Collection of cryptography, social engineering and malware
- Type:
- Other > E-books
- Files:
- 29
- Size:
- 1.17 GiB (1256670198 Bytes)
- Tag(s):
- cryptography social engineering malware algorithms protocols hacker engineering security handbook art of art penetration
- Uploaded:
- 2018-02-10 20:12:47 GMT
- By:
- Knugen69
- Seeders:
- 0
- Leechers:
- 1
- Comments
- 0
- Info Hash: 54BFAF9C232FCD0D23CBB8E1033AC7F7C24726D4
(Problems with magnets links are fixed by upgrading your torrent client!)
A collection of cryptography, social engineering and malware analysts E-BOOKS. Contents: Applied cryptography protocols algorithms and source code in c 20th Anniversary Edition Ceh v9 certified ethical hacker study guide Cryptography engineering design principles and practical applications Malware analysts cookbook and dvd tools and techniques for fighting malicious code Practical reverse engineering x86 x64 arm windows kernel reversing tools and obfuscation Secrets and lies digital security in a networked world 15th Anniversary Edition Security engineering a guide to building dependable distributed systems 2nd Edition Shellcoders handbook discovering and exploiting security holes 2nd Edition Social engineering the art of human hacking The art of deception controlling the human element of security The art of memory forensics detecting malware and threats in windows linux and mac memory Threat modeling designing for security Unauthorised access physical penetration testing for it security teams Web application hackers handbook finding and exploiting security flaws 2nd Edition Enjoy! Knugen69
malware_analysts_cookbook_and_dvd_tools_and_techniques_for_fighting_malicious_code_dvd.zip | 874.37 MiB |
cryptography_engineering_design_principles_and_practical_applications.jpg | 56.31 KiB |
shellcoders_handbook_discovering_and_exploiting_security_holes_2nd_Edition.pdf | 3.47 MiB |
unauthorised_access_physical_penetration_testing_for_it_security_teams.jpg | 57.38 KiB |
secrets_and_lies_digital_security_in_a_networked_world_15th_Anniversary_Edition.jpg | 82.07 KiB |
web_application_hackers_handbook_finding_and_exploiting_security_flaws_2nd_Edition.jpg | 60.25 KiB |
practical_reverse_engineering_x86_x64_arm_windows_kernel_reversing_tools_and_obfuscation.jpg | 43.73 KiB |
ceh_v9_certified_ethical_hacker_study_guide.jpg | 46.42 KiB |
the_art_of_deception_controlling_the_human_element_of_security.pdf | 2.88 MiB |
social_engineering_the_art_of_human_hacking.jpg | 44.77 KiB |
applied_cryptography_protocols_algorithms_and_source_code_in_c_20th_Anniversary_Edition.jpg | 69.16 KiB |
threat_modeling_designing_for_security.jpg | 89.7 KiB |
malware_analysts_cookbook_and_dvd_tools_and_techniques_for_fighting_malicious_code.jpg | 59.82 KiB |
security_engineering_a_guide_to_building_dependable_distributed_systems_2nd_Edition.jpg | 26.86 KiB |
the_art_of_memory_forensics_detecting_malware_and_threats_in_windows_linux_and_mac_memory.pdf | 14.34 MiB |
unauthorised_access_physical_penetration_testing_for_it_security_teams.pdf | 25.95 MiB |
cryptography_engineering_design_principles_and_practical_applications.pdf | 2.78 MiB |
shellcoders_handbook_discovering_and_exploiting_security_holes_2nd_Edition.jpg | 47.4 KiB |
practical_reverse_engineering_x86_x64_arm_windows_kernel_reversing_tools_and_obfuscation.pdf | 4.49 MiB |
secrets_and_lies_digital_security_in_a_networked_world_15th_Anniversary_Edition.pdf | 4.08 MiB |
web_application_hackers_handbook_finding_and_exploiting_security_flaws_2nd_Edition.pdf | 16.3 MiB |
the_art_of_deception_controlling_the_human_element_of_security.jpg | 32.88 KiB |
social_engineering_the_art_of_human_hacking.pdf | 6.01 MiB |
ceh_v9_certified_ethical_hacker_study_guide.pdf | 37.07 MiB |
security_engineering_a_guide_to_building_dependable_distributed_systems_2nd_Edition.pdf | 5.8 MiB |
the_art_of_memory_forensics_detecting_malware_and_threats_in_windows_linux_and_mac_memory.jpg | 53.59 KiB |
applied_cryptography_protocols_algorithms_and_source_code_in_c_20th_Anniversary_Edition.pdf | 157.16 MiB |
threat_modeling_designing_for_security.pdf | 21.71 MiB |
malware_analysts_cookbook_and_dvd_tools_and_techniques_for_fighting_malicious_code.pdf | 21.29 MiB |