet Sniffing.chm.7z | 17.30MB Expert Web Services Security in the .NET Platform.chm.7z | 21.64MB Exploiting Software - How to Break Code.pdf.7z | 4.44MB Fast Track to Security.pdf.7z | 6.16MB File System Forensic Analysis.chm.7z | 3.84MB Firewall Fundamentals.chm.7z | 10.16MB Firewall Policies & VPN Configurations.pdf.7z | 5.58MB Firewalls & Internet Security - Repelling the Wily Hacker, 2nd Ed..pdf.7z | 56.81MB Firewalls - Jumpstart for Network & Systems Administrators.pdf.7z | 1.47MB Firewalls for Dummies, 2nd Ed..pdf.7z | 6.77MB Forensic Computer Crime Investigation.pdf.7z | 2.25MB Forensic Computing - A Practitioner's Guide, 2nd Ed..pdf.7z | 9.02MB Foundations of Computer Security.pdf.7z | 1.79MB Foundations of Cryptography - A Primer.pdf.7z | 748.64KB Foundations of Cryptography - Vol. 1, Basic Tools.pdf.7z | 2.34MB Foundations of Mac OS X Leopard Security.pdf.7z | 20.41MB Foundations of Security - What Every Programmer Needs to Know.pdf.7z | 2.18MB Fundamentals of Cryptology - A Professional Reference & Interactive Tutorial.pdf.7z | 26.18MB Fuzzing - Brute Force Vulnerability Discovery.pdf.7z | 42.05MB Google Hacking for Penetration Testers, Vol. 2.pdf.7z | 11.66MB Google Hacking for Penetration Testers.pdf.7z | 9.62MB Gray Hat Hacking - The Ethical Hacker's Handbook, 2nd Ed..pdf.7z | 8.03MB Grid Computing Security.pdf.7z | 7.65MB Guide to Elliptic Curve Cryptography.pdf.7z | 2.36MB Hack Attacks Revealed - A Complete Reference with Custom Security Hacking Toolkit.chm.7z | 6.35MB Hack I.T. - Security through Penetration Testing.chm.7z | 4.62MB Hack Proofing ColdFusion - The Only Way to Stop a Hacker Is to Think Like One.pdf.7z | 6.45MB Hack Proofing Linux - Your Guide to Open Source Security.pdf.7z | 9.74MB Hack Proofing Sun Solaris 8 - Protect Your Solaris Network from Attack.pdf.7z | 5.51MB Hack Proofing Windows 2000 Server.pdf.7z | 9.53MB Hack Proofing XML - The Only Way to Stop a Hacker Is to Think Like One.pdf.7z | 5.53MB Hack Proofing Your E-Commerce Site - The Only Way to Stop a Hacker Is to Think Like One.pdf.7z | 6.00MB Hack Proofing Your Identity in the Information Age - Protect Your Family on the Internet!.pdf.7z | 7.10MB Hack Proofing Your Network, 2nd Ed. - The Only Way to Stop a Hacker Is to Think Like One.pdf.7z | 7.35MB Hack Proofing Your Network.pdf.7z | 2.48MB Hack Proofing Your Web Applications - The Only Way to Stop a Hacker Is to Think Like One.pdf.7z | 7.18MB Hack Proofing Your Wireless Network - Protect Your Wireless Network from Attack.pdf.7z | 5.51MB Hack the Stack - Using Snort & Ethereal to Master the 8 Layers of an Insecure Network.pdf.7z | 5.99MB Hacker Debugging Uncovered.chm.7z | 14.42MB Hacker Disassembling Uncovered.chm.7z | 4.77MB Hacker Linux Uncovered.chm.7z | 4.51MB Hacker Web Exploitation Uncovered.chm.7z | 554.28KB Hacker's Challenge - Test Your Incident Response Skills Using 20 Scenarios.pdf.7z | 3.91MB Hacker's Delight.chm.7z | 2.10MB Hackers - Heroes of the Computer Revolution.pdf.7z | 2.02MB Hackers Beware - Defending Your Network from the Wiley Hacker.pdf.7z | 4.31MB Hacking - The Art of Exploitation, 2nd Ed..chm.7z | 4.71MB Hacking - The Art of Exploitation.chm.7z | 1.40MB Hacking a Terror Network - The Silent Threat of Covert Channels.pdf.7z | 6.25MB Hacking Exposed, 2nd Ed. - Network Security Secrets & Solutions.pdf.7z | 7.41MB Hacking Exposed-Cisco Networks - Cisco