Details for this torrent 

Pack0.25 200GB Books Computer Science Math Programming Skills
Type:
Other > E-books
Files:
120
Size:
2.08 GiB (2237813572 Bytes)
Texted language(s):
English
Uploaded:
2017-08-10 19:17:28 GMT
By:
j3w1
Seeders:
0
Leechers:
1
Comments
0  

Info Hash:
856611264ACFFF3709D79E31577723FF67646B6E




(Problems with magnets links are fixed by upgrading your torrent client!)
seed & dont' forget to enjoy

CompTIA IT Fundamentals Study Guide.pdf233.12 MiB
CompTIA A+ Certification: Mike Meyers' Certification Passport 5th Edition.pdf128.99 MiB
How to Become a Travel Ninja: Travel Hacking Anywhere in the World.pdf294.58 KiB
Applied Cryptography for Cyber Security and Defense: Information Encryption and Cyphering.pdf5.41 MiB
Hacking the Invisible Network: Insecurities in 802.11x.pdf13.78 MiB
Trust Management.pdf25.88 MiB
Attack and Defend Computer Security Set.pdf34.42 MiB
Adsense: BlackHat Edition.pdf386.89 KiB
Social, Managerial, and Organizational Dimensions of Enterprise Information Systems.pdf12.39 MiB
Java Enterprise Design Patterns: Patterns in Java Vol.3.pdf3.1 MiB
Guide to J2E: Enterprise Java.pdf28.78 MiB
CompTIA Security+ Study Guide 6th Edition.epub12.52 MiB
The CISM Prep Guide: Mastering the Five Domains of Information Security Management.chm2.41 MiB
CompTIA Security+ Certification Bundle Exam SY0-401 2nd Edition.epub36.95 MiB
Unreliable Guide To Hacking The Linux Kernel.pdf365.21 KiB
Learning SaltStack: Learn how to manage your infrastructure by utilizing the power of SaltStack.pdf1.51 MiB
Break into TechL LinkedIn Profile Checklist.pdf476.26 KiB
A Guide to Improving Porductivity Using Barcode Readers: Techniques for Stabilizing Moving Targets for Reading Purposes.pdf2.43 MiB
Hacking Digital Cameras.pdf21.35 MiB
Creating Resilient Architectures on Microsoft Azure.pdf691.38 KiB
Hacking Etico por Carlos Tori.pdf59.33 MiB
Ethical Hacking (EC-Council Exam 312-50): Student Courseware.chm14.15 MiB
Complete CompTIA A+ Guide to IT Hardware and Software 7th Edition.epub90.18 MiB
Hacking Video Game Consoles.pdf66.94 MiB
Waze vs. Google Maps: Which App Will Navigate Home Faster.pdf2.12 MiB
CCSP: Cisco CErtified Security Professional Certification Exam Guide All-in-One.pdf17.24 MiB
Hacking Movable Type.pdf8.41 MiB
CompTIA A+ 220-701 and 220-702 Exam Cram 5th Edition.pdf11.21 MiB
World Standards Safety Guide.pdf3.35 MiB
Hacking Google Maps and Google Earth.pdf11.28 MiB
Introduction to Information Systems 17th Edition.pdf80.63 MiB
1D-2D Code Reader Actial Installation Examples: Electronic Device Industry Edition.pdf1.78 MiB
Amazon Web Services an Overview: Expert REference Series of White Papers.pdf222.96 KiB
Struts Survival Guide: Basics to Best Practices.pdf4.47 MiB
CompTIA Network+ N10-005 Exam Cram 4th Edition.epub31.04 MiB
CompTIA Network+ Certification Exam N10-005 All-in-One Premium 5th Edition.azw351.48 MiB
Hacking Point of Sale: Payment Application Secrets, Threats, and Solutions.pdf22.83 MiB
Kernel Level Vulnerabilities: Behind the Scenes of the 5th Argus Hacking Challenge.pdf440.45 KiB
CASP CompTIA Advanced Security Practitioner Study Guide 2nd Edition.pdf7.15 MiB
Current Security Management & Ethical Issues of Information Technology.chm2.65 MiB
Security Engineering: A Guide to Building Dependable Distributed Systems 2nd Edition.pdf5.34 MiB
Inside Network Security Assessment: Guarding your IT Infrastructure.chm1.87 MiB
Travel Deeply: Do it Cheaply.pdf8.4 MiB
CCIE Profesional Development Series Network Security Technologies and Solutions.chm26.01 MiB
Windows Command Prompt A to N.pdf2.39 MiB
Unmatched Protection Safety Light Curtain.pdf7.35 MiB
Java SOA Cookbook: SOA Implementation Recipes, Tips, and Techniques.pdf9.97 MiB
Boost Productivity With Your Smart Phone: And Run Your Business Wherever You Want.pdf879.38 KiB
CompTIA A+ Certification All-in-One for Dummies.pdf82.52 MiB
Hacking Cyberspace.pdf22.68 MiB
Securit in Distributed and Networking Systems.pdf9.57 MiB
Hacking GPS.pdf10.33 MiB
CompTIA A+ Complete Deluxe Study Guide 2nd Edition Exam 220-801 220-802.pdf136.39 MiB
CompTIA Network+ Certification Exam N10-006 All-In-One 6th Edition.pdf50.42 MiB
Hacking Exposed Unified Communications & VoIP 2nd Edition.pdf20.59 MiB
20 Travel Hacking Strategies.pdf2.66 MiB
Applied Information Security: A Hands-on Approach.pdf1.59 MiB
