Details for this torrent 

Elsevier Syngress All Books & Journals Computer Security
Type:
Other > E-books
Files:
563
Size:
10.05 GiB (10786694276 Bytes)
Uploaded:
2020-01-14 16:28:56 GMT
By:
j3w1
Seeders:
1
Leechers:
2
Comments
0  

Info Hash:
82CE544FE85192DCD07B595E63712DA8243831F9




(Problems with magnets links are fixed by upgrading your torrent client!)
This is the new upload NOT using a big compressed file

All Elsevier-Syngress Books and Journals with some extra and useful content.

99.5% TruePDFs

Enjoy & Seed!

-----------------------------

I am currently downloading all my torrents again, all of them, thanks for those who are still seeding!

I would like everyone interested, download the whole collection of my torrents, these are all the magnet links of my torrents you can add on your client:

pastebin ZXgjEXQS


Also please kindly check http://the-eye.eu , they have good stuff to download too

specials/SDN and NFV Simplified A Visual Guide to Understanding Software Defined Networks and Network Function Virtualization.pdf420.69 MiB
10 Cool LEGO Mindstorms Robotics Invention System 2 Projects Amazing Projects You Can Build Under an Hour.pdf31.51 MiB
A Guide to Kernel Exploitation Attacking the Core.pdf5.27 MiB
A Machine Learning Approach to Phishing Detection and Defense.pdf7.1 MiB
A Study of Black Hole Attack Solutions On AODV Routing Protocl in MANET.pdf10.56 MiB
Administering Cisco QoS in IP Networks.pdf3.69 MiB
Advanced Persistent Security A Cyberwarfare Approach to Implementing Adaptive Enterprise Protection, Detection, and Reaction Strategies.pdf2.27 MiB
Advanced Persistent Threat Understanding the Danger and How to Protect Your Organization.pdf7.12 MiB
Aggressive Network Self-Defense I'm Mad As Hell, and I'm Not Gonna Take It Anymore.pdf83.05 MiB
Alternate Data Storage Forensics Raise Digital Fingerprints from Alternate Data Storage ADS Devices.pdf7.81 MiB
Android Forensics Investigation, Analysis and Mobile Security for Google Android.pdf39.01 MiB
Apple I Replica Creation Back to the Garage.pdf72.84 MiB
Applied Cyber Security and the Smart Grid Implementing Security Controls into the Modern Power Infrastructure.epub3.53 MiB
Applied Cyber Security and the Smart Grid Implementing Security Controls into the Modern Power Infrastructure.pdf9.23 MiB
Applied Network Security Monitoring Collection, Detection, and Analysis.epub7.43 MiB
Applied Network Security Monitoring Collection, Detection, and Analysis.pdf41.51 MiB
ASP Configuration Handbook Application Service Provider A Guide for ISPs.pdf4.97 MiB
ASP.NET Web Developer's Guide.pdf6.99 MiB
Assessing Vendors A Hands-On Guide to Assessing Infosec and IT Vendors.epub2.31 MiB
Assessing Vendors A Hands-On Guide to Assessing Infosec and IT Vendors.pdf1.37 MiB
Asterisk Hacking Turn your Phone System into a Samurai Sword-for Attack or Defense.pdf10.19 MiB
Audio Content Security Attack Analysis on Audio Watermarking.pdf2.28 MiB
Augmented Reality An Emerging Technologies Guide to AR.epub4.23 MiB
Augmented Reality An Emerging Technologies Guide to AR.pdf15.5 MiB
Augmented Reality Law, Privacy, and Ethics Law, Society, and Emerging AR Technologies.pdf13.01 MiB
Automated Security Analysis of Android and iOS Applications with Mobile Security Framework.pdf5.43 MiB
Automating Open Source Intelligence Algorithms for OSINT.pdf6.77 MiB
AVIEN Malware Defense Guide for the Enterprise Stop the Stalkers on Your Desktop.pdf5.69 MiB
Best Damn Cisco Internetworking Book Period.pdf16.55 MiB
Best Damn Cybercrime and Digital Forensics Book Period Your Guide to Digital Information Seizure, Incident Response, and Computer Forensics.pdf10.46 MiB
Best Damn Exchange, SQL and IIS Book Period.pdf65.28 MiB
Best Damn Firewall Book Period 2nd Edition.pdf47.7 MiB
Best Damn Firewall Book Period.chm50.81 MiB
Best Damn Firewall Book Period.pdf20.45 MiB
Best Damn IT Security Management Book Period Everything You Need to Know About Security Management.pdf25.4 MiB
Best Damn Server Virtualization Book Period.pdf34.65 MiB
Best Damn Windows Server 2003 Book Period.pdf21.4 MiB
Best Damn Windows Server 2008 Book Period 2nd Edition.pdf19.25 MiB
BigNum Math Implementing Cryptographic Multiple Precision Arithmetic Learn How to Implement Efficient Multiple Precision Algorithms.pdf5.6 MiB
BizTalk Server 2000 Developer's Guide for ,NET.pdf6.9 MiB
Black Hat Physical Device Security Exploiting Hardware and Software.pdf78.59 MiB
Blackhatonomics An Inside Look at the Economics of Cybercrime.pdf6.37 MiB
Bluetooth Application Developer's Guide The Short Range Interconnect Solution.pdf53.98 MiB
Botnets The Killer Web App.pdf6.98 MiB
Breaking into Information Security Crafting a Custom Career Path to Get the Job You Really Want.pdf3.56 MiB
Buffer Overflow Attacks Detect, Exploit, Prevent.pdf5.39 MiB
Building a Cisco Wireless LAN.pdf7.07 MiB
Building a Digital Forensic Laboratory Establishing and Managing a Successful Facility.pdf1.16 MiB
Building a Practical Information Security Prgram.pdf2.65 MiB
Building a VoIP Network with Nortel's Multimedia Communication Server 5100.pdf47.34 MiB
Building an Information Security Awareness Program.pdf5.55 MiB
Building an Intelligence-Led Security Program.pdf6.29 MiB
Building Cisco Networks for Windows 2000.pdf5.71 MiB
Building Cisco Remote Access Networks.pdf5.69 MiB
Building DMZs For Enterprise Networks Design, Deploy, and Maintain a Secure DMZ on Your Network.pdf9.84 MiB
Building Robots with LEGO Mindstorms NXT The Ultimate Tool for MINDSTORMS Maniacs.pdf71.15 MiB
Building Robots with LEGO Mindstorms The Ultimate Tool for Mindstorms Maniacs.pdf14.2 MiB
Building SANs with Brocade Fabric Switches How to Design, Implement, and Maintain Storage Are Networks SANs with Brocade Fabric Switches.pdf3.05 MiB
Business Continuity & Disaster Recovery for IT Professionals Increase Your Company's Odds of Surviving a Major Disaster.pdf5.73 MiB
Business Continuity and Disaster Recovery Planning for IT Professionals 2nd Edition.pdf7.24 MiB
