Computer Security Enthusiast
File List
- Sockets, Shellcode, Porting, & Coding - Reverse Engineering Exploits & Tool Coding for Security Professionals.pdf.7z 104.5 MB
- Cyber Spying - Tracking Your Family's (Sometimes) Secret Online Lives.pdf.7z 104.3 MB
- Hacking Exposed-Linux - Linux Security Secrets & Solutions.pdf.7z 88.8 MB
- Microsoft Log Parser Toolkit.pdf.7z 84.0 MB
- Intrusion Prevention & Active Response - Deploying Network & Host IPS.pdf.7z 82.6 MB
- InfoSec Career Hacking - Sell Your Skillz, Not Your Soul.pdf.7z 82.2 MB
- Aggressive Network Self-Defense.pdf.7z 80.9 MB
- Black Hat Physical Device Security - Exploiting Hardware & Software.pdf.7z 76.1 MB
- Practical Hacking Techniques & Countermeasures.pdf.7z 63.9 MB
- How to Cheat at Designing Security for a Windows Server 2003 Network.pdf.7z 62.4 MB
- Firewalls & Internet Security - Repelling the Wily Hacker, 2nd Ed..pdf.7z 56.8 MB
- MORE Electronic Gadgets for the Evil Genius - 40 New Build-It-Yourself Projects.pdf.7z 56.0 MB
- Electronic Gadgets for the Evil Genius - 28 Build-It-Yourself Projects.pdf.7z 54.9 MB
- CompTIA A+ Exam Prep [Exams A+ Essentials, 220-602, 220-603, & 220-604].chm.7z 49.6 MB
- Mastering Windows Network Forensics & Investigation.chm.7z 45.7 MB
- Fuzzing - Brute Force Vulnerability Discovery.pdf.7z 42.1 MB
- Windows Forensic Analysis.pdf.7z 41.8 MB
- 101 Spy Gadgets for the Evil Genius.pdf.7z 41.0 MB
- Introduction to Communication Electronic Warfare Systems.pdf.7z 40.9 MB
- How to Cheat at VolP Security.pdf.7z 40.9 MB
- WarDriving-Drive, Detect, Defend - A Guide to Wireless Security.chm.7z 37.5 MB
- Anti-Hacker Tool Kit, 3rd Ed..chm.7z 34.8 MB
- The Best Damn Firewall Book Period, 2nd Ed..pdf.7z 32.5 MB
- Digital Evidence & Computer Crime - Forensic Science, Computers, & the Internet, 2nd Ed..chm.7z 31.4 MB
- Anti-Hacker Tool Kit, 2nd Ed..chm.7z 29.2 MB
- Information Security Management Handbook, 5th Ed..pdf.7z 27.5 MB
- Network Security Technologies & Solutions.chm.7z 26.3 MB
- Fundamentals of Cryptology - A Professional Reference & Interactive Tutorial.pdf.7z 26.2 MB
- Cisco Security Agent.chm.7z 26.0 MB
- Investigative Data Mining for Security & Criminal Detection.chm.7z 25.7 MB
- Penetration Tester's Open Source Toolkit.pdf.7z 25.5 MB
- Windows Vista Security - Securing Vista Against Malicious Attacks.chm.7z 25.1 MB
- Hardening Windows Systems.chm.7z 23.7 MB
- Secure Communicating Systems - Design, Analysis, & Implementation.pdf.7z 21.8 MB
- Expert Web Services Security in the .NET Platform.chm.7z 21.6 MB
- Secure Data Management in Decentralized Systems.pdf.7z 21.6 MB
- Computer Network Security.pdf.7z 21.4 MB
- Cisco NAC Appliance - Enforcing Host Security with Clean Access.pdf.7z 21.4 MB
- Windows Server 2008 Networking & Network Access Protection (NAP).pdf.7z 20.8 MB
- Penetration Tester's Open Source Toolkit, Vol. 2.pdf.7z 20.6 MB
- No Tech Hacking - A Guide to Social Engineering, Dumpster Diving, & Shoulder Surfing.pdf.7z 20.6 MB
- Foundations of Mac OS X Leopard Security.pdf.7z 20.4 MB
- Microsoft Windows Security Inside Out for Windows XP & Windows 2000.chm.7z 19.5 MB
- Applied Security Visualization.pdf.7z 19.3 MB
- CISSP Certification All-in-One Exam Guide, 4th Ed..pdf.7z 18.8 MB
- 50 Awesome Auto Projects for the Evil Genius.pdf.7z 18.5 MB
- Ethereal Packet Sniffing.chm.7z 17.3 MB
- Malware Forensics - Investigating & Analyzing Malicious Code.pdf.7z 17.2 MB
- Hardening Network Infrastructure.chm.7z 17.1 MB
- Hacking the Cable Modem - What Cable Companies Don't Want You to Know.pdf.7z 16.8 MB
- Wardriving & Wireless Penetration Testing.pdf.7z 16.5 MB
- Hacking Exposed-VoIP - Voice Over IP Security Secrets & Solutions.chm.7z 16.5 MB
- Self-Defending Networks - The Next Generation of Network Security.pdf.7z 16.5 MB
- Applied Cryptanalysis - Breaking Ciphers in the Real World.pdf.7z 16.4 MB
- Juniper Networks Secure Access SSL VPN Configuration Guide.pdf.7z 16.3 MB
- Honeypots for Windows.chm.7z 16.2 MB