Vision Sensor IV Series: Quick Setup Guide.pdf2.35 MiB
Poderes Locales y Globales. Un Estudio desde las Evaluaciones de Impacto Ambiental en las Toninas, Partido de la Costa, Buenos Aires, Argentina.pdf251.59 KiB
Hacking Ubuntu.chm9.74 MiB
7 Steps to Change Company Culture.pdf1.31 MiB
How to Build A Beowulf.chm416.17 KiB
CMS Security Handbook: The Comprehensive Guide for Wordpress, Joomla, Drupal, and Plone.epub13.76 MiB
Inline Profile Measurement: The World's Fastest at 64000 Profile per Second.pdf7.98 MiB
Hacking the Tivo.pdf4.67 MiB
Data Storage Networking: Real-World Skills for the CompTIA Storage+ Certification and Beyond.pdf4.8 MiB
1D-2D Code Reader Actual Installation Examples: Food, Pharmaceutical, and Cosmetics Industries Edition.pdf1.78 MiB
Distributed Systems Security: Issues, Processes and Solutions.pdf6.14 MiB
Data Protection Ensuring Data Availability.pdf6.32 MiB
Cloud Essentials CompTIA Authorized Courseware for Exam CLO-001.epub13.19 MiB
31 Days Before Your CompTIA A+ Exams 2nd Edition.pdf1.54 MiB
LPIC-1 Certification Bible.pdf7.71 MiB
Hacking Windows Vista ExtremeTech.chm17.82 MiB
Enterprise Systems Backup and Recovery: A Corporate Insurance Policy.pdf3.78 MiB
Hacking Exposed 7: Network Security Secrets & Solutions.pdf33.03 MiB
Juniper SRX Series: A Comprehensive Guide to Security Services on the SRX Series.pdf46.77 MiB
Rails: Novice to Ninja.pdf12.27 MiB
CompTIA Cloud+ Certification Study Guide Exam CV0-001.pdf22.33 MiB
CompTIA Cloud+ Study Guide.azw34.25 MiB
What is a Sensor: Sensor Basics Understanding fundamental principles and features.pdf745.67 KiB
Introduction to Computer Science by Huong Nguyen.pdf3.11 MiB
Blackjacking: Security Threats to BlackBerry Devices PDAs, and Cell Phones in the Eterprise.pdf10.47 MiB
CompTIA Network+ Lab Manual.epub26.58 MiB
Patterns in Java Vol.2.pdf17.51 MiB
Management of Information Security.pdf15.41 MiB
X-SHELL: A Guide Towards Windows Prompt Accesses.pdf2.34 MiB
Sensor and Safety Line up.pdf930.85 KiB
Security Assessment in Vehicular Networks.pdf1020.79 KiB
PCI Compliance: Understand and Implement Effective PCI Data Security Standard Compliance.pdf6.34 MiB
Linux Administrator Street Smarts: A Real World Guide to Linux Certification Skills.pdf9.04 MiB
Breaking into Computer Networks from the Internet.djvu787.06 KiB
Flexible, Reliable Software: Using Patterns and Agile Development.pdf3.51 MiB
CompTIA Project+ Practice Tests.pdf2.18 MiB
The Best Books in your Pocket.pdf2.31 MiB
Cisco Security Professional's Guide to Secure Intrusion Detection Systems.pdf13.11 MiB
CompTIA Security+ SY0-301 Authorized Cert Guide.epub18.75 MiB
Information technology Security techniques: Code of practice for information security management.pdf1.36 MiB
Practical Hacking Techniques and Countermeasures.pdf143.97 MiB
ID Code Handbook 2-D Code Basic Guide.pdf328.72 KiB
Hacking Leopard: Tools and Techniques for Attacking the Newest Mac OS X.pdf2.13 MiB
Black Hats and the White Hats: The Effect of Organizational Culture and Institutional Identity on the Twenty-third Air Force.pdf3.92 MiB
IT Security Interviews Exposed: Secrets to Landing Your Next Information Security Job.pdf2.45 MiB
All-in-One CompTIA Mobility+ Certification Exam Guide MB0-001.epub4.65 MiB
Be Hacker Vol.1.pdf1.99 MiB
Underground - hacking, madness and obsession on the electronic frontier.pdf1.48 MiB
The Tools For Continuous Delivery.pdf171.15 KiB
Pro Open Source Mail: Building an Enterprise Mail Solution.pdf7.16 MiB
CV-X Series Version 4 Power Meets Simplicity.pdf10.51 MiB
Risk Propagation Assessment for Network Security.pdf1.82 MiB
CompTIA Network+ Certification Study Guide 6th Edition Exam N10-006 50+ Practice Exam Question.pdf73.84 MiB
Hardware Hacking Projects for Geeks.pdf15.03 MiB
Extreme Exploits: Advanced Defenses Against Harcore Hacks.chm10.62 MiB
I Wear The Black Hat: Grappling with Villains (Real and Imagined).epub3.41 MiB
Linux Toys II Are you Game: Set Up a Gaming Server for a BZFlag battle.pdf9.09 MiB
Identity Theft: The Other you has Stolen Your Identity How to Stop Him.pdf2.22 MiB
ID Code Handbook Bar Code Type Selection Guide.pdf1.17 MiB
Hacking RSS and Atom.pdf14.94 MiB
Essential Computer Security: Everyone's Guide to E-Mail, Internet, and Wireless Security.pdf11.72 MiB
Quantitative Security Risk Assessment of Enterprise Networks.pdf803.59 KiB
Vision System Beginner's Guide.pdf2.1 MiB