589689.xyz

Collection Of Various Computer Related Books

  • 收录时间:2018-08-18 17:12:30
  • 文件大小:2GB
  • 下载次数:22
  • 最近下载:2020-12-26 04:14:56
  • 磁力链接:

文件列表

  1. Illustrated Windows XP 101 Hot Tips.pdf 56MB
  2. Broadband Telecommunications Handbook.pdf 46MB
  3. Information Security Management Handbook, Fifth Edition.pdf 43MB
  4. WarDriving Drive, Detect, Defend - A Guide to Wireless Security.chm 37MB
  5. Linux Server Hacks.pdf 34MB
  6. Google Hacking for Penetration Testers.pdf 32MB
  7. Sams Teach Yourself Microsoft SQL Server 2005 Express in 24 Hours.chm 30MB
  8. Anti-Hacker Tool Kit, Second Edition.chm 29MB
  9. The A+ Certification and PC Repair Handbook.chm 28MB
  10. Windows Server 2003 Security Infrastructures - Core Security Features.chm 27MB
  11. Microsoft SQL Server 2005 Implementation and Maintenance.pdf 27MB
  12. PC Disaster and Recovery.chm 25MB
  13. Cyber Terrorism - Political And Economic Implications.pdf 24MB
  14. Upgrading and Repairing Pcs, 17th Edition.chm 24MB
  15. The Best Damn Firewall Book Period.pdf 22MB
  16. MS Press Windows Server 2003 Administrators Companion 2nd Edition March 2006.pdf 22MB
  17. The Best Damn Windows Server 2003 Book Period.pdf 21MB
  18. Advanced Wireless Networks - 4G Technologies.pdf 21MB
  19. PC Upgrade and Repair Bible Desktop Edition.pdf 20MB
  20. Mastering Active Directory for Windows Server 2003.chm 19MB
  21. Microsoft Windows XP Networking Inside Out.pdf 19MB
  22. Spring Into Linux.chm 18MB
  23. Modern Cryptography - Theory and Practice.pdf 18MB
  24. Skinning Windows XP.chm 18MB
  25. Ethereal Packet Sniffing.chm 17MB
  26. The Everyday Internet All-In-One Desk Reference For Dummies.pdf 17MB
  27. Special Ops - Host and Network Security for Microsoft, UNIX, and Oracle.pdf 17MB
  28. Steal This File Sharing Book - What They Won't Tell You About File Sharing.chm 17MB
  29. Cabling - The Complete Guide to Network Wiring.pdf 17MB
  30. Upgrading and Repairing Servers.chm 17MB
  31. Red Hat Fedora 5 Unleashed.chm 16MB
  32. Windows XP Bible.pdf 16MB
  33. Website Secrets Unleash the Power of, Google, Amazon, eBay & more.pdf 16MB
  34. The Tao of Network Security Monitoring - Beyond Intrusion Detection.chm 15MB
  35. Linux Timesaving Techniques For Dummies.pdf 15MB
  36. Security Patterns - Integrating Security and Systems Engineering.pdf 14MB
  37. Programming with Microsoft Visual C++ .NET, Sixth Edition.chm 14MB
  38. Absolute Beginners Guide To Microsoft Windows XP, Second Edition.chm 14MB
  39. CISSP - Certified Information Systems Security Professional Study Guide, Third Edition.pdf 14MB
  40. Broadband Packet Switching Technologies.pdf 14MB
  41. Steal This Computer Book 3 - What They Won't Tell You About the Internet.chm 14MB
  42. Hacking Firefox - More Than 150 Hacks, Mods, and Customizations.pdf 14MB
  43. The Hacker Ethic.pdf 13MB
  44. Windows XP for Power Users - Power Pack.pdf 13MB
  45. Hacking Windows XP.pdf 12MB
  46. Snort 2.1 - Intrusion Detection, Second Edition.pdf 12MB
  47. Microsoft Windows XP Power Toolkit.chm 12MB