Security Secrets & Solutions.chm.7z | 9.92MB Hacking Exposed-Linux - Linux Security Secrets & Solutions, 3rd Ed..pdf.7z | 5.09MB Hacking Exposed-Linux - Linux Security Secrets & Solutions.pdf.7z | 88.82MB Hacking Exposed-Network Security - Secrets & Solutions, 2nd Ed..pdf.7z | 7.41MB Hacking Exposed-Network Security - Secrets & Solutions, 3rd Ed..pdf.7z | 4.66MB Hacking Exposed-VoIP - Voice Over IP Security Secrets & Solutions.chm.7z | 16.53MB Hacking Exposed-Web 2.0 - Web 2.0 Security Secrets & Solutions.pdf.7z | 3.94MB Hacking Exposed-Web Applications - Web Application Security Secrets & Solutions.pdf.7z | 4.00MB Hacking Exposed-Windows - Windows Security Secrets & Solutions, 3rd Ed..pdf.7z | 4.42MB Hacking Exposed-Wireless - Wireless Security Secrets & Solutions.chm.7z | 12.37MB Hacking for Dummies, 2nd Ed..pdf.7z | 4.08MB Hacking for Dummies.pdf.7z | 5.32MB Hacking the Cable Modem - What Cable Companies Don't Want You to Know.pdf.7z | 16.81MB Hacking Wireless Networks for Dummies.pdf.7z | 7.71MB HackNotes - Linux & Unix Security Portable Reference.pdf.7z | 1.76MB HackNotes - Network Security Portable Reference.pdf.7z | 1.98MB HackNotes - Web Security Portable Reference.pdf.7z | 1.87MB HackNotes - Windows Security Portable Reference.pdf.7z | 2.74MB Halting the Hacker - A Practical Guide to Computer Security, 2nd Ed..chm.7z | 628.52KB Handbook of Database Security - Applications & Trends.pdf.7z | 4.71MB Handbook of Digital & Multimedia Forensic Evidence.pdf.7z | 1.74MB Handbook of Research on Wireless Security.pdf.7z | 11.01MB Hardening Apache.chm.7z | 1.06MB Hardening Linux.chm.7z | 9.48MB Hardening Linux.pdf.7z | 2.11MB Hardening Network Infrastructure.chm.7z | 17.12MB Hardening Windows Systems.chm.7z | 23.73MB Hardening Windows, 2nd Ed..pdf.7z | 3.85MB Hardening Windows.chm.7z | 1.71MB High-Assurance Design - Architecting Secure & Reliable Enterprise Applications.chm.7z | 3.68MB Home Network Security Simplified.chm.7z | 14.31MB Honeypots - Tracking Hackers.chm.7z | 2.50MB Honeypots for Windows.chm.7z | 16.20MB How to Cheat at Configuring Open Source Security Tools - The Perfect Reference for the Multitasked SysAdmin.pdf.7z | 6.29MB How to Cheat at Deploying & Securing RFID.pdf.7z | 3.98MB How to Cheat at Designing Security for a Windows Server 2003 Network.pdf.7z | 62.40MB How to Cheat at Managing Information Security.pdf.7z | 5.36MB How to Cheat at Securing a Wireless Network.pdf.7z | 10.25MB How to Cheat at Securing Linux - The Perfect Reference for the Multitasked SysAdmin.pdf.7z | 8.14MB How to Cheat at VolP Security.pdf.7z | 40.86MB How to Cheat at Windows System Administration Using Command Line Scripts.pdf.7z | 2.98MB IM Instant Messaging Security.pdf.7z | 1.77MB Implementing Email Security & Tokens - Current Standards, Tools, & Practices.pdf.7z | 1.42MB Implementing NAP & NAC Security Technologies - The Complete Guide to Network Access Control.pdf.7z | 5.33MB Implementing SSH - Strategies for Optimizing the Secure Shell.pdf.7z | 5.75MB Incident Response & Computer Forensics, 2nd Ed..pdf.7z | 9.34MB Incident Response - A Strategic Guide to Handling System & Network Security Breaches.chm.7z | 991.41KB Incident Response - Computer Forensics Toolkit.pdf.7z | 4.15MB Information Security - Principles & Practice.pdf.7z | 4.15MB Information Security Management Handbook, 5th Ed..pdf.7z | 27.47MB Information Security