pack3.75
File List
- Lab Manual for Security+ Guide to Network Security Fundamentals 5th Edition.pdf 86.4 MB
- Applied Network Security: Master the art of detecting and averting advanced network security attacks and techniques.pdf 44.2 MB
- Cloud Computing Security Foundations and Challenges.pdf 43.1 MB
- CISSP (ISC)2 Certified Information Systems Security Professional Official Study Guide 7th Edition.pdf 37.6 MB
- Kali Linux Intrusion and Exploitation Cookbook: Over 70 recipes for system administrators or DevOps to master Kali Linux 2 and perform effective security assessments.azw3 37.3 MB
- The Practical Guide to HIPAA Privacy and Security Compliance 2nd Edition.pdf 35.5 MB
- Mastering Kali Linux for Web Penetration Testing.pdf 34.5 MB
- Mastering Kali Linux for Advanced Penetration Testing: Secure your network with Kali Linux - the ultimate's hacker arsenal 2nd Edition.pdf 31.7 MB
- Network Security: A Beginner's Guide 3rd Edition.pdf 31.4 MB
- Kali Linux 2: Windows Penetration Testing: a complete pentesting toolkit facilitating smooth backtracking for working hackers.azw3 31.3 MB
- The Kish Cypher: The Story Of KLJN For Unconditional Security.pdf 30.2 MB
- SELinux by Example: Using Security Enhanced Linux.pdf 26.7 MB
- Kali Linux Revealed: Mastering the Penetration Testing Distribution.pdf 26.3 MB
- Cloud Computing and Security.pdf 24.8 MB
- Kali Linux Cookbook: Effective penetration testing solutions 2nd Edition.azw3 22.0 MB
- Kali Linux - An Ethical Hacker's Cookbook: Ent-to-end penetration testing solutions.azw3 21.4 MB
- Intermediate Security Testing With Kali Linux 2.pdf 21.1 MB
- Kali Linux Wireless Penetration Testing Essentials: Plan and execute penetration tests on wireless networks with the Kali Linux distribution.pdf 18.6 MB
- Cisco Press CCNA Security 640-554 Official Cert Guide.pdf 18.5 MB
- Introduction to Security and Network Forensics.pdf 18.0 MB
- Oracle Database 12c Security Cookbook: Secure your Oracle Database 12c with this valuable Oracle support resource, featuring more than 100 solutions to the challenges of protecting your data.pdf 17.9 MB
- CEHv6 Module 05 Scanning.pdf 16.6 MB
- Software Networks: Virtualization, SDN, 5G, and Security.pdf 16.5 MB
- Security in Computing 5th Edition.pdf 16.4 MB
- CWSP: Certified Wireless Security Professional Official Study Guide (CWSP-205) 2nd Edition.pdf 16.2 MB
- Basic Security Testing with Kali Linux 2: Test Your Computer System Security by using the same Tactics that an Attacker would use.pdf 15.9 MB
- CEHv6 Module 07 System Hacking.pdf 15.1 MB
- SOA Security.pdf 14.6 MB
- Data and Applications Security and Privacy XXVIII.pdf 14.2 MB
- Hacking Electronics: Learning Electronics with Arduino and Raspberry Pi 2nd Edition.pdf 14.2 MB
- Identity and Data Security for Web Development: Best Practices.pdf 13.5 MB
- Distributed Networks: Intelligence, Security, and Applications.pdf 11.8 MB
- Applications and Techniques in Information Security.pdf 11.7 MB
- Masterking Kali linux: Hack It or Crack It 2nd Edition.pdf 11.6 MB
- Content Delivery Networks: Web Switching for Security Availability and Speed.pdf 11.6 MB
- Fundamentals of information systems security 3rd Edition.pdf 10.7 MB
- (IN)SECURE Magazine Issue 47 Redefining Security Visualization with Hollywood UI Design.pdf 10.7 MB
