E-BOOKS
File List
- malware_analysts_cookbook_and_dvd_tools_and_techniques_for_fighting_malicious_code_dvd.zip 874.4 MB
- applied_cryptography_protocols_algorithms_and_source_code_in_c_20th_Anniversary_Edition.pdf 157.2 MB
- ceh_v9_certified_ethical_hacker_study_guide.pdf 37.1 MB
- unauthorised_access_physical_penetration_testing_for_it_security_teams.pdf 25.9 MB
- threat_modeling_designing_for_security.pdf 21.7 MB
- malware_analysts_cookbook_and_dvd_tools_and_techniques_for_fighting_malicious_code.pdf 21.3 MB
- web_application_hackers_handbook_finding_and_exploiting_security_flaws_2nd_Edition.pdf 16.3 MB
- the_art_of_memory_forensics_detecting_malware_and_threats_in_windows_linux_and_mac_memory.pdf 14.3 MB
- social_engineering_the_art_of_human_hacking.pdf 6.0 MB
- security_engineering_a_guide_to_building_dependable_distributed_systems_2nd_Edition.pdf 5.8 MB
- practical_reverse_engineering_x86_x64_arm_windows_kernel_reversing_tools_and_obfuscation.pdf 4.5 MB
- secrets_and_lies_digital_security_in_a_networked_world_15th_Anniversary_Edition.pdf 4.1 MB
- shellcoders_handbook_discovering_and_exploiting_security_holes_2nd_Edition.pdf 3.5 MB
- the_art_of_deception_controlling_the_human_element_of_security.pdf 2.9 MB
- cryptography_engineering_design_principles_and_practical_applications.pdf 2.8 MB
- threat_modeling_designing_for_security.jpg 89.7 KB
- secrets_and_lies_digital_security_in_a_networked_world_15th_Anniversary_Edition.jpg 82.1 KB
- applied_cryptography_protocols_algorithms_and_source_code_in_c_20th_Anniversary_Edition.jpg 69.2 KB
- web_application_hackers_handbook_finding_and_exploiting_security_flaws_2nd_Edition.jpg 60.2 KB
- malware_analysts_cookbook_and_dvd_tools_and_techniques_for_fighting_malicious_code.jpg 59.8 KB
- unauthorised_access_physical_penetration_testing_for_it_security_teams.jpg 57.4 KB
- cryptography_engineering_design_principles_and_practical_applications.jpg 56.3 KB
- the_art_of_memory_forensics_detecting_malware_and_threats_in_windows_linux_and_mac_memory.jpg 53.6 KB
- shellcoders_handbook_discovering_and_exploiting_security_holes_2nd_Edition.jpg 47.4 KB
- ceh_v9_certified_ethical_hacker_study_guide.jpg 46.4 KB
- social_engineering_the_art_of_human_hacking.jpg 44.8 KB
- practical_reverse_engineering_x86_x64_arm_windows_kernel_reversing_tools_and_obfuscation.jpg 43.7 KB
- the_art_of_deception_controlling_the_human_element_of_security.jpg 32.9 KB
- security_engineering_a_guide_to_building_dependable_distributed_systems_2nd_Edition.jpg 26.9 KB
Download Torrent
Related Resources
Copyright Infringement
If the content above is not authorized, please contact us via activebusinesscommunication[AT]gmail.com. Remember to include the full url in your complaint.