Utica Books
File List
- Charles P. Pfleeger, Shari Lawrence Pfleeger-Analyzing Computer Security_ A Threat _ Vulnerability _ Countermeasure Approach-Prentice Hall (2011).pdf 239.1 MB
- -EC-Council. Ethical Hacking and Countermeasures (CEH v. 8).rar 125.4 MB
- Sherri Davidoff, Jonathan Ham Network Forensics Tracking Hackers through Cyberspace.epub 45.9 MB
- Michael T. Raggo, Chet Hosmer Data hiding Exposing concealed data in multimedia, operating systems, mobile devices and network protocols.pdf 25.4 MB
- The Experts_ EC-Council.-Ethical Hacking and Countermeasures_ Attack Phases.pdf 17.1 MB
- EC-Council Computer Forensics Investigating Data and Image Files .pdf 15.2 MB
- Michael E. Whitman, Herbert J. Mattord Principles of Information Security.pdf 14.8 MB
- Joel Scambray, Neil Bergman, Mike Stanfield, Jason Rouse Hacking Exposed Mobile Security Secrets & Solutions.epub 12.9 MB
- Michael Sikorski, Andrew Honig Practical Malware Analysis The Hands-On Guide to Dissecting Malicious Software.epub 11.0 MB
- American Psychological Association-Publication Manual of the American Psychological Association-American Psychological Association (APA) (2009).pdf 9.4 MB
- Jason Andress and Steve Winterfeld Auth. Cyber Warfare. Techniques, Tactics and Tools for Security Practitioners.pdf 9.1 MB
- Jeffrey Carr Inside cyber warfare mapping the cyber underworld.epub 5.8 MB
- Aditya Sood and Richard Enbody Auth. Targeted Cyber Attacks. Multi-staged Attacks Driven by Exploits and Malware.pdf 5.5 MB
- (Protecting Our Future 2) Mowbray, Thomas J_ LeClair, Jane-Cybersecurity in Our Digital Lives-John Wiley & Sons, Inc. (2013).epub 5.2 MB
- Patrick Engebretson The basics of hacking and penetration testing ethical hacking and penetration testing made easy.pdf 4.5 MB
- Sean Bodmer, Dr. Max Kilger, Gregory Carpenter, Jade Jones Reverse Deception Organized Cyber Threat Counter-Exploitation.epub 3.6 MB
- Maness, Ryan C._ Valeriano, Brandon-Cyber war versus cyber realities _ cyber conflict in the international system-Oxford University Press (2015).pdf 2.6 MB
- P.W. Singer, Allan Friedman Cybersecurity and Cyberwar What Everyone Needs to Know.epub 2.4 MB
- Thomas A. Johnson Cybersecurity Protecting Critical Infrastructures from Cyber Attack and Cyber Warfare.pdf 1.7 MB
- Donovan, Martin-Hacking_ Learn the Basics of Ethical Hacking and Penetration Testing (2016).epub 1.5 MB
- Torrent_downloaded_from_Demonoid_-_www.demonoid.pw_.txt 59 bytes
Download Torrent
Related Resources
Copyright Infringement
If the content above is not authorized, please contact us via activebusinesscommunication[AT]gmail.com. Remember to include the full url in your complaint.