Policies & Actions in Modern Integrated Systems.chm.7z | 7.22MB Information Security Policies & Procedures - A Practitioner's Reference, 2nd Ed..pdf.7z | 1.60MB Information Technology Security - Advice from Experts.chm.7z | 801.73KB InfoSec Career Hacking - Sell Your Skillz, Not Your Soul.pdf.7z | 82.21MB InfoSecurity 2008 Threat Analysis.pdf.7z | 9.38MB Inside Java 2 Platform Security, 2nd Ed. - Architecture, API Design, & Implementation.chm.7z | 1.17MB Inside Network Perimeter Security, 2nd Ed..chm.7z | 8.65MB Inside the Spam Cartel - Trade Secrets from the Dark Side.chm.7z | 6.04MB Insider Attack & Cyber Security - Beyond the Hacker.pdf.7z | 2.19MB Insider Threat - Protecting the Enterprise from Sabotage, Spying, & Theft.pdf.7z | 4.03MB Internet & Intranet Security Management - Risks & Solutions.pdf.7z | 1.34MB Internet & Intranet Security.chm.7z | 5.66MB Internet Denial of Service - Attack & Defense Mechanisms.chm.7z | 2.06MB Internet Forensics.chm.7z | 839.55KB Internet Security - A Jumpstart for Systems Administrators & IT Managers.chm.7z | 3.86MB Internet Security - Cryptographic Principles, Algorithms, & Protocols.pdf.7z | 1.84MB Introduction to Communication Electronic Warfare Systems.pdf.7z | 40.89MB Introduction to Cryptography - Principles & Applications, 2nd Ed..pdf.7z | 2.02MB Intrusion Detection & Prevention.chm.7z | 3.16MB Intrusion Prevention & Active Response - Deploying Network & Host IPS.pdf.7z | 82.56MB Intrusion Prevention Fundamentals.chm.7z | 2.12MB Investigating Computer-Related Crime - A Handbook for Corporate Investigators.pdf.7z | 1013.04KB Investigative Data Mining for Security & Criminal Detection.chm.7z | 25.71MB IPSec - The New Security Standard for the Internet, Intranets, & Virtual Private Networks, 2nd Ed..chm.7z | 1.57MB IPSec VPN Design.chm.7z | 8.96MB IPTV Security - Protecting High-Value Digital Contents.pdf.7z | 1.89MB IT Auditing - Using Controls to Protect Information Assets.chm.7z | 3.08MB IT Security Interviews Exposed - Secrets to Landing Your Next Information Security Job.pdf.7z | 1.68MB J2EE Security for Servlets, EJBs, & Web Services.chm.7z | 1.91MB Jeff Duntemann's Drive-By Wi-Fi Guide.chm.7z | 12.74MB Juniper Networks Field Guide & Reference.chm.7z | 3.13MB Juniper Networks Secure Access SSL VPN Configuration Guide.pdf.7z | 16.26MB Kismet Hacking.pdf.7z | 3.77MB LAN Switch Security - What Hackers Know About Your Switches.pdf.7z | 2.64MB Linux Firewalls - Attack Detection & Response with iptables, psad, & fwsnort.pdf.7z | 3.85MB Linux Network Security.chm.7z | 6.52MB Linux Security Cookbook.chm.7z | 643.31KB Mac OS X Maximum Security.chm.7z | 3.71MB Mac OS X Security.chm.7z | 4.63MB Mainframe Basics for Security Professionals - Getting Started with RACF.pdf.7z | 3.42MB Malicious Cryptography - Exposing Cryptovirology.pdf.7z | 2.19MB Malware - Fighting Malicious Code.chm.7z | 6.39MB Malware Detection.pdf.7z | 14.25MB Malware Forensics - Investigating & Analyzing Malicious Code.pdf.7z | 17.22MB Managing Cisco Network Security.pdf.7z | 4.42MB Managing Security with Snort & IDS Tools.chm.7z | 1.74MB Mastering FreeBSD & OpenBSD Security.chm.7z | 1.33MB Mastering Network Security.pdf.7z | 2.36MB Mastering Windows Network Forensics & Investigation.chm.7z | 45.71MB Maximum Linux Security, 2nd Ed..pdf.7z | 4.00MB Maximum Security, 4th Ed..chm.7z | 2.93MB Maximum Wireless