/Security-HackingEbooks2/
|
netcat_power_tools.pdf
|
16.8 MB
|
100-uC-OS-II-002.pdf
|
4.3 MB
|
A Day in the Life of a Flux Reversal - Count Zero.pdf
|
205.1 KB
|
advanced bash scripting guide.pdf
|
2.7 MB
|
Algorithms Explained.doc
|
160.8 KB
|
Ankit Fadia Hacking Guide.pdf
|
1.3 MB
|
BackTrack 5 Cookbook.pdf
|
23.4 MB
|
BackTrack 5 Wireless Penetration Testing Beginners Guide[NepsterJay].pdf
|
17.4 MB
|
Bash Reference Manual by Chet Ramey and Brian Fox.pdf
|
716.9 KB
|
Bluetooth Hacking.pdf
|
362.1 KB
|
CCENT Cisco Certified Entry Networking Technician (2013).pdf
|
16.6 MB
|
CCNA Wireless Study Guide_ IUWNE Exam 640-721 - Lammle, Todd.pdf
|
14.3 MB
|
Certified Ethical Hacker Study Guide.pdf
|
7.0 MB
|
CompTIA_Network_N10-005.pdf
|
261.4 KB
|
CWTS_ Certified Wireless Technology Specialist Official Study Guide_ Exam PW0-070 - Robert J. Bartz.pdf
|
8.8 MB
|
Data Mining and Machine Learning in Cybersecurity.pdf
|
3.3 MB
|
debian-handbook.pdf
|
30.0 MB
|
Firebug 1.5 Editing Debugging and Monitoring Web Pages [eBook].pdf
|
5.9 MB
|
firewalls.doc
|
45.1 KB
|
FTP Exploits By Ankit Fadia.pdf
|
36.2 KB
|
Gathering Info on Remote Host.doc
|
55.3 KB
|
Getting geographical Information using an IP Address.doc
|
52.2 KB
|
GoogleHackingforPenetrationTesters.pdf
|
33.8 MB
|
Hack Proofing Your Web Server.pdf
|
86.5 KB
|
Hackers Delight - By Henry S. Warren,.pdf
|
10.3 MB
|
Hackers Survival Guide.pdf
|
545.5 KB
|
Hacking - Dangerous Google - Searching For Secrets by Michał Piotrowski.pdf
|
2.2 MB
|
Hacking - Firewalls And Networks How To Hack Into Remote Com.pdf
|
3.5 MB
|
Hacking Exposed 6 (ntwk security) - S. McClure, et. al., (McGraw-Hill, 2009) BBS.pdf
|
15.6 MB
|
Hacking Exposed 7.epub
|
47.4 MB
|
Hacking Into Computer Systems - Beginners.pdf
|
629.9 KB
|
Hacking Intranet Websites.pdf
|
5.7 MB
|
Hacking the Human.pdf
|
12.8 MB
|
Hacking Web Apps.pdf
|
23.0 MB
|
Hacking with Kali - Broad, James, Bindner, Andrew.pdf
|
9.6 MB
|
Hacking, 2nd Edition.pdf
|
5.1 MB
|
Hacking---Firewalls-And-Networks-How-To-Hack-Into-Remote-Computers.pdf
|
3.0 MB
|
hacking_gmail.pdf
|
5.5 MB
|
How to Crack CD Protections.pdf
|
30.7 KB
|
How to Make Key Generators.pdf
|
74.3 KB
|
How to Master CCNA v2.0.pdf
|
8.1 MB
|
HTML-Guide.pdf
|
21.8 MB
|
Identify Theft for Dummies - M. Arata (Wiley, 2010).pdf
|
5.4 MB
|
Instant Wireshark Starter [eBook].pdf
|
2.4 MB
|
Introduction to Linux; A Hands on Guide by Machtelt Garrels.pdf
|
1.6 MB
|
Java Programming From Problem Analysis To Program Design 4th ed.pdf
|
7.9 MB
|
Kali Linux Cookbook.pdf
|
11.2 MB
|
learnd2.pdf
|
1.7 MB
|
Learning Java, 4th Edition[A4].pdf
|
25.7 MB
|
