Pack0.25 200GB Books Computer Science Math Programming Skills
- Type:
- Other > E-books
- Files:
- 120
- Size:
- 2.08 GiB (2237813572 Bytes)
- Texted language(s):
- English
- Uploaded:
- 2017-08-10 19:17:28 GMT
- By:
- j3w1
- Seeders:
- 0
- Leechers:
- 1
- Comments
- 0
- Info Hash: 856611264ACFFF3709D79E31577723FF67646B6E
(Problems with magnets links are fixed by upgrading your torrent client!)
seed & dont' forget to enjoy
CompTIA IT Fundamentals Study Guide.pdf | 233.12 MiB |
CompTIA A+ Certification: Mike Meyers' Certification Passport 5th Edition.pdf | 128.99 MiB |
How to Become a Travel Ninja: Travel Hacking Anywhere in the World.pdf | 294.58 KiB |
Applied Cryptography for Cyber Security and Defense: Information Encryption and Cyphering.pdf | 5.41 MiB |
Hacking the Invisible Network: Insecurities in 802.11x.pdf | 13.78 MiB |
Trust Management.pdf | 25.88 MiB |
Attack and Defend Computer Security Set.pdf | 34.42 MiB |
Adsense: BlackHat Edition.pdf | 386.89 KiB |
Social, Managerial, and Organizational Dimensions of Enterprise Information Systems.pdf | 12.39 MiB |
Java Enterprise Design Patterns: Patterns in Java Vol.3.pdf | 3.1 MiB |
Guide to J2E: Enterprise Java.pdf | 28.78 MiB |
CompTIA Security+ Study Guide 6th Edition.epub | 12.52 MiB |
The CISM Prep Guide: Mastering the Five Domains of Information Security Management.chm | 2.41 MiB |
CompTIA Security+ Certification Bundle Exam SY0-401 2nd Edition.epub | 36.95 MiB |
Unreliable Guide To Hacking The Linux Kernel.pdf | 365.21 KiB |
Learning SaltStack: Learn how to manage your infrastructure by utilizing the power of SaltStack.pdf | 1.51 MiB |
Break into TechL LinkedIn Profile Checklist.pdf | 476.26 KiB |
A Guide to Improving Porductivity Using Barcode Readers: Techniques for Stabilizing Moving Targets for Reading Purposes.pdf | 2.43 MiB |
Hacking Digital Cameras.pdf | 21.35 MiB |
Creating Resilient Architectures on Microsoft Azure.pdf | 691.38 KiB |
Hacking Etico por Carlos Tori.pdf | 59.33 MiB |
Ethical Hacking (EC-Council Exam 312-50): Student Courseware.chm | 14.15 MiB |
Complete CompTIA A+ Guide to IT Hardware and Software 7th Edition.epub | 90.18 MiB |
Hacking Video Game Consoles.pdf | 66.94 MiB |
Waze vs. Google Maps: Which App Will Navigate Home Faster.pdf | 2.12 MiB |
CCSP: Cisco CErtified Security Professional Certification Exam Guide All-in-One.pdf | 17.24 MiB |
Hacking Movable Type.pdf | 8.41 MiB |
CompTIA A+ 220-701 and 220-702 Exam Cram 5th Edition.pdf | 11.21 MiB |
World Standards Safety Guide.pdf | 3.35 MiB |
Hacking Google Maps and Google Earth.pdf | 11.28 MiB |
Introduction to Information Systems 17th Edition.pdf | 80.63 MiB |
1D-2D Code Reader Actial Installation Examples: Electronic Device Industry Edition.pdf | 1.78 MiB |
Amazon Web Services an Overview: Expert REference Series of White Papers.pdf | 222.96 KiB |
Struts Survival Guide: Basics to Best Practices.pdf | 4.47 MiB |
CompTIA Network+ N10-005 Exam Cram 4th Edition.epub | 31.04 MiB |
CompTIA Network+ Certification Exam N10-005 All-in-One Premium 5th Edition.azw3 | 51.48 MiB |