C# .NET Web Developer's Guide Develop and Deliver Enterprise-Critical Desktop and Web Applications with C# .NET.pdf6.82 MiB
C# for Java Programmers.pdf5.46 MiB
CD and DVD Forensics Handle, Examine, and Process CD and DVD Evidence for Computer Forensics.pdf5.97 MiB
Check Point Next Generation with Application Intelligence Security Administration.pdf151.58 MiB
Check Point NG VPN-1 FireWall-1 Advanced Configuration and Troubleshooting.pdf9.19 MiB
Check Point NGX R65 Security Administration.pdf10.58 MiB
CheckPoint NG-AI Next Generation with Application Intelligence Security Administration.chm22.79 MiB
Cisco AVVID and IP Telephony Design & Implementation Design and Deploy IP Telephony Solutions.pdf7.46 MiB
Cisco CCNA CCENT Exam 640-802, 640-822, 640-816 Preparation Kit.pdf15.25 MiB
Cisco Router and Switch Forensics Investigating and Analyzing Malicious Network Activity.pdf25.57 MiB
Cisco Security Professional's Guide to Secure Intrusion Detection Systems.pdf13.11 MiB
Cisco Security Specialist's Guide to PIX Firewalls.pdf10.77 MiB
CISSP Study Guide 3rd Edition.pdf30.45 MiB
Citrix XenDesktop Implementation A Practical Guide for IT Professionals.pdf33.53 MiB
Classic Lego Mindstorms Projects and Software Tools Award-Winning Designs from Master Builders.pdf45.47 MiB
Client-Side Attacks and Defense.pdf15.02 MiB
Cloud Storage Forensics.pdf5.64 MiB
Coding for Penetration Testers Building Better Tools 2nd Edition.epub9.13 MiB
Coding for Penetration Testers Building Better Tools 2nd Edition.pdf5.5 MiB
Coding for Penetration Testers Building Better Tools.pdf9.88 MiB
Collaboration with Cloud Computing Security, Social Media, and Unified Communications.pdf13.93 MiB
Combating Spyware in the Enterprise Discover, Detect, and Eradicate the Internet's Greatest Threat.pdf8 MiB
CompTIA Linux+ Certification Study Guide.pdf4.2 MiB
CompTIA Network+ Certification Study Guide Exam N10-004 2nd Edition.pdf7.5 MiB
CompTIA RFID+ Exam RF0-001 Study Guide and Practice Exam.pdf3.28 MiB
CompTIA Security+ Certification Study Guide 3rd Edition.pdf13.02 MiB
CompTIA Security+ Exam JK0-010 Study Guide and Practice Exam 2nd Edition.pdf13.02 MiB
Computer Incident Response and Forensics Team Management Conducting a Successful Incident Response.pdf43.77 MiB
Configuring and Troubleshooting Windows XP Professional.pdf82.03 MiB
Configuring Check Point NGX VPN-1 FireWall-1 Secure Your Network and Build a Bulletproof Network VPN.pdf10.95 MiB
Configuring Cisco AVVID Architecture for Voice, Video, and Integrated Data.pdf3.91 MiB
Configuring CISCO Voice Over IP 2nd Edition.pdf8.7 MiB
Configuring Citrix Metaframe for Windows 2000 Terminal Services.pdf4.87 MiB
Configuring Citrix MetaFrame XP for Windows Including Feature Release 1 Everything You Need to Install and Configure Citrix MetaFrame XP.pdf10.34 MiB
Configuring Exchange 2000 Server.pdf7.46 MiB
Configuring IPv6 for Cisco IOS.pdf2.03 MiB
Configuring ISA Server 2000 Building Firewalls for Windows 2000 Everything You Need to Deploy ISA Server in the Enterprise.pdf7.12 MiB
Configuring Juniper Networks Netscreen & SSG Firewalls.pdf13.67 MiB
Configuring NetScreen Firewalls Your Complete Guide to Juniper's NetScreen Firewall Appliances.pdf11.21 MiB
Configuring SonicWALL Firewalls The Only Book on the Market's Fastest-Growing Firewall Product.pdf13.94 MiB
Configuring Symantec AntiVirus Corporate Edition Develop an Effective Enterprise AntiVirus Solution.pdf20.32 MiB
Configuring Windows 2000 WITHOUT Active Directory.pdf10.76 MiB
Consumer's Guide to Cell Phones & Wireless Service Plans Everything You Need to Choose the Right Brand, With the Right Feature Sets, for Your Needs.pdf4.18 MiB
Contemporary Digital Forensic Investigations of Cloud and Mobile Applications.pdf64.99 MiB
Cryptography for Developers The Only Cryptography Guide Written for Software Developers.pdf5.02 MiB
CSA Guide to Cloud Computing Implementing Cloud Privacy and Security.pdf5.39 MiB
CYA Securing Exchange Server 2003 and Outlook Web Access Cover Your Ass by Getting It Right the First Time.pdf9.12 MiB
CYA Securing IIS 6.0. Cover Your Ass by Getting It Right the First Time.pdf22.07 MiB
Cyber Adversary Characterization Auditing the Hacker Mind.pdf3.07 MiB
Cyber Crime and Cyber Terrorism Investigator's Handbook.pdf5.8 MiB
Cyber Crime Investigations Bridging the Gaps Between Security Professional, Law Enforcement, and Prosecutors.pdf9.19 MiB
Cyber Guerilla.pdf2.03 MiB
Cyber Reconnaissance, Surveillance and Defense.pdf25.12 MiB
Cyber Security and IT Infrastructure Protection.pdf11.01 MiB
Cyber Security Awareness for Accountants and CPAs.azw31.74 MiB
Cyber Security Awareness for Accountants and CPAs.pdf1.7 MiB
Cyber Security Awareness for CEOs and Management.pdf6.81 MiB
Cyber Security Awareness for Corporate Directors and Board Members.azw31.45 MiB
Cyber Security Awareness for Corporate Directors and Board Members.pdf1.4 MiB
Cyber Security Awareness for Lawyers.azw32.32 MiB
Cyber Security Awareness for Lawyers.pdf2.32 MiB
Cyber Spying Tracking Your Family's (Sometimes) Secret Online LIves.pdf69.29 MiB
Cyber Warfare Techniques, Tactics and Tools for Security Practitioners 2nd Edition.pdf8.59 MiB
Cybercrime and Espionage An Analysis of Subversive Multi-vector Threats.pdf14.33 MiB
Cybercrime Case Presentation Using Digital Forensics and Investigative Techniques to Identify Cybercrime Suspects.epub6.07 MiB
Cybercrime Case Presentation Using Digital Forensics and Investigative Techniques to Identify Cybercrime Suspects.pdf2.24 MiB
Cybercrime Investigation Case Studies An Excerpt from Placing the Suspect Behind the Keyboard.pdf1.45 MiB
Cybercrime Investigative Case Management Using Digital Forensics and Investigative Techniques to Identify Cybercrime Suspects.epub6.19 MiB
Cybercrime Investigative Case Management Using Digital Forensics and Investigative Techniques to Identify Cybercrime Suspects.pdf2.7 MiB
Cybersecurity and Applied Mathematics.pdf6.58 MiB
Data Breach Preparation and Response Breaches are Certain, Impact is Not.pdf12.95 MiB
