/
|
(EBOOK - ENG - TELECOMUNICAZIONI) Wiley - The UMTS Network and Radio Access Technology - Air Interface Techniques for Future Mobile Systems.pdf
|
8.1 MB
|
(ebook pdf) Teach Yourself TCP-IP in 14 Days 2nd Edition.pdf
|
1.4 MB
|
100 Linux Tips And Tricks.pdf
|
1.2 MB
|
A Comparative Analysis of Methods of Defense against Buffer Overflow Attacks.pdf
|
54.2 KB
|
A Little Bit about Buffer Overflows.pdf
|
17.2 KB
|
Absolute Beginner's Guide to Networking, Fourth Edition.chm
|
7.5 MB
|
Absolute Beginners Guide To Microsoft Windows XP, Second Edition.chm
|
14.9 MB
|
Active Directory Cookbook, 2nd Edition.chm
|
2.1 MB
|
Advanced Bash Shell Scripting Gude.pdf
|
4.8 MB
|
Advanced SQL Injection In SQL Server Applications.pdf
|
298.0 KB
|
Advanced Wireless Networks - 4G Technologies.pdf
|
21.9 MB
|
Alternate Data Streams in NTFS.pdf
|
16.8 KB
|
An Example of the RSA Algorithm.pdf
|
16.4 KB
|
Analysis of a Telnet Session Hijack via Spoofed MAC Addresses.pdf
|
29.6 KB
|
Anti-Hacker Tool Kit, Second Edition.chm
|
30.2 MB
|
Apache Phrase Book - Essential Code and Commands.chm
|
476.6 KB
|
Applied Microsoft .Net Framework Programming.pdf
|
4.4 MB
|
Beating IT Risks.pdf
|
3.2 MB
|
Blindfolded SQL Injection.pdf
|
306.7 KB
|
Bluetooth Security.pdf
|
1.6 MB
|
Broadband Packet Switching Technologies.pdf
|
14.9 MB
|
Broadband Telecommunications Handbook.pdf
|
48.3 MB
|
Buffer Overflow Attacks - Detect, Exploit, Prevent.pdf
|
5.6 MB
|
Building DMZs for Enterprise Networks.pdf
|
12.2 MB
|
Bulletproof Wireless Security - GSM, UMTS, 802.11, and Ad Hoc Security (Communications Engineering).pdf
|
3.5 MB
|
Bypassing Firewalls Tools and Techniques.pdf
|
36.3 KB
|
C# Programming Primer.pdf
|
4.3 MB
|
C++ Cookbook.chm
|
876.8 KB
|
C++ How to Program, Fifth Edition.chm
|
10.7 MB
|
Cabling - The Complete Guide to Network Wiring.pdf
|
17.5 MB
|
Certified Ethical Hacker Exam Prep.chm
|
8.7 MB
|
Cisco - Password Recovery Procedures.pdf
|
23.8 KB
|
CISSP - Certified Information Systems Security Professional Study Guide, Third Edition.pdf
|
14.9 MB
|
Cleaning Windows XP For Dummies.pdf
|
8.9 MB
|
CompTIA Security+ Certification.chm
|
1.3 MB
|
Computer Networks, Fourth Edition.chm
|
9.0 MB
|
Content Networking - Architecture, Protocols, and Practice.pdf
|
8.1 MB
|
Coreldraw 12 The Official Guide.pdf
|
17.8 MB
|
Cross-Site Scripting.pdf
|
618.3 KB
|
Crypto - How the Code Rebels Beat the Government - Saving Privacy in the Digital Age.pdf
|
2.1 MB
|
CYA - Securing Exchange Server 2003 and Outlook Web Access.pdf
|
9.6 MB
|
CYA - Securing IIS 6.0.pdf
|
9.3 MB
|
Cyber Terrorism - Political And Economic Implications.pdf
|
25.4 MB
|
Datacom overview.pdf
|
405.8 KB
|
DDOS Attack Tools.pdf
|
292.8 KB
|
