FileMood

Download Cyber Security literature

Cyber Security literature

Name

Cyber Security literature

 DOWNLOAD Copy Link

Total Size

4.0 GB

Total Files

361

Last Seen

2024-11-07 23:39

Hash

4486A2E261F7F667139FDA92B36E71ED4CDB4057

/Cyber Security literature Part 1/

19 Deadly Sins of Software Security Programming Flaws and How to Fix Them Security One off .chm

1.4 MB

24 Deadly Sins of Software Security Programming Flaws and How to Fix Them.pdf

2.6 MB

A Bug Hunter 039 s Diary A Guided Tour Through the Wilds of Software Security.pdf

5.4 MB

A Comparative Analysis of Methods of Defense against Buffer Overflow Attacks.pdf

54.2 KB

A Guide to Kernel Exploitation Attacking the Core.pdf

5.5 MB

Absolute OpenBSD UNIX for the Practical Paranoid.pdf

1.5 MB

Anti Hacker Tool Kit Third Edition.chm

36.1 MB

Apache the Definitive Guide 2nd Edition.pdf

3.0 MB

Applied Oracle Security Developing Secure Database and Middleware Environments.pdf

12.5 MB

BIOS Disassembly Ninjutsu Uncovered Uncovered series .pdf

86.5 MB

BackTrack 4 Assuring Security by Penetration Testing.pdf

6.5 MB

BackTrack 5 Wireless Penetration Testing Beginner 039 s Guide.pdf

7.9 MB

Beginning ASP NET Security Wrox Programmer to Programmer .pdf

28.0 MB

Botnets The Killer Web Applications.pdf

3.3 MB

Build Your Own Security Lab A Field Guide for Network Testing.pdf

9.1 MB

Chained Exploits Advanced Hacking Attacks from Start to Finish.chm

10.2 MB

Coding for Penetration Testers Building Better Tools.pdf

10.4 MB

Computer Security Art and Science.chm

2.7 MB

Computer Viruses and Malware Advances in Information Security .pdf

11.3 MB

Core Security Patterns Best Practices and Strategies for J2EE TM Web Services and Identity Management.chm

7.6 MB

Counter Hack Reloaded A Step by Step Guide to Computer Attacks and Effective Defenses 2nd Edition .chm

19.4 MB

Covert Java Techniques for Decompiling Patching and Reverse Engineering.pdf

4.0 MB

Cracking Drupal A Drop in the Bucket.pdf

4.7 MB

Crimeware Understanding New Attacks and Defenses Symantec Press .chm

10.8 MB

Cross Site Scripting Attacks Xss Exploits and Defense.pdf

60.3 MB

Cryptography and Network Security 4th Edition.pdf

14.7 MB

Cyber War The Next Threat to National Security and What to Do About It.epub

345.7 KB

CyberForensics Understanding Information Security Investigations Springers Forensic Laboratory Science Series .pdf

6.5 MB

DarkMarket Cyberthieves Cybercops and You.epub

2.2 MB

Designing BSD Rootkits An Introduction to Kernel Hacking.pdf

8.8 MB

Disappearing Cryptography Third Edition Information Hiding Steganography amp Watermarking The Morgan Kaufmann Series in Software Engineering and.pdf

5.0 MB

Dissecting the Hack The F0rb1dd3n Network Revised Edition.pdf

2.7 MB

Enterprise Web Services Security Internet Series .pdf

1.8 MB

Exploiting Online Games Cheating Massively Distributed Systems.chm

9.4 MB

Extreme Exploits Advanced Defenses Against Hardcore Hacks Hacking Exposed .chm

11.1 MB

Fuzzing Brute Force Vulnerability Discovery.pdf

58.2 MB

Fuzzing for Software Security Testing and Quality Assurance Artech House Information Security and Privacy .pdf

4.7 MB

Ghost in the Wires My Adventures as the World 039 s Most Wanted Hacker.pdf

2.9 MB

Google Hacking for Penetration Testers Volume 2.pdf

16.0 MB

Google Hacking for Penetration Testers.pdf

33.8 MB

Gray Hat Hacking The Ethical Hackers Handbook 3rd Edition.pdf

12.8 MB

Gray Hat Python Python Programming for Hackers and Reverse Engineers.pdf

3.2 MB

HACKING EXPOSED WEB APPLICATIONS 3rd Edition.pdf

5.8 MB

Hack Attacks Revealed A Complete Reference with Custom Security Hacking Toolkit.pdf