Data Hiding Exposing Concealed Data in Multimedia, Operating Systems, Mobile Devices and Network Protocols.pdf25.45 MiB
Data Hiding Techniques in Windows OS A Practical Approach to Investigation and Defense.pdf74.57 MiB
DBAs Guide to Databases On Linux Including Oracle & MySQL.pdf24.49 MiB
Deploying Citrix MetaFrame Presentation Server 3.0 With Windows Server 2003 Terminal Services.pdf105.76 MiB
Deploying Secure Containers for Training and Development.pdf4.57 MiB
Designing A Wireless Network Understand How Wireless Communication Works.pdf3.93 MiB
Designing and Building a Security Operations Center.pdf3.68 MiB
Designing and Building Enterprise DMZs Build Network DMZs.pdf12.89 MiB
Designing SQL Server 2000 Databases for .NET Enterprise Servers.pdf4.92 MiB
Detecting and Combating Malicious Email.pdf8.35 MiB
Developer's Guide to Web Application Security Can You Recognize Web Application Security Threats.pdf10.92 MiB
Developing .NET Web Services with XML.pdf6.14 MiB
Developing Web Services with Java APIs for XML Using WSDP Integrate XML Into Your Java Platform.pdf4.7 MiB
Dictionary of Information Security.pdf968.85 KiB
Digital Forensics for Legal Professionals Understanding Digital Evidence from the Warrant to the Courtroom.pdf10.99 MiB
Digital Forensics for Network, Internet, and Cloud Computing A Forensic Evidence Guide for Moving Targets and Data.pdf12.87 MiB
Digital Forensics Processing and Procedures Meeting the Requirements of ISO 17020, ISO17025, ISO 27001 and Best Practice Requirements.pdf14.98 MiB
Digital Forensics Threatscape and Best Practices.pdf7.75 MiB
Digital Forensics with Open Source Tools.pdf4.38 MiB
Digital Triage Forensics Processing the Digital Crime Scene.pdf19.51 MiB
Dissecting the Hack - The F0rb1dd3n Network (2010) Revised Edition.pdf16.09 MiB
Dissecting the Hack - The F0rb1dd3n Network (2010).pdf14.88 MiB
Dissecting the Hack - The V3rb0t3n Network.pdf11.66 MiB
DNS Security Defending the Domain Name System.pdf6.01 MiB
Dr. Tom Shinder's Configuring ISA Server 2004.chm32.6 MiB
Dr. Tom Shinder's ISA 2006 Migration Guide Your Clear, Concise, and Thorough Path to Migrate from Previous Versions of ISA Server to ISA Server 2006.pdf16.09 MiB
Dr. Tom Shinder's ISA Server and Beyond Real World Security Solutions for Microsoft Enterprise Networks.pdf15.34 MiB
E-discovery Creating and Managing and Enterpriswide Program A Technical Guide to Digital Investigation and Litigation Support.pdf6.53 MiB
E-mail Virus Protection Handbook.pdf5.84 MiB
Eleventh 11th Hour CISSP Study Guide 2nd Edition.pdf2.39 MiB
Eleventh 11th Hour CISSP Study Guide 3rd Edition.pdf5.52 MiB
Eleventh 11th Hour Linux+ Study Guide Exam XK0-003.pdf3.08 MiB
Eleventh 11th Hour Network+ Study Guide Exam N10-004.pdf4.23 MiB
Eleventh 11th Hour Security+ Study Guide Exam SY0-201.pdf1.86 MiB
Enemy at The Water Cooler Real-Life Stories of Insider Threats and Enterprise Security Management Countermeasures.pdf6.3 MiB
Essential Computer Security Everyone's Guide to E-mail, Internet, and Wireless Security.pdf11.72 MiB
Essential Skills for Hackers.pdf6.18 MiB
Ethereal Packet Sniffing.chm17.12 MiB
Executing Windows Command Line Investigations While Ensuring Evidentiary Integrity.pdf13.18 MiB
Federal Cloud Computing The Definitive Guide for Cloud Service Providers 2nd Edition.pdf7.62 MiB
Federated Identity Primer.pdf3.16 MiB
Firewall Policies and VPN Configurations.pdf15.7 MiB
FISMA and the Risk Management Framework The New Practice of Federal Cyber Security.pdf9.76 MiB
FISMA Certification & Accreditation Handbook.pdf5.06 MiB
FISMA Compliance Handbook 2nd Edition.epub5.44 MiB
FISMA Compliance Handbook 2nd Edition.pdf8.78 MiB
Game Console Hacking Xbox, Playstation, Nintendo, Atari, & Gamepark 32.pdf45.41 MiB
GFI Network Security and PCI Compliance Power Tools Learn How to Use GFI's Tools to Search for Vulnerabilities in Your Network.pdf23.03 MiB
Google Earth Forensics Using Google Earth Geo-Location in Digital Forensic Investigations.pdf6.63 MiB
Google Hacking for Penetration Testers 3rd Edition.pdf37.38 MiB
Google Hacking for Penetration Testers.pdf32.23 MiB
Google Talking An Easy-to-Read Guide Packed with Tips and Tricks on Google Talk.pdf8.32 MiB
Hack Proofing ColdFusion The Only Way to Stop a Hacker Is to Think Like One.pdf7.81 MiB
Hack Proofing Linux Your Guide to Open Source Security.pdf11.44 MiB
Hack Proofing Sun Solaris 8.pdf6.8 MiB
Hack Proofing Windows 2000 Server.pdf8.92 MiB
Hack Proofing XML.pdf5.71 MiB
Hack Proofing Your E-Commerce Site.pdf7.34 MiB
Hack Proofing your Identity in the Information Age.pdf2.48 MiB
Hack Proofing Your Network 2nd Edition.pdf5.49 MiB
Hack Proofing Your Network Internet Tradecraft.pdf2.95 MiB
Hack Proofing Your Web Applications The Only Way to Stop a Hacker is to Think Like One.pdf7.48 MiB
Hack Proofing Your Wireless Network Protect Your Wireless Network From Attack.pdf2.54 MiB
Hack the Stack Using Snort and Ethereal to Master the 8 Layers of an Insecure Network.pdf11.83 MiB
Hack-Proofing your Wireless Network.pdf3.55 MiB
Hacking a Terror Network The Silent Threat of Covert Channels.pdf6.45 MiB
Hacking and Penetration Testing with Low Power Devices.pdf8.32 MiB
Hacking the Code ASP.NET Web Application Security.chm4.82 MiB
Hacking Web Apps Detecting and Preventing Web Application Security Problems.pdf14.69 MiB
Hacking Web Intelligence Open Source Intelligence and Web Reconnaissance Concepts and Techniques.pdf36.75 MiB
Hacking Wireless Access Points Cracking, Tracking, and Signal Jacking.pdf5.51 MiB
Hacking with Kali Practical Penetration Testing Techniques.pdf23.58 MiB
Handbook of System Safety and Security.pdf13.9 MiB
Hardware Hacking Have Fun While Voiding Your Warranty.pdf14.95 MiB
HCISPP Study Guide.pdf6.04 MiB
Hiding Behind the Keyboard Uncovering Covert Communication Methods with Forensic Analysis.pdf29.92 MiB
Host Integrity Monitoring Using Osiris and Samhain.pdf2.97 MiB
How to Attack and Defend Your Website.pdf23.6 MiB