Defend I.T. - Security by Example.chm
|
1.4 MB
|
Designing and Developing Scalable IP Networks.pdf
|
2.9 MB
|
Designing Storage Area Networks - A Practical Reference for Implementing Fibre Channel and IP.chm
|
5.2 MB
|
Detection Of Promiscuous Nodes Using ARP Packets.pdf
|
95.9 KB
|
Digital Design with CPLD Applications %26 VHDL %28Delmar%29.pdf
|
9.0 MB
|
DNS and BIND, 5th Edition.chm
|
2.5 MB
|
DNS on Windows Server 2003.chm
|
2.8 MB
|
Don't Click on the Blue E!.chm
|
4.1 MB
|
Ebook - Math - Boyce, DiPrima. Elementary Differential Equations (Interactive learning edition, Wiley, 7ed., 2001)(1310s).pdf
|
10.5 MB
|
Encryption in a Windows Environment - EFS File, 802.1x Wireless, IPSec Transport, and S-MIME Exchange.chm
|
1.9 MB
|
Enterprise SOA - Designing IT for Business Innovation.chm
|
6.5 MB
|
Ethereal Packet Sniffing.chm
|
17.9 MB
|
Ethernet Networks - Design, Implementation, Operation, Management (Fourth Edition).pdf
|
5.4 MB
|
Ethical Hacking & Countermeasures.pdf
|
7.4 MB
|
Exploiting Software - How to Break Code.pdf
|
8.0 MB
|
FAQ Network Intrusion Detection Systems.pdf
|
241.1 KB
|
Finite Difference and Spectral Methods for Ordinary and Partial Differential Equations - Trefethen.pdf
|
2.9 MB
|
Firefox Hacks.chm
|
2.9 MB
|
Firewalking - A Traceroute-Like Analysis of IP Packet Responses to Determine Gateway Accessing.pdf
|
67.8 KB
|
Fixing Windows XP Annoyances.chm
|
4.0 MB
|
FreeBSD Handbook 2006.pdf
|
9.6 MB
|
Freeman, 1999. Fundamentals of Telecommunications.pdf
|
7.1 MB
|
Fundamentals Of Wireless Communication.pdf
|
10.3 MB
|
General Guidelines On Random Query Evaluation.pdf
|
301.2 KB
|
Google A Hacker's Best Friend.pdf
|
232.5 KB
|
Google Hacking for Penetration Testers.pdf
|
33.8 MB
|
Google Secrets - How To Get A Top 10 Ranking.pdf
|
1.4 MB
|
Google Spamguide.pdf
|
114.9 KB
|
GRC.com Denial Of Service Attack.pdf
|
135.1 KB
|
Groupware & Security.pdf
|
830.4 KB
|
GSM and GPRS.pdf
|
590.7 KB
|
Guide to Elliptic Curve Cryptography.pdf
|
4.6 MB
|
Guide To Using Google Discover Google's Buried Treasure.pdf
|
5.1 MB
|
Hack Attacks Revealed A Complete Reference With Custom Security Hacking Toolkit.chm
|
6.6 MB
|
Hack I.T. - Security Through Penetration Testing.chm
|
4.8 MB
|
Hack Proofing Linux.pdf
|
12.4 MB
|
Hacker Disassembling Uncovered.chm
|
5.0 MB
|
Hacker Web Exploitation Uncovered.chm
|
568.3 KB
|
Hacker's Delight.chm
|
2.2 MB
|
Hacker's Desk Reference.pdf
|
534.1 KB
|
Hackers Beware.pdf
|
5.1 MB
|
Hacking - The Art of Exploitation.chm
|
1.5 MB
|
Hacking a Terror Network.pdf
|
8.9 MB
|
Hacking Exposed Web Applications.pdf
|
2.8 MB
|
Hacking Firefox - More Than 150 Hacks, Mods, and Customizations.pdf
|
14.3 MB
|
Hacking GPS.pdf
|
10.8 MB
|
Hacking Windows XP.pdf