8.6 MB

Hack Proofing Your Ecommerce Site.pdf

7.7 MB

Hack the Stack Using Snort and Ethereal to Master the 8 Layers of an Insecure Network.pdf

12.7 MB

HackNotes tm Web Security Pocket Reference.pdf

3.5 MB

Hacker Web Exploitation Uncovered.chm

568.3 KB

Hackers Crime in the Digital Sublime.pdf

2.3 MB

Hackers Beware The Ultimate Guide to Network Security.pdf

4.8 MB

Hacking The Art of Exploitation 2nd Edition.pdf

4.6 MB

Hacking The Next Generation Animal Guide .pdf

7.2 MB

Hacking Exposed Malware and Rootkits.pdf

10.9 MB

Hacking Exposed Network Security Secrets amp Solutions Second Edition Hacking Exposed .pdf

8.4 MB

Hacking Exposed 5th Edition Hacking Exposed .chm

19.4 MB

Hacking Exposed Cisco Networks Cisco Security Secrets amp Solutions.chm

10.3 MB

Hacking Exposed Computer Forensics Second Edition Computer Forensics Secrets amp Solutions.pdf

12.2 MB

Hacking Exposed VoIP Voice Over IP Security Secrets amp Solutions.chm

17.1 MB

Hacking Exposed Web 2 0 Web 2 0 Security Secrets and Solutions Hacking Exposed .pdf

5.3 MB

Hacking Exposed Windows Microsoft Windows Security Secrets and Solutions Third Edition.pdf

6.3 MB

Hacking VoIP Protocols Attacks and Countermeasures.chm

8.7 MB

Hacking the Cable Modem What Cable Companies Don 039 t Want You to Know.pdf

22.9 MB

Hacking the Xbox An Introduction to Reverse Engineering.pdf

7.5 MB

Hardware based Computer Security Techniques to Defeat Hackers From Biometrics to Quantum Cryptography.pdf

13.3 MB

How to Break Web Software Functional and Security Testing of Web Applications and Web Services Book amp CD.chm

12.6 MB

IT Security Metrics A Practical Framework for Measuring Security amp Protecting Data.pdf

5.4 MB

Identifying Malicious Code Through Reverse Engineering Advances in Information Security .pdf

6.5 MB

Implementing Database Security and Auditing A guide for DBAs information security administrators and auditors.pdf

7.3 MB

Inside Cyber Warfare Mapping the Cyber Underworld 2nd Edition.pdf

14.2 MB

Inside Cyber Warfare Mapping the Cyber Underworld.pdf

2.1 MB

Inside the SPAM Cartel By Spammer X.pdf

144.5 MB

Inside the Security Mind Making the Tough Decisions.chm

1.5 MB

Introduction to Computer Security.chm

2.9 MB

Intrusion Detection with SNORT Advanced IDS Techniques Using SNORT Apache MySQL PHP and ACID.pdf

2.7 MB

Linux Firewalls Attack Detection and Response with iptables psad and fwsnort.pdf

2.6 MB

Linux Hacking Exposed Linux Security Secrets and Solutions.pdf

101.3 MB

Malicious Cryptography Exposing Cryptovirology.pdf

30.5 MB

Malicious Mobile Code Virus Protection for Windows O 039 Reilly Computer Security .chm

3.0 MB

Malware Analyst 039 s Cookbook and DVD Tools and Techniques for Fighting Malicious Code.pdf

9.4 MB

Malware Detection Advances in Information Security .pdf

12.3 MB

Managed Code Rootkits Hooking Into Runtime Environments.pdf

5.8 MB

Mastering FreeBSD and OpenBSD Security.chm

1.4 MB

Masters of Deception The Gang That Ruled Cyberspace.pdf

424.9 KB

Metasploit The Penetration Tester 039 s Guide.pdf

7.2 MB

Metasploit Toolkit for Penetration Testing Exploit Development and Vulnerability Research.pdf

5.1 MB

Mobile Malware Attacks and Defense.pdf

7.1 MB

Modern Communications Jamming Principles and Techniques.pdf

27.7 MB

Network Security A Practical Approach The Morgan Kaufmann Series in Networking .pdf