  48. Linux Power Tools.chm 12MB
  49. Windows NT File System Internals - A Developers Guide.pdf 12MB
  50. Hack Proofing Linux.pdf 12MB
  51. Building DMZs for Enterprise Networks.pdf 12MB
  52. Upgrading and Repairing Networks, Fourth Edition.chm 12MB
  53. MIT Encyclopedia Of The Cognitive Sciences.pdf 12MB
  54. Hacking Wireless Networks For Dummies.pdf 11MB
  55. MS Press - Microsoft Encyclopedia of Security.pdf 10MB
  56. Winternals - Defragmentation, Recovery, and Administration Field Guide.pdf 10MB
  57. Linux Command Directory.pdf 10MB
  58. Hacking GPS.pdf 10MB
  59. C++ How to Program, Fifth Edition.chm 10MB
  60. Linux Complete Command Reference.pdf 10MB
  61. Video Conferencing Over IP - Configure, Secure, and Troubleshoot.pdf 10MB
  62. RHCE Red Hat Certified Engineer Linux Study Guide (Exam RH302), Fourth Edition.chm 10MB
  63. Practical VoIP Security.pdf 10MB
  64. FreeBSD Handbook 2006.pdf 9MB
  65. CYA - Securing Exchange Server 2003 and Outlook Web Access.pdf 9MB
  66. Microsoft Internet Security and Acceleration (ISA) Server 2004 Administrator's Pocket Consultant.chm 9MB
  67. CYA - Securing IIS 6.0.pdf 9MB
  68. IPSec VPN Design.chm 9MB
  69. Network Tutorial, Fifth Edition.chm 9MB
  70. Inside Network Perimeter Security, Second Edition.chm 9MB
  71. Computer Networks, Fourth Edition.chm 9MB
  72. Cleaning Windows XP For Dummies.pdf 8MB
  73. Hacking a Terror Network.pdf 8MB
  74. Reversing - Secrets of Reverse Engineering.pdf 8MB
  75. Microsoft IIS 6.0 Administrator's Pocket Consultant.chm 8MB
  76. Certified Ethical Hacker Exam Prep.chm 8MB
  77. Teach Yourself The C# Language in 21 Days.pdf 8MB
  78. Sniffer Pro - Network Optimization and Troubleshooting Handbook.pdf 8MB
  79. The A+ Exams Guide - (Exam 220-301, 220-302) (TestTaker's Guide Series).chm 8MB
  80. Red Hat Linux Networking and System Administration.pdf 8MB
  81. How to Cheat at Designing a Windows Server 2003 Active Directory Infrastructure.pdf 8MB
  82. Content Networking - Architecture, Protocols, and Practice.pdf 8MB
  83. Security and Usability - Designing Secure Systems that People Can Use.chm 8MB
  84. Exploiting Software - How to Break Code.pdf 8MB
  85. PC Hardware in a Nutshell, Second Edition.chm 7MB
  86. Absolute Beginner's Guide to Networking, Fourth Edition.chm 7MB
  87. Windows Forensics and Incident Recovery.chm 7MB
  88. Nessus, Snort, & Ethereal Power Tools - Customizing Open Source Security Applications.pdf 7MB
  89. Ethical Hacking & Countermeasures.pdf 7MB
  90. TCP IP Foundations.pdf 7MB
  91. Wi-Foo - The Secrets of Wireless Hacking.chm 7MB
  92. The Art of Computer Virus Research and Defense.chm 7MB
  93. Storage Networking Protocol Fundamentals.chm 7MB
  94. Insider Threat - Protecting The Enterprise From Sabotage, Spying, And Theft.pdf 7MB
  95. Sams Teach Yourself HTML in 10 Minutes, Fourth Edition.chm 6MB
  96. Malware - Fighting Malicious Code.chm 6MB
  97. Hack Attacks Revealed A Complete Reference With Custom Security Hacking Toolkit.chm 6MB
  98. Software Piracy Exposed.pdf 6MB
