/Penetration Testing/
|
Practical Hacking Techniques & Countermeasures (2007).pdf
|
151.0 MB
|
Aggressive Network Self-Defense (2005).pdf
|
86.9 MB
|
Web Penetration Testing with Kali Linux (2013).pdf
|
20.8 MB
|
Penetration Tester's Open Source Toolkit [3rd edition] (2011).pdf
|
17.8 MB
|
Coding for Penetration Testers (2011).pdf
|
10.4 MB
|
Professional Penetration Testing (2010).pdf
|
9.3 MB
|
Hacking - The Next Generation (2009).pdf
|
9.0 MB
|
Metasploit - The Penetration Testers Guide (2011).pdf
|
7.2 MB
|
BackTrack 4 - Assuring Security by Penetration Testing (2010).pdf
|
6.5 MB
|
Metasploit Toolkit for Penetration Testing, Exploit Development, & Vulnerability Research (2007).pdf
|
5.1 MB
|
The Basics of Hacking and Penetration Testing (2011).pdf
|
3.9 MB
|
Hacknotes Linux And Unix Security Portable Reference (2003).pdf
|
3.6 MB
|
The Hacker’s Underground Handbook (2008).pdf
|
2.6 MB
|
/Software Security/
|
Sockets, Shellcode, Porting & Coding (2005).pdf
|
117.8 MB
|
The Shellcoder's Handbook [2nd edition] (2007).pdf
|
9.2 MB
|
Reversing - Secrets Of Reverse Engineering (2005).pdf
|
8.8 MB
|
Software Piracy Exposed (2005).pdf
|
6.5 MB
|
Buffer Overflow Attacks - Detect, Exploit, Prevent (2005).pdf
|
5.6 MB
|
/Operating Systems/
|
Rootkit Arsenal [2nd Edition] (2013).pdf
|
111.3 MB
|
The Rootkit Arsenal - Escape and Evasion in the Dark Corners of the System [2nd Edition] (2013).pdf
|
98.7 MB
|
Rootkit Arsenal (2009).pdf
|
85.3 MB
|
Windows Internals - Part 1 [6th edition] (2012).pdf
|
26.2 MB
|
Programming Windows [6th Edition] (2013).pdf
|
23.9 MB
|
Windows Internals - Part 2 [6th edition] (2012).pdf
|
22.7 MB
|
Advanced Windows Debugging (2008).pdf
|
9.9 MB
|
Windows 7 Device Driver (2010).pdf
|
1.8 MB
|
/Computer Programming/iOS/
|
Learning iOS Programming [3rd edition] (2013).pdf
|
97.0 MB
|
More iOS 6 Development (2013).pdf
|
55.8 MB
|
Teach Yourself iOS 5 Application Development in 24 Hours [3rd edition] (2012).pdf
|
40.0 MB
|
iOS 6 Programming Cookbook (2012).pdf
|
37.5 MB
|
iOS 5 Programming Cookbook (2012).pdf
|
26.2 MB
|
iOS 6 Recipes - A Problem-Solution Approach (2012).pdf
|
25.5 MB
|
Developing iOS Applications with Flex 4.5 (2011).pdf
|
14.2 MB
|
Programming iOS 5 [2nd edition] (2011).pdf
|
11.0 MB
|
/Information Security (General)/
|
Black Hat Physical Device Security (2005).pdf
|
82.4 MB
|
Hack Proofing Your Network [2nd edition] (2002).pdf
|
9.2 MB
|
Security Engineering [2nd edition] (2008).pdf
|
6.2 MB
|
The Myths of Security (2009).pdf
|
2.0 MB
|
Kingpin - How One Hacker Took Over the Billion-Dollar Cybercrime Underground (2011).pdf
|
1.4 MB
|
Beyond Fear - Thinking Sensibly About Security in an Uncertain World (2003).pdf
|
1.1 MB
|
/Computer Programming/
|
Super Scratch Programming Adventure! Learn to Program By Making Cool Games (2012).pdf
|
77.5 MB
|
Introduction to the Theory of Computation [2nd edition] (2006).pdf
|
21.6 MB
|
Hello World! - Computer Programming for Kids and Other Beginners (2009).pdf
|
18.9 MB
|
The C Programming Language [2nd edition] (1988).pdf
|