5.4 MB

Ninja Hacking Unconventional Penetration Testing Tactics and Techniques.pdf

10.3 MB

No Tech Hacking A Guide to Social Engineering Dumpster Diving and Shoulder Surfing.pdf

7.4 MB

Out of the Inner Circle A Hacker 039 s Guide to Computer Security.pdf

36.2 MB

PGP amp GPG Email for the Practical Paranoid.pdf

3.5 MB

Penetration Tester 039 s Open Source Toolkit Volume 2.pdf

28.4 MB

Penetration Tester 039 s Open Source Toolkit.pdf

17.8 MB

Perl Scripting for Windows Security Live Response Forensic Analysis and Monitoring.pdf

5.8 MB

Practical Hacking Techniques and Countermeasures.pdf

151.0 MB

Practical Lock Picking A Physical Penetration Tester 039 s Training Guide.pdf

20.1 MB

Practical Oracle Security Your Unauthorized Guide to Relational Database Security.pdf

4.8 MB

Practical Packet Analysis Using Wireshark to Solve Real World Network Problems.pdf

10.5 MB

Practical Unix amp Internet Security 3rd Edition.chm

2.5 MB

Preventing Web Attacks with Apache.chm

6.3 MB

Pro PHP Security From Application Security Principles to the Implementation of XSS Defenses Second Edition.pdf

5.0 MB

Professional Penetration Testing Creating and Operating a Formal Hacking Lab.pdf

9.3 MB

Real World Linux Security Intrusion Prevention Detection and Recovery 2nd Edition .chm

2.0 MB

Reverse Engineering of Object Oriented Code Monographs in Computer Science .pdf

6.1 MB

Reversing Secrets of Reverse Engineering.pdf

9.0 MB

Rootkits Subverting the Windows Kernel.chm

1.7 MB

SELinux NSA 039 s Open Source Security Enhanced Linux.chm

1.1 MB

SQL Injection Attacks and Defense.pdf

6.9 MB

SSH The Secure Shell The Definitive Guide.chm

3.7 MB

SSL amp TLS Essentials Securing the Web.pdf

1.4 MB

Secrets and Lies Digital Security in a Networked World.pdf

2.7 MB

Secure Coding in C and C SEI Series in Software Engineering .chm

3.1 MB

Secure Programming with Static Analysis.pdf

4.9 MB

Securing amp Optimizing Linux The Hacking Solution.pdf

6.1 MB

Security for Web Services and Service Oriented Architectures.pdf

5.1 MB

Self Defending Networks The Next Generation of Network Security.chm

17.1 MB

Seven Deadliest Social Network Attacks Syngress Seven Deadliest Attacks .pdf

5.6 MB

Seven Deadliest Web Application Attacks.pdf

2.1 MB

Silence on the Wire A Field Guide to Passive Reconnaissance and Indirect Attacks.chm

7.9 MB

Social Engineering The Art of Human Hacking.pdf

6.4 MB

Sockets Shellcode Porting and Coding Reverse Engineering Exploits and Tool Coding for Security Professionals.pdf

117.8 MB

Spyware and Adware Advances in Information Security 50 .pdf

3.6 MB

Stealing the Network How to Own the Box.pdf

4.2 MB

Stealing the Network The Complete Series Collector 039 s Edition Final Chapter and DVD.pdf

11.4 MB

Subclassing and Hooking with Visual Basic.pdf

15.9 MB

Tangled Web Tales of Digital Crime from the Shadows of Cyberspace Queconsumerother .pdf

2.5 MB

The Art of Computer Virus Research and Defense.chm

14.1 MB

The Art of Deception Controlling the Human Element of Security.pdf

1.4 MB

The Art of Intrusion The Real Stories Behind the Exploits of Hackers Intruders amp Deceivers.pdf

3.2 MB

The Basics of Hacking and Penetration Testing Ethical Hacking and Penetration Testing Made Easy.pdf

3.9 MB

The Best of 2600 A Hacker Odyssey Collectors Editon.pdf

4.0 MB

The Book of PF A No Nonsense Guide to the OpenBSD Firewall.pdf

6.9 MB

The Cuckoo 039 s Egg Tracking a Spy Through the Maze of Computer Espionage.pdf

990.4 KB

The Database Hacker 039 s Handbook Defending Database Servers.chm

1.2 MB

The IDA Pro Book The Unofficial Guide to the World 039 s Most Popular Disassembler.pdf