Learning PHP, MySQL & JavaScript, 4th Edition.pdf
|
14.9 MB
|
Linux System Programming.pdf
|
2.9 MB
|
Linux Utilities Cookbook [eBook].pdf
|
10.5 MB
|
linux_server_hacks.pdf
|
35.9 MB
|
Low Tech Hacking -Street Smarts for Security Professionals [NepsterJay].pdf
|
33.1 MB
|
Mastering Microsoft Exchange Server 2013 - Elfassy, David.pdf
|
20.7 MB
|
metasplitable2_sih60b.pdf
|
597.1 KB
|
Metasploit Penetration Testing Cookbook, Second Edition [eBook].pdf
|
6.9 MB
|
Microsoft Windows Xp - Command-Line Reference A-Z.pdf
|
9.5 MB
|
Moore-Critical-Thinking-Intelligence-Analysis.pdf
|
12.8 MB
|
Net+ 2009.pdf
|
78.1 MB
|
Ninja-Hacking.pdf
|
10.3 MB
|
Nmap Network Scanning.pdf
|
57.6 MB
|
Offensive Security - Penetration Testing with BackTrack (Lab Guide)v3.2.pdf
|
11.0 MB
|
OpenVPN 2 Cookbook [eBook].pdf
|
7.9 MB
|
OS_and_application_fingerprinting.pdf
|
897.1 KB
|
PayPal Hacks.pdf
|
126.9 KB
|
PracticalPacketAnalysis2e.pdf
|
28.7 MB
|
Removing Banners from your site.doc
|
29.2 KB
|
Scalix- Linux Administrator’s Guide.pdf
|
8.9 MB
|
Secrets of Network Cartography A Comprehensive Guide to Nmap.pdf
|
1.1 MB
|
Seven Deadliest Web Application Attacks.pdf
|
3.0 MB
|
Simple Hacks - Addons, Macros And More.pdf
|
875.6 KB
|
Syngress.Asterisk.Hacking.May.2007.pdf
|
10.7 MB
|
TCP Wrappers Unwrapped.doc
|
35.3 KB
|
The Basics of Web Hacking - Pauli, Josh.pdf
|
5.3 MB
|
The Psychology of Interrogations and Confessions A Handbook - Gisli H. Gudjonsson.pdf
|
5.2 MB
|
Tracing IP,DNS,WHOIS-nsLOOKUP.pdf
|
24.4 KB
|
Understanding TCP_IP [eBook].pdf
|
11.5 MB
|
Untold Windows Tips and Secrets.doc
|
38.9 KB
|
Web Penetration Testing with Kali Linux.pdf
|
21.0 MB
|
Wiley.Ubuntu.Linux.Toolbox.1000.plus.Commands.for.Ubuntu.and.Debian.Power.Users.Nov.2007.pdf
|
3.4 MB
|
Wireshark Network Analysis_ The Official Wireshark Certork Analyst Study Guide - Laura Chappell & Gerald Combs.mobi
|
21.8 MB
|
WordPress Web Application Development [eBook].pdf
|
4.5 MB
|
/Technology, programming, IT, computer science, hacking/
|
netcat_power_tools.pdf
|
16.8 MB
|
100-uC-OS-II-002.pdf
|
4.3 MB
|
A Day in the Life of a Flux Reversal - Count Zero.pdf
|
205.1 KB
|
advanced bash scripting guide.pdf
|
2.7 MB
|
Advanced Penetration Testing for Highly-Secured Environments- The Ultimate Security Guide [eBook].pdf
|
13.4 MB
|
Algorithms Explained.doc
|
160.8 KB
|
An Introduction to the Analysis of Algorithms, 2nd Edition.pdf
|
5.8 MB
|
Ankit Fadia Hacking Guide.pdf
|
1.3 MB
|
Apress - Pro Bash Programming Scripting the GNULinux Shell (10-2009) (ATTiCA).pdf
|
1.5 MB
|
BackTrack 5 Cookbook.pdf
|
23.4 MB
|
BackTrack 5 Wireless Penetration Testing Beginners Guide[NepsterJay].pdf