- Microsoft Forefront Security Administration Guide.pdf.7z 16.2 MB
- The Tao of Network Security Monitoring - Beyond Intrusion Detection.chm.7z 15.6 MB
- The Best Damn IT Security Management Book Period.pdf.7z 15.5 MB
- The Best Damn Firewall Book Period.pdf.7z 15.3 MB
- Networking with Microsoft Windows Vista - Your Guide to Easy & Secure Windows Vista Networking.pdf.7z 15.3 MB
- Penetration Testing & Network Defense.chm.7z 14.8 MB
- Hacker Debugging Uncovered.chm.7z 14.4 MB
- Home Network Security Simplified.chm.7z 14.3 MB
- Certified Ethical Hacking Official Course Material [Exam 312-50].chm.7z 14.3 MB
- Malware Detection.pdf.7z 14.3 MB
- Web Application Vulnerabilities - Detect, Exploit, Prevent.pdf.7z 14.1 MB
- Professional Windows Desktop & Server Hardening.chm.7z 14.0 MB
- Steal This Computer Book 3 - What They Won't Tell You About the Internet.chm.7z 13.9 MB
- Understanding Forensic Digital Imaging.pdf.7z 13.7 MB
- Administering & Securing the Apache Server.chm.7z 13.6 MB
- OS X for Hackers at Heart - The Apple of Every Hacker's Eye.pdf.7z 13.4 MB
- EnCase Computer Forensics - The Official EnCE-EnCase Certified Examiner Study Guide, 2nd Ed..pdf.7z 13.4 MB
- CCNA Security Official Exam Certification Guide [Exam 640-553].pdf.7z 13.2 MB
- Jeff Duntemann's Drive-By Wi-Fi Guide.chm.7z 12.7 MB
- Cryptography & Network Security, 4th Ed..chm.7z 12.5 MB
- Hacking Exposed-Wireless - Wireless Security Secrets & Solutions.chm.7z 12.4 MB
- Cisco Security Professional's Guide to Secure Intrusion Detection Systems.pdf.7z 12.2 MB
- Securing Windows Server 2008 - Prevent Attacks from Outside & Inside Your Organization.pdf.7z 12.1 MB
- The CISSP & CAP Prep Guide - Platinum Ed..chm.7z 11.9 MB
- The Complete Idiot's Guide to Protecting Yourself Online.pdf.7z 11.8 MB
- The Official CHFI Study Guide for Computer Hacking Forensics Investigators [Exam 312-49].pdf.7z 11.7 MB
- Shellcoder's Programming Uncovered.chm.7z 11.7 MB
- Google Hacking for Penetration Testers, Vol. 2.pdf.7z 11.7 MB
- SSL Remote Access VPNs.pdf.7z 11.6 MB
- Decrypted Secrets - Methods & Maxims of Cryptology, 4th, Revised & Extended Ed..pdf.7z 11.5 MB
- Ajax Security.pdf.7z 11.4 MB
- MCSE Designing Security for a Microsoft Windows Server 2003 Network Self-Paced Training Kit [Exam 70-298].chm.7z 11.3 MB
- End-to-End Network Security - Defense-in-Depth.pdf.7z 11.1 MB
- Modern Cryptography - Theory & Practice.pdf.7z 11.1 MB
- Handbook of Research on Wireless Security.pdf.7z 11.0 MB
- Configuring SonicWALL Firewalls.pdf.7z 10.8 MB
- Special Ops - Host & Network Security for Microsoft, UNIX, & Oracle.pdf.7z 10.8 MB
- Windows XP Hacks & Mods For Dummies.pdf.7z 10.7 MB
- Privacy Defended - Protecting Yourself Online.chm.7z 10.6 MB
- Wireshark & Ethereal Network Protocol Analyzer Toolkit.pdf.7z 10.5 MB
- The IT Regulatory & Standards Compliance Handbook - How to Survive an Information Systems Audit & Assessments.pdf.7z 10.5 MB
- CCSP Cisco Secure PIX Firewall Advanced Exam Certification Guide.pdf.7z 10.4 MB
- Multimedia Forensics & Security.pdf.7z 10.4 MB
- Crimeware - Understanding New Attacks & Defenses.chm.7z 10.4 MB
- How to Cheat at Securing a Wireless Network.pdf.7z 10.3 MB
- Firewall Fundamentals.chm.7z 10.2 MB
- 51 High-Tech Practical Jokes for the Evil Genius.pdf.7z 10.0 MB
- Hacking Exposed-Cisco Networks - Cisco Security Secrets & Solutions.chm.7z 9.9 MB
- RFID Handbook - Applications, Technology, Security, & Privacy.pdf.7z 9.8 MB
- Network Administrator Street Smarts - A Real World Guide to CompTIA Network+ Skills.pdf.7z 9.7 MB
- Hack Proofing Linux - Your Guide to Open Source Security.pdf.7z 9.7 MB
- Complete Guide to CISM Certification.pdf.7z 9.7 MB
- Developer's Guide to Web Application Security.pdf.7z 9.6 MB
- Google Hacking for Penetration Testers.pdf.7z 9.6 MB
- Hack Proofing Windows 2000 Server.pdf.7z 9.5 MB
- Hardening Linux.chm.7z 9.5 MB
- InfoSecurity 2008 Threat Analysis.pdf.7z 9.4 MB
- Incident Response & Computer Forensics, 2nd Ed..pdf.7z 9.3 MB
