589689.xyz

Hacking and Security Books from Syngress

  • 收录时间:2018-04-28 22:04:36
  • 文件大小:177MB
  • 下载次数:73
  • 最近下载:2020-12-31 17:46:12
  • 磁力链接:

文件列表

  1. Penetration Tester's Open Source Toolkit, Third Edition.pdf 17MB
  2. Dissecting the Hack.pdf 17MB
  3. Cisco CCNA CCENT Exam 640-802, 640-822, 640-816 Preparation Kit.pdf 15MB
  4. Thor's Microsoft Security Bible.pdf 15MB
  5. Cybercrime and Espionage.pdf 14MB
  6. Stealing the Network.pdf 11MB
  7. Coding for Penetration Testers.pdf 10MB
  8. Ninja Hacking.pdf 10MB
  9. Professional Penetration Testing.pdf 9MB
  10. CompTIA Network+ Certification Study Guide.pdf 7MB
  11. Seven Deadliest Network Attacks.pdf 7MB
  12. Seven Deadliest Unified Communications Attacks.pdf 6MB
  13. Managed Code Rootkits.pdf 6MB
  14. Seven Deadliest Social Network Attacks.pdf 5MB
  15. A Guide to Kernel Exploitation.pdf 5MB
  16. Seven Deadliest USB Attacks.pdf 5MB
  17. CompTIA Linux+ Certification Study Guide (2009 Exam).pdf 4MB
  18. The Basics of Hacking and Penetration Testing.pdf 4MB
  19. SQL Injection Attacks and Defense.pdf 3MB
  20. Seven Deadliest Web Application Attacks.pdf 3MB
  21. Seven Deadliest Microsoft Attacks.pdf 2MB
  22. Seven Deadliest Wireless Technologies Attacks.pdf 2MB
  23. The Basics of Hacking and Penetration Testing.jpg 36KB
  24. Dissecting the Hack.jpg 33KB
  25. Ninja Hacking.jpg 30KB
  26. Cisco CCNA CCENT Exam 640-802, 640-822, 640-816 Preparation Kit.jpg 29KB
  27. CompTIA Network+ Certification Study Guide.jpg 29KB
  28. Seven Deadliest Social Network Attacks.jpg 29KB
  29. Seven Deadliest USB Attacks.jpg 28KB
  30. Seven Deadliest Unified Communications Attacks.jpg 28KB
  31. Seven Deadliest Microsoft Attacks.jpg 26KB
  32. Seven Deadliest Network Attacks.jpg 26KB
  33. Seven Deadliest Web Application Attacks.jpg 26KB
  34. Seven Deadliest Wireless Technologies Attacks.jpg 25KB
  35. A Guide to Kernel Exploitation.jpg 24KB
  36. Cybercrime and Espionage.jpg 22KB
  37. CompTIA Linux+ Certification Study Guide (2009 Exam).jpg 21KB
  38. Penetration Tester's Open Source Toolkit, Third Edition.jpg 21KB
  39. Stealing the Network.jpg 21KB
  40. Thor's Microsoft Security Bible.jpg 20KB
  41. Coding for Penetration Testers.jpg 19KB
  42. SQL Injection Attacks and Defense.jpg 17KB
  43. Professional Penetration Testing.jpg 17KB
  44. Managed Code Rootkits.jpg 17KB