Security.chm.7z | 4.24MB MCSA-MCSE Implementing & Administering Security in a Microsoft Windows Server 2003 Network Self-Paced Training Kit [Exam 70-299].pdf.7z | 4.77MB MCSE Core Elective Exams in a Nutshell - A Desktop Quick Reference.chm.7z | 3.90MB MCSE Designing Security for a Microsoft Windows Server 2003 Network Self-Paced Training Kit [Exam 70-298].chm.7z | 11.28MB MCSE Implementing & Administering Security in a Windows 2003 Network Exam Cram 2 [Exam 70-299].chm.7z | 3.54MB Metasploit Toolkit for Penetration Testing, Exploit Development, & Vulnerability Research.pdf.7z | 3.58MB Microsoft Encyclopedia of Security.pdf.7z | 7.27MB Microsoft Forefront Security Administration Guide.pdf.7z | 16.17MB Microsoft Log Parser Toolkit.pdf.7z | 83.97MB Microsoft Windows Security Inside Out for Windows XP & Windows 2000.chm.7z | 19.47MB Microsoft Windows Server 2003 PKI & Certificate Security.pdf.7z | 5.70MB Mission Critical! Internet Security.pdf.7z | 3.50MB Mobile & Wireless Network Security & Privacy.pdf.7z | 2.93MB Mobility, Data Mining, & Privacy - Geographic Knowledge Discovery.pdf.7z | 3.36MB Modern Cryptography - Theory & Practice.pdf.7z | 11.07MB MORE Electronic Gadgets for the Evil Genius - 40 New Build-It-Yourself Projects.pdf.7z | 56.02MB Multicast & Group Security.pdf.7z | 2.36MB Multimedia Forensics & Security.pdf.7z | 10.42MB Multimedia Security Technologies for Digital Rights Management.pdf.7z | 2.66MB Nessus Network Auditing, 2nd Ed..pdf.7z | 8.72MB Nessus, Snort, & Ethereal Power Tools - Customizing Open Source Security Applications.pdf.7z | 4.32MB Netcat Power Tools.pdf.7z | 8.52MB Network Administrator Street Smarts - A Real World Guide to CompTIA Network+ Skills.pdf.7z | 9.75MB Network Intrusion Detection, 3rd Ed..pdf.7z | 2.03MB Network Perimeter Security - Building Defense In-Depth.chm.7z | 3.56MB Network Security - Know It All.pdf.7z | 4.96MB Network Security Assessment - From Vulnerability to Patch.pdf.7z | 7.50MB Network Security Assessment - Know Your Network, 2nd Ed..pdf.7z | 4.07MB Network Security Assessment - Know Your Network.chm.7z | 1.68MB Network Security Bible.pdf.7z | 5.58MB Network Security Hacks - 100 Industrial-Strength Tips & Tools.chm.7z | 1.62MB Network Security Hacks - Tips & Tools for Protecting Your Privacy, 2nd Ed..chm.7z | 3.88MB Network Security Illustrated.pdf.7z | 8.43MB Network Security JumpStart.pdf.7z | 1.42MB Network Security Technologies & Solutions.chm.7z | 26.27MB Network Security Tools - Writing, Hacking, & Modifying Security Tools.chm.7z | 1.29MB Network Security with OpenSSL.pdf.7z | 1.28MB Network Warrior.pdf.7z | 5.19MB Networking with Microsoft Windows Vista - Your Guide to Easy & Secure Windows Vista Networking.pdf.7z | 15.27MB Nmap in the Enterprise - Your Guide to Network Scanning.pdf.7z | 3.92MB No Tech Hacking - A Guide to Social Engineering, Dumpster Diving, & Shoulder Surfing.pdf.7z | 20.59MB Official (ISC)2 Guide to the CISSP Exam.pdf.7z | 7.84MB Online Business Security Systems.pdf.7z | 1.64MB Open Source Fuzzing Tools.pdf.7z | 2.91MB Open Source Security Tools - A Practical Guide to Security Applications.chm.7z | 5.67MB Oracle Security.chm.7z | 1.30MB OS X Exploits & Defense.pdf.7z | 6.71MB OS X for Hackers at Heart - The Apple of Every Hacker's Eye.pdf.7z | 13.36MB OSSEC Host-Based Intrusion Detection Guide.pdf.7z | 6.94MB PCI Compliance - Understand & Implement