|
12.7 MB
|
Hacking Wireless Networks For Dummies.pdf
|
11.5 MB
|
How To Build A Freebsd-Stable Firewall With Ipfilter.pdf
|
68.1 KB
|
How to Cheat at Designing a Windows Server 2003 Active Directory Infrastructure.pdf
|
8.1 MB
|
How to develop a Network Security Policy.pdf
|
29.4 KB
|
How to write Buffer Overflows.pdf
|
34.3 KB
|
ICMP Crafting and other uses.pdf
|
232.7 KB
|
ieee_2002_vhdl_ref_manual.pdf
|
1.8 MB
|
ieee_2004_vhdl_ref_manual.pdf
|
1.7 MB
|
IGI.Global.Advances.in.Machine.Learning.Applications.in.Software.Engineering.Feb.2007.eBook-LinG.pdf
|
12.9 MB
|
Illustrated TCPIP - A Graphic Guide to the Protocol Suite.chm
|
6.2 MB
|
Illustrated Windows XP 101 Hot Tips.pdf
|
59.1 MB
|
Information Security Management Handbook, Fifth Edition.pdf
|
45.0 MB
|
Information Systems - The State of the Field.pdf
|
3.9 MB
|
Inside Network Perimeter Security, Second Edition.chm
|
9.0 MB
|
Insider Threat - Protecting The Enterprise From Sabotage, Spying, And Theft.pdf
|
7.0 MB
|
Internet Denial of Service - Attack and Defense Mechanisms.chm
|
2.2 MB
|
Internet Security - A Jumpstart for Systems Administrators and IT Managers.chm
|
4.0 MB
|
Introduction To Algorithms 2nd Edition Solutions (Instructors.Manual).pdf
|
1.7 MB
|
Intrusion Prevention Fundamentals.chm
|
2.2 MB
|
IP Addressing and Subnetting, Including IPv6.chm
|
3.1 MB
|
IP in Wireless Networks.chm
|
2.7 MB
|
IP Storage Networking - Straight to the Core.chm
|
5.2 MB
|
IPSec - The New Security Standard for the Internet, Intranets, and Virtual Private Networks.chm
|
1.6 MB
|
IPSec VPN Design.chm
|
9.3 MB
|
IPv6 Essentials.pdf
|
2.8 MB
|
IPv6 Network Programming.pdf
|
3.3 MB
|
ISDN - Integrated Services.pdf
|
595.9 KB
|
Java.pdf
|
468.3 KB
|
John.Wiley.and.Sons.Wireless.Communications.over.MIMO.Channels.Sep.2006.pdf
|
6.1 MB
|
Kerberos - The Definitive Guide.chm
|
1.5 MB
|
LAN.pdf
|
3.5 MB
|
LDAP System Administration.chm
|
1.2 MB
|
Learning PHP and MySQL.chm
|
4.4 MB
|
Linux Basic Commands.pdf
|
76.7 KB
|
Linux Command Directory.pdf
|
10.9 MB
|
Linux Complete Command Reference.pdf
|
10.6 MB
|
Linux in a Nutshell, 5th Edition .chm
|
1.4 MB
|
Linux Kernel Development, 2nd Edition.chm
|
1.3 MB
|
Linux Network Administrator's Guide, Second Edition.pdf
|
1.6 MB
|
Linux Power Tools.chm
|
12.6 MB
|
Linux Quick Fix Notebook.chm
|
2.9 MB
|
Linux Server Hacks.pdf
|
35.7 MB
|
Linux Timesaving Techniques For Dummies.pdf
|
16.0 MB
|
Linux Troubleshooting for System Administrators and Power Users.chm
|
4.3 MB
|
Linux+ Certification Bible.pdf
|
3.8 MB
|
Malware - Fighting Malicious Code.chm
|
6.7 MB
|
Mastering Active Directory for Windows Server 2003.chm
|
19.8 MB
|