- Configuring Juniper Networks NetScreen & SSG Firewalls.pdf.7z 9.3 MB
- Computer Viruses & Malware.pdf.7z 9.2 MB
- CompTIA Security+ Study Guide & Practice Exam, 2nd Ed. [Exam JK0-010].pdf.7z 9.1 MB
- CD Cracking Uncovered - Protection Against Unsanctioned CD Copying.chm.7z 9.1 MB
- Forensic Computing - A Practitioner's Guide, 2nd Ed..pdf.7z 9.0 MB
- Blackjacking - Security Threats to BlackBerry Devices, PDAs, & Cell Phones in the Enterprise.pdf.7z 9.0 MB
- IPSec VPN Design.chm.7z 9.0 MB
- Nessus Network Auditing, 2nd Ed..pdf.7z 8.7 MB
- Inside Network Perimeter Security, 2nd Ed..chm.7z 8.6 MB
- Security Power Tools.pdf.7z 8.5 MB
- Netcat Power Tools.pdf.7z 8.5 MB
- Wireless Security Handbook.pdf.7z 8.4 MB
- Network Security Illustrated.pdf.7z 8.4 MB
- Computer Security & Cryptography.pdf.7z 8.3 MB
- Certified Ethical Hacker Exam Prep [Exam 312-50].chm.7z 8.3 MB
- Building DMZs for Enterprise Networks.pdf.7z 8.1 MB
- Applied Cryptography & Network Security - 2nd International Conference, ACNS 2004.pdf.7z 8.1 MB
- How to Cheat at Securing Linux - The Perfect Reference for the Multitasked SysAdmin.pdf.7z 8.1 MB
- Stealing the Network - How to Own a Shadow.pdf.7z 8.1 MB
- CISSP - Certified Information Systems Security Professional Study Guide, 4th Ed..pdf.7z 8.1 MB
- Gray Hat Hacking - The Ethical Hacker's Handbook, 2nd Ed..pdf.7z 8.0 MB
- Professional Rootkits.chm.7z 7.9 MB
- Official (ISC)2 Guide to the CISSP Exam.pdf.7z 7.8 MB
- Security in Computing, 4th Ed..chm.7z 7.8 MB
- A Classical Introduction to Cryptography Exercise Book.pdf.7z 7.7 MB
- Hacking Wireless Networks for Dummies.pdf.7z 7.7 MB
- Security for Microsoft Visual Basic .NET.chm.7z 7.7 MB
- RSA Security's Official Guide to Cryptography.pdf.7z 7.7 MB
- Grid Computing Security.pdf.7z 7.6 MB
- Security & Usability - Designing Secure Systems that People Can Use.chm.7z 7.6 MB
- Physical & Logical Security Convergence - Powered By Enterprise Security Management.pdf.7z 7.5 MB
- Network Security Assessment - From Vulnerability to Patch.pdf.7z 7.5 MB
- Cisco ASA, PIX, & FWSM Firewall Handbook, 2nd Ed..pdf.7z 7.5 MB
- Hacking Exposed, 2nd Ed. - Network Security Secrets & Solutions.pdf.7z 7.4 MB
- Hacking Exposed-Network Security - Secrets & Solutions, 2nd Ed..pdf.7z 7.4 MB
- Hack Proofing Your Network, 2nd Ed. - The Only Way to Stop a Hacker Is to Think Like One.pdf.7z 7.3 MB
- Practical Packet Analysis - Using Wireshark to Solve Real-World Network Problems.pdf.7z 7.3 MB
- Security+ Study Guide, 2nd Ed. [SYO-101].pdf.7z 7.3 MB
- Core Security Patterns - Best Practices & Strategies for J2EE, Web Services, & Identity Management.chm.7z 7.3 MB
- Microsoft Encyclopedia of Security.pdf.7z 7.3 MB
- Windows Forensics & Incident Recovery.chm.7z 7.2 MB
- Information Security Policies & Actions in Modern Integrated Systems.chm.7z 7.2 MB
- Hack Proofing Your Web Applications - The Only Way to Stop a Hacker Is to Think Like One.pdf.7z 7.2 MB
- Windows Server 2008 Security Resource Kit.pdf.7z 7.1 MB
- Combating Spyware in the Enterprise.pdf.7z 7.1 MB
- Crackproof Your Software - Protect Your Software Against Crackers.pdf.7z 7.1 MB
- Hack Proofing Your Identity in the Information Age - Protect Your Family on the Internet!.pdf.7z 7.1 MB
- OSSEC Host-Based Intrusion Detection Guide.pdf.7z 6.9 MB
- Deploying Secure 802.11 Wireless Networks with Microsoft Windows.chm.7z 6.9 MB
- WAP, Bluetooth, & 3G Programming - Cracking the Code.pdf.7z 6.9 MB
- Snort IDS & IPS Toolkit.pdf.7z 6.8 MB
- Phishing Exposed.pdf.7z 6.8 MB
- Wi-Foo - The Secrets of Wireless Hacking.chm.7z 6.8 MB
- Firewalls for Dummies, 2nd Ed..pdf.7z 6.8 MB
- The Art of Computer Virus Research & Defense.chm.7z 6.8 MB
- OS X Exploits & Defense.pdf.7z 6.7 MB
- Writing Security Tools & Exploits.pdf.7z 6.6 MB
- Linux Network Security.chm.7z 6.5 MB
- Sarbanes-Oxley IT Compliance Using Open Source Tools, 2nd Ed..pdf.7z 6.5 MB
- Hack Proofing ColdFusion - The Only Way to Stop a Hacker Is to Think Like One.pdf.7z 6.4 MB
- Phishing - Cutting the Identity Theft Line.pdf.7z 6.4 MB