9.7 MB

The Myths of Security What the Computer Security Industry Doesn 039 t Want You to Know.pdf

7.1 MB

The Oracle Hacker 039 s Handbook Hacking and Defending Oracle.chm

496.1 KB

The Rootkit Arsenal Escape and Evasion in the Dark Corners of the System.pdf

85.3 MB

The Shellcoder 039 s Handbook Discovering and Exploiting Security Holes.chm

2.2 MB

The Shellcoder 039 s Handbook Discovering and Exploiting Security Holes 2nd Edition.pdf

3.1 MB

The Software Vulnerability Guide Programming Series .pdf

7.8 MB

The Web Application Hacker 039 s Handbook Discovering and Exploiting Security Flaws.pdf

9.2 MB

The Web Application Hacker 039 s Handbook Finding and Exploiting Security Flaws.pdf

14.2 MB

Towards Hardware Intrinsic Security Foundations and Practice Information Security and Cryptography .pdf

8.4 MB

UNIX and Linux Forensic Analysis DVD Toolkit.pdf

5.3 MB

Underground Tales of Hacking Madness and Obsession on the Electronic Frontier.pdf

1.2 MB

Virtual Honeypots From Botnet Tracking to Intrusion Detection.chm

4.3 MB

Virtualization for Security Including Sandboxing Disaster Recovery High Availability Forensic Analysis and Honeypotting.pdf

8.3 MB

War 2 0 Irregular Warfare in the Information Age Praeger Security International .pdf

2.2 MB

Wardriving amp Wireless Penetration Testing.pdf

21.9 MB

Web Application Vulnerabilities Detect Exploit Prevent.pdf

17.8 MB

Web Security Privacy and Commerce 2nd Edition.pdf

14.1 MB

Web Security Testing Cookbook Systematic Techniques to Find Problems Fast.pdf

6.8 MB

Wi Foo The Secrets of Wireless Hacking.chm

7.1 MB

Windows Forensic Analysis DVD Toolkit Second Edition.pdf

6.2 MB

Windows Registry Forensics Advanced Digital Forensic Analysis of the Windows Registry.pdf

3.8 MB

Wireshark amp Ethereal Network Protocol Analyzer Toolkit.pdf

10.4 MB

Writing Secure Code Practical Strategies and Proven Techniques for Building Secure Applications in a Networked World.chm

2.3 MB

Writing Security Tools and Exploits.pdf

5.6 MB

iPhone and iOS Forensics Investigation Analysis and Mobile Security for Apple iPhone iPad and iOS Devices.pdf

9.2 MB

php architect 039 s Guide to PHP Security.pdf

2.4 MB

/Cyber Security literature Part 2/

2012 Sean Bodmer - Reverse Deception - Organized Cyber Threat Counter-Exploitation[1stED]_Rsll.epub

10.6 MB

2016 Gilberto Najera-Gutierrez - Kali Linux Web Penetration Testing Cookbook_Ral.epub

30.8 MB

CISSP Practice Exams (3rd Edition) - Shon Harris (retail).epub

6.8 MB

Cengage-The.Lure.2011.RETAiL.EBook-DiGiBook.pdf

3.9 MB

Computer Forensics - Investigating Network Intrusions and Cybercrime (2010) - EC-Council.pdf

25.2 MB

Crafting the InfoSec Playbook - Jeff Bollinger.pdf

11.2 MB

Cyber Attacks - Edward Amoroso.epub

4.1 MB

Cyber Crime and Digital Evidence- Materials and Cases.pdf

56.5 MB

Cyber Crime and Espionage - Will Gragido.epub

4.3 MB

Essential Cybersecurity Science - Josiah Dykstra.epub

5.0 MB

Handbook of Digital Forensics and Investigation.pdf

25.4 MB

Handbook of System Safety and Security - Edward Griffor.pdf

14.2 MB

Incident Response & Computer Forensics (3rd Edition).pdf

14.8 MB

Infosec Management Fundamentals.epub

2.6 MB

Intermediate Security Testing with Kali Linux 2.pdf

22.1 MB

Krause Jordan. Windows Server 2016 Cookbook.pdf

17.1 MB

Red Team_ How to Succeed by Thinking Like the Enemy - Micah Zenko (retail).epub

1.1 MB

Security Intelligence_ A Practitioner's Guide to Solving Enterprise Security Challenges.epub