|
17.4 MB
|
Bash Guide for Beginners.pdf
|
1.2 MB
|
Bash Reference Manual by Chet Ramey and Brian Fox.pdf
|
716.9 KB
|
Bluetooth Hacking.pdf
|
362.1 KB
|
Buffer Overflow Attacks - Detect, Exploit, Prevent (Syngress, 2005) BBS.pdf
|
5.6 MB
|
CCENT Cisco Certified Entry Networking Technician (2013).pdf
|
16.6 MB
|
CCENT-CCNA ICND1 640-822 Official Cert Guide, 3rd Edition.pdf
|
16.4 MB
|
CCNA Wireless Study Guide_ IUWNE Exam 640-721 - Lammle, Todd.pdf
|
14.3 MB
|
Certified Ethical Hacker Study Guide.pdf
|
7.0 MB
|
command-line.pdf
|
1.8 MB
|
CompTIA Linux Plus Study Guide 2013 for Exams LX0-101 and LX0-102 2nd Ed.pdf
|
11.1 MB
|
CompTIA_Network_N10-005.pdf
|
261.4 KB
|
CompTIA_Security_SY0-301.pdf
|
233.4 KB
|
CWTS_ Certified Wireless Technology Specialist Official Study Guide_ Exam PW0-070 - Robert J. Bartz.pdf
|
8.8 MB
|
Data Mining and Machine Learning in Cybersecurity.pdf
|
3.3 MB
|
debian-handbook.pdf
|
30.0 MB
|
Dos Attacked.pdf
|
18.7 KB
|
Fadia, Ankit - Encryption Algorithms Explained.pdf
|
345.8 KB
|
Firebug 1.5 Editing Debugging and Monitoring Web Pages [eBook].pdf
|
5.9 MB
|
firewalls(2).doc
|
45.1 KB
|
firewalls.doc
|
45.1 KB
|
FTP Exploits By Ankit Fadia.pdf
|
36.2 KB
|
Fundamentals of Computer Programming with C#.pdf
|
11.5 MB
|
Gathering Info on Remote Host.doc
|
55.3 KB
|
Getting geographical Information using an IP Address (1).doc
|
52.2 KB
|
Getting geographical Information using an IP Address.doc
|
52.2 KB
|
GNU-Linux Command-Line Tools Summary Gareth Anderson.pdf
|
698.8 KB
|
GoogleHackingforPenetrationTesters.pdf
|
33.8 MB
|
Hack Proofing Your Web Server.pdf
|
86.5 KB
|
Hack The Net.pdf
|
584.0 KB
|
Hackers Delight - By Henry S. Warren,.pdf
|
10.3 MB
|
Hackers Survival Guide.pdf
|
545.5 KB
|
Hacking - Dangerous Google - Searching For Secrets by Michał Piotrowski.pdf
|
2.2 MB
|
Hacking - Firewalls And Networks How To Hack Into Remote Com.pdf
|
3.5 MB
|
Hacking a Coke Machine.pdf
|
119.8 KB
|
Hacking and Network Defense.pdf
|
156.2 KB
|
Hacking Exposed 6 (ntwk security) - S. McClure, et. al., (McGraw-Hill, 2009) BBS.pdf
|
15.6 MB
|
Hacking Exposed 7.epub
|
47.4 MB
|
Hacking Exposed Computer Forensics Secrets & Solutions.pdf
|
12.2 MB
|
Hacking Exposed Wireless (ntwk security) 2nd ed - J. Cache, et al., (McGraw-Hill, 2010) BBS.pdf
|
11.6 MB
|
Hacking for Dummies 2.pdf
|
151.9 KB
|
Hacking Into Computer Systems - Beginners.pdf
|
629.9 KB
|
Hacking into Linux.doc
|
127.5 KB
|
Hacking Intranet Websites.pdf
|
5.7 MB
|
Hacking The Art Of Exploitation 2nd Edition V413HAV.pdf
|
4.2 MB
|
Hacking the Human.pdf
|
12.8 MB
|
Hacking The Linux.pdf
|
88.4 KB
|
Hacking Web Apps.pdf
|
23.0 MB
|