13.8 MB
|
The Art Of Debugging With GDB, DDD, and Eclipse (2008).pdf
|
9.5 MB
|
C How To Program [6th Edition] (2010).pdf
|
9.1 MB
|
Ruby by Example - Concepts and Code (2007).pdf
|
6.7 MB
|
theForger's Win32 API Tutorial (2003).pdf
|
408.6 KB
|
/Software Security/Vulnerability Research/
|
Fuzzing - Brute Force Vulnerability Discovery (2007).pdf
|
58.2 MB
|
The IDA Pro Book (2008).pdf
|
27.1 MB
|
The IDA Pro Book [2nd edition] (2011).pdf
|
9.7 MB
|
A Guide to Kernel Exploitation (2011).pdf
|
5.5 MB
|
A Bug Hunter's Diary (2011).pdf
|
5.4 MB
|
Fuzzing for Software Security Testing and Quality Assurance (2008).pdf
|
4.7 MB
|
Open Source Fuzzing Tools (2007).pdf
|
4.4 MB
|
/Computer Programming/Android/
|
Android Apps for Absolute Beginners [2nd edition] (2012).pdf
|
41.9 MB
|
OpenGL ES 2 for Android - A Quick-Start Guide (2013).pdf
|
32.1 MB
|
Beginning Android Application Development (2011).pdf
|
22.8 MB
|
Android in Action (2011).pdf
|
19.1 MB
|
Android for Programmers - An App-Driven Approach (2012).pdf
|
16.0 MB
|
Professional Android Application Development (2009).pdf
|
11.1 MB
|
Learn Java for Android Development (2010).pdf
|
9.5 MB
|
Designing for Android (2012).pdf
|
8.9 MB
|
Android Programming Tutorials (2011).pdf
|
7.0 MB
|
Hello, Android - Introducing Google's Mobile Development Platform (2008).pdf
|
6.7 MB
|
Expert Android (2013).pdf
|
5.9 MB
|
The Business of Android Apps Development [2nd edition] (2013).pdf
|
5.3 MB
|
Learn Java for Android Development [2nd edition] (2013).pdf
|
4.1 MB
|
/Malware Research/
|
Malicious Cryptography - Exposing Cryptovirology (2004).pdf
|
30.5 MB
|
Malware Forensics - Investigating & Analyzing Malicious Code (2008).pdf
|
26.2 MB
|
Malware Detection (2007).pdf
|
19.4 MB
|
Computer Viruses & Malware (2006).pdf
|
11.3 MB
|
Hacking Exposed - Malware & Rootkits (2010).pdf
|
10.9 MB
|
Practical Malware Analysis (2012).pdf
|
9.9 MB
|
Malware Analyst's Cookbook (2011).pdf
|
9.4 MB
|
Botnets - The Killer Web App (2007).pdf
|
7.3 MB
|
Mobile Malware Attacks and Defense (2009).pdf
|
7.1 MB
|
The Giant Black Boot of Computer Viruses (1995).pdf
|
6.0 MB
|
AVIEN Malware Defense Guide for the Enterprise (2007).pdf
|
6.0 MB
|
Defense & Detection Strategies against Internet Worms (2004).pdf
|
3.0 MB
|
Stuxnet Malware Analysis Paper (2011).pdf
|
2.3 MB
|
The Little Black Book of Computer Viruses (1990).pdf
|
1.5 MB
|
/Lockpicking/
|
Practical Lock Picking [2nd Edition] (2012).pdf
|
30.1 MB
|
Keys to the Kingdom (2012).pdf
|
28.4 MB
|
Practical Lock Picking (2010).pdf
|
20.1 MB
|
Master Locksmithing (2008).pdf
|
18.6 MB
|
Opening Locks By Bumping In Five Seconds Or Less (2006).pdf
|
3.3 MB
|
Bumping locks (2005).pdf
|
556.9 KB
|
MIT Guide to Lock Picking (1991).pdf
|
521.1 KB
|
/Intelligence Agencies/
|
By Way of Deception (1990).pdf
|
27.7 MB
|
Secret Power (1996).pdf
|
23.4 MB
|
Shadow Factory (2008).pdf
|
1.3 MB
|
The Big Breach (2001).pdf
|
1.3 MB
|
/Computer Programming/Python/
|
Python - How to Program (2001).pdf
|
26.2 MB
|
Beginning Python - From Novice to Pro (2005).pdf