5.8 MB

Security Operations Center_ Building, uniz & Gary McIntyre & Nadhem AlFardan.epub

15.7 MB

Targeted Cyber Attacks - Sood, Aditya, Enbody, Richard.epub

4.7 MB

The Mac Hacker's Handbook.pdf

7.8 MB

The Network Security Test Lab_ A Step-by-Step Guide.epub

10.2 MB

Wiley Phishing Dark Waters, The Offensive and Defensive Sides of Malicious E-mails (2015).pdf

12.1 MB

Wiley Security Intelligence, A Practitioner's Guide to Solving Enterprise Security Challenges (2015).pdf

22.6 MB

desktop.ini

0.2 KB

/.../Apress.-.Penetration.Testing.Basics.2016.Retail.eBook-BitBook/

Penetration Testing Basics.pdf

13.4 MB

/.../Cyber-Physical Attack Recovery Procedures/

Cyber-Physical Attack Recovery Procedures.epub

5.2 MB

Cyber-Physical Attack Recovery Procedures.pdf

8.0 MB

/.../the CIS Controls for Effective Cyber Defense V 6.0/

A.pdf

497.2 KB

CIS Controls Mobile Security Companion.pdf

172.3 KB

CIS Controls Privacy Companion.pdf

352.0 KB

CIS.pdf

352.0 KB

CSC-MASTER-VER.pdf

2.2 MB

CSC-VER.xlsx

93.0 KB

Internet of Things.pdf

435.2 KB

/.../Advanced Persistent Threat Ebook/

Advanced Persistent Threat - Eric Cole.pdf

5.1 MB

/Cyber Security literature Part 3/

Bruce Schneier - Secrets and Lies Digital Security in a Networked World.pdf

2.7 MB

Build Your Own Security Lab - A Field Guide for Network Testing.pdf

9.1 MB

CEH v9 - Certified Ethical Hacker Version 9 Study Guide - Sean-Philip Oriyano.pdf

9.6 MB

Combat Ready It and Pie_ Cyber Security fo - Paul B. Dove.epub

7.4 MB

Computer Crime, Investigation & the Law.pdf

7.8 MB

Craig Smith - The Car Hacker's Handbook .pdf

25.0 MB

Cyber Security Basics_ Protect Your Organi - Don Franke.mobi

1.2 MB

Cyber-security_of_SCADA_and_Other_Industrial_Control_Systems.pdf

9.0 MB

Cybersecurity Lexicon - Luis Ayala.pdf

1.4 MB

Dalziel, Henry_ Willson, David-Cyber Security Awareness for CEOs and Management-Syngress is an imprint of Elsevier (2016).pdf

7.0 MB

Dan Kaminsky - Reverse Engineering Code with IDA Pro.pdf

4.1 MB

Dane Christian-A Human Readable Guide to Cyber Security (2015).epub

188.0 KB

Digital Habits_ 5 Simple Tips t - David Schropfer.epub

469.8 KB

Eric Rzeszut, Daniel Bachrach-10 Don'ts on Your Digital Devices_ The Non-Techie's Survival Guide to Cyber Security and Privacy-Apress (2014).pdf

3.9 MB

Fei Hu-Security and Privacy in Internet of Things (IoTs)_ Models, Algorithms, and Implementations-CRC Press (2016).pdf

12.5 MB

Gray Hat Hacking the Ethical Hacker's Hand - Daniel Regalado.epub

143.6 MB

Gray Hat Python - Python Programming for Hackers and Reverse Engineers (2009).pdf

3.2 MB

HACKING SECRETS REVEALED - Information and instructional guide..pdf

504.5 KB

Hacker Techniques, Tools, and Incident Handling.pdf

61.8 MB

Hacker's Challenge_ Test Your Incident Response Skills Using 20 Scenarios.pdf

32.6 MB

Information Security for the Rest of Us - Cr3 Concepts Llc.mobi

3.2 MB

Kali Linux Network Scanning Cookbook.pdf

5.4 MB

Lucas Edward-Cyberphobia_ Identity, Trust, Security and the Internet-Bloomsbury (2015).epub