McGraw-Hill Science, Engineering, Math - Digital Communications - John Proakis - 4 edition (August 15, 2000) - ISBN 0072321113a.pdf
|
19.6 MB
|
Methods of Hacking - Social Engineering.pdf
|
16.0 KB
|
Microsoft IIS 6.0 Administrator's Pocket Consultant.chm
|
8.7 MB
|
Microsoft Internet Security and Acceleration (ISA) Server 2004 Administrator's Pocket Consultant.chm
|
9.4 MB
|
Microsoft SQL Server 2005 Implementation and Maintenance.pdf
|
27.9 MB
|
Microsoft Windows Scripting Self-Paced Learning Guide.pdf
|
5.4 MB
|
Microsoft Windows Server 2003 Administrator's Pocket Consultant.chm
|
6.0 MB
|
Microsoft Windows XP Networking Inside Out.pdf
|
19.5 MB
|
Microsoft Windows XP Power Toolkit.chm
|
12.7 MB
|
MIT Encyclopedia Of The Cognitive Sciences.pdf
|
12.1 MB
|
Modern Cryptography - Theory and Practice.pdf
|
18.7 MB
|
Moving to Linux - Kiss the Blue Screen of Death Goodbye!.chm
|
5.6 MB
|
MS Press - Microsoft Encyclopedia of Security.pdf
|
11.0 MB
|
MS Press Windows Server 2003 Administrators Companion 2nd Edition March 2006.pdf
|
22.6 MB
|
Nagios - System and Network Monitoring.pdf
|
6.5 MB
|
Nessus, Snort, & Ethereal Power Tools - Customizing Open Source Security Applications.pdf
|
7.5 MB
|
Netware Hacking.pdf
|
132.7 KB
|
Network Intrusion Detection, Third Edition.pdf
|
2.6 MB
|
Network Management.pdf
|
821.0 KB
|
Network Security Assessment.chm
|
1.8 MB
|
Network Security Hacks.chm
|
1.7 MB
|
Network Security with OpenSSL.pdf
|
2.5 MB
|
Network Tutorial, Fifth Edition.chm
|
9.1 MB
|
O'Reilly - Google Hacks 2nd Edition.chm
|
5.5 MB
|
Open Source Network Administration.chm
|
540.6 KB
|
Open-Source Security Testing Methodology Manual.pdf
|
446.8 KB
|
PC Disaster and Recovery.chm
|
26.3 MB
|
PC Hardware in a Nutshell, Second Edition.chm
|
7.6 MB
|
PC networks.pdf
|
653.5 KB
|
PC Upgrade and Repair Bible Desktop Edition.pdf
|
20.7 MB
|
Peer to Peer - Harnessing the Power of Disruptive Technologies.pdf
|
2.2 MB
|
Penetration Testing Templates.pdf
|
660.9 KB
|
Perl Medic - Transforming Legacy Code.chm
|
1.3 MB
|
php.pdf
|
2.6 MB
|
Placing Backdoors Through Firewalls.pdf
|
26.0 KB
|
Practical VoIP Security.pdf
|
10.2 MB
|
Pro DNS and BIND.pdf
|
3.3 MB
|
Programming Applications for Microsoft Windows, Fourth Edition.chm
|
6.0 MB
|
Programming the Microsoft Windows Driver Model, Second Edition.chm
|
2.7 MB
|
Programming with Microsoft Visual C++ .NET, Sixth Edition.chm
|
14.9 MB
|
Python in A Nutshell, 2nd Edition.chm
|
1.2 MB
|
Real 802.11 Security - Wi-Fi Protected Access and 802.11i.chm
|
3.1 MB
|
Red Hat Fedora 5 Unleashed.chm
|
16.9 MB
|
Red Hat Linux Networking and System Administration.pdf
|
8.2 MB
|
Red Hat Linux Security and Optimization.pdf
|
5.4 MB
|
Reversing - Secrets of Reverse Engineering.pdf
|
8.8 MB
|