Effective PCI Data Security Standard Compliance.pdf.7z | 4.24MB Penetration Tester's Open Source Toolkit, Vol. 2.pdf.7z | 20.61MB Penetration Tester's Open Source Toolkit.pdf.7z | 25.47MB Penetration Testing & Network Defense.chm.7z | 14.75MB Perfect Passwords - Selection, Protection, Authentication.pdf.7z | 1.22MB Perl Scripting for Windows Security - Live Response, Forensic Analysis, & Monitoring.pdf.7z | 4.11MB PGP & GPG - Email for the Practical Paranoid.pdf.7z | 1.75MB Phishing - Cutting the Identity Theft Line.pdf.7z | 6.43MB Phishing Exposed.pdf.7z | 6.79MB PHP Oracle Web Development - Data processing, Security, Caching, XML, Web Services, & AJAX.pdf.7z | 3.05MB Physical & Logical Security Convergence - Powered By Enterprise Security Management.pdf.7z | 7.53MB Practical Guide for Implementing Secure Intranets & Extranets.chm.7z | 5.49MB Practical Hacking Techniques & Countermeasures.pdf.7z | 63.85MB Practical Oracle Security - Your Unauthorized Guide to Relational Database Security.pdf.7z | 3.35MB Practical Packet Analysis - Using Wireshark to Solve Real-World Network Problems.pdf.7z | 7.31MB Practical Unix & Internet Security, 3rd Ed..chm.7z | 2.40MB Practical VoIP Security.pdf.7z | 6.12MB Preventing Web Attacks with Apache.chm.7z | 6.06MB Privacy Defended - Protecting Yourself Online.chm.7z | 10.62MB Privacy Preserving Data Mining.pdf.7z | 5.63MB Privacy Protection & Computer Forensics, 2nd Ed..pdf.7z | 2.52MB Privacy, Security, & Trust within the Context of Pervasive Computing.pdf.7z | 1.82MB Probabilistic & Statistical Methods in Cryptology - An Introduction by Selected Topics.pdf.7z | 1.00MB Professional Rootkits.chm.7z | 7.92MB Professional Windows Desktop & Server Hardening.chm.7z | 14.05MB Real 802.11 Security - Wi-Fi Protected Access & 802.11i.chm.7z | 2.95MB Reverse Engineering Code with IDA Pro.pdf.7z | 3.59MB Reverse Engineering of Object Oriented Code.pdf.7z | 4.81MB Reversing - Secrets of Reverse Engineering.pdf.7z | 3.83MB RFID Handbook - Applications, Technology, Security, & Privacy.pdf.7z | 9.80MB RFID Security.pdf.7z | 4.09MB Rootkits - Subverting the Windows Kernel.chm.7z | 1.60MB Rootkits for Dummies.pdf.7z | 3.27MB Router Security Strategies - Securing IP Network Traffic Planes.pdf.7z | 2.55MB RSA Security's Official Guide to Cryptography.pdf.7z | 7.65MB Sarbanes-Oxley IT Compliance Using COBIT & Open Source Tools.chm.7z | 1.62MB Sarbanes-Oxley IT Compliance Using Open Source Tools, 2nd Ed..pdf.7z | 6.49MB Secrets Stolen, Fortunes Lost - Preventing Intellectual Property Theft & Economic Espionage in the 21st Century.pdf.7z | 2.35MB Secure Coding - Principles & Practices.chm.7z | 634.61KB Secure Communicating Systems - Design, Analysis, & Implementation.pdf.7z | 21.77MB Secure Computer & Network Systems - Modeling, Analysis, & Design.pdf.7z | 1.71MB Secure Data Management in Decentralized Systems.pdf.7z | 21.62MB Secure Programming Cookbook for C & C++.chm.7z | 1.35MB Secure Programming with Static Analysis.pdf.7z | 3.64MB Securing & Optimizing Linux - The Hacking Solution.pdf.7z | 5.00MB Securing IM & P2P Applications for the Enterprise.pdf.7z | 4.48MB Securing the Information Infrastructure.pdf.7z | 2.31MB Securing VoIP Networks - Threats, Vulnerabilities, & Countermeasures.pdf.7z | 4.69MB Securing Web Services with WS-Security - Demystifying WS-Security, WS-Policy, SAML, XML Signature, & XML