|
13.9 MB
|
Violent Python - A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers (2012).pdf
|
8.2 MB
|
Hacking Secret Ciphers with Python (2013).pdf
|
6.9 MB
|
Invent Your Own Computer Games with Python [2nd edition] (2010).pdf
|
5.1 MB
|
The Quick Python Book [2nd edition] (2010).pdf
|
4.6 MB
|
Making Games with Python & Pygame [2nd edition] (2012).pdf
|
4.5 MB
|
Dive Into Python (2004).pdf
|
1.3 MB
|
Think Python - How to Think Like A Computer Scientist (2012).pdf
|
884.6 KB
|
/Digital Forensics/
|
iOS Forensic Analysis (2010).pdf
|
25.1 MB
|
Hacking Exposed - Computer Forensics [2nd edition] (2010).pdf
|
12.2 MB
|
Forensic Computing - A Practitioner's Guide [2nd edition] (2007).pdf
|
10.0 MB
|
iPhone and iOS Forensics (2011).pdf
|
9.2 MB
|
Windows Forensic Analysis DVD Toolkit [2nd edition] (2009).pdf
|
6.2 MB
|
CD And DVD Forensics (2006).pdf
|
5.4 MB
|
Windows Forensic Analysis DVD Toolkit (2007).pdf
|
4.5 MB
|
Windows Registry Forensics (2011).pdf
|
3.8 MB
|
/Cryptology/Mathematics/
|
Topics in Algebra (1964).pdf
|
20.6 MB
|
/Cryptology/
|
Applied Cryptanalysis (2007).pdf
|
19.6 MB
|
Cryptography - Theory and Practice [3rd edition] (2006).pdf
|
17.4 MB
|
Machine Cryptography and Modern Cryptanalysis [Abridged, Chapters 2-4-5 only] (1985).pdf
|
16.4 MB
|
Computer Security and Cryptography (2007).pdf
|
14.8 MB
|
Decrypted Secrets - Methods and Maxims of Cryptology [4th edition] (2007).pdf
|
12.9 MB
|
Basic Cryptanalysis (1990).pdf
|
10.4 MB
|
Military Cryptanalysis - Part IV - Transposition And Fractionating Systems (1939).pdf
|
9.8 MB
|
A Classical Introduction to Cryptography Exercise Book (2006).pdf
|
9.4 MB
|
Military Cryptanalysis - Part I - Monoalphabetic Substitution Systems (1939).pdf
|
7.7 MB
|
The Code Book (1999).pdf
|
7.6 MB
|
Military Cryptanalysis - Part III - Simpler Varieties Of Aperiodic Substitution Systems (1939).pdf
|
6.3 MB
|
Military Cryptanalysis - Part II - Simpler Varieties Of Polyalphabetic Substitution Systems (1939).pdf
|
6.0 MB
|
Manual for the Solution of Military Ciphers (1916).pdf
|
5.9 MB
|
The Index Of Coincidence And Its Applications In Cryptanalysis (1922).pdf
|
5.6 MB
|
Cryptology Unlocked (2007).pdf
|
4.9 MB
|
Brute Force - Cracking the Data Encryption Standard (2005).pdf
|
2.0 MB
|
Algebraic Cryptanalysis (2009).pdf
|
1.8 MB
|
The Codebreakers - The Story of Secret Writing [Abridged] (1973).pdf
|
1.5 MB
|
Codes and Ciphers - Julius Caesar, the Enigma, and the Internet (2001).pdf
|
1.3 MB
|
/Wireless Security/
|
Wireless Security Handbook (2006).pdf
|
18.0 MB
|
RFID Security (2006).pdf
|
6.2 MB
|
/Information & Coding Theory/
|
Error Control Coding (2002).pdf
|
17.8 MB
|
Information Theory and Statistics (1968).pdf
|
16.9 MB
|
The Art of Error Correcting Coding [2nd Edition] (2006).pdf
|
2.3 MB
|
Communication Theory of Secrecy Systems (1949).pdf
|
562.6 KB
|
A Mathematical Theory of Communication (1948).pdf
|
366.3 KB
|
/Information Security (Fiction)/
|
Dissecting the Hack (2010).pdf
|
17.4 MB
|
Stealing the Network - How to Own A Shadow (2007).pdf