How to Cheat at Administering Office Communications Server 2007.pdf28.74 MiB
How to Cheat at Configuring Exchange Server 2007 Including Outlook Web, Mobile, and Voice Access.pdf19.84 MiB
How to Cheat at Configuring ISA Server 2004.pdf66.25 MiB
How to Cheat at Configuring Open Source Security Tools The Perfect Reference for the Multitasked SysAdmin.pdf7.64 MiB
How to Cheat at Configuring VMware ESX Server.pdf16.02 MiB
How to Cheat at Deploying and Securing RFID.pdf7.1 MiB
How to Cheat at Deploying Exchange Server 2000 with Active Directory.pdf596.27 KiB
How to Cheat at Designing a Windows Server 2003 Active Directory Infrastructure.pdf7.69 MiB
How to Cheat at Designing Security for a W2K3 Server Network.pdf67.28 MiB
How to Cheat at IIS 7 Server Administration.pdf15.17 MiB
How to Cheat at IT Project Management.pdf3.44 MiB
How to Cheat at Managing Information Security.pdf2.45 MiB
How to Cheat at Managing Microsoft Operations Manager 2005 In the Land of the Blind, the One-Eyed Man is King.pdf11.25 MiB
How to Cheat at Managing Windows Server Update Services Automate Patch Management Across Your Network.pdf10.02 MiB
How to Cheat at Managing Windows Small Business Server 2003 In the Land of the Blind, the One-Eyed Man is King.pdf7.88 MiB
How to Cheat at Microsoft Vista Administration.pdf28.1 MiB
How to Cheat at Securing a Wireless Network.pdf11.71 MiB
How to Cheat at Securing Linux.pdf27 MiB
How to Cheat at Securing SQL Server 2005 The Perfect Book for Multitasked IT Managers Responsible for Securing SQL Server.pdf9.19 MiB
How to Cheat at Securing Your Network The Perfect Reference for the Multitasked Administrator.pdf9.65 MiB
How to Cheat at VoIP Security.pdf53.53 MiB
How to Cheat at Windows System Administration Using Command Line Scripts.pdf2.09 MiB
How to Defeat Advanced Malware New Tools for Protection and Forensics.pdf3.92 MiB
How to Define and Build an Effective Cyber Threat Intelligence Capability.pdf3.47 MiB
Identity and Access Management Business Performance Through Connected Intelligence.epub26.05 MiB
Identity and Access Management Business Performance Through Connected Intelligence.pdf165.7 MiB
Implementing Digital Forensic Readiness From Reactive to Proactive Process.pdf10.04 MiB
Industrial Network Security Securing Critical Infrastructure Network for Smart Grid, SCADA, and Other Industrial Control Systems 2nd Edition.pdf19.24 MiB
Information Hiding in Speech Signals for Secure Communication.pdf11.43 MiB
Information Security Analytics Finding Security Insights, Patterns, and Anomalies in Big Data.pdf8.46 MiB
Information Security Risk Assessment Toolkit Practical Assessments through Data Collection and Data Analysis.epub10.84 MiB
Information Security Risk Assessment Toolkit Practical Assessments through Data Collection and Data Analysis.pdf7.39 MiB
Information Security Science Measuring the Vulnerability to Data Compromises.pdf25.06 MiB
InfoSec Career Hacking Sell Your Skillz, Not Your Soul A Technical Guide to Landing (and Keeping) a Job in the Information Security Field.pdf83.88 MiB
Infosec Management Fundamentals.pdf3.39 MiB
InfoSecurity 2008 Threat Analysis A One-Stop Refrence Containing The Most Read Topics in the Infosecurity Library.pdf11.53 MiB
Inside the SPAM Cartel Trade Secrets from the Dark Side.chm5.98 MiB
Inside the SPAM Cartel Trade Secrets from the Dark Side.pdf7.17 MiB
Insider Threat Protecting the Enterprise from Sabotage, Spying, and Theft Prevent Employees and Contractors from Stealing Corporate Data.pdf6.72 MiB
Integrating ISA Server 2006 with Microsoft Exchange 2007 Protect your E-Mail Environment with ISA Server 2006 and Microsoft Forefront Security Suite.pdf11.67 MiB
Integrating Python with Leading Computer Forensics Platforms.epub58.02 MiB
Integrating Python with Leading Computer Forensics Platforms.pdf35.69 MiB
Introduction to Cyber-Warfare A Multidisciplinary Approach.pdf9.32 MiB
Introduction to Information Security A Strategic-based Approach.pdf5.65 MiB
Introduction to Social Media Investigation A Hands-on Approach.pdf39.42 MiB
Introduction to US Cybersecurity Careers.pdf6.01 MiB
Intrusion Prevention and Active Response.pdf84.85 MiB
Investigating Internet Crimes An Introduction to Solving Crimes in Cyberspace.pdf33.11 MiB
IP Addressing Subnetting IPv6.pdf54.8 MiB
iPhone and iOS Forensics Investigation, Analysis and Mobile Security for Apple iPhone, iPad and iOS Devices.pdf8.8 MiB
Ira Winkler's Zen and the Art of Information Security.pdf1.69 MiB
Islands in the Clickstream Reflections on Life in a Virtual World.pdf1.58 MiB
Job Reconnaissance Using Hacking Skills to Win the Job Hunt Game.epub2.39 MiB
Job Reconnaissance Using Hacking Skills to Win the Job Hunt Game.pdf3.76 MiB
Joe Grand's Best Of Hardware, Wireless & Game Console Hacking Includes DVD with 20 Hacks in High-Res Color.pdf7.34 MiB
Juniper Networks Secure Access SSL VPN Configuration Guide Complete Coverage of the Juniper Network Secure Access SSL VPN Line and IVE Software.pdf27.83 MiB
Keys to the Kingdom Impressioning, Bumping, Master Escalation, and Other Key-Based Attacks Against Physical Locks.pdf27.12 MiB
Kismet Hacking The Only Book on the Industry Standard for Examining Wireless Network Traffic.pdf5.46 MiB
LEGO Mindstorms Masterpieces Building and Programming Advanced Robots Learn from the Lego Masters.pdf18.69 MiB
LEGO Software Power Tools.pdf14.89 MiB
Linksys WRT54G Ultimate Hacking.pdf15.79 MiB
Linux Malware Incident Response A Practitioner's Guide to Forensic Collection and Examination of Volatile Data An Excerpt from Malware Forensics Field Guide for Linux Systems.pdf14.98 MiB
Linux Malware Incident Response A Practitioner's Guide to Forensic Collection and Examination of Volatile Data.epub4.07 MiB
Logging And Log Management The Authoritative Guide to understanding the Concepts Surrounding Loggin and Log Management.pdf11.84 MiB
Lossless Information Hiding in Images.pdf7.31 MiB
Low Tech Hacking Street Smarts for Security Professionals.pdf7.66 MiB