- Malware - Fighting Malicious Code.chm.7z 6.4 MB
- Web Hacking - Attacks & Defense.chm.7z 6.4 MB
- Access Denied - The Practice & Policy of Global Internet Filtering.pdf.7z 6.4 MB
- Hack Attacks Revealed - A Complete Reference with Custom Security Hacking Toolkit.chm.7z 6.3 MB
- How to Cheat at Configuring Open Source Security Tools - The Perfect Reference for the Multitasked SysAdmin.pdf.7z 6.3 MB
- Essential Computer Security - Everyone's Guide to Email, Internet, & Wireless Security.pdf.7z 6.3 MB
- Hacking a Terror Network - The Silent Threat of Covert Channels.pdf.7z 6.2 MB
- Cisco Secure Internet Security Solutions.pdf.7z 6.2 MB
- Web Security, Privacy, & Commerce, 2nd Ed..chm.7z 6.2 MB
- Fast Track to Security.pdf.7z 6.2 MB
- Practical VoIP Security.pdf.7z 6.1 MB
- Syngress Force Emerging Threat Analysis - From Mischief to Malicious.pdf.7z 6.1 MB
- Preventing Web Attacks with Apache.chm.7z 6.1 MB
- Inside the Spam Cartel - Trade Secrets from the Dark Side.chm.7z 6.0 MB
- Hack Proofing Your E-Commerce Site - The Only Way to Stop a Hacker Is to Think Like One.pdf.7z 6.0 MB
- Hack the Stack - Using Snort & Ethereal to Master the 8 Layers of an Insecure Network.pdf.7z 6.0 MB
- Configuring NetScreen Firewalls.pdf.7z 5.9 MB
- Cisco Router Firewall Security.chm.7z 5.8 MB
- Cisco Wireless LAN Security.chm.7z 5.8 MB
- Active Defense - A Comprehensive Guide to Network Security.pdf.7z 5.8 MB
- Stealing the Network - How to Own an Identity.pdf.7z 5.8 MB
- Implementing SSH - Strategies for Optimizing the Secure Shell.pdf.7z 5.8 MB
- Enterprise Information Systems Assurance & System Security - Managerial & Technical Issues.pdf.7z 5.7 MB
- 22 Radio & Receiver Projects for the Evil Genius.pdf.7z 5.7 MB
- Microsoft Windows Server 2003 PKI & Certificate Security.pdf.7z 5.7 MB
- Open Source Security Tools - A Practical Guide to Security Applications.chm.7z 5.7 MB
- Internet & Intranet Security.chm.7z 5.7 MB
- Privacy Preserving Data Mining.pdf.7z 5.6 MB
- Firewall Policies & VPN Configurations.pdf.7z 5.6 MB
- Network Security Bible.pdf.7z 5.6 MB
- Building Secure Wireless Networks with 802.11.pdf.7z 5.5 MB
- Hack Proofing XML - The Only Way to Stop a Hacker Is to Think Like One.pdf.7z 5.5 MB
- Hack Proofing Sun Solaris 8 - Protect Your Solaris Network from Attack.pdf.7z 5.5 MB
- Hack Proofing Your Wireless Network - Protect Your Wireless Network from Attack.pdf.7z 5.5 MB
- Practical Guide for Implementing Secure Intranets & Extranets.chm.7z 5.5 MB
- How to Cheat at Managing Information Security.pdf.7z 5.4 MB
- Designing BSD Rootkits - An Introduction to Kernel Hacking.pdf.7z 5.3 MB
- Implementing NAP & NAC Security Technologies - The Complete Guide to Network Access Control.pdf.7z 5.3 MB
- The Craft of System Security.chm.7z 5.3 MB
- Hacking for Dummies.pdf.7z 5.3 MB
- CISSP - Certified Information Systems Security Professional Study Guide, 3rd Ed..pdf.7z 5.3 MB
- Botnets - The Killer Web App.pdf.7z 5.3 MB
- Network Warrior.pdf.7z 5.2 MB
- The CISSP Prep Guide - Gold Ed..pdf.7z 5.1 MB
- Hacking Exposed-Linux - Linux Security Secrets & Solutions, 3rd Ed..pdf.7z 5.1 MB
- Snort 2.1 Intrusion Detection, 2nd Ed..pdf.7z 5.1 MB
- Securing & Optimizing Linux - The Hacking Solution.pdf.7z 5.0 MB
- AVIEN Malware Defense Guide for the Enterprise.pdf.7z 5.0 MB
- Network Security - Know It All.pdf.7z 5.0 MB
- Enemy at the Water Cooler - Real-Life Stories of Insider Threats & Enterprise Security Management Countermeasures.pdf.7z 4.9 MB
- Security in Computing, 3rd Ed..chm.7z 4.9 MB
- XSS Attacks - Cross Site Scripting Exploits & Defense.pdf.7z 4.9 MB
- Simple Computer Security - Disinfect Your PC.pdf.7z 4.9 MB
- Advances in Enterprise Information Technology Security.pdf.7z 4.8 MB
- Reverse Engineering of Object Oriented Code.pdf.7z 4.8 MB
- Securing Your Business with Cisco ASA & PIX Firewalls.chm.7z 4.8 MB
- Hacker Disassembling Uncovered.chm.7z 4.8 MB
- MCSA-MCSE Implementing & Administering Security in a Microsoft Windows Server 2003 Network Self-Paced Training Kit [Exam 70-299].pdf.7z 4.8 MB
