pack4.5
    
    File List
    
        
            
                
                    - Practical Rails Social Networking Sites.pdf  86.3 MB
 
                
                    - Infosec Career Hacking: Sell Your Skillz, Not Your Soul, A Technical Guide to Landing (and Keeping) A Job in the Information Security Field.pdf  83.9 MB
 
                
                    - Operating System Forensics.pdf  73.7 MB
 
                
                    - Taking your iPad 2 to the Max.pdf  69.2 MB
 
                
                    - Practical Paranoia macOS 10.12 Sierra Security Essentials.pdf  54.4 MB
 
                
                    - Computer Security: Principles and Practice - William Stallings Global Edition 3rd Edition.pdf  54.1 MB
 
                
                    - Practical Paranoia macOS 10.13 Security Essentials.pdf  53.5 MB
 
                
                    - Security and Privacy in the Age of Uncertainty.pdf  50.5 MB
 
                
                    - Cyberspace Safety and Security.pdf  42.7 MB
 
                
                    - Network Security and Communication Engineering.pdf  40.8 MB
 
                
                    - CWSP Certified Wireless Security Professional Study Guide Exam CWSP-205 2nd Edition.pdf  39.2 MB
 
                
                    - 5 Steps to a 5 - AP Computer Science A - 2017 Edition (2016).epub  37.1 MB
 
                
                    - Head First Data Analysis.pdf  34.2 MB
 
                
                    - Spectrum Sharing in Wireless Networks: Fairness, Efficiency, and Security.pdf  25.6 MB
 
                
                    - Information Systems Security & Assurance: Security Strategies In Linux Platforms And Applications 2nd Edition.pdf  23.6 MB
 
                
                    - Windows Azure: Steb-by-Step.pdf  23.6 MB
 
                
                    - CompTIA Security+ Exam SY0-401 Exam Guide 4th Edition.pdf  20.5 MB
 
                
                    - Industrial Network Security: Securing Critical Infrastructure Netoworks for Smart Grid, SCADA, and Other Industrial Control Systems 2nd Edition.pdf  18.6 MB
 
                
                    - Security of Block Ciphers: From Algorithm Design to Hardware Implementation.pdf  18.3 MB
 
                
                    - GSEC: GIAC Security Essentials Certification All-in-One Exam Guide.pdf  17.8 MB
 
                
                    - Testing Python: Applying Unit Testing, TDD, BDD, and Acceptance Testing.pdf  17.2 MB
 
                
                    - An Introduction to Splines for use in Computer Graphics and Geometric Modeling.djvu  16.8 MB
 
                
                    - CompTIA Security+ Guide to Network Security Fundamentals 5th Edition.pdf  16.5 MB
 
                
                    - Practical Methods of Financial Engineering and Risk Mangement.pdf  16.5 MB
 
                
                    - Smart Cards, Tokens, Security and Applications 2nd Edition.pdf  16.4 MB
 
                
                    - Cybersecurity and Privacy: Bridging the Gap Wireless World Research Forum.pdf  16.1 MB
 
                
                    - Mobile Application Development, Usability, and Security.pdf  15.1 MB
 
                
                    - Computer Security and Cryptography.pdf  14.6 MB
 
                
                    - Multimedia Forensics and Security: Foundations, Innovations, and Applications.pdf  14.5 MB
 
                
                    - European Security and Defence 6 International Security and Defense 2017.pdf  13.8 MB
 
                
                    - CEHv6 Module 20 Hacking Wireless Networks.pdf  13.0 MB
 
                
                    - Cyber Security on Azure: An IT Professional's Guide to Microsoft Azure Security Center.pdf  12.1 MB
 
                
                    - Pressure Control During Oil Well Drilling.pdf  11.0 MB
 
                
                    - Security Management in Mobile Cloud Computing.pdf  10.9 MB
 
                
                    - CompTIA Security+ Get Certified Get Ahead SY0-501 Study Guide.pdf  10.8 MB
 
                
                    - Scripting Intelligence: Web 3.0 Information Gathering And Processing.pdf  10.4 MB
 
                
                    - Social Security For Dummies 3rd Edition.pdf  10.2 MB
 
                
                    - A Practical Guide to Video and Audio Compression: From Sprockets and Rasters to Macro Blocks.pdf  10.2 MB
 