Mac OS X, iPod, and iPhone Forensic Analysis DVD Toolkit.pdf42.47 MiB
Malware Forensics Field Guide for Linux Systems Digital Forensics Field Guides.pdf56.73 MiB
Malware Forensics Field Guide for Windows Systems Digital Forensics Field Guides.pdf42.2 MiB
Malware Forensics Investigating and Analyzing Malicious Code.pdf24.57 MiB
Managed Code Rootkits Hooking into Runtime Environments.pdf5.56 MiB
Managing and Securing A Cisco SWAN Structured Wireless-Aware Network.pdf9.45 MiB
Managing Catastrophic Loss of Sensitive Data A Guide for IT and Security Professionals.pdf1.06 MiB
Managing Cisco Network Security 2nd Edition.pdf5.93 MiB
Managing Information Security 2nd Edition.epub3.64 MiB
Managing Information Security 2nd Edition.pdf13.55 MiB
Managing Information Security.pdf6.02 MiB
Managing Windows 2000 Network Services.pdf27.88 MiB
MCSA MCSE Exam 70-290 Managing and Maintaining a Windows Server 2003 Environment Study Guide & DVD Training System.pdf10.57 MiB
MCSA MCSE Exam 70-291 Implementing, Managing, and Maintaining a Windows Server 2003 Network Infrastructure Study Guide & DVD Training System.pdf11.36 MiB
MCSA MCSE Exam 70-291 Study Guide and Training System Implementing, Managing, and Maintaining a Windows Server 2003 Network Infrastructure Guide.ppt1011.5 KiB
MCSA MCSE Managing and Maintaining a Windows Server 2003 Environment for an MCSA Certified on Windows 2000 (70-292) Study Guide & DVD Training System.pdf8.88 MiB
MCSE Designing a Windows Server 2003 Active Directory and Network Infrastructure Exam 70-297 Study Guide & DVD Training System.pdf6.55 MiB
MCSE Designing Security for a Windows Server 2003 Network Exam 70-298 Study Guide & DVD Training System.pdf5.83 MiB
MCSE Exam 70-293 Planning and Maintaining a Windows Server 2003 Network Infrastructure Study Guide & DVD Training System.pdf9.19 MiB
MCSE Exam 70-294 Planning, Implementing, and Maintaining a Windows Server 2003 Active Directory Infrastructure Study Guide & DVD Training System.pdf12.33 MiB
MCSE Exam 70-296 Planning, Implementing and Maintaining a Windows Server 2003 Environment for an MCSE Certified on Windows 2000 Study Guide & DVD Training System.pdf11.85 MiB
MCSE MCSA Implementing & Administering Security in a Windows 2000 Network (Exam 70-214) Study Guide & DVD Training System.pdf11.1 MiB
Meeting People via WiFi and Bluetooth.pdf12.12 MiB
Metasploit Toolkit for Penetration Testing, Exploit Development, and Vulnerability Research.pdf4.9 MiB
Metrics and Methods for Security Risk Management.pdf6.16 MiB
Microsoft Exchange Server 2007 with SP1 Tony Redmond's Guide to Successful Implementation.pdf16 MiB
Microsoft Forefront Security Administration Guide.pdf24.6 MiB
Microsoft Log Parser Toolkit.pdf86.57 MiB
Microsoft Virtualization Master Microsoft Server, Desktop, Application, and Presentation Virtualization.pdf48.42 MiB
Microsoft Vista for IT Security Professionals.pdf17.64 MiB
Microsoft Windows 7 Administrator's Reference Upgrading, Deploying, Managing, and Securing Windows 7.pdf28.95 MiB
Microsoft Windows Server 2008 R2 Administrator's Reference The Administrator's Essential Reference.pdf66.75 MiB
Migrating to the Cloud Oracle Client Server Modernization.pdf8.02 MiB
Mission Critical Windows 2000 Server Administration.pdf5.33 MiB
Mobile Data Loss Threats and Countermeasures.pdf2.51 MiB
Mobile Malware Attacks and Defense.pdf9.93 MiB
Mobile Security and Privacy Advances, Challenges and Future Research Directions.pdf11.31 MiB
Moving to the Cloud Developing Apps in the New World of Cloud Computing.pdf16.87 MiB
Nagios 3 Enterprise Network Monitoring Including Plug-Ins and Hardware Devices.pdf3.77 MiB
Nessus Network Auditing 2nd Edition.pdf10.44 MiB
Nessus Network Auditing.pdf4.62 MiB
Nessus, Snort & Ethereal Power Tools Customizing Open Source Security Applications.pdf3.05 MiB
NET Mobile Web Developer's Guide Develop and Deliver Enterprise-Critical Mobile Web Applications.pdf5.31 MiB
Netcat Power Tools.pdf10.35 MiB
Network and System Security 2nd Edition.mobi9.29 MiB
Network and System Security 2nd Edition.pdf11.79 MiB
Network Intrusion Analysis Methodologies, Tools, and Techniques for Incident Analysis and Response.pdf30.72 MiB
Network Performance and Security Testing and Analyzing Using Open Source and Low-Cost Tools.pdf63.23 MiB
Network Security Assessment From Vulnerability to Patch.pdf10.15 MiB
Network Security Evaluation Using the NSA IEM Learn How the NSA Conducts Network Security Evaluations.pdf7.31 MiB
Network+ Exam N10-003 Study Guide & Practice Exams.pdf9.26 MiB
Next Generation Red Teaming.pdf2.55 MiB
Next Generation SSH2 Implementation Securing Data in Motion.pdf7.16 MiB
Ninja Hacking Unconventional Penetration Testing Tactics and Techniques.pdf9.86 MiB
Nmap in the Enterprise Your Guide to Network Scanning.pdf4.65 MiB
No Tech Hacking A Guide to Social Engineering, Dumpster Diving, and Shoulder Surfing.pdf26.11 MiB
Nokia Firewall, VPN, and IPSO Configuration Guide.pdf10.5 MiB
Nokia Network Security Solution Handbook.pdf7.62 MiB
Open Source Fuzzing Tools Check Your Software for Vulnerabilities and Eliminate Them.pdf4.22 MiB
Operating System Forensics.pdf73.99 MiB
Optimizing IEEE 802.11i Resource and Security Essentials For Mobile and Stationary Devices.pdf2.78 MiB
OS X Exploits and Defense Own it Just like Windows or Linux.pdf7.49 MiB
OS X for Hackers at Heart The Apple of Every Hacker's Eye.pdf15.28 MiB
OS X Incident Response Scripting and Analysis.pdf51.82 MiB
OSSEC HIDS Host-Based Intrusion Detection Guide.pdf8.58 MiB
Palm OS web application developer's guide (Files).zip2.15 MiB
Palm OS Web Application Developer's Guide Developing and Delivering PQAs with Web Clipping.pdf4.03 MiB
PCI Compliance Understand and Implement Effective PCI Data Security Standard Compliance 4th Edition.pdf7.21 MiB
PCI Compliance Understand and Implement Effective PCI Data Security Standard Compliance.pdf6.34 MiB
PCI DSS 3.1 The Standard That Killed SSL.pdf667.32 KiB
Penetration Tester's Open Source Toolkit 3rd Edition.pdf16.99 MiB