Hacking Point of Sale: Payment Application Secrets, Threats, and Solutions.pdf | 22.83 MiB |
Kernel Level Vulnerabilities: Behind the Scenes of the 5th Argus Hacking Challenge.pdf | 440.45 KiB |
CASP CompTIA Advanced Security Practitioner Study Guide 2nd Edition.pdf | 7.15 MiB |
Current Security Management & Ethical Issues of Information Technology.chm | 2.65 MiB |
Security Engineering: A Guide to Building Dependable Distributed Systems 2nd Edition.pdf | 5.34 MiB |
Inside Network Security Assessment: Guarding your IT Infrastructure.chm | 1.87 MiB |
Travel Deeply: Do it Cheaply.pdf | 8.4 MiB |
CCIE Profesional Development Series Network Security Technologies and Solutions.chm | 26.01 MiB |
Windows Command Prompt A to N.pdf | 2.39 MiB |
Unmatched Protection Safety Light Curtain.pdf | 7.35 MiB |
Java SOA Cookbook: SOA Implementation Recipes, Tips, and Techniques.pdf | 9.97 MiB |
Boost Productivity With Your Smart Phone: And Run Your Business Wherever You Want.pdf | 879.38 KiB |
CompTIA A+ Certification All-in-One for Dummies.pdf | 82.52 MiB |
Hacking Cyberspace.pdf | 22.68 MiB |
Securit in Distributed and Networking Systems.pdf | 9.57 MiB |
Hacking GPS.pdf | 10.33 MiB |
CompTIA A+ Complete Deluxe Study Guide 2nd Edition Exam 220-801 220-802.pdf | 136.39 MiB |
CompTIA Network+ Certification Exam N10-006 All-In-One 6th Edition.pdf | 50.42 MiB |
Hacking Exposed Unified Communications & VoIP 2nd Edition.pdf | 20.59 MiB |
20 Travel Hacking Strategies.pdf | 2.66 MiB |
Applied Information Security: A Hands-on Approach.pdf | 1.59 MiB |
Vision Sensor IV Series: Quick Setup Guide.pdf | 2.35 MiB |
Poderes Locales y Globales. Un Estudio desde las Evaluaciones de Impacto Ambiental en las Toninas, Partido de la Costa, Buenos Aires, Argentina.pdf | 251.59 KiB |
Hacking Ubuntu.chm | 9.74 MiB |
7 Steps to Change Company Culture.pdf | 1.31 MiB |
How to Build A Beowulf.chm | 416.17 KiB |
CMS Security Handbook: The Comprehensive Guide for Wordpress, Joomla, Drupal, and Plone.epub | 13.76 MiB |
Inline Profile Measurement: The World's Fastest at 64000 Profile per Second.pdf | 7.98 MiB |
Hacking the Tivo.pdf | 4.67 MiB |
Data Storage Networking: Real-World Skills for the CompTIA Storage+ Certification and Beyond.pdf | 4.8 MiB |
1D-2D Code Reader Actual Installation Examples: Food, Pharmaceutical, and Cosmetics Industries Edition.pdf | 1.78 MiB |
Distributed Systems Security: Issues, Processes and Solutions.pdf | 6.14 MiB |
Data Protection Ensuring Data Availability.pdf | 6.32 MiB |
Cloud Essentials CompTIA Authorized Courseware for Exam CLO-001.epub | 13.19 MiB |
31 Days Before Your CompTIA A+ Exams 2nd Edition.pdf | 1.54 MiB |
LPIC-1 Certification Bible.pdf | 7.71 MiB |
Hacking Windows Vista ExtremeTech.chm | 17.82 MiB |
Enterprise Systems Backup and Recovery: A Corporate Insurance Policy.pdf | 3.78 MiB |
Hacking Exposed 7: Network Security Secrets & Solutions.pdf | 33.03 MiB |
Juniper SRX Series: A Comprehensive Guide to Security Services on the SRX Series.pdf | 46.77 MiB |
Rails: Novice to Ninja.pdf | 12.27 MiB |
CompTIA Cloud+ Certification Study Guide Exam CV0-001.pdf | 22.33 MiB |
CompTIA Cloud+ Study Guide.azw3 | 4.25 MiB |