                
                    - Programming Chrome Apps: Develop Cross-Platform Apps for Chrome.pdf  9.9 MB
 
                
                    - Perfect Passwords: Selection, Protection, Authentication.pdf  9.6 MB
 
                
                    - Evaluating and Improving Undergraduate Teaching.pdf  9.2 MB
 
                
                    - Security in Fixed and Wireless Networks 2nd Edition.pdf  9.1 MB
 
                
                    - A Guide to Computer Network Security.pdf  8.5 MB
 
                
                    - Building the Infrastructure for Cloud Security: A Solutions View.pdf  8.4 MB
 
                
                    - Cybersecurity: Managing Systems, Conducting Testing, and Investigating Intrusions.pdf  8.0 MB
 
                
                    - Foundations of Agile Python Development.pdf  7.4 MB
 
                
                    - A Practical Guide to Networking, Privacy & Security in iOS 11 (1.0).pdf  7.3 MB
 
                
                    - Smart Home Automation with Linux and Raspberry Pi.pdf  7.1 MB
 
                
                    - Beginning J2ME From Novice to Professional.pdf  6.9 MB
 
                
                    - Security and Trends in Wireless Identification and Sensing Platform Tags: Advancements in RFID.pdf  6.8 MB
 
                
                    - Cognitive Radio Networking and Security: A Game Theoretic View.pdf  6.8 MB
 
                
                    - Security of Mobile Communications.pdf  6.6 MB
 
                
                    - Advances in Security and Payment Methods for Mobile Commerce.pdf  6.5 MB
 
                
                    - CEHv6 Module 22 Linux Hacking.pdf  6.1 MB
 
                
                    - ADO.NET Programming.chm  5.9 MB
 
                
                    - Mastering pfSense: Master the art of managing, securing, and monitoring your network using the powerful pfSense 2.3.pdf  5.8 MB
 
                
                    - Securing Java: Getting Down to Business with Mobile Code 2nd Edition.pdf  5.8 MB
 
                
                    - Cryptography and Security Systems.pdf  5.7 MB
 
                
                    - CEHv6 Module 09 Viruses and Worms.pdf  5.6 MB
 
                
                    - CEHv6 Module 45 Privacy on the Internet.pdf  5.4 MB
 
                
                    - Designing Large-Scale LANs.pdf  5.2 MB
 
                
                    - Digital Holographic Data Representation and Compression.pdf  5.0 MB
 
                
                    - CEHv6 Module 11 Social Engineering.pdf  5.0 MB
 
                
                    - Real Functions in Several Variables: Volume XI.pdf  5.0 MB
 
                
                    - A Multidisciplinary Introduction to Information Security.pdf  4.9 MB
 
                
                    - Real Functions in Several Variables: Volume VI.pdf  4.9 MB
 
                
                    - Cognitive Hack: The New Battleground in Cybersecurity...the Human Mind.pdf  4.6 MB
 
                
                    - Beginning Android C++ Game Development.pdf  4.5 MB
 
                
                    - CEHv6 Module 25 Cryptography.pdf  4.1 MB
 
                
                    - CEHv6 Module 38 VoIP Hacking.pdf  3.9 MB
 
                
                    - Wireless Security and Cryptography: Specifications and Implementations.pdf  3.8 MB
 
                
                    - Chemical Engineering Vocabulary: Bilingual.pdf  3.7 MB
 
                
                    - Scheduling and Locking in Multiprocessor Real-Time Operating Systems.pdf  3.4 MB
 
                
                    - Pro JPA 2.pdf  3.1 MB
 
                
                    - Examples of Power Series.pdf  3.1 MB
 
                
                    - Wireless Communications Security: Solutions for the Internet of Things.pdf  3.1 MB
 
                
                    - CEHv6 Module 21 Physical Security.pdf  3.1 MB
 
                
                    - Information Security: Policies and Actions in Modern Integrated Systems.pdf  3.0 MB
 
                
                    - High Performance Web Sites.pdf  2.8 MB
 
                
                    - Amazon Hacks.chm  2.8 MB
 
                
                    - An Introduction to Computer Security: The NIST Handbook.pdf  2.8 MB
 
                
                    - Vehicular Cyber Physical Systems: Adaptive Connectivity and Security.pdf  2.8 MB
 
