Details for this torrent 

Pack3.75 200GB Security Edition & Computer Science Books
Type:
Other > E-books
Files:
120
Size:
1.14 GiB (1225275558 Bytes)
Tag(s):
Hacking Security Linux
Uploaded:
2017-10-28 03:18:11 GMT
By:
j3w1
Seeders:
1
Leechers:
1
Comments
0  

Info Hash:
292ACD88D5D0806E8E78444DBAF415AFB71D089E




(Problems with magnets links are fixed by upgrading your torrent client!)
Almost all latest security, pentesting and hacking books

Lab Manual for Security+ Guide to Network Security Fundamentals 5th Edition.pdf86.41 MiB
Hacking Electronics: Learning Electronics with Arduino and Raspberry Pi 2nd Edition.pdf14.17 MiB
Masterking Kali linux: Hack It or Crack It 2nd Edition.pdf11.6 MiB
Information Theoretic Security and Privacy of Information Systems.azw36.56 MiB
Hacking: Beginner's Guide on How to Hack Using Python and Linux.pdf657.01 KiB
Kali Linux - An Ethical Hacker's Cookbook: Ent-to-end penetration testing solutions.azw321.36 MiB
Kali Linux Wireless Penetration Testing Essentials: Plan and execute penetration tests on wireless networks with the Kali Linux distribution.pdf18.64 MiB
CWSP: Certified Wireless Security Professional Official Study Guide (CWSP-205) 2nd Edition.pdf16.24 MiB
Applied Network Security: Master the art of detecting and averting advanced network security attacks and techniques.pdf44.2 MiB
Hacking: Create Your Own Penetration Testing Lab in 1 Hour Kali Linux Booklet.pdf2.12 MiB
Kali Linux Cookbook: Effective penetration testing solutions 2nd Edition.azw321.99 MiB
Hacking with Python: The Ultimate Beginner's Guide.pdf3.17 MiB
Hacking for Beginners: Computer Virus Cracking Malware IT Security2nd Edition.epub191.54 KiB
Applications and Techniques in Information Security.pdf11.74 MiB
Mobile Communication Systems and Security.pdf5.01 MiB
Wireless Mobile Internet Security 2nd Edition.pdf2.2 MiB
Network Security: A Beginner's Guide 3rd Edition.pdf31.39 MiB
Web Application Security for Dummies Qualys Limited Edition.pdf2.84 MiB
Kali Linux Intrusion and Exploitation Cookbook: Over 70 recipes for system administrators or DevOps to master Kali Linux 2 and perform effective security assessments.azw337.35 MiB
Cloud Computing Security Foundations and Challenges.pdf43.1 MiB
Least Privilege Security for Windows 7, Vista and XP: Secure desktops for regulatory compliance business agility.pdf10.36 MiB
CEHv6 Module 63 Botnets.pdf1.11 MiB
SOA Security.pdf14.62 MiB
Advanced Persistent Threat Hacking: The Art and Science of Hacking Any Organization.pdf10.58 MiB
Thinking Security: Stopping Next Year's Hackers.pdf5.87 MiB
CEHv6 Module 06 Enumeration.pdf4.05 MiB
SELinux by Example: Using Security Enhanced Linux.pdf26.67 MiB
ISSE 2014 Securing Electronic Business Processes: Highlights of the Information Security Solutions Europe 2014 Conference.pdf7.02 MiB
CEHv6 Module 05 Scanning.pdf16.65 MiB
Data Analytics and Computer Hacking & Mobile Hacking 3 Bundle Manuscript: Beginner's Guide to Learn Data Analytics, Predictive Analytics and Data Science with Computer Hacking and Mobile Hacking.pdf1.43 MiB
CEHv6 Module 67 Identifying the Terrorists.pdf1.76 MiB
Information Security Governance Simplified: From the Boardroom to the Keyboard.pdf3.24 MiB
Identity and Data Security for Web Development: Best Practices.pdf13.46 MiB
CEHv6 Module 59 How to Steal Passwords.pdf1.55 MiB