- A Technical Guide to IPSec Virtual Private Networks.pdf.7z 4.8 MB
- The Business Case for Network Security - Advocacy, Governance, & ROI.chm.7z 4.7 MB
- The Web Application Hacker's Handbook - Discovering & Exploiting Security Flaws.pdf.7z 4.7 MB
- Hacking - The Art of Exploitation, 2nd Ed..chm.7z 4.7 MB
- Handbook of Database Security - Applications & Trends.pdf.7z 4.7 MB
- Securing VoIP Networks - Threats, Vulnerabilities, & Countermeasures.pdf.7z 4.7 MB
- The Giant Black Book of Computer Viruses.pdf.7z 4.7 MB
- Codes - The Guide to Secrecy from Ancient to Modern Times.pdf.7z 4.7 MB
- Hacking Exposed-Network Security - Secrets & Solutions, 3rd Ed..pdf.7z 4.7 MB
- Building Internet Firewalls, 2nd Ed..pdf.7z 4.7 MB
- Mac OS X Security.chm.7z 4.6 MB
- Hack I.T. - Security through Penetration Testing.chm.7z 4.6 MB
- Cyber Warfare & Cyber Terrorism.pdf.7z 4.6 MB
- Security Warrior.chm.7z 4.5 MB
- The Art of Software Security Assessment - Identifying & Preventing Software Vulnerabilities.chm.7z 4.5 MB
- Security Log Management - Identifying Patterns in the Chaos.pdf.7z 4.5 MB
- Hacker Linux Uncovered.chm.7z 4.5 MB
- Securing IM & P2P Applications for the Enterprise.pdf.7z 4.5 MB
- Exploiting Software - How to Break Code.pdf.7z 4.4 MB
- Hacking Exposed-Windows - Windows Security Secrets & Solutions, 3rd Ed..pdf.7z 4.4 MB
- Managing Cisco Network Security.pdf.7z 4.4 MB
- CD & DVD Forensics.pdf.7z 4.4 MB
- Cryptography & Security Services - Mechanisms & Applications.pdf.7z 4.4 MB
- Software Piracy Exposed.pdf.7z 4.3 MB
- Nessus, Snort, & Ethereal Power Tools - Customizing Open Source Security Applications.pdf.7z 4.3 MB
- Hackers Beware - Defending Your Network from the Wiley Hacker.pdf.7z 4.3 MB
- Web Services Security & E-Business.pdf.7z 4.3 MB
- Maximum Wireless Security.chm.7z 4.2 MB
- PCI Compliance - Understand & Implement Effective PCI Data Security Standard Compliance.pdf.7z 4.2 MB
- SSH, The Secure Shell - The Definitive Guide.pdf.7z 4.2 MB
- Disassembling Code - IDA Pro & SoftICE.chm.7z 4.2 MB
- Information Security - Principles & Practice.pdf.7z 4.2 MB
- Incident Response - Computer Forensics Toolkit.pdf.7z 4.2 MB
- The Book of PF - A No-Nonsense Guide to the OpenBSD Firewall.pdf.7z 4.1 MB
- Perl Scripting for Windows Security - Live Response, Forensic Analysis, & Monitoring.pdf.7z 4.1 MB
- Virtual Honeypots - From Botnet Tracking to Intrusion Detection.chm.7z 4.1 MB
- RFID Security.pdf.7z 4.1 MB
- Hacking for Dummies, 2nd Ed..pdf.7z 4.1 MB
- Network Security Assessment - Know Your Network, 2nd Ed..pdf.7z 4.1 MB
- Insider Threat - Protecting the Enterprise from Sabotage, Spying, & Theft.pdf.7z 4.0 MB
- Cryptography for Dummies.chm.7z 4.0 MB
- Maximum Linux Security, 2nd Ed..pdf.7z 4.0 MB
- Hacking Exposed-Web Applications - Web Application Security Secrets & Solutions.pdf.7z 4.0 MB
- A+, Network+, Security+ Exams in a Nutshell - A Desktop Quick Reference.pdf.7z 4.0 MB
- How to Cheat at Deploying & Securing RFID.pdf.7z 4.0 MB
- SELinux by Example - Using Security Enhanced Linux.chm.7z 4.0 MB
- Web Services Security.chm.7z 4.0 MB
- Hacking Exposed-Web 2.0 - Web 2.0 Security Secrets & Solutions.pdf.7z 3.9 MB
- Enterprise Java Security - Building Secure J2EE Applications.chm.7z 3.9 MB
- Nmap in the Enterprise - Your Guide to Network Scanning.pdf.7z 3.9 MB
- Hacker's Challenge - Test Your Incident Response Skills Using 20 Scenarios.pdf.7z 3.9 MB
- MCSE Core Elective Exams in a Nutshell - A Desktop Quick Reference.chm.7z 3.9 MB
- The CISSP Prep Guide - Mastering the Ten Domains of Computer Security.pdf.7z 3.9 MB
- Network Security Hacks - Tips & Tools for Protecting Your Privacy, 2nd Ed..chm.7z 3.9 MB
- Internet Security - A Jumpstart for Systems Administrators & IT Managers.chm.7z 3.9 MB
- UNIX & Linux Forensic Analysis DVD Toolkit.pdf.7z 3.8 MB
- Hardening Windows, 2nd Ed..pdf.7z 3.8 MB
- Linux Firewalls - Attack Detection & Response with iptables, psad, & fwsnort.pdf.7z 3.8 MB