Hacking with Kali - Broad, James, Bindner, Andrew.pdf
|
9.6 MB
|
Hacking, 2nd Edition.pdf
|
5.1 MB
|
Hacking---Firewalls-And-Networks-How-To-Hack-Into-Remote-Computers.pdf
|
3.0 MB
|
Hacking.Into.Computer.Systems-A.Beginners.Guide---420ebooks.pdf
|
629.9 KB
|
hacking_gmail.pdf
|
5.5 MB
|
Hardcore Windows XP - The Step by Step Guide To Ultimate Performance.pdf
|
8.1 MB
|
hashcat_user_manual.pdf
|
2.3 MB
|
How to Crack CD Protections.pdf
|
30.7 KB
|
How to Make Key Generators.pdf
|
74.3 KB
|
How to Master CCNA v2.0.pdf
|
8.1 MB
|
How to Master Subnetting.pdf
|
2.6 MB
|
HTML-Guide.pdf
|
21.8 MB
|
HTTP_methods attacks.pdf
|
1.1 MB
|
Identify Theft for Dummies - M. Arata (Wiley, 2010).pdf
|
5.4 MB
|
Inside Cyber Warfar by Jeffrey Carr.pdf
|
3.0 MB
|
Instant Wireshark Starter [eBook].pdf
|
2.4 MB
|
Introduction to Linux; A Hands on Guide by Machtelt Garrels.pdf
|
1.6 MB
|
Introduction to Software Development.pdf
|
23.8 MB
|
Java Programming From Problem Analysis To Program Design 4th ed.pdf
|
7.9 MB
|
Kali Linux Cookbook.pdf
|
11.2 MB
|
Kevin Mitnick - The Art of Intrusion.pdf
|
3.2 MB
|
Kevin_Mitnick_-_Art_Of_Deception.pdf
|
5.4 MB
|
learnd2.pdf
|
1.7 MB
|
Learning Java, 4th Edition[A4].pdf
|
25.7 MB
|
Learning PHP, MySQL & JavaScript, 4th Edition.pdf
|
14.9 MB
|
Linux Kernel Development, 3rd Edition.pdf
|
4.5 MB
|
Linux Shell Scripting Cookbook, Second Edition [eBook].pdf
|
3.2 MB
|
Linux System Programming.pdf
|
2.9 MB
|
Linux Utilities Cookbook [eBook].pdf
|
10.5 MB
|
Linux-101-Hacks.pdf
|
1.6 MB
|
linux_server_hacks.pdf
|
35.9 MB
|
Low Tech Hacking -Street Smarts for Security Professionals [NepsterJay].pdf
|
33.1 MB
|
Machine Learning for hackers.pdf
|
25.1 MB
|
Mastering Metasploit- RAW [eBook].pdf
|
8.2 MB
|
Mastering Microsoft Exchange Server 2013 - Elfassy, David.pdf
|
20.7 MB
|
metasplitable2_sih60b.pdf
|
597.1 KB
|
Metasploit Penetration Testing Cookbook, Second Edition [eBook].pdf
|
6.9 MB
|
Metasploit Toolkit for Penetration Testing, Exploit Development, and Vulnerability Research.pdf
|
5.1 MB
|
Metasploit.pdf
|
7.2 MB
|
Microsoft Windows Xp - Command-Line Reference A-Z.pdf
|
9.5 MB
|
Moore-Critical-Thinking-Intelligence-Analysis.pdf
|
12.8 MB
|
More Password Cracking Decrypted.doc
|
130.0 KB
|
Nessus-Network-Auditing.pdf
|
4.8 MB
|
Net+ 2009.pdf
|
78.1 MB
|
Ninja-Hacking.pdf
|
10.3 MB
|
Nmap 6 Network Exploration and Security Auditing Cookbook.pdf
|
2.0 MB
|
Nmap Network Scanning.pdf
|
57.6 MB
|
Offensive Security - BackTrack to the Max Cracking the Perimeter V 1.0.pdf
|
3.7 MB
|
Offensive Security - Penetration Testing with BackTrack (Lab Guide)v3.2.pdf
|
11.0 MB
|
Offensive.Security.WiFu.v2.0.pdf