Cyber-Physical Security and Privacy in the Electric Smart Grid.pdf1.46 MiB
Master Internet and Computer Security: How to Protect Yourself, Your Family and Your Business from Cyber Crime, Malicious Software and Data Loss.pdf1.51 MiB
Kali Linux 2: Windows Penetration Testing: a complete pentesting toolkit facilitating smooth backtracking for working hackers.azw331.31 MiB
Mastering Kali Linux for Web Penetration Testing.pdf34.48 MiB
CEHv6 Module 33 Reverse Engineering Techniques.pdf2.78 MiB
How To Rename Your Recycle Bin.pdf29.65 KiB
Implementing Cybersecurity: A Guide To The National Institute of Standards and Technology Risk Management Framework.pdf4.09 MiB
Physical Security and Safety: A Field Guide for the Practitioner.pdf9.1 MiB
How To Hack Someone With His IP Address.pdf54.58 KiB
Software Networks: Virtualization, SDN, 5G, and Security.pdf16.51 MiB
CEH-Classroom-Lab-Setup-v6.pdf1.49 MiB
CEHv6 Module 35 Hacking Routers, Cable Modems and Firewalls.pdf3.22 MiB
(IN)SECURE Magazine Issue 47 Redefining Security Visualization with Hollywood UI Design.pdf10.74 MiB
Data and Applications Security and Privacy XXVIII.pdf14.23 MiB
The Kish Cypher: The Story Of KLJN For Unconditional Security.pdf30.2 MiB
From Here to Security: How Workplace Savings Can Keep America's Promise.pdf3.58 MiB
CEHv6 Module 18 Web based Password Cracking Techniques.pdf5.41 MiB
Advanced Hacking: The Blueprint for Beginners to Advanced Hackers.pdf602.29 KiB
Securing the Connected Classroom Technology Planning to Keep Students Safe.pdf939.07 KiB
Enterprise Information Systems Assurance And System Security: Managerial And Technical Issues.pdf8.06 MiB
Basic Security Testing with Kali Linux 2: Test Your Computer System Security by using the same Tactics that an Attacker would use.pdf15.93 MiB
RFID Security: A Lightweight Paradigm.pdf3.84 MiB
Content Delivery Networks: Web Switching for Security Availability and Speed.pdf11.57 MiB
Introduction to Security and Network Forensics.pdf17.97 MiB
CEHv6 Module 65 Patch Management.pdf7.02 MiB
Cyber Security Basics: Protect your organization by applying the fundamentals.pdf1.57 MiB
CEHv6 Module 07 System Hacking.pdf15.11 MiB
CEHv6 Module 56 Hacking Global Positioning System.pdf2.15 MiB
Distributed Networks: Intelligence, Security, and Applications.pdf11.78 MiB
How To Shutdown A Computer With A Cell Phone.pdf34.44 KiB
Advanced Persistent Training: Take Your Security Awareness Program to the Next Level.pdf1.11 MiB
Security Testing with Kali NetHunter: Testing computer system security using a mobile device and the power of Kali NetHunter.pdf5.58 MiB
How To Use Your First Web Exploit.pdf589.41 KiB
Role Engineering for Enterprise Security Management.pdf2.91 MiB
Security of Self-Organizing Networks: MANET, WSN, WMN, VANET.pdf7.25 MiB
CEHv6 Module 58 Credit Card Frauds.pdf2.13 MiB
NISTIR 8176: Security Assurance Requirements for Linux Application Container Deployments.pdf1.72 MiB
Energy Security in Europe: Divergent Perceptions and Policy Challenges.pdf3.63 MiB
Industrial Network Security 2nd Edition.pdf5.65 MiB
Testing and Securing Android Studio Applications.pdf3.56 MiB
How To ''Deface'' A Guestbook With HTML-Injection.pdf54.38 KiB
Information Fusion for Cyber-Security Analytics.pdf7.61 MiB
The Practical Guide to HIPAA Privacy and Security Compliance 2nd Edition.pdf35.47 MiB
E-mail Security: A Pocket Guide.pdf1.05 MiB