- File System Forensic Analysis.chm.7z 3.8 MB
- Securing Web Services with WS-Security - Demystifying WS-Security, WS-Policy, SAML, XML Signature, & XML Encryption.chm.7z 3.8 MB
- Reversing - Secrets of Reverse Engineering.pdf.7z 3.8 MB
- Kismet Hacking.pdf.7z 3.8 MB
- Mac OS X Maximum Security.chm.7z 3.7 MB
- High-Assurance Design - Architecting Secure & Reliable Enterprise Applications.chm.7z 3.7 MB
- Wireless Network Hacks & Mods for Dummies.pdf.7z 3.7 MB
- Applied Cryptography - Protocols, Algorithms, & Source COde in C, 2nd Ed..chm.7z 3.6 MB
- Secure Programming with Static Analysis.pdf.7z 3.6 MB
- Reverse Engineering Code with IDA Pro.pdf.7z 3.6 MB
- Metasploit Toolkit for Penetration Testing, Exploit Development, & Vulnerability Research.pdf.7z 3.6 MB
- The Art of Deception - Controlling the Human Element of Security.pdf.7z 3.6 MB
- Network Perimeter Security - Building Defense In-Depth.chm.7z 3.6 MB
- MCSE Implementing & Administering Security in a Windows 2003 Network Exam Cram 2 [Exam 70-299].chm.7z 3.5 MB
- Mission Critical! Internet Security.pdf.7z 3.5 MB
- Cyber Forensics - A Field Manual for Collecting, Examining, & Preserving Evidence of Computer Crimes.pdf.7z 3.5 MB
- Cryptography in C & C++.chm.7z 3.5 MB
- AAA & Network Security for Mobile Access - Radius, Diameter, EAP, PKI, & IP Mobility.pdf.7z 3.5 MB
- The Ethical Hack - A Framework for Business Value Penetration Testing.pdf.7z 3.4 MB
- Securing Windows Server 2003.chm.7z 3.4 MB
- Mainframe Basics for Security Professionals - Getting Started with RACF.pdf.7z 3.4 MB
- Stealing the Network - How to Own the Box.pdf.7z 3.4 MB
- Mobility, Data Mining, & Privacy - Geographic Knowledge Discovery.pdf.7z 3.4 MB
- Writing Secure Code.pdf.7z 3.4 MB
- Practical Oracle Security - Your Unauthorized Guide to Relational Database Security.pdf.7z 3.4 MB
- Rootkits for Dummies.pdf.7z 3.3 MB
- BigNum Math - Implementing Cryptographic Multiple Precision Arithmetic.pdf.7z 3.2 MB
- Security for Wireless Ad Hoc Networks.pdf.7z 3.2 MB
- Intrusion Detection & Prevention.chm.7z 3.2 MB
- Juniper Networks Field Guide & Reference.chm.7z 3.1 MB
- CEH - Official Certified Ethical Hacker Review Guide [Exam 312-50].pdf.7z 3.1 MB
- CEH Official Certified Ethical Hacker Review Guide.pdf.7z 3.1 MB
- IT Auditing - Using Controls to Protect Information Assets.chm.7z 3.1 MB
- Writing Secure Code for Windows Vista.chm.7z 3.1 MB
- PHP Oracle Web Development - Data processing, Security, Caching, XML, Web Services, & AJAX.pdf.7z 3.1 MB
- Security, Privacy, & Trust in Modern Data Management.pdf.7z 3.0 MB
- Effective Oracle Database 10g Security by Design.chm.7z 3.0 MB
- How to Cheat at Windows System Administration Using Command Line Scripts.pdf.7z 3.0 MB
- Real 802.11 Security - Wi-Fi Protected Access & 802.11i.chm.7z 3.0 MB
- Maximum Security, 4th Ed..chm.7z 2.9 MB
- Mobile & Wireless Network Security & Privacy.pdf.7z 2.9 MB
- Web Security & Commerce.pdf.7z 2.9 MB
- Open Source Fuzzing Tools.pdf.7z 2.9 MB
- Buffer Overflow Attacks - Detect, Exploit, Prevent.pdf.7z 2.9 MB
- Security in Distributed, Grid, Mobile, & Pervasive Computing.pdf.7z 2.9 MB
- Cisco Network Security Little Black Book.pdf.7z 2.8 MB
- Stealing the Network - How to Own a Continent.chm.7z 2.8 MB
- HackNotes - Windows Security Portable Reference.pdf.7z 2.7 MB
- Cryptography for Developers.pdf.7z 2.7 MB
- Multimedia Security Technologies for Digital Rights Management.pdf.7z 2.7 MB
- Surveillance & Security - Technological Politics & Power in Everyday Life.pdf.7z 2.7 MB
- LAN Switch Security - What Hackers Know About Your Switches.pdf.7z 2.6 MB
- Critical Incident Management.chm.7z 2.6 MB
- Computer & Intrusion Forensics.pdf.7z 2.6 MB
- Router Security Strategies - Securing IP Network Traffic Planes.pdf.7z 2.6 MB
- Privacy Protection & Computer Forensics, 2nd Ed..pdf.7z 2.5 MB
- Building Secure Servers with Linux.pdf.7z 2.5 MB
- Honeypots - Tracking Hackers.chm.7z 2.5 MB
- Snort Cookbook.chm.7z 2.5 MB