478.3 KB

Magnus_Almgren_Vincenzo_Gulisano_Federico_Maggi_-_Detection of Intrusions and Malware_ and Vulnerability Assessment_12th.pdf

18.3 MB

Malware, Rootkits Botnets A Beginners Guide.epub

8.7 MB

Mike Shema - Anti-Hacker Tool Kit, 4th Edition.pdf

37.1 MB

Protecting Our Future_ Educating a Cyberse - Jane Leclair.epub

395.2 KB

Safe, Sound and Secure_ How to - Don Silver.epub

211.9 KB

Security Intelligence - Qing Li.epub

5.8 MB

Streamlined Malware Incident Response with EnCase-Salazar-5-20-2015.pdf

628.7 KB

The Hackers Underground Handbook David Melnichuk.pdf

2.6 MB

The Internet Sucks- Here's How to Use It Safely - Ken Baker.epub

1.2 MB

Will Gragido - Blackhatonomics - An Inside Look at the Economics of Cybercrime .pdf

6.7 MB

/.../Cybersecurity Managing Systems, Conducting Testing, and Investigating Intrusions/

Cisco Next-Generation Security Solutions All-in-one Cisco ASA Firepower Services, NGIPS, and AMP (9780134213071).epub

37.1 MB

Cybersecurity Managing Systems, Conducting Testing, and Investigating Intrusions.pdf

8.2 MB

Security Operations Center_ Building, uniz & Gary McIntyre & Nadhem AlFardan.epub

15.7 MB

/.../HackingStep by Step Beginner's Guide to Start Hacking Computer Systems Within Hours (2016) [WWRG]/

Hacking_Step by Step Beginner's - Tim Swarr.epub

133.3 KB

Hacking_Step by Step Beginner's - Tim Swarr.pdf

468.2 KB

/.../How to be Anonymous Online 2016/

How to be Anonymous Online 2016.epub

107.8 KB

/.../Linux For Beginners - Adam Vardy/

Linux For Beginners - Adam Vardy.azw3

1.1 MB

Linux For Beginners - Adam Vardy.epub

866.8 KB

Linux For Beginners - Adam Vardy.mobi

1.2 MB

Linux For Beginners - Adam Vardy.pdf

2.2 MB

/.../Masterking Kali linux - Ajay Tiwari/

Masterking Kali linux - Ajay Tiwari.azw3

9.3 MB

Masterking Kali linux - Ajay Tiwari.epub

5.1 MB

Masterking Kali linux - Ajay Tiwari.mobi

10.4 MB

Masterking Kali linux - Ajay Tiwari.pdf

12.2 MB

/.../Penetration Testing - Setting Up a Test Lab How-to (Vyacheslav Fadyushin)/

Penetration Testing Setting up - Vyacheslav Fadyushin.epub

2.4 MB

Penetration Testing Setting up - Vyacheslav Fadyushin.pdf

4.0 MB

/.../Python Programming eBooks Collection [PDF]/

AddedBytes Cheat Sheets Python.pdf

398.2 KB

Addison-Wesley Professional Programming in Python 3 2nd (2010).pdf

6.5 MB

Addison-Wesley Python Essential Reference 4th (2009).pdf

2.6 MB

Addison-Wesley Python Programming with the Java Class Libraries, A Tutorial for Building Web and Enterprise Applications with Jython (2002).pdf

16.8 MB

Addison-Wesley Python Web Development with Django (2009).pdf

4.7 MB

Addison-Wesley Starting Out with Python (2009).pdf

35.5 MB

Addison-Wesley Starting Out with Python 2nd (2012).pdf

3.9 MB

Addison-Wesley Text Processing in Python (2003).pdf

2.7 MB

Addison-Wesley The Python Standard Library by Example (2011).pdf

3.0 MB

Apress Beginning Game Development with Python and Pygame, From Novice to Professional (2007).pdf

9.0 MB

Apress Beginning Python Visualization, Crafting Visual Transformation Scripts (2009).pdf