Cisco Press CCNA Security 640-554 Official Cert Guide.pdf18.55 MiB
Cloud Computing and Security.pdf24.76 MiB
Cyberspace and Cybersecurity 2nd Edition.pdf3.27 MiB
CEHv6 Module 02 Hacking Laws.pdf3.64 MiB
Fundamentals of information systems security 3rd Edition.pdf10.75 MiB
Hospitality Security: Managing Security in Today's Hotel, Lodging, Entertainment, and Tourism Environment.pdf7.05 MiB
Online Security for Everyone: How to protect yourself and stay safe from fraud, scams and hackers with easy cyber security tips for your Gmail, Docs and other Google services.pdf1.31 MiB
(IN)SECURE Magazine Issue 46 10 Practical Security Tips for DevOps.pdf9.67 MiB
How To Hack An Administrator Account With A Guest Account.pdf81.89 KiB
Provable Security.pdf9.49 MiB
CEHv6 Module 64 Economic Espionage.pdf657.63 KiB
Managing an Information Securit and Privacy Awareness and Training Program 2nd Edition.pdf3.41 MiB
Sexual Violence in a Digital Age: Palgrave MacMillan's Studies in Cyber Crime and Security.pdf5.59 MiB
CISSP (ISC)2 Certified Information Systems Security Professional Official Study Guide 7th Edition.pdf37.63 MiB
CEHv6 Module 16 Hacking Webservers.pdf4.88 MiB
Security: The Human Factor.pdf426.32 KiB
(IN)SECURE Magazine Issue 53 Antivirus 2017: Security with a Hint of Surveillance.pdf5.1 MiB
CEHv6 Module 12 Phishing.pdf2.6 MiB
CEHv6 Module 62 Case Studies.pdf718.23 KiB
CEHv6 Module 36 Hacking Mobile Phones, PDA and Handheld Devices.pdf4.02 MiB
Hacking and Securitng Web Applications.pdf4.16 MiB
Hacking: The Blueprint. A Beginner's Guide to Ethical Computer Hacking.pdf718.9 KiB
Intermediate Security Testing With Kali Linux 2.pdf21.06 MiB
Assessing Network Security.pdf5.93 MiB
php|architect's Guide to PHP Security: A Step-by-Step Guide to Writing Secure and Reliable PHP Applications.pdf2.25 MiB
Oracle Database 12c Security Cookbook: Secure your Oracle Database 12c with this valuable Oracle support resource, featuring more than 100 solutions to the challenges of protecting your data.pdf17.86 MiB
How To Kick Someone Of A Wireless Network (Must be LAN-Admin).pdf43.43 KiB
CEHv6 Module 26 Penetration Testing.pdf5.64 MiB
Hacking: Noob to Cyberpunk Easy Guide to Computer Hacking, Internet Security, Penetration Testing, Cracking, Sniffing, and Smart Phone Vulnerabilities.pdf589.65 KiB
Hacking: The Internet Compact Research.pdf1.9 MiB
Owning Bitcoin: The Illustrated Guide to Security, Privacy and Possibility.azw36.76 MiB
Modern Security Analysis: Understanding Wall Street Fundamentals.pdf3.71 MiB
Predictive Computing and Information Security.pdf5.62 MiB
Security in Computing 5th Edition.pdf16.36 MiB
Hacking Made Easy: An Easy Guide To Learn IT Security.epub2.79 MiB
Kali Linux Revealed: Mastering the Penetration Testing Distribution.pdf26.32 MiB
Securing Docker: Learn how to secure your Docker environment and keep your environments secure irrespective of the threats out there.azw31.82 MiB
Intelligent Systems for Security Informatics.pdf7.47 MiB
Mastering Kali Linux for Advanced Penetration Testing: Secure your network with Kali Linux - the ultimate's hacker arsenal 2nd Edition.pdf31.68 MiB
Practical Internet of Things Security.azw35.14 MiB
Hacking: 17 Must Tools Every Hacker Should Have Volume 2.pdf2.28 MiB
Python Programming for Beginners and Hacking with Python: 2 Bundle Manuscript.pdf624.76 KiB