  99. Nagios - System and Network Monitoring.pdf 6MB
  100. Enterprise SOA - Designing IT for Business Innovation.chm 6MB
  101. Illustrated TCPIP - A Graphic Guide to the Protocol Suite.chm 6MB
  102. Solaris 10 System Administration Exam Prep.chm 6MB
  103. Programming Applications for Microsoft Windows, Fourth Edition.chm 6MB
  104. Microsoft Windows Server 2003 Administrator's Pocket Consultant.chm 6MB
  105. SUSE Linux.chm 5MB
  106. Software Requirements, Second Edition.chm 5MB
  107. Skype - The Definitive Guide.chm 5MB
  108. Buffer Overflow Attacks - Detect, Exploit, Prevent.pdf 5MB
  109. Moving to Linux - Kiss the Blue Screen of Death Goodbye!.chm 5MB
  110. O'Reilly - Google Hacks 2nd Edition.chm 5MB
  111. Ethernet Networks - Design, Implementation, Operation, Management (Fourth Edition).pdf 5MB
  112. Microsoft Windows Scripting Self-Paced Learning Guide.pdf 5MB
  113. Red Hat Linux Security and Optimization.pdf 5MB
  114. Security Assessment - Case Studies for Implementing the NSA IAM.pdf 5MB
  115. IP Storage Networking - Straight to the Core.chm 5MB
  116. Software Abstractions - Logic, Language, and Analysis.pdf 5MB
  117. Designing Storage Area Networks - A Practical Reference for Implementing Fibre Channel and IP.chm 5MB
  118. Guide To Using Google Discover Google's Buried Treasure.pdf 5MB
  119. Hackers Beware.pdf 5MB
  120. Hacker Disassembling Uncovered.chm 5MB
  121. Advanced Bash Shell Scripting Gude.pdf 5MB
  122. Stealing The Network - How To Own The Box.pdf 5MB
  123. Hack I.T. - Security Through Penetration Testing.chm 5MB
  124. Terminal Services for Microsoft Windows Server 2003 - Advanced Technical Design Guide.chm 5MB
  125. Security Warrior.chm 5MB
  126. Guide to Elliptic Curve Cryptography.pdf 4MB
  127. Learning PHP and MySQL.chm 4MB
  128. Applied Microsoft .Net Framework Programming.pdf 4MB
  129. C# Programming Primer.pdf 4MB
  130. Linux Troubleshooting for System Administrators and Power Users.chm 4MB
  131. Wireless Hacks.chm 4MB
  132. The XP Files - Windows' Hidden Tools for Secure Sharing, Communication, and Collaboration.pdf 4MB
  133. Don't Click on the Blue E!.chm 4MB
  134. The Ethical Hack - A Framework for Business Value Penetration Testing.pdf 4MB
  135. Internet Security - A Jumpstart for Systems Administrators and IT Managers.chm 4MB
  136. Fixing Windows XP Annoyances.chm 4MB
  137. Information Systems - The State of the Field.pdf 4MB
  138. Skype Hacks.chm 4MB
  139. Linux+ Certification Bible.pdf 4MB
  140. Switching to VoIP.chm 3MB
  141. LAN.pdf 3MB
  142. Bulletproof Wireless Security - GSM, UMTS, 802.11, and Ad Hoc Security (Communications Engineering).pdf 3MB
  143. Software Fortresses - Modeling Enterprise Architectures.chm 3MB
  144. Pro DNS and BIND.pdf 3MB
  145. IPv6 Network Programming.pdf 3MB
  146. Beating IT Risks.pdf 3MB
  147. The Internet and its applications.pdf 3MB
  148. IP Addressing and Subnetting, Including IPv6.chm 3MB
  149. Real 802.11 Security - Wi-Fi Protected Access and 802.11i.chm 3MB
  150. Designing and Developing Scalable IP Networks.pdf 3MB