2.3 MB

Apress Beginning Python, From Novice to Professional (2005).pdf

13.9 MB

Apress Beginning Python, From Novice to Professional 2nd (2008).pdf

4.5 MB

Apress Dive into Python (2004).pdf

1.2 MB

Apress Dive into Python 3 (2009).pdf

2.6 MB

Apress Foundations of Agile Python Development (2008).pdf

7.2 MB

Apress Foundations of Python Network Programming (2004) (no OCR).pdf

17.8 MB

Apress Foundations of Python Network Programming 2nd (2010).pdf

6.2 MB

Apress Pro Android Python with SL4A (2011).pdf

5.3 MB

Apress Pro IronPython (2009).pdf

3.2 MB

Apress Pro Python (2010).pdf

2.8 MB

Apress Pro Python System Administration (2010).pdf

4.8 MB

Apress Python 3 for Absolute Beginners (2009).pdf

8.0 MB

Apress Python Algorithms, Mastering Basic Algorithms in the Python Language (2010).pdf

4.9 MB

Apress The Definitive Guide to Jython, Python for the Java Platform (2010).pdf

12.6 MB

CRC Press Methods in Medical Informatics, Fundamentals of Healthcare Programming in Perl Python and Ruby (2011).pdf

6.1 MB

Cambridge University Press Numerical Methods in Engineering with Python (2005).pdf

7.0 MB

Cambridge University Press Numerical Methods in Engineering with Python 2nd (2010).pdf

4.6 MB

Cambridge University Press Python for Software Design, How to Think Like a Computer Scientist (2009).pdf

798.8 KB

Course Technology Fundamentals of Python, From First Programs through Data Structures (2010).pdf

12.0 MB

Course Technology Python Power, The Comprehensive Guide (2008).pdf

3.7 MB

Green Tea Press How to Think Like a Computer Scientist, Learning with Python (2002).pdf

933.6 KB

Green Tea Press Think Python, How to Think Like a Computer Scientist (2008).pdf

664.5 KB

Hungry Minds Python 2.1 Bible (2001).pdf

6.3 MB

IBM Press WebSphere Application Server Administration Using Jython (2010).pdf

4.6 MB

Lulu Press Learn Python the Hard Way (2010).pdf

1.3 MB

MCGraw-Hill Osborne Exploring Python (2009).pdf

5.9 MB

MIT Press Introduction to Computation and Programming Using Python (2013) (no OCR).pdf

90.0 MB

Manning Hello Python (2012).pdf

33.6 MB

Manning IronPython in Action (2009).pdf

14.9 MB

Manning Python and Tkinter Programming (2000).pdf

9.4 MB

Manning The Quick Python Book 2nd (2010).pdf

2.8 MB

Manning wxPython in Action (2006).pdf

8.7 MB

New Riders Publishing Jython for Java Programmers (2001).pdf

8.9 MB

No Starch Press Gray Hat Python, Python Programming for Hackers and Reverse Engineers (2009).pdf

3.2 MB

No Starch Press Python for Kids, A Playful Introduction to Programming (2013).pdf

13.9 MB

OReilly Bioinformatics Programming Using Python (2010).pdf

4.3 MB

OReilly Head First Python (2011).pdf

39.7 MB

OReilly Learning Python (1999).pdf

3.3 MB

OReilly Learning Python 2nd (2003).pdf

6.1 MB

OReilly Learning Python 3rd (2008).pdf

4.3 MB

OReilly Learning Python 4th (2009).pdf

12.9 MB

OReilly MongoDB and Python (2011).pdf

4.3 MB

OReilly Natural Language Processing with Python (2009).pdf

3.2 MB

OReilly Programming Computer Vision with Python (2012).pdf

65.4 MB

OReilly Programming Python 2nd (2001).pdf

7.3 MB

OReilly Programming Python 3rd (2006).pdf

22.7 MB

OReilly Programming Python 4th (2011).pdf

30.9 MB

OReilly Python Bibliography, The Top Technical Resources on Python (2011).pdf

572.0 KB

OReilly Python Cookbook (2002).pdf

1.6 MB

OReilly Python Cookbook 2nd (2005).pdf

3.3 MB

OReilly Python Pocket Reference 4th (2010).pdf

2.7 MB

OReilly Python Programming on Win32 (2000).pdf

5.1 MB

OReilly Python Standard Library (2001).pdf

1.3 MB

OReilly Python and AWS Cookbook (2012).pdf

3.7 MB

OReilly Python and XML (2002).pdf

3.7 MB

OReilly Python for Data Analysis (2013).pdf

14.8 MB

OReilly Python for Unix and Linux System Administration (2008).pdf

3.6 MB

OReilly Python in a Nutshell 2nd (2006).pdf

14.0 MB

OReilly Real World Instrumentation with Python (2011).pdf

13.3 MB

OReilly Think Python (2012).pdf

7.9 MB

Packt Publishing CherryPy Essentials Rapid Python Web Application Development (2007).pdf