                
                    - CEHv6 Module 43 Cyber Warfare- Hacking Al-Qaida and Terrorism.pdf  2.7 MB
 
                
                    - Plus One Hackers Training Kit: For Ethical Hackers and Cyber Security Professionals.pdf  2.7 MB
 
                
                    - CEHv6 Module 37 Bluetooth Hacking.pdf  2.5 MB
 
                
                    - Operating System Concepts and Techniques.pdf  2.5 MB
 
                
                    - Trust and Security in a Collaborative Computing.pdf  2.5 MB
 
                
                    - CEHv6 Module 54 Proxy Server Technologies.pdf  2.3 MB
 
                
                    - Lectures on Probability Theory and Mathematical Statistics 2nd Edition.pdf  2.2 MB
 
                
                    - CEHv6 Module 50 Software Piracy and W.pdf  2.1 MB
 
                
                    - CEHv6 Module 49 Creating Security Policies.pdf  2.1 MB
 
                
                    - CEHv6 Module 30 Exploit Writing.pdf  2.0 MB
 
                
                    - Beyond Cybersecurity: Protecting Your Digital Business.pdf  2.0 MB
 
                
                    - Advanced Java Networking.pdf  1.9 MB
 
                
                    - CEHv6 Module 53 Hacking Web Browsers.pdf  1.9 MB
 
                
                    - Managing Your Outsourced IT Services Provider.pdf  1.8 MB
 
                
                    - The international handbook of computer security.pdf  1.8 MB
 
                
                    - Smart Grid Security.pdf  1.8 MB
 
                
                    - Privacy, Data Protection and Cybersecurity in Europe.pdf  1.7 MB
 
                
                    - Cyberphobia: Identity, Trust, Security and The Internet.pdf  1.6 MB
 
                
                    - CEHv6 Module 42 Hacking Database Servers.pdf  1.6 MB
 
                
                    - Internet Governance in an Age of Cyber Insecurity.pdf  1.6 MB
 
                
                    - SSL and TLS Essentials: Securing the Web.pdf  1.4 MB
 
                
                    - A Security Analysis of the WPA-TKIP and TLS Security Protocols.pdf  1.2 MB
 
                
                    - Hackers' Bazaar: Markets for Cybercrime Tools and Stolen Data.pdf  1.2 MB
 
                
                    - Demistifying the IPsec Puzzle: Computer Security Series1.pdf  1.1 MB
 
                
                    - Apache Cookbook.chm  989.2 KB
 
                
                    - IT Security 101: Think Like A CyberCriminal.pdf  893.5 KB
 
                
                    - Hacking with Python: Your Guide to Ethical Hacking, Basic Security & Python Hacking.pdf  728.5 KB
 
                
                    - CEHv6 Module 32 Exploit Writing.pdf  645.2 KB
 
                
                    - CEHv6 Module 66 Security Convergence.pdf  634.9 KB
 
                
                    - How To Hack Into A Computer On LAN.pdf  570.0 KB
 
                
                    - Cloud Security and Governance: Who's on Your Cloud.pdf  533.9 KB
 
                
                    - Hacking for Beginners: A Complete Practical Guide For Beginners to Learn Ethical Computer Hacking and Security.pdf  487.2 KB
 
                
                    - Cyber Security: Understand Hacking and Protect Yourself and Your Organization from Ever Getting Hacked.pdf  429.8 KB
 
                
                    - Cyber Security Series: Password Security.pdf  416.5 KB
 
                
                    - How To Get Past Your School Blocking System Without Programs.pdf  363.8 KB
 
                
                    - How To Use Cain & Abel To Get Local Passwords.pdf  118.6 KB
 
                
                    - How To Change Your Folders Background.pdf  94.9 KB
 
                
                    - How To Make A Folder Lock Without Any Software.pdf  78.6 KB
 
                
                    - How To Hack Passwords Using USB Drive.pdf  59.0 KB
 
                
                    - How To Grab IP Address With PHP.pdf  37.4 KB
 
                
                    - How To Use A Trial Program Forever Without Activation.pdf  37.3 KB
 
                
                    - How To Get IP's Through The Steam Client.pdf  34.1 KB
 
                
                    - How To Get Unlimited Time In Internet Café's.pdf  32.5 KB
 
                
            
        
     
    Download Torrent
    
    Related Resources
    
    Copyright Infringement
    
        If the content above is not authorized, please contact us via activebusinesscommunication[AT]gmail.com. Remember to include the full url in your complaint.