|
15.2 MB
|
OpenVPN 2 Cookbook [eBook].pdf
|
7.9 MB
|
OS_and_application_fingerprinting.pdf
|
897.1 KB
|
Own-The-Box.pdf
|
4.8 MB
|
Packt.Metasploit.Penetration.Testing.Cookbook.Jun.2012.RETAIL.eBook-ELOHiM.pdf
|
3.8 MB
|
PayPal Hacks.pdf
|
126.9 KB
|
PracticalPacketAnalysis2e.pdf
|
28.7 MB
|
Programming in Objective-C, 6th Edition.pdf
|
6.6 MB
|
Removing Banners from your site.doc
|
29.2 KB
|
RTFM - Red Team Field Manual v2.pdf
|
3.1 MB
|
Scalix- Linux Administrator’s Guide.pdf
|
8.9 MB
|
Scene of the Cybercrime - Computer Forensics Handbook.pdf
|
2.3 MB
|
Secrets of Network Cartography A Comprehensive Guide to Nmap.pdf
|
1.1 MB
|
Sendmail and Beyond.doc
|
63.5 KB
|
SET_User_Manual.pdf
|
1.7 MB
|
Seven Deadliest Web Application Attacks.pdf
|
3.0 MB
|
Simple Hacks - Addons, Macros And More.pdf
|
875.6 KB
|
SSH_Tectia.pdf
|
73.8 KB
|
SSL Torn Apart.doc
|
79.4 KB
|
SSL VPN - Understanding, evaluating and planning secure, web-based remote access [eBook].pdf
|
4.0 MB
|
Syngress.Asterisk.Hacking.May.2007.pdf
|
10.7 MB
|
TCP Wrappers Unwrapped.doc
|
35.3 KB
|
The Art of Readable Code.pdf
|
26.1 MB
|
The Basics of Web Hacking - Pauli, Josh.pdf
|
5.3 MB
|
The Basics of Web Hacking.epub
|
3.7 MB
|
The Linux Command Line by William Shotts.pdf
|
2.1 MB
|
The Psychology of Interrogations and Confessions A Handbook - Gisli H. Gudjonsson.pdf
|
5.2 MB
|
The Web Application Hackers Handbook.pdf
|
11.7 MB
|
Tracing IP,DNS,WHOIS-nsLOOKUP.pdf
|
24.4 KB
|
Transparent Proxies in Squid.doc
|
30.2 KB
|
Truths!!!--What they Dont teach in Manuals!!!.pdf
|
23.2 KB
|
Understanding TCP_IP [eBook].pdf
|
11.5 MB
|
Untold Windows Tips and Secrets.doc
|
38.9 KB
|
User_Manual.pdf
|
1.7 MB
|
we-are-anon.pdf
|
1.6 MB
|
Web Penetration Testing with Kali Linux.pdf
|
21.0 MB
|
web_for_pentester.pdf
|
2.5 MB
|
Wiley.Ubuntu.Linux.Toolbox.1000.plus.Commands.for.Ubuntu.and.Debian.Power.Users.Nov.2007.pdf
|
3.4 MB
|
Windows Password Files Torn Apart.doc
|
36.9 KB
|
Wireshark Network Analysis_ The Official Wireshark Certified Network Analyst Study Guide - Laura Chappell.pdf
|
37.0 MB
|
Wireshark Network Analysis_ The Official Wireshark Certork Analyst Study Guide - Laura Chappell & Gerald Combs.mobi
|
21.8 MB
|
WordPress Web Application Development [eBook].pdf
|
4.5 MB
|
WordPress.3.Ultimate.Security.pdf
|
8.7 MB
|
/.../_ Informatyka. Word Excel Acces (napomoc) (1)/
|
Walkenbach J - Excel 2013 Bible.pdf
|
226.6 MB
|
Walkenbach J - Excel 2010 Power Programming with VBA.pdf
|
12.9 MB
|
Walkenbach J - Excel 2013 PL. Programowanie w VBA dla bystrzaków. wyd 3.pdf
|
14.0 MB
|
/.../1 - Basic Programming & Data Structures/
|