  151. Linux Quick Fix Notebook.chm 3MB
  152. Firefox Hacks.chm 3MB
  153. Stealing the Network - How to Own a Continent.chm 3MB
  154. DNS on Windows Server 2003.chm 3MB
  155. Hacking Exposed Web Applications.pdf 3MB
  156. IPv6 Essentials.pdf 3MB
  157. Programming the Microsoft Windows Driver Model, Second Edition.chm 3MB
  158. IP in Wireless Networks.chm 3MB
  159. TCPIP.pdf 2MB
  160. Network Intrusion Detection, Third Edition.pdf 2MB
  161. Network Security with OpenSSL.pdf 2MB
  162. DNS and BIND, 5th Edition.chm 2MB
  163. UNIX Power Tools, Third Edition.chm 2MB
  164. Peer to Peer - Harnessing the Power of Disruptive Technologies.pdf 2MB
  165. Hacker's Delight.chm 2MB
  166. Intrusion Prevention Fundamentals.chm 2MB
  167. The Shellcoder's Handbook - Discovering and Exploiting Security Holes.chm 2MB
  168. Internet Denial of Service - Attack and Defense Mechanisms.chm 2MB
  169. Crypto - How the Code Rebels Beat the Government - Saving Privacy in the Digital Age.pdf 2MB
  170. Active Directory Cookbook, 2nd Edition.chm 2MB
  171. Voice Over 802.11.pdf 2MB
  172. Encryption in a Windows Environment - EFS File, 802.1x Wireless, IPSec Transport, and S-MIME Exchange.chm 2MB
  173. Network Security Assessment.chm 2MB
  174. Introduction To Algorithms 2nd Edition Solutions (Instructors.Manual).pdf 2MB
  175. Network Security Hacks.chm 2MB
  176. Sarbanes-Oxley - IT Compliance Using COBIT and Open Source Tools.chm 2MB
  177. IPSec - The New Security Standard for the Internet, Intranets, and Virtual Private Networks.chm 2MB
  178. Linux Network Administrator's Guide, Second Edition.pdf 2MB
  179. Bluetooth Security.pdf 1MB
  180. Routers and Networking.pdf 1MB
  181. Kerberos - The Definitive Guide.chm 1MB
  182. Hacking - The Art of Exploitation.chm 1MB
  183. Linux in a Nutshell, 5th Edition .chm 1MB
  184. SSL and TLS Essentials - Securing the Web.pdf 1MB
  185. Defend I.T. - Security by Example.chm 1MB
  186. Google Secrets - How To Get A Top 10 Ranking.pdf 1MB
  187. Linux Kernel Development, 2nd Edition.chm 1MB
  188. CompTIA Security+ Certification.chm 1MB
  189. Perl Medic - Transforming Legacy Code.chm 1MB
  190. 100 Linux Tips And Tricks.pdf 1MB
  191. Understanding IPv6.chm 1MB
  192. Python in A Nutshell, 2nd Edition.chm 1MB
  193. The Database Hacker's Handbook - Defending Database Servers.chm 1MB
  194. LDAP System Administration.chm 1MB
  195. The Practical Guide to HIPAA Privacy and Security Compliance.chm 1MB
  196. Securing Linux Servers for Service Providers.pdf 1MB
  197. WAN, Wide Area Networks.pdf 1MB
  198. C++ Cookbook.chm 856KB
  199. Windows Server 2003 Security Cookbook.chm 828KB
  200. Strategic Information Security.chm 825KB
  201. Groupware & Security.pdf 811KB
  202. Network Management.pdf 802KB
  203. Tripwire_exploit_poster.pdf 749KB
  204. WWW techniques.pdf 702KB
  205. Penetration Testing Templates.pdf 645KB
  206. PC networks.pdf 638KB
  207. Wireless WAN System.pdf 609KB
  208. Cross-Site Scripting.pdf 604KB
  209. ISDN - Integrated Services.pdf 582KB