- Advanced Persistent Threat Hacking: The Art and Science of Hacking Any Organization.pdf 10.6 MB
- Least Privilege Security for Windows 7, Vista and XP: Secure desktops for regulatory compliance business agility.pdf 10.4 MB
- (IN)SECURE Magazine Issue 46 10 Practical Security Tips for DevOps.pdf 9.7 MB
- Provable Security.pdf 9.5 MB
- Physical Security and Safety: A Field Guide for the Practitioner.pdf 9.1 MB
- Enterprise Information Systems Assurance And System Security: Managerial And Technical Issues.pdf 8.1 MB
- Information Fusion for Cyber-Security Analytics.pdf 7.6 MB
- Intelligent Systems for Security Informatics.pdf 7.5 MB
- Security of Self-Organizing Networks: MANET, WSN, WMN, VANET.pdf 7.2 MB
- Hospitality Security: Managing Security in Today's Hotel, Lodging, Entertainment, and Tourism Environment.pdf 7.0 MB
- ISSE 2014 Securing Electronic Business Processes: Highlights of the Information Security Solutions Europe 2014 Conference.pdf 7.0 MB
- CEHv6 Module 65 Patch Management.pdf 7.0 MB
- Owning Bitcoin: The Illustrated Guide to Security, Privacy and Possibility.azw3 6.8 MB
- Information Theoretic Security and Privacy of Information Systems.azw3 6.6 MB
- Assessing Network Security.pdf 5.9 MB
- Thinking Security: Stopping Next Year's Hackers.pdf 5.9 MB
- Industrial Network Security 2nd Edition.pdf 5.7 MB
- CEHv6 Module 26 Penetration Testing.pdf 5.6 MB
- Predictive Computing and Information Security.pdf 5.6 MB
- Sexual Violence in a Digital Age: Palgrave MacMillan's Studies in Cyber Crime and Security.pdf 5.6 MB
- Security Testing with Kali NetHunter: Testing computer system security using a mobile device and the power of Kali NetHunter.pdf 5.6 MB
- CEHv6 Module 18 Web based Password Cracking Techniques.pdf 5.4 MB
- Practical Internet of Things Security.azw3 5.1 MB
- (IN)SECURE Magazine Issue 53 Antivirus 2017: Security with a Hint of Surveillance.pdf 5.1 MB
- Mobile Communication Systems and Security.pdf 5.0 MB
- CEHv6 Module 16 Hacking Webservers.pdf 4.9 MB
- Hacking and Securitng Web Applications.pdf 4.2 MB
- Implementing Cybersecurity: A Guide To The National Institute of Standards and Technology Risk Management Framework.pdf 4.1 MB
- CEHv6 Module 06 Enumeration.pdf 4.0 MB
- CEHv6 Module 36 Hacking Mobile Phones, PDA and Handheld Devices.pdf 4.0 MB
- RFID Security: A Lightweight Paradigm.pdf 3.8 MB
- Modern Security Analysis: Understanding Wall Street Fundamentals.pdf 3.7 MB
- CEHv6 Module 02 Hacking Laws.pdf 3.6 MB
- Energy Security in Europe: Divergent Perceptions and Policy Challenges.pdf 3.6 MB
- From Here to Security: How Workplace Savings Can Keep America's Promise.pdf 3.6 MB
- Testing and Securing Android Studio Applications.pdf 3.6 MB
- Managing an Information Securit and Privacy Awareness and Training Program 2nd Edition.pdf 3.4 MB
- Cyberspace and Cybersecurity 2nd Edition.pdf 3.3 MB
- Information Security Governance Simplified: From the Boardroom to the Keyboard.pdf 3.2 MB
- CEHv6 Module 35 Hacking Routers, Cable Modems and Firewalls.pdf 3.2 MB
- Hacking with Python: The Ultimate Beginner's Guide.pdf 3.2 MB
- Role Engineering for Enterprise Security Management.pdf 2.9 MB
- Web Application Security for Dummies Qualys Limited Edition.pdf 2.8 MB
- Hacking Made Easy: An Easy Guide To Learn IT Security.epub 2.8 MB
- CEHv6 Module 33 Reverse Engineering Techniques.pdf 2.8 MB