Bjarne Stroustrup-The C++ Programming Language, 4th Edition-Addison-Wesley Professional (2013).pdf
|
19.7 MB
|
Nicolai M. Josuttis-The C++ Standard Library_ A Tutorial and Reference-Addison-Wesley (2012).pdf
|
14.5 MB
|
Scott Meyers-Effective Modern C++_ 42 Specific Ways to Improve Your Use of C++11 and C++14-O'Reilly Media (2014).epub
|
19.1 MB
|
Stanley B. Lippman, Josée Lajoie, Barbara E. Moo-C++ Primer-Addison-Wesley Professional (2012).pdf
|
52.8 MB
|
Adam Drozdek-Data Structures and Algorithms in C++-Cengage Learning (2012).pdf
|
22.4 MB
|
(2nd Edition) Bjarne Stroustrup-Programming_ Principles and Practice Using C++-Addison-Wesley Professional (2014).epub
|
34.9 MB
|
(Addison-Wesley Professional Computing Series) Scott Meyers-Effective C++. 55 specific ways to improve your programs and designs-Addison-Wesley Professional (2005).djvu
|
2.7 MB
|
/.../2 - Learn your way around an Unix shell, Make, System Programming and C/
|
Brian W. Kernighan, Dennis M. Ritchie-The C Programming Language (2nd Edition)-Prentice Hall (1988).pdf
|
16.6 MB
|
Jeffrey Richter and Christophe Nasarre-Windows via C_C++-Microsoft Press (2008).chm
|
3.4 MB
|
Johnson M. Hart-Windows System Programming-Addison-Wesley Professional (2010).pdf
|
10.9 MB
|
K. N. King-C Programming_ A Modern Approach-W. W. Norton & Company (2008).pdf
|
106.8 MB
|
W. Richard Stevens, Stephen A. Rago-Advanced Programming in the UNIX Environment.pdf
|
20.6 MB
|
/.../2 - Computer Organization and Architecture/
|
Randal E. Bryant, David R. O'Hallaron-Computer Systems_ A Programmer's Perspective-Pearson (2015).pdf
|
37.7 MB
|
/Computer Science/4 - Operating Systems/
|
Abraham Silberschatz, Peter B. Galvin, Greg Gagne-Operating System Concepts-Wiley (2012).pdf
|
7.0 MB
|
Andrew S. Tanenbaum, Herbert Bos-Modern Operating Systems-Pearson (2014).pdf
|
6.6 MB
|
/Computer Science/6 - Algorithms/
|
Dexter C. Kozen-The Design and Analysis of Algorithms-Springer (1992).djvu
|
2.3 MB
|
Jon Kleinberg, Éva Tardos-Algorithm Design-Addison-Wesley (2005).epub
|
4.0 MB
|
Robert Sedgewick and Philippe Flajolet-An Introduction to the Analysis of Algorithms-Addison-Wesley Professional (2013).pdf
|
7.0 MB
|
Robert Sedgewick-Algorithms in C++ Part 5_ Graph Algorithms. 3 ed.-Addison-Wesley Professional (2002).epub
|
11.4 MB
|
Robert Sedgewick-Algorithms in C++, Parts 1-4_ Fundamentals, Data Structure, Sorting, Searching-Addison-Wesley Professional (1998).chm
|
6.1 MB
|
Thomas H. Cormen, Charles E. Leiserson, Ronald L. Rivest, Clifford Stein-Introduction to Algorithms, Third Edition (2009).pdf
|
5.6 MB
|
/Computer Science/9 - Parallel Programming/
|