Penetration Tester's Open Source Toolkit 4th Edition.pdf30.46 MiB
Penetration Tester's Open Source Toolkit Volume 2.pdf27.07 MiB
Perfect Passwords Selection, Protection, Authentication Create Password Policies That Baffle the Bad Guys, Not Your Users.pdf1.8 MiB
Perl Scripting for Windows Security Live Response, Forensic Analysis, and Monitoring Master Perl for Digital Forensic Analysis and Application Monitoring.pdf5.51 MiB
Phishing Exposed Uncover Secrets from the Dark Side.pdf8.29 MiB
Physical and Logical Security Convergence Powered by Enterprise Security Management.pdf21.16 MiB
Placing the Suspect Behind the Keyboard Using Digital Forensics and Investigative Techniques to Identify Cybercrime Suspects.pdf21.58 MiB
Practical Anonymity Hiding in Plain Sight Online.pdf3.4 MiB
Practical Deployment of Cisco Identity Services Engine (ISE) Real-World Examples of AAA Deployments.epub22.1 MiB
Practical Deployment of Cisco Identity Services Engine (ISE) Real-World Examples of AAA Deployments.pdf81.51 MiB
Practical Lock Picking A Physical Penetration Tester's Training Guide 2nd Edition.pdf28.67 MiB
Practical Lock Picking A Physical Penetration Tester's Training Guide.pdf7.9 MiB
Practical Oracle Security Your Unauthorized Guide to Relational Database Security.pdf4.56 MiB
Practical VoIP Security.pdf46.6 MiB
Preserving Electronic Evidence for Trial A Team Approach to the Litigation Hold, Data Collection, and Evidence Preservation.pdf1.61 MiB
Professional Penetration Testing Creating and Learning in a Hacking Lab 2nd Edition.epub25.09 MiB
Professional Penetration Testing Creating and Learning in a Hacking Lab 2nd Edition.pdf37.49 MiB
Professional Penetration Testing Creating And Operating A Formal Hacking Lab.pdf8.86 MiB
Programmer's Ultimate Security DeskRef.pdf4.51 MiB
Programming LEGO Mindstorms NXT Teach Your Robot New Tricks.pdf10.26 MiB
Programming LEGO Mindstorms with Java The Ultimate Tool for Mindstorms Maniacs.pdf7.15 MiB
Protecting Patient Information A Decision-Maker's Guide to RIsk, Prevention, and Damage Control.pdf3.6 MiB
Python Forensics A Workbench for Inventing and Sharing Digital Forensic Technology.pdf31.1 MiB
Python Passive Network Mapping P2NMAP.pdf36.44 MiB
Research Methods for Cyber Security.pdf10.65 MiB
Reverse Engineering Code with IDA Pro.pdf4.9 MiB
RFID Security Protect to Supply Chain.pdf5.16 MiB
Rick Gallagher's MPLS Training Guide Building Multi Protocol Label Switching Networks.pdf50.87 MiB
Rick Gallagher's MPLS Training Guide Building Multi-Protocol Label Switching Networks.chm19.63 MiB
Risk Management Framework A Lab-Based Approach to Securing Information Systems.epub15.8 MiB
Risk Management Framework A Lab-Based Approach to Securing Information Systems.pdf8.64 MiB
Ruby Developer's Guide Everything You Need to Develop and Deliver Ruby Applications.pdf4.26 MiB
SAP Security Configuration and Deployment The IT Administrator's Guide to Best Practices.pdf4.44 MiB
Sarbanes-Oxley IT Compliance Using COBIT and Open Source Tools A Toolkit for IT Professionals.pdf2.45 MiB
Sarbanes-Oxley IT Compliance Using Open Source Tools A Toolkit for IT Professionals 2nd Edition.pdf9.84 MiB
Scene of the Cybercrime 2nd Edition.pdf7.68 MiB
Scene of the Cybercrime Computer Forensics Handbook Bring Cybercriminals to Justice.pdf3.25 MiB
Scripting VMware Power Tools Automating Virtual Intrastructure Administration.pdf6.88 MiB
Secrets Stolen, Fortunes Lost Preventing Intellectual Property Theft and Economic Espionage in the 21st Century.pdf2.27 MiB
Secure your Network for Free Using Nmap, Wireshark, Snort, Nessus, and MRTG.pdf7 MiB
Securing Citrix Presentation Server in the Enterprise Learn How to Use XenApp Server to Keep Attackers from Penetrating Your Network.pdf15.23 MiB
Securing Citrix XenApp Server in the Enterprise.pdf15.5 MiB
Securing IM and P2P Applications for the Enterprise.pdf6.15 MiB
Securing Social Media in the Enterprise.pdf6.51 MiB
Securing SQL Server Protecting Your Database from Attackers 3rd Edition.pdf9.71 MiB
Securing the Cloud Cloud Computer Security Techniques and Tactics.pdf3.28 MiB
Securing the Internet of Things.pdf7.04 MiB
Securing the Smart Grid Next Generation Power Grid Security.pdf8.56 MiB
Securing VoIP Keeping Your VoIP Network Safe.pdf19.44 MiB
Securing Windows Server 2008 Prevent Attacks from Outside and Inside Your Organization.pdf15.15 MiB
Security Assessment Case Studies for Implementing the NSA IAM.pdf4.96 MiB
Security Controls Evaluation, Testing, and Assessment Handbook.pdf46 MiB
Security for Microsoft Windows Systems Administrators Introduction to Key Information Security Concepts.pdf11.86 MiB
Security Log Management Identifying Patterns in the Chaos.pdf6.64 MiB
Security Risk Management Building an Information Security Risk Management Program from the Ground Up.pdf3.27 MiB
Security SAGE's Guide to Hardening the Network Infrastructure.pdf9.36 MiB
Security+ Study Guide & DVD Training System.pdf8.06 MiB
Seven Deadliest Microsoft Attacks.pdf2.17 MiB
Seven Deadliest Network Attacks.pdf6.97 MiB
Seven Deadliest Social Network Attacks.pdf5.35 MiB
Seven Deadliest Unified Communications Attacks.pdf5.74 MiB
Seven Deadliest USB Attacks.pdf5.18 MiB
Seven Deadliest Web Application Attacks.pdf2.82 MiB
Seven Deadliest Wireless Technologies Attacks.pdf1.72 MiB
Simple Steps to Data Encryption A Practical Guide to Secure Encryption.pdf6.57 MiB
Skype Me From Single User to Small Enterprise and Beyond.pdf7.64 MiB
Smart Grid Security Innovative Solutions for a Modernized Grid.pdf21.76 MiB
Sniffer Pro Network Optimization & Troubleshooting Handbook Everything You Need to Perform Vital Network Analysis.pdf7.17 MiB
Snort 2.0 Intrusion Detection.pdf4.79 MiB
Snort 2.1 Intrusion Detection 2nd Edition.pdf12.64 MiB
Snort IDS and IPS Toolkit.pdf8.36 MiB
Social Engineering Penetration Testing Executing Social Engineering Pen Tests, Assessments and Defense.pdf15.41 MiB
Social Media Security Leveraging Social Networking While Mitigating Risk.pdf10.89 MiB