- CEHv6 Module 12 Phishing.pdf 2.6 MB
- Hacking: 17 Must Tools Every Hacker Should Have Volume 2.pdf 2.3 MB
- php|architect's Guide to PHP Security: A Step-by-Step Guide to Writing Secure and Reliable PHP Applications.pdf 2.3 MB
- Wireless Mobile Internet Security 2nd Edition.pdf 2.2 MB
- CEHv6 Module 56 Hacking Global Positioning System.pdf 2.1 MB
- CEHv6 Module 58 Credit Card Frauds.pdf 2.1 MB
- Hacking: Create Your Own Penetration Testing Lab in 1 Hour Kali Linux Booklet.pdf 2.1 MB
- Hacking: The Internet Compact Research.pdf 1.9 MB
- Securing Docker: Learn how to secure your Docker environment and keep your environments secure irrespective of the threats out there.azw3 1.8 MB
- CEHv6 Module 67 Identifying the Terrorists.pdf 1.8 MB
- NISTIR 8176: Security Assurance Requirements for Linux Application Container Deployments.pdf 1.7 MB
- Cyber Security Basics: Protect your organization by applying the fundamentals.pdf 1.6 MB
- CEHv6 Module 59 How to Steal Passwords.pdf 1.5 MB
- Master Internet and Computer Security: How to Protect Yourself, Your Family and Your Business from Cyber Crime, Malicious Software and Data Loss.pdf 1.5 MB
- CEH-Classroom-Lab-Setup-v6.pdf 1.5 MB
- Cyber-Physical Security and Privacy in the Electric Smart Grid.pdf 1.5 MB
- Data Analytics and Computer Hacking & Mobile Hacking 3 Bundle Manuscript: Beginner's Guide to Learn Data Analytics, Predictive Analytics and Data Science with Computer Hacking and Mobile Hacking.pdf 1.4 MB
- Online Security for Everyone: How to protect yourself and stay safe from fraud, scams and hackers with easy cyber security tips for your Gmail, Docs and other Google services.pdf 1.3 MB
- CEHv6 Module 63 Botnets.pdf 1.1 MB
- Advanced Persistent Training: Take Your Security Awareness Program to the Next Level.pdf 1.1 MB
- E-mail Security: A Pocket Guide.pdf 1.0 MB
- Securing the Connected Classroom Technology Planning to Keep Students Safe.pdf 939.1 KB
- Hacking: The Blueprint. A Beginner's Guide to Ethical Computer Hacking.pdf 718.9 KB
- CEHv6 Module 62 Case Studies.pdf 718.2 KB
- CEHv6 Module 64 Economic Espionage.pdf 657.6 KB
- Hacking: Beginner's Guide on How to Hack Using Python and Linux.pdf 657.0 KB
- Python Programming for Beginners and Hacking with Python: 2 Bundle Manuscript.pdf 624.8 KB
- Advanced Hacking: The Blueprint for Beginners to Advanced Hackers.pdf 602.3 KB
- Hacking: Noob to Cyberpunk Easy Guide to Computer Hacking, Internet Security, Penetration Testing, Cracking, Sniffing, and Smart Phone Vulnerabilities.pdf 589.7 KB
- How To Use Your First Web Exploit.pdf 589.4 KB
- Security: The Human Factor.pdf 426.3 KB
- Hacking for Beginners: Computer Virus Cracking Malware IT Security2nd Edition.epub 191.5 KB
- How To Hack An Administrator Account With A Guest Account.pdf 81.9 KB
- How To Hack Someone With His IP Address.pdf 54.6 KB
- How To ''Deface'' A Guestbook With HTML-Injection.pdf 54.4 KB
- How To Kick Someone Of A Wireless Network (Must be LAN-Admin).pdf 43.4 KB
- How To Shutdown A Computer With A Cell Phone.pdf 34.4 KB
- How To Rename Your Recycle Bin.pdf 29.7 KB
Download Torrent
Related Resources
Copyright Infringement
If the content above is not authorized, please contact us via activebusinesscommunication[AT]gmail.com. Remember to include the full url in your complaint.