- Hack Proofing Your Network.pdf.7z 2.5 MB
- Beginning Cryptography with Java.chm.7z 2.5 MB
- Zero-Day Exploit - Countdown to Darkness.pdf.7z 2.5 MB
- Security Technologies for the World Wide Web, 2nd Ed..pdf.7z 2.4 MB
- Practical Unix & Internet Security, 3rd Ed..chm.7z 2.4 MB
- Security & Quality of Service in Ad Hoc Wireless Networks.pdf.7z 2.4 MB
- Contemporary Cryptography.pdf.7z 2.4 MB
- Multicast & Group Security.pdf.7z 2.4 MB
- Mastering Network Security.pdf.7z 2.4 MB
- Guide to Elliptic Curve Cryptography.pdf.7z 2.4 MB
- Bulletproof Wireless Security - GSM, UMTS, 802.11, & Ad Hoc Security.pdf.7z 2.4 MB
- Secrets Stolen, Fortunes Lost - Preventing Intellectual Property Theft & Economic Espionage in the 21st Century.pdf.7z 2.3 MB
- Foundations of Cryptography - Vol. 1, Basic Tools.pdf.7z 2.3 MB
- Building an Effective Information Security Policy Architecture.pdf.7z 2.3 MB
- Computer Viruses for Dummies.pdf.7z 2.3 MB
- Securing the Information Infrastructure.pdf.7z 2.3 MB
- Computer Viruses - From Theory to Applications.pdf.7z 2.3 MB
- Encyclopedia of Cryptology.chm.7z 2.3 MB
- Forensic Computer Crime Investigation.pdf.7z 2.3 MB
- Writing Secure Code, 2nd Ed..chm.7z 2.2 MB
- Insider Attack & Cyber Security - Beyond the Hacker.pdf.7z 2.2 MB
- Malicious Cryptography - Exposing Cryptovirology.pdf.7z 2.2 MB
- Foundations of Security - What Every Programmer Needs to Know.pdf.7z 2.2 MB
- Intrusion Prevention Fundamentals.chm.7z 2.1 MB
- The Shellcoder's Handbook - Discovering & Exploiting Security Holes.chm.7z 2.1 MB
- Hardening Linux.pdf.7z 2.1 MB
- Hacker's Delight.chm.7z 2.1 MB
- Covert Java - Techniques for Decompiling, Patching, & Reverse Engineering.pdf.7z 2.1 MB
- Internet Denial of Service - Attack & Defense Mechanisms.chm.7z 2.1 MB
- Tangled Web - Tales of Digital Crime from the Shadows of Cyberspace.pdf.7z 2.0 MB
- Network Intrusion Detection, 3rd Ed..pdf.7z 2.0 MB
- Introduction to Cryptography - Principles & Applications, 2nd Ed..pdf.7z 2.0 MB
- Wireless Personal Area Networks - Performance, Interconnection, & Security with IEEE 802.15.4.pdf.7z 2.0 MB
- Hackers - Heroes of the Computer Revolution.pdf.7z 2.0 MB
- HackNotes - Network Security Portable Reference.pdf.7z 2.0 MB
- Cisco Secure Firewall Services Module (FWSM).pdf.7z 1.9 MB
- J2EE Security for Servlets, EJBs, & Web Services.chm.7z 1.9 MB
- IPTV Security - Protecting High-Value Digital Contents.pdf.7z 1.9 MB
- HackNotes - Web Security Portable Reference.pdf.7z 1.9 MB
- Webster's New World Hacker Dictionary.pdf.7z 1.9 MB
- Botnet Detection - Countering the Largest Security Threat.pdf.7z 1.8 MB
- Internet Security - Cryptographic Principles, Algorithms, & Protocols.pdf.7z 1.8 MB
- Advances in Network & Distributed Systems Security.pdf.7z 1.8 MB
- 1337 h4x0r h4ndb00k.chm.7z 1.8 MB
- Privacy, Security, & Trust within the Context of Pervasive Computing.pdf.7z 1.8 MB
- Cryptology Unlocked.pdf.7z 1.8 MB
- Advances in Elliptic Curve Cryptography.pdf.7z 1.8 MB
- Foundations of Computer Security.pdf.7z 1.8 MB
- IM Instant Messaging Security.pdf.7z 1.8 MB
- HackNotes - Linux & Unix Security Portable Reference.pdf.7z 1.8 MB
- PGP & GPG - Email for the Practical Paranoid.pdf.7z 1.7 MB
- Managing Security with Snort & IDS Tools.chm.7z 1.7 MB
- Handbook of Digital & Multimedia Forensic Evidence.pdf.7z 1.7 MB
- Secure Computer & Network Systems - Modeling, Analysis, & Design.pdf.7z 1.7 MB
- Hardening Windows.chm.7z 1.7 MB
- Network Security Assessment - Know Your Network.chm.7z 1.7 MB
- IT Security Interviews Exposed - Secrets to Landing Your Next Information Security Job.pdf.7z 1.7 MB
- Computer Security Basics, 2nd Ed..chm.7z 1.6 MB
- Advanced CISSP Prep Guide - Exam Q&A.chm.7z 1.6 MB
- Online Business Security Systems.pdf.7z 1.6 MB
- Computer Security, Privacy, & Politics - Current Issues, Challenges, & Solutions.pdf.7z 1.6 MB
- Sarbanes-Oxley IT Compliance Using COBIT & Open Source Tools.chm.7z 1.6 MB
- Network Security Hacks - 100 Industrial-Strength Tips & Tools.chm.7z 1.6 MB