Encryption.chm.7z | 3.83MB Securing Windows Server 2003.chm.7z | 3.42MB Securing Windows Server 2008 - Prevent Attacks from Outside & Inside Your Organization.pdf.7z | 12.07MB Securing Your Business with Cisco ASA & PIX Firewalls.chm.7z | 4.78MB Security & Quality of Service in Ad Hoc Wireless Networks.pdf.7z | 2.38MB Security & Usability - Designing Secure Systems that People Can Use.chm.7z | 7.64MB Security for Microsoft Visual Basic .NET.chm.7z | 7.69MB Security for Wireless Ad Hoc Networks.pdf.7z | 3.23MB Security in Computing, 3rd Ed..chm.7z | 4.91MB Security in Computing, 4th Ed..chm.7z | 7.83MB Security in Distributed, Grid, Mobile, & Pervasive Computing.pdf.7z | 2.89MB Security in Wireless LANs & MANs.pdf.7z | 1.32MB Security Log Management - Identifying Patterns in the Chaos.pdf.7z | 4.51MB Security Power Tools.pdf.7z | 8.52MB Security Technologies for the World Wide Web, 2nd Ed..pdf.7z | 2.45MB Security Warrior.chm.7z | 4.54MB Security+ Study Guide, 2nd Ed. [SYO-101].pdf.7z | 7.31MB Security, Privacy, & Trust in Modern Data Management.pdf.7z | 2.99MB Self-Defending Networks - The Next Generation of Network Security.pdf.7z | 16.50MB SELinux - NSA's Open Source Security Enhanced Linux.chm.7z | 1.05MB SELinux by Example - Using Security Enhanced Linux.chm.7z | 3.96MB Shellcoder's Programming Uncovered.chm.7z | 11.70MB Simple Computer Security - Disinfect Your PC.pdf.7z | 4.86MB Snort 2.1 Intrusion Detection, 2nd Ed..pdf.7z | 5.06MB Snort Cookbook.chm.7z | 2.49MB Snort IDS & IPS Toolkit.pdf.7z | 6.80MB Sockets, Shellcode, Porting, & Coding - Reverse Engineering Exploits & Tool Coding for Security Professionals.pdf.7z | 104.54MB Software Piracy Exposed.pdf.7z | 4.34MB Special Ops - Host & Network Security for Microsoft, UNIX, & Oracle.pdf.7z | 10.78MB SSH, The Secure Shell - The Definitive Guide.pdf.7z | 4.20MB SSL & TLS Essentials - Securing the Web.pdf.7z | 1.01MB SSL Remote Access VPNs.pdf.7z | 11.63MB Static & Dynamic Reverse Engineering Techniques for Java Software Systems.pdf.7z | 1.01MB Static & Dynamic Reverse Engineering Techniques for Java Software Sytems.pdf.7z | 1.01MB Steal This Computer Book 3 - What They Won't Tell You About the Internet.chm.7z | 13.89MB Stealing the Network - How to Own a Continent.chm.7z | 2.76MB Stealing the Network - How to Own a Shadow.pdf.7z | 8.09MB Stealing the Network - How to Own an Identity.pdf.7z | 5.77MB Stealing the Network - How to Own the Box.pdf.7z | 3.40MB Strategic Information Security.chm.7z | 820.20KB Surveillance & Security - Technological Politics & Power in Everyday Life.pdf.7z | 2.65MB Syngress Force Emerging Threat Analysis - From Mischief to Malicious.pdf.7z | 6.07MB Tangled Web - Tales of Digital Crime from the Shadows of Cyberspace.pdf.7z | 2.03MB The Apache Modules Book - Application Development with Apache.pdf.7z | 1.47MB The Art of Computer Virus Research & Defense.chm.7z | 6.76MB The Art of Deception - Controlling the Human Element of Security.pdf.7z | 3.57MB The Art of Intrusion - The Real Stories Behind the Exploits of Hackers, Intruders, & Deceivers.pdf.7z | 1.15MB The Art of Software Security Assessment - Identifying & Preventing Software Vulnerabilities.chm.7z | 4.54MB The Best Damn Firewall Book Period, 2nd Ed..pdf.7z | 32.54MB The Best Damn Firewall Book Period.pdf.7z | 15.35MB The Best Damn IT Security Management Book Period.pdf.7z | 