RHCE Red Hat Certified Engineer Linux Study Guide (Exam RH302), Fourth Edition.chm
|
10.6 MB
|
Routers and Networking.pdf
|
1.5 MB
|
RSA Encryption Algorithm, a simple example.pdf
|
35.6 KB
|
Sams Teach Yourself HTML in 10 Minutes, Fourth Edition.chm
|
6.8 MB
|
Sams Teach Yourself Microsoft SQL Server 2005 Express in 24 Hours.chm
|
31.6 MB
|
Sarbanes-Oxley - IT Compliance Using COBIT and Open Source Tools.chm
|
1.7 MB
|
Securing Linux Servers for Service Providers.pdf
|
1.1 MB
|
Security and Usability - Designing Secure Systems that People Can Use.chm
|
8.0 MB
|
Security Assessment - Case Studies for Implementing the NSA IAM.pdf
|
5.2 MB
|
Security Patterns - Integrating Security and Systems Engineering.pdf
|
15.0 MB
|
Security Warrior.chm
|
4.7 MB
|
Skinning Windows XP.chm
|
18.4 MB
|
Skype - The Definitive Guide.chm
|
5.6 MB
|
Skype Hacks.chm
|
3.9 MB
|
Sniffer Pro - Network Optimization and Troubleshooting Handbook.pdf
|
8.4 MB
|
Snort 2.1 - Intrusion Detection, Second Edition.pdf
|
12.7 MB
|
Social Engineering – A Real Story in a Multi-national Company.pdf
|
215.1 KB
|
Software Abstractions - Logic, Language, and Analysis.pdf
|
5.2 MB
|
Software Fortresses - Modeling Enterprise Architectures.chm
|
3.3 MB
|
Software Piracy Exposed.pdf
|
6.5 MB
|
Software Requirements, Second Edition.chm
|
5.7 MB
|
Solaris 10 System Administration Exam Prep.chm
|
6.2 MB
|
Special Ops - Host and Network Security for Microsoft, UNIX, and Oracle.pdf
|
17.8 MB
|
Spring Into Linux.chm
|
19.3 MB
|
SQL Injection, Are Your Web Applications Vulnerable.pdf
|
542.5 KB
|
SSL and TLS Essentials - Securing the Web.pdf
|
1.4 MB
|
Steal This Computer Book 3 - What They Won't Tell You About the Internet.chm
|
14.4 MB
|
Steal This File Sharing Book - What They Won't Tell You About File Sharing.chm
|
17.7 MB
|
Stealing the Network - How to Own a Continent.chm
|
2.9 MB
|
Stealing The Network - How To Own The Box.pdf
|
4.8 MB
|
Storage Networking Protocol Fundamentals.chm
|
7.0 MB
|
Strategic Information Security.chm
|
844.5 KB
|
SUSE Linux.chm
|
5.7 MB
|
Switching to VoIP.chm
|
3.6 MB
|
SysAdmin - Security Tools in FreeBSD.pdf
|
188.1 KB
|
TCP IP Foundations.pdf
|
7.1 MB
|
TCPIP.pdf
|
2.6 MB
|
TDD-CDMA for Wireless Communications by Riaz Esmailzadeh Masao Nakagawa.pdf
|
2.5 MB
|
Teach Yourself The C# Language in 21 Days.pdf
|
8.5 MB
|
Terminal Services for Microsoft Windows Server 2003 - Advanced Technical Design Guide.chm
|
4.8 MB
|
The A+ Certification and PC Repair Handbook.chm
|
28.9 MB
|
The A+ Exams Guide - (Exam 220-301, 220-302) (TestTaker's Guide Series).chm
|
8.2 MB
|
The Art of Computer Virus Research and Defense.chm
|
7.0 MB
|
The Best Damn Firewall Book Period.pdf
|
22.6 MB
|