Sockets, Shellcode, Porting & Coding - Reverse Engineering Exploits And Tool Coding For Security Professionals.pdf112.34 MiB
Software Piracy Exposed Secrets from the Dark Side Revealed.pdf6.23 MiB
SonicWALL Secure Wireless Network Integrated Solutions Guide.pdf13.26 MiB
Special Ops Host and Network Security for Microsoft UNIX, and Oracle.pdf11.65 MiB
SQL Injection Attacks and Defense 2nd Edition.pdf20.9 MiB
SQL Injection Attacks and Defense.pdf6.55 MiB
SSCP Systems Security Certification Practicioner Study Guide & DVD Training System.pdf6.26 MiB
Stealing The Network How to Own a Continent.chm2.74 MiB
Stealing The Network How to Own a Shadow.pdf9.13 MiB
Stealing The Network How to Own an Identity.pdf3.92 MiB
Stealing The Network How To Own The Box.pdf4.14 MiB
Stealing The Network The Complete Series Collector's Book.pdf10.83 MiB
Syngress Force Emerging Threat Analysis From Mischief to Malicious.pdf7.91 MiB
Syngress IT Security Project Management Handbook.pdf7.8 MiB
Targeted Cyber Attacks Multi-staged Attacks Driven by Exploits and Malware.pdf5.71 MiB
Techno Security's Guide to E-Discovery and Digital Forensics A Comprehensive Handbook for Investigators, Examiners, IT Security Managers, Lawyers, and Academia.pdf4.28 MiB
Techno Security's Guide to Managing Risks For IT Managers, Auditors, and Investigators.pdf53.45 MiB
Techno Security's Guide to Securing SCADA A Comprehensive Handbook On Protecting the Critical Infrastructure.pdf3.71 MiB
The Basics of Cloud Computing Understanding the Fundamentals of Cloud Computing in Theory and Practice.epub2.81 MiB
The Basics of Cloud Computing Understanding the Fundamentals of Cloud Computing in Theory and Practice.pdf8.09 MiB
The Basics of Cyber Safety Computer and Mobile Device Safety Made Easy.pdf6.28 MiB
The Basics of Cyber Warfare Understanding the Fundamentals of Cyber Warfare in Theory and Practice.pdf2.76 MiB
The Basics of Digital Forensics The Primer for Getting Started in DIgital Forensics 2nd Edition.pdf6.85 MiB
The Basics of Digital Forensics The Primer for Getting Started in DIgital Forensics.pdf6.69 MiB
The Basics of Digital Privacy Simple Tools to Protect Your Personal Information and Your Identity Online.pdf10.3 MiB
The Basics of Hacking and Penetration Testing Ethical Hacking and Penetration Testing Made Easy 2nd Edition.pdf4.53 MiB
The Basics of Hacking and Penetration Testing.pdf3.75 MiB
The Basics of Information Security Understanding the Fundamentals of Infosec in Theory and Practice 2nd Edition.pdf10.11 MiB
The Basics of IT Audit Purposes, Processes, and Practical Information.pdf2.82 MiB
The Basics of Web Hacking Tools and Techniques to Attack the Web.pdf12.51 MiB
The Cloud Security Ecosystem Technical, Legal, Business and Management Issues.pdf11.9 MiB
The Hacker's Guide to OS X Exploiting OS X from the Root Up.pdf19.68 MiB
The IT Digital Legal Companion A Comprehensive Business Guide to Software, IT, Internet, Media and IP Law.pdf4.24 MiB
The IT Regulatory and Standards Compliance Handbook How to Survive Information Systems Audit and Assessments.pdf15.02 MiB
The Manager's Handbook for Business Security 2nd Edition.pdf6.03 MiB
The Mezonic Agenda Hacking the Presidency.pdf16.3 MiB
The Official CHFI Exam 312-49 Study Guide for Computer Hacking Forensics Investigators.pdf7.62 MiB
The Real Citrix CCA Exam Preparation Kit Prepare for XenApp 5.0.pdf5.98 MiB
The Real MCITP Windows Server 2008 Enterprise Administrator Exam 70-647 Prep Kit.pdf24.93 MiB
The Real MCITP Windows Server 2008 Server Administrator Exam 70-646 Prep Kit.pdf25.9 MiB
The Real MCTS MCITP Configuring Microsoft Windows Vista Client Exam 70-620 Prep Kit.pdf28.16 MiB
The Real MCTS MCITP Upgrading Your MCSA on Windows Server 2003 to Windows Server 2008 Exam 70-648 Prep Kit.pdf26.5 MiB
The Real MCTS MCITP Upgrading Your MCSE on Windows Server 2003 to Windows Server 2008 Exam 70-649 Prep Kit.pdf32.88 MiB
The Real MCTS MCITP Windows Server 2008 Configuring Active Directory Exam 70-640 Prep Kit.pdf21.4 MiB
The Real MCTS MCITP Windows Server 2008 Configuring Applications Infrastructure Exam 70-643 Prep Kit.pdf19.43 MiB
The Real MCTS MCITP Windows Server 2008 Configuring Network Infrastructure Exam 70-642 Prep Kit.pdf14.61 MiB
The Real MCTS SQL Server 2008 Exam 70-432 Database Implementation and Maintenance Prep Kit.pdf9.49 MiB
The Real MCTS SQL Server 2008 Exam 70-433 Database Design Prep Kit.pdf15.05 MiB
The Ruby Developer's Guide.pdf4.11 MiB
The Wireshark Field Guide Analyzing and Troubleshooting Network Traffic.pdf25.24 MiB
Theoretical and Experimental Methods for Defending Against DDoS Attacks.pdf5.29 MiB
Thor's Microsoft Security Bible A Collection of Practical Security Techniques.pdf14.71 MiB
Thor's OS Xodus Why And How I Left Windows For OS X.pdf25.63 MiB
Threat Forecasting Leveraging Big Data for Predictive Analysis.pdf3.6 MiB
Troubleshooting Windows 2000 TCP-IP.pdf5 MiB
Unified Communications Forensics Anatomy of Common UC Attacks.pdf32.13 MiB
UNIX and Linux Forensic Analysis DVD Toolkit.pdf4.98 MiB
UTM Security with Fortinet Mastering FortiOS.pdf15.57 MiB
Video Conferencing Over IP Configure, Secure, and Troubleshoot Simple and Cost-Effective Solutions That Work.pdf10.08 MiB
Violent Python A Cookbook for Hackers, Forensic Analysts, Penetration Testers, and Security Engineers.pdf21.1 MiB
Virtualization and Forensics A Digital Forensic Investigator's Guide to Virtual Environments.pdf17.21 MiB
Virtualization for Security Including Sandboxing, Disaster Recovery, High Availability, Forensic Analysis, and Honeypotting.pdf7.09 MiB
Virtualization with Microsoft Virtual Server 2005 Free Your Infrastructure from Physical Limitations.pdf10.12 MiB
Virtualization with VMware ESX Server.chm7.57 MiB
Virtualization with VMware ESX Server.pdf10.18 MiB
Virtualization with Xen Including XenEnterprise, XenServer, and XenExpress The Book That Demystifies Xen.pdf5.78 MiB
VoIP Security.pdf2.5 MiB
WarDriving & Wireless Pentration Testing.pdf20.85 MiB