What is a Sensor: Sensor Basics Understanding fundamental principles and features.pdf | 745.67 KiB |
Introduction to Computer Science by Huong Nguyen.pdf | 3.11 MiB |
Blackjacking: Security Threats to BlackBerry Devices PDAs, and Cell Phones in the Eterprise.pdf | 10.47 MiB |
CompTIA Network+ Lab Manual.epub | 26.58 MiB |
Patterns in Java Vol.2.pdf | 17.51 MiB |
Management of Information Security.pdf | 15.41 MiB |
X-SHELL: A Guide Towards Windows Prompt Accesses.pdf | 2.34 MiB |
Sensor and Safety Line up.pdf | 930.85 KiB |
Security Assessment in Vehicular Networks.pdf | 1020.79 KiB |
PCI Compliance: Understand and Implement Effective PCI Data Security Standard Compliance.pdf | 6.34 MiB |
Linux Administrator Street Smarts: A Real World Guide to Linux Certification Skills.pdf | 9.04 MiB |
Breaking into Computer Networks from the Internet.djvu | 787.06 KiB |
Flexible, Reliable Software: Using Patterns and Agile Development.pdf | 3.51 MiB |
CompTIA Project+ Practice Tests.pdf | 2.18 MiB |
The Best Books in your Pocket.pdf | 2.31 MiB |
Cisco Security Professional's Guide to Secure Intrusion Detection Systems.pdf | 13.11 MiB |
CompTIA Security+ SY0-301 Authorized Cert Guide.epub | 18.75 MiB |
Information technology Security techniques: Code of practice for information security management.pdf | 1.36 MiB |
Practical Hacking Techniques and Countermeasures.pdf | 143.97 MiB |
ID Code Handbook 2-D Code Basic Guide.pdf | 328.72 KiB |
Hacking Leopard: Tools and Techniques for Attacking the Newest Mac OS X.pdf | 2.13 MiB |
Black Hats and the White Hats: The Effect of Organizational Culture and Institutional Identity on the Twenty-third Air Force.pdf | 3.92 MiB |
IT Security Interviews Exposed: Secrets to Landing Your Next Information Security Job.pdf | 2.45 MiB |
All-in-One CompTIA Mobility+ Certification Exam Guide MB0-001.epub | 4.65 MiB |
Be Hacker Vol.1.pdf | 1.99 MiB |
Underground - hacking, madness and obsession on the electronic frontier.pdf | 1.48 MiB |
The Tools For Continuous Delivery.pdf | 171.15 KiB |
Pro Open Source Mail: Building an Enterprise Mail Solution.pdf | 7.16 MiB |
CV-X Series Version 4 Power Meets Simplicity.pdf | 10.51 MiB |
Risk Propagation Assessment for Network Security.pdf | 1.82 MiB |
CompTIA Network+ Certification Study Guide 6th Edition Exam N10-006 50+ Practice Exam Question.pdf | 73.84 MiB |
Hardware Hacking Projects for Geeks.pdf | 15.03 MiB |
Extreme Exploits: Advanced Defenses Against Harcore Hacks.chm | 10.62 MiB |
I Wear The Black Hat: Grappling with Villains (Real and Imagined).epub | 3.41 MiB |
Linux Toys II Are you Game: Set Up a Gaming Server for a BZFlag battle.pdf | 9.09 MiB |
Identity Theft: The Other you has Stolen Your Identity How to Stop Him.pdf | 2.22 MiB |
ID Code Handbook Bar Code Type Selection Guide.pdf | 1.17 MiB |
Hacking RSS and Atom.pdf | 14.94 MiB |
Essential Computer Security: Everyone's Guide to E-Mail, Internet, and Wireless Security.pdf | 11.72 MiB |
Quantitative Security Risk Assessment of Enterprise Networks.pdf | 803.59 KiB |
Vision System Beginner's Guide.pdf | 2.1 MiB |