  210. GSM and GPRS.pdf 577KB
  211. Hacker Web Exploitation Uncovered.chm 555KB
  212. SQL Injection, Are Your Web Applications Vulnerable.pdf 530KB
  213. Open Source Network Administration.chm 528KB
  214. Hacker's Desk Reference.pdf 522KB
  215. XP Tips & Tweaks.pdf 506KB
  216. The BitTorrent Bible.pdf 496KB
  217. Apache Phrase Book - Essential Code and Commands.chm 465KB
  218. Java.pdf 457KB
  219. Wireless and Mobile Data.pdf 444KB
  220. Open-Source Security Testing Methodology Manual.pdf 436KB
  221. Datacom overview.pdf 396KB
  222. Why Wireless Data.pdf 315KB
  223. Blindfolded SQL Injection.pdf 300KB
  224. General Guidelines On Random Query Evaluation.pdf 294KB
  225. Advanced SQL Injection In SQL Server Applications.pdf 291KB
  226. DDOS Attack Tools.pdf 286KB
  227. FAQ Network Intrusion Detection Systems.pdf 235KB
  228. ICMP Crafting and other uses.pdf 227KB
  229. Google A Hacker's Best Friend.pdf 227KB
  230. Social Engineering – A Real Story in a Multi-national Company.pdf 210KB
  231. SysAdmin - Security Tools in FreeBSD.pdf 184KB
  232. Cryptography FAQ's.txt 168KB
  233. Windows XP Services That Can Be Disabled.pdf 161KB
  234. GRC.com Denial Of Service Attack.pdf 132KB
  235. Netware Hacking.pdf 130KB
  236. Google Spamguide.pdf 112KB
  237. Detection Of Promiscuous Nodes Using ARP Packets.pdf 94KB
  238. Linux Basic Commands.pdf 75KB
  239. WebJacking.pdf 69KB
  240. How To Build A Freebsd-Stable Firewall With Ipfilter.pdf 66KB
  241. Firewalking - A Traceroute-Like Analysis of IP Packet Responses to Determine Gateway Accessing.pdf 66KB
  242. Advanced buffer overflow exploits.txt 60KB
  243. A Comparative Analysis of Methods of Defense against Buffer Overflow Attacks.pdf 53KB
  244. Defeating Sniffers and Intrusion Detection Systems.txt 51KB
  245. DNS Spoofing.txt 43KB
  246. Ethical Hacking Agreement.doc 40KB
  247. Bypassing Firewalls Tools and Techniques.pdf 35KB
  248. RSA Encryption Algorithm, a simple example.pdf 35KB
  249. Win32 Stack Based Buffer Overflow Walkthrough.txt 34KB
  250. How to write Buffer Overflows.pdf 34KB
  251. Analysis of a Telnet Session Hijack via Spoofed MAC Addresses.pdf 29KB
  252. How to develop a Network Security Policy.pdf 29KB
  253. Placing Backdoors Through Firewalls.pdf 25KB
  254. The SMB Man-In-The-Middle Attack.pdf 24KB
  255. Cisco - Password Recovery Procedures.pdf 23KB
  256. Exploiting Stack Based Buffer Overflows.txt 21KB
  257. Collection Of Various Computer Books.md5 21KB
  258. A Little Bit about Buffer Overflows.pdf 17KB
  259. Alternate Data Streams in NTFS.pdf 16KB
  260. An Example of the RSA Algorithm.pdf 16KB
  261. Methods of Hacking - Social Engineering.pdf 16KB
  262. Well Known Trojans and Their Ports.pdf 15KB
  263. Man in the Middle Attack using DHCP.txt 11KB
  264. Understanding Buffer Overruns.txt 6KB
  265. How SQL Slammer Works.txt 5KB
  266. Using Binary Search with SQL Injection.txt 5KB
  267. VBE Document Property Buffer Overflow.txt 4KB
  268. Torrent downloaded from Demonoid.com.txt 47B