15.50MB The Book of PF - A No-Nonsense Guide to the OpenBSD Firewall.pdf.7z | 4.12MB The Business Case for Network Security - Advocacy, Governance, & ROI.chm.7z | 4.74MB The CISSP & CAP Prep Guide - Platinum Ed..chm.7z | 11.86MB The CISSP Prep Guide - Gold Ed..pdf.7z | 5.14MB The CISSP Prep Guide - Mastering the Ten Domains of Computer Security.pdf.7z | 3.89MB The Complete Idiot's Guide to Protecting Yourself Online.pdf.7z | 11.77MB The Craft of System Security.chm.7z | 5.33MB The Database Hacker's Handbook - Defending Database Servers.chm.7z | 1.13MB The Ethical Hack - A Framework for Business Value Penetration Testing.pdf.7z | 3.43MB The Giant Black Book of Computer Viruses.pdf.7z | 4.69MB The International Handbook of Computer Security.pdf.7z | 1.60MB The IT Regulatory & Standards Compliance Handbook - How to Survive an Information Systems Audit & Assessments.pdf.7z | 10.52MB The Naked Employee - How Technology Is Compromising Workplace Privacy.chm.7z | 629.13KB The Official CHFI Study Guide for Computer Hacking Forensics Investigators [Exam 312-49].pdf.7z | 11.72MB The Oracle Hacker's Handbook - Hacking & Defending Oracle.chm.7z | 483.62KB The Shellcoder's Handbook - Discovering & Exploiting Security Holes.chm.7z | 2.11MB The Tao of Network Security Monitoring - Beyond Intrusion Detection.chm.7z | 15.58MB The Web Application Hacker's Handbook - Discovering & Exploiting Security Flaws.pdf.7z | 4.72MB Understanding Forensic Digital Imaging.pdf.7z | 13.71MB UNIX & Linux Forensic Analysis DVD Toolkit.pdf.7z | 3.85MB Virtual Honeypots - From Botnet Tracking to Intrusion Detection.chm.7z | 4.10MB WAP, Bluetooth, & 3G Programming - Cracking the Code.pdf.7z | 6.87MB Wardriving & Wireless Penetration Testing.pdf.7z | 16.53MB WarDriving-Drive, Detect, Defend - A Guide to Wireless Security.chm.7z | 37.51MB Web Application Vulnerabilities - Detect, Exploit, Prevent.pdf.7z | 14.13MB Web Hacking - Attacks & Defense.chm.7z | 6.38MB Web Security & Commerce.pdf.7z | 2.92MB Web Security, Privacy, & Commerce, 2nd Ed..chm.7z | 6.17MB Web Services Security & E-Business.pdf.7z | 4.31MB Web Services Security.chm.7z | 3.96MB Webster's New World Hacker Dictionary.pdf.7z | 1.86MB Wi-Foo - The Secrets of Wireless Hacking.chm.7z | 6.78MB Windows Forensic Analysis.pdf.7z | 41.81MB Windows Forensics & Incident Recovery.chm.7z | 7.23MB Windows Server 2003 Security Guide.pdf.7z | 1.13MB Windows Server 2008 Networking & Network Access Protection (NAP).pdf.7z | 20.83MB Windows Server 2008 Security Resource Kit.pdf.7z | 7.14MB Windows Vista Security - Securing Vista Against Malicious Attacks.chm.7z | 25.13MB Windows XP Hacks & Mods For Dummies.pdf.7z | 10.65MB Wireless Network Hacks & Mods for Dummies.pdf.7z | 3.66MB Wireless Operational Security.chm.7z | 1.48MB Wireless Personal Area Networks - Performance, Interconnection, & Security with IEEE 802.15.4.pdf.7z | 2.02MB Wireless Security Handbook.pdf.7z | 8.43MB Wireshark & Ethereal Network Protocol Analyzer Toolkit.pdf.7z | 10.52MB Writing Secure Code for Windows Vista.chm.7z | 3.07MB Writing Secure Code, 2nd Ed..chm.7z | 2.23MB Writing Secure Code.pdf.7z | 3.36MB Writing Security Tools & Exploits.pdf.7z | 6.62MB XSS Attacks - Cross Site Scripting Exploits & Defense.pdf.7z | 4.88MB Zero-Day Exploit - Countdown to Darkness.pdf.7z | 2.45MB

Recommend

Magnetic link has been copied to the cutting board