- Apache Security.chm.7z 1.6 MB
- Rootkits - Subverting the Windows Kernel.chm.7z 1.6 MB
- Information Security Policies & Procedures - A Practitioner's Reference, 2nd Ed..pdf.7z 1.6 MB
- The International Handbook of Computer Security.pdf.7z 1.6 MB
- IPSec - The New Security Standard for the Internet, Intranets, & Virtual Private Networks, 2nd Ed..chm.7z 1.6 MB
- Cyber Crime Investigator's Field Guide.pdf.7z 1.5 MB
- Brute Force - Cracking the Data Encryption Standard.pdf.7z 1.5 MB
- Wireless Operational Security.chm.7z 1.5 MB
- Firewalls - Jumpstart for Network & Systems Administrators.pdf.7z 1.5 MB
- The Apache Modules Book - Application Development with Apache.pdf.7z 1.5 MB
- Network Security JumpStart.pdf.7z 1.4 MB
- Implementing Email Security & Tokens - Current Standards, Tools, & Practices.pdf.7z 1.4 MB
- Hacking - The Art of Exploitation.chm.7z 1.4 MB
- 19 Deadly Sins of Software Security - Programming Flaws & How to Fix Them.chm.7z 1.4 MB
- CISSP for Dummies, 2nd Ed..chm.7z 1.4 MB
- Secure Programming Cookbook for C & C++.chm.7z 1.4 MB
- Internet & Intranet Security Management - Risks & Solutions.pdf.7z 1.3 MB
- Mastering FreeBSD & OpenBSD Security.chm.7z 1.3 MB
- Defend I.T. - Security by Example.chm.7z 1.3 MB
- Security in Wireless LANs & MANs.pdf.7z 1.3 MB
- Cryptography - A Very Short Introduction.chm.7z 1.3 MB
- Oracle Security.chm.7z 1.3 MB
- Network Security Tools - Writing, Hacking, & Modifying Security Tools.chm.7z 1.3 MB
- Cisco IOS Access Lists.pdf.7z 1.3 MB
- Network Security with OpenSSL.pdf.7z 1.3 MB
- Auditor's Guide to Information Systems Auditing.pdf.7z 1.2 MB
- Perfect Passwords - Selection, Protection, Authentication.pdf.7z 1.2 MB
- Inside Java 2 Platform Security, 2nd Ed. - Architecture, API Design, & Implementation.chm.7z 1.2 MB
- Building Secure Servers with Linux.chm.7z 1.2 MB
- The Art of Intrusion - The Real Stories Behind the Exploits of Hackers, Intruders, & Deceivers.pdf.7z 1.1 MB
- Windows Server 2003 Security Guide.pdf.7z 1.1 MB
- The Database Hacker's Handbook - Defending Database Servers.chm.7z 1.1 MB
- Biometrics & Network Security.chm.7z 1.1 MB
- Complexity & Cryptography - An Introduction.pdf.7z 1.1 MB
- Hardening Apache.chm.7z 1.1 MB
- SELinux - NSA's Open Source Security Enhanced Linux.chm.7z 1.1 MB
- Codes & Ciphers - Julius Caesar, the Enigma, & the Internet.pdf.7z 1.0 MB
- Absolute OpenBSD - UNIX for the Practical Paranoid.chm.7z 1.0 MB
- Defense & Detection Strategies against Internet Worms.pdf.7z 1.0 MB
- Static & Dynamic Reverse Engineering Techniques for Java Software Systems.pdf.7z 1.0 MB
- Static & Dynamic Reverse Engineering Techniques for Java Software Sytems.pdf.7z 1.0 MB
- SSL & TLS Essentials - Securing the Web.pdf.7z 1.0 MB
- Probabilistic & Statistical Methods in Cryptology - An Introduction by Selected Topics.pdf.7z 1.0 MB
- Investigating Computer-Related Crime - A Handbook for Corporate Investigators.pdf.7z 1013.0 KB
- Incident Response - A Strategic Guide to Handling System & Network Security Breaches.chm.7z 991.4 KB
- Internet Forensics.chm.7z 839.5 KB
- Strategic Information Security.chm.7z 820.2 KB
- 802.11 Security.pdf.7z 816.7 KB
- Information Technology Security - Advice from Experts.chm.7z 801.7 KB
- Foundations of Cryptography - A Primer.pdf.7z 748.6 KB
- Bluetooth Security.pdf.7z 691.9 KB
- Linux Security Cookbook.chm.7z 643.3 KB
- Secure Coding - Principles & Practices.chm.7z 634.6 KB
- The Naked Employee - How Technology Is Compromising Workplace Privacy.chm.7z 629.1 KB
- Halting the Hacker - A Practical Guide to Computer Security, 2nd Ed..chm.7z 628.5 KB
- Hacker Web Exploitation Uncovered.chm.7z 554.3 KB
- The Oracle Hacker's Handbook - Hacking & Defending Oracle.chm.7z 483.6 KB
- Essential PHP Security.chm.7z 358.9 KB
Download Torrent
Related Resources
Copyright Infringement
If the content above is not authorized, please contact us via activebusinesscommunication[AT]gmail.com. Remember to include the full url in your complaint.