2.9 MB

Packt Publishing Expert Python Programming (2008).pdf

6.4 MB

Packt Publishing FreeCAD How-to (2012).pdf

2.3 MB

Packt Publishing Matplotlib for Python Developers (2009).pdf

11.9 MB

Packt Publishing MySQL for Python (2010).pdf

2.9 MB

Packt Publishing Python 2.6 Graphics Cookbook (2010).pdf

6.2 MB

Packt Publishing Python 2.6 Text Processing, Beginner's Guide (2010).pdf

8.1 MB

Packt Publishing Python 3 Object Oriented Programming (2010).pdf

2.6 MB

Packt Publishing Python 3 Web Development, Beginner's Guide (2011).pdf

11.1 MB

Packt Publishing Python Geospatial Development (2010).pdf

25.8 MB

Packt Publishing Python Multimedia, Beginner's Guide (2010).pdf

8.4 MB

Packt Publishing Python Testing Cookbook (2011).pdf

31.5 MB

Packt Publishing Python Testing, Beginner's Guide (2010).pdf

2.7 MB

Packt Publishing Python Text Processing with NLTK 2.0 Cookbook (2010).pdf

19.0 MB

Packt Publishing Spring Python 1.1 (2010).pdf

6.4 MB

Packt Publishing wxPython 2.8, Application Development Cookbook (2010).pdf

4.5 MB

Pragmatic Bookshelf Publishing Practical Programming, An Introduction to Computer Science Using Python (2009).pdf

7.0 MB

Prentice Hall Core Python Applications Programming 3rd (2012).pdf

9.8 MB

Prentice Hall Core Python Programming 2nd (2007).pdf

16.6 MB

Prentice Hall Introduction to Programming Using Python (2013).pdf

9.3 MB

Prentice Hall Rapid GUI Programming with Python and Qt, The Definitive Guide to PyQt Programming (2008).pdf

5.7 MB

SAMS Python Developer's Handbook (2000).pdf

12.6 MB

SAMS Python Essential Reference 3rd (2006).pdf

4.1 MB

SAMS Python Phrasebook, Essential Code and Commands (2006).pdf

3.3 MB

Springer Publishing A Primer on Scientific Programming with Python (2009).pdf

3.1 MB

Springer Publishing A Primer on Scientific Programming with Python 2nd (2011).pdf

5.2 MB

Springer Publishing A Primer on Scientific Programming with Python 3rd (2012).pdf

7.5 MB

Springer Publishing Python Programming Fundamentals (2011).pdf

4.2 MB

Springer Publishing Python Scripting for Computational Science 3rd (2008).pdf

5.7 MB

Sybex XML Processing with Perl, Python and PHP (2002).pdf

1.9 MB

Syngress Publishing Violent Python, A Cookbook for Hackers Forensic Analysts Penetration Testers and Security Engineers (2013).pdf

8.2 MB

Wiley Data Structures and Algorithms Using Python (2011).pdf

10.7 MB

Wiley Financial Modelling in Python (2009).pdf

3.9 MB

Wiley Making Use of Python (2002).pdf

3.3 MB

Wiley Mobile Python, Rapid Prototyping of Applications on the Mobile Platform (2007).pdf

4.1 MB

Wiley Python for Dummies (2006).pdf

1.6 MB

Wrox Press Beginning Python (2005).pdf

15.8 MB

Wrox Press Beginning Python, Using Python 2.6 and Python 3.1 (2010).pdf

4.6 MB

Wrox Press Professional IronPython (2010).pdf

18.1 MB

Wrox Press Professional Python Frameworks, Web 2.0 Programming with Django and TurboGears (2007).pdf

10.8 MB

Wrox Press Python, Create-Modify-Reuse (2008).pdf

6.2 MB

Wrox Press Web Standards Programmer's Reference, HTML CSS JavaScript Perl Python and PHP (2005).pdf

13.1 MB

/

Cyber Security literature.nfo

16.3 KB

 

Total files 361


Copyright © 2024 FileMood.com