|
9.6 MB
|
Stealing the Network - How to Own an Identity (2005).pdf
|
8.1 MB
|
Stealing the Network - How to Own the Box (2003).pdf
|
4.8 MB
|
Zero-Day Exploit - Countdown to Darkness (2004).pdf
|
3.9 MB
|
/Network Security & Tools/
|
Practical Packet Analysis [2nd edition] (2011).pdf
|
16.8 MB
|
Snort 2.1 Intrusion Detection [2nd edition] (2004).pdf
|
12.7 MB
|
Hack the Stack - Using Snort and Ethereal to Master the 8 Layers of an Insecure Network (2006).pdf
|
11.9 MB
|
How to Cheat at Configuring Open Source Security Tools (2007).pdf
|
8.0 MB
|
Nmap Cookbook (2010).pdf
|
6.6 MB
|
Your Botnet is My Botnet - Analysis of a Botnet Takeover (2009).pdf
|
943.9 KB
|
/Social Engineering/Personal Protection/
|
The Big Book of Secret Hiding Places (1987).pdf
|
14.3 MB
|
How To be Invisible - The Essential Guide to Protecting Your Personal Privacy (2004).pdf
|
5.6 MB
|
What Every BODY Is Saying (2007).pdf
|
2.8 MB
|
Executive's Guide to Personal Security (2003).pdf
|
1.8 MB
|
Never Be Lied to Again (1999).pdf
|
677.5 KB
|
/Web Security/
|
The Web Application Hackers Handbook [2nd edition] (2011).pdf
|
14.2 MB
|
The Web Application Hackers Handbook (2008).pdf
|
11.5 MB
|
SQL Injection Attacks and Defense [2nd edition] (2012).pdf
|
6.7 MB
|
XSS Attacks - Cross Site Scripting Exploits & Defense (2007).pdf
|
6.5 MB
|
/Penetration Testing/Hacking/
|
Gray Hat Hacking - The Ethical Hacker's Handbook [2nd edition] (2008).pdf
|
13.2 MB
|
Gray Hat Hacking - The Ethical Hacker's Handbook [3rd edition] (2011).pdf
|
12.8 MB
|
Hacking Exposed - Network Security Secrets & Solutions [2nd edition] (2001).pdf
|
8.4 MB
|
Hacking Exposed - Windows [3rd edition] (2008).pdf
|
6.3 MB
|
Hacking - The Art of Exploitation [2nd edition] (2008).pdf
|
4.6 MB
|
Gray Hat Python (2009).pdf
|
3.2 MB
|
/Mental Exercise & Other Tests/
|
Test Your EQ Assess Your Emotional Intelligence with 20 Personality Questionnaires (2009).pdf
|
12.2 MB
|
Math Puzzles and Games - Grades 6-8 (2009).pdf
|
7.3 MB
|
IQ Gym - Grow Your Mind (2008).pdf
|
7.2 MB
|
Mathematical Teasers (1970).pdf
|
4.5 MB
|
World's 200 Hardest Brain Teasers (2010).pdf
|
3.8 MB
|
Career, Aptitude and Selection Tests Match Your IQ, Personality and Abilities to Your Ideal Career [2nd Edition] (2006).pdf
|
1.5 MB
|
The Psychologist's Book of Personality Tests (2001).pdf
|
1.1 MB
|
Meyers-Briggs Type Indicator Lite Test (2012).pdf
|
694.3 KB
|
/Social Engineering/
|
Social Engineering - The Art of Human Hacking (2011).pdf
|
11.0 MB
|
Ninja Hacking - Unconventional Penetration Testing (2011).pdf
|
10.3 MB
|
The Art of Intrusion (2005).pdf
|
3.2 MB
|
Unauthorised Access (2009).pdf
|
2.8 MB
|
The Art of Deception (2002).pdf
|
1.6 MB
|
/Mobile App Security/
|
Hacking and Securing iOS Applications (2012).pdf
|
10.7 MB
|
Android Apps Security (2012).pdf
|
6.6 MB
|
/VPN Security/
|
A Technical Guide to IPSec Virtual Private Networks (2001).pdf
|
7.1 MB
|
/Digital Forensics/Cybercrime/
|
Fighting Computer Crime-A New Framework for Protecting Information (1998).pdf
|
1.9 MB
|
Total files 180
|