WarDriving Drive, Detect, Defend A Guide to Wireless Security.epub30.12 MiB
Web Application Obfuscation.pdf3.06 MiB
Web Application Vulnerabilities Detect, Exploit, Prevent.pdf20.9 MiB
Webmaster's Guide to the Wireless Internet Everything You Need to Develop E-Commerce Enabled Wireless Web Sites.pdf5.1 MiB
Windows 2000 Active Directory 2nd Edition.pdf6.47 MiB
Windows 2000 Configuration Wizards.pdf24.48 MiB
Windows 2000 Server System Administration Handbook.pdf4.86 MiB
Windows 2012 Server Network Security Securing your Windows Network Systems and Infrastructure.pdf30.35 MiB
Windows Forensic Analysis DVD Toolkit 2nd Edition.pdf5.92 MiB
Windows Forensic Analysis DVD Toolkit.pdf45.43 MiB
Windows Forensic Analysis Toolkit Advanced Analysis Techniques for Windows 7 3rd Edition.pdf8.33 MiB
Windows Forensic Analysis Toolkit Advanced Analysis Techniques for Windows 8 4th Edition.pdf12.9 MiB
Windows Performance Analysis Field Guide.pdf43.17 MiB
Windows Registry Forensics Advanced Digital Forensic Analysis of the Windows Registry 2nd Edition.pdf11.75 MiB
Windows Registry Forensics Advanced Digital Forensic Analysis of the Windows Registry.pdf3.62 MiB
Windows Server 2012 Security from End to Edge and Beyond.pdf50.95 MiB
Windows to Linux Migration Toolkit Your Windows to Linux Extreme Makeover.pdf114.19 MiB
Winternals Defragmentation, Recovery, and Administration Field Guide A Must-Have for Windows Sys Admins.pdf42.95 MiB
Wireless Hacking Projects for Wi-Fi Enthusiasts.pdf18.31 MiB
Wireless Reconnaissance in Penetration Testing.pdf9.42 MiB
Wireshark & Ethereal Network Protocol Analyzer Toolkit.pdf14.76 MiB
Writing Security Tools and Exploits.pdf7.82 MiB
X-Ways Forensics Practitioner's Guide.epub4.52 MiB
X-Ways Forensics Practitioner's Guide.pdf12.61 MiB
XBOX 360 Forensics A Digital Forensics Guide to Examining Artifacts.pdf21.07 MiB
XML .NET Developer’s Guide (Files).rar534.83 KiB
XML .NET Developer’s Guide Develop and Deliver Enterprise-Critical Applications with XML .NET.pdf5.79 MiB
XSS Attacks Cross Site Scripting Exploits and Defense.pdf7.34 MiB
You For Sale, Protecting Your Personal Data and Privacy Online.pdf3.1 MiB
Zero-Day Exploit Countdown to Darkness.pdf1.76 MiB
specials/(ISC)2 CISSP Certified Information Systems Security Professional Official Practice Tests 2nd Edition.pdf12.79 MiB
specials/A+ Guide to Software Managing, Maintaining, and Troubleshooting 9th Edition.pdf60.32 MiB
specials/CEH Certified Ethical Hacker All In One Exam Guide 4th Edition.pdf19.19 MiB
specials/CEH v10 Certified Ethical Hacker Study Guide.pdf9.58 MiB
specials/CEH v10 EC-COUNCIL Certified Ethical Hacker Most Demanding Complete Hacking Guide Exam 312-50.pdf12.39 MiB
specials/CompTIA A+ Complete Deluxe Study Guide Exam 230-901 220-902 3rd Edition.pdf43.31 MiB
specials/CompTIA Pentest+ Study Guide Exam PT0-001.pdf33.26 MiB
specials/Computer Forensics Investigating Data & Image Files.pdf15.22 MiB
specials/Computer Forensics Investigating Hard Disks, File & Operating Systems.pdf10.28 MiB
specials/Computer Forensics Investigating Network Intrusions & Cyber Crime.pdf23.99 MiB
specials/Computer Forensics Investigating Wireless Networks and Devices.pdf5.34 MiB
specials/Computer Networking A Top-Down Approach 7th Edition Global Edition.pdf131.07 MiB
specials/Computer Networking for LANS to WANS Hardware, Software and Security 1st Edición - Mansfield, Jr., Kenneth C_.pdf28.36 MiB
specials/Computer Networks 5th Edition.pdf6.58 MiB
specials/Computer Networks and Internets 6th Edition.pdf4.09 MiB
specials/Disaster Recovery.pdf9.07 MiB
specials/EC Council Academia CEH Attack Vectors and Countermeasures Volume 2 of 4.pdf325.9 MiB
specials/Ethical Hacking & Countermeasures Linux, Macintosh & Mobile Systems.pdf6.43 MiB
specials/Ethical Hacking & Countermeasures Secure Network Infrastructures.pdf7.9 MiB
specials/Ethical Hacking & Countermeasures Threats & Defense Mechanisms.pdf15.24 MiB
specials/Ethical Hacking and Countermeasures Attack Phases.pdf17.06 MiB
specials/Gray Hat Hacking The Ethical Hacker's Handbook 5th Edition.pdf94.35 MiB
specials/Guide to Computer Network Security 4th Edition.pdf8.51 MiB
specials/Guide to Networking Essentials 7th Edition.pdf18.86 MiB
specials/Handbook of Digital Forensics of Multimedia Data and Devices.pdf30.78 MiB
specials/Kali Linux Revealed Mastering the Penetration Testing Distribution.pdf26.32 MiB
specials/Linux Command Line and Shell Scripting Bible The Comprehensive, Tutorial Resource.pdf5.47 MiB
specials/MCSA Guide to Networking with Windows Server 2016 MCSE MCSA Exam 70-741.pdf337.69 MiB
specials/Network Defense Perimeter Defense Mechanisms.pdf5.73 MiB
specials/Network Safety.pdf3.19 MiB
specials/Network+ Guide to Networks 8th Edition.pdf42.24 MiB
specials/Networking All-In-One for Dummies 7th Edition.pdf34.65 MiB
specials/Networking Essentials A CompTIA Network+ N10-006 Textbook 4th Edition Instructor Edition.pdf93.4 MiB
specials/Networking Essentials A CompTIA Network+ N10-006 Textbook 4th Edition.pdf92.89 MiB
specials/Networking The Complete Reference 3rd Edition.pdf13.02 MiB
specials/Penetration Testing Communication Media Testing.pdf12.36 MiB
specials/Penetration Testing Procedures & Methodologies.pdf7.96 MiB
specials/Picture Yourself Networking Your Home or Small Office.pdf13.33 MiB
specials/Practical Binary Analysis Build Your Own Linux Tools for Binary Instrumentation, Analysis, and Disassembly.pdf32.94 MiB
specials/Python Basics A Self-Teaching Introduction.pdf11.65 MiB
10 Cool LEGO Mindstorms Dark Side Robots, Transports, and Creatures Amazing Projects You Can Build in Under an Hour.pdf15.73 MiB
specials/The Handbook of Information and Computer Ethics.pdf3.49 MiB
specials/The Illustrated Network How TCP-IP Works in a Modern Network 2nd Edition.pdf8.96 MiB
specials/Virtualization Security.pdf7.63 MiB
specials/Wireless Communications & Networks by William Stallings 2nd International Edition.pdf8.94 MiB
specials/Wireless Safety.pdf3.31 MiB