The Best Damn Windows Server 2003 Book Period.pdf
|
22.4 MB
|
The BitTorrent Bible.pdf
|
507.4 KB
|
The Database Hacker's Handbook - Defending Database Servers.chm
|
1.2 MB
|
The Ethical Hack - A Framework for Business Value Penetration Testing.pdf
|
4.1 MB
|
The Everyday Internet All-In-One Desk Reference For Dummies.pdf
|
17.8 MB
|
The Hacker Ethic.pdf
|
13.9 MB
|
The Internet and its applications.pdf
|
3.2 MB
|
The Practical Guide to HIPAA Privacy and Security Compliance.chm
|
1.1 MB
|
The Shellcoder's Handbook - Discovering and Exploiting Security Holes.chm
|
2.2 MB
|
The SMB Man-In-The-Middle Attack.pdf
|
24.7 KB
|
The Tao of Network Security Monitoring - Beyond Intrusion Detection.chm
|
16.2 MB
|
The XP Files - Windows' Hidden Tools for Secure Sharing, Communication, and Collaboration.pdf
|
4.2 MB
|
Tripwire_exploit_poster.pdf
|
767.2 KB
|
Understanding IPv6.chm
|
1.2 MB
|
UNIX Power Tools, Third Edition.chm
|
2.3 MB
|
Upgrading and Repairing Networks, Fourth Edition.chm
|
12.2 MB
|
Upgrading and Repairing Pcs, 17th Edition.chm
|
25.0 MB
|
Upgrading and Repairing Servers.chm
|
17.4 MB
|
VHDL Beginners Book.pdf
|
8.4 MB
|
VHDL examples.pdf
|
342.9 KB
|
VHDL Reference Manual.pdf
|
1.5 MB
|
VHDL.pdf
|
688.9 KB
|
Video Conferencing Over IP - Configure, Secure, and Troubleshoot.pdf
|
10.6 MB
|
Voice Over 802.11.pdf
|
2.0 MB
|
WAN, Wide Area Networks.pdf
|
1.1 MB
|
WarDriving Drive, Detect, Defend - A Guide to Wireless Security.chm
|
38.9 MB
|
WebJacking.pdf
|
71.1 KB
|
Website Secrets Unleash the Power of, Google, Amazon, eBay & more.pdf
|
16.4 MB
|
Well Known Trojans and Their Ports.pdf
|
15.4 KB
|
Why Wireless Data.pdf
|
322.7 KB
|
Wi-Foo - The Secrets of Wireless Hacking.chm
|
7.1 MB
|
Windows Forensics and Incident Recovery.chm
|
7.5 MB
|
Windows NT File System Internals - A Developers Guide.pdf
|
12.4 MB
|
Windows Server 2003 Security Cookbook.chm
|
848.4 KB
|
Windows Server 2003 Security Infrastructures - Core Security Features.chm
|
28.1 MB
|
Windows XP Bible.pdf
|
16.8 MB
|
Windows XP for Power Users - Power Pack.pdf
|
13.2 MB
|
Windows XP Services That Can Be Disabled.pdf
|
164.7 KB
|
Winternals - Defragmentation, Recovery, and Administration Field Guide.pdf
|
11.0 MB
|
Wireless and Mobile Data.pdf
|
455.1 KB
|
Wireless Communications by Andrea Goldmsith.pdf
|
3.5 MB
|
Wireless Communications.pdf
|
50.8 MB
|
Wireless Hacking - The Invisible Network.pdf
|
336.2 KB
|
Wireless Hacks.chm
|
4.2 MB
|
Wireless Technologies.pdf
|
462.8 KB
|
Wireless WAN System.pdf
|
623.9 KB
|
wireless-communication-technologies.pdf
|
210.3 KB
|
WWW techniques.pdf
|
719.0 KB
|
XP Tips & Tweaks.pdf
|
517.6 KB
|
[ ITA ] Nozioni fondamentali sui router.pdf
|
217.6 KB
|
Total files 279
|