Aaftab Munshi, Benedict Gaster, Timothy Mattson, James Fung, Dan Ginsburg-OpenCL Programming Guide -Addison-Wesley Professional (2011).epub
|
13.2 MB
|
Ananth Grama-Introduction to Parallel Computing-Addison Wesley (2003).pdf
|
12.9 MB
|
Anthony Williams-C++ Concurrency in Action_ Practical Multithreading-Manning Publications (2012).epub
|
6.9 MB
|
Benedict Gaster, Lee Howes, David R. Kaeli, Perhaad Mistry, Dana Schaa-Heterogeneous computing with OpenCL_ revised OpenCL 1.2 edition-Morgan Kaufmann (2012).pdf
|
14.7 MB
|
Matthew Scarpino-OpenCL in Action_ How to Accelerate Graphics and Computations-Manning Publications (2011).pdf
|
17.7 MB
|
Peter Pacheco-An Introduction to Parallel Programming-Morgan Kaufmann (2011).pdf
|
3.8 MB
|
/Computer Science/10 - Networks/
|
Dimitri Bertsekas, Robert Gallager-Instructor's Solutions Manual for Data Networks-Pearson (1993).pdf
|
10.0 MB
|
Dimitri P. Bertsekas, Gallager-Data Networks (2nd Edition)-Prentice Hall (1992).pdf
|
34.4 MB
|
Larry L. Peterson, Bruce S. Davie-Computer Networks_ A Systems Approach, Fifth Edition -Elsevier (2011).pdf
|
30.3 MB
|
Radia Perlman-Interconnections_ Bridges, Routers, Switches, and Internetworking Protocols -Addison-Wesley Professional (1999).pdf
|
3.2 MB
|
W. Richard Stevens, Bill Fenner, Andrew M. Rudoff-Unix Network Programming, Volume 1_ The Sockets Networking API-Addison-Wesley Professional (2003).pdf
|
17.2 MB
|
/.../11 - Computer Security and Cryptography/
|
Jeffrey Hoffstein, Jill Pipher, Joseph H. Silverman (auth.)-An Introduction to Mathematical Cryptography-Springer-Verlag New York (2014).pdf
|
6.0 MB
|
Jonathan Katz, Yehuda Lindell-Introduction to Modern Cryptography, Second Edition.pdf
|
7.9 MB
|
Niels Ferguson, Bruce Schneier, Tadayoshi Kohno-Cryptography Engineering_ Design Principles and Practical Applications-Wiley (2010).djvu
|
5.4 MB
|
/.../12 - Information Theory and Coding Theory/
|
Abbas El Gamal, Young-Han Kim-Network Information Theory-Cambridge University Press (2012).pdf
|
4.4 MB
|
Andrew J. Viterbi, Jim K. Omura-Principles of Digital Communication and Coding (2009).epub
|
47.0 MB
|
Claude E Shannon, Warren Weaver-The Mathematical Theory of Communication-U. Illinois (1963).djvu
|
1.3 MB
|
Khalid Sayood-Introduction to Data Compression, Fourth Edition-Morgan Kaufmann (2012).pdf
|
18.3 MB
|
Robert B. Ash-Information Theory-John Wiley & Sons, Inc. (1965).pdf
|
10.3 MB
|
Robert G. Gallager-Information theory and reliable communication-Wiley (1968).djvu
|
6.2 MB
|
Steven Roman-Coding and information theory- .djvu
|
6.8 MB
|
Thomas M. Cover, Joy A. Thomas-Elements of Information Theory-Wiley-Interscience (2006).pdf
|
10.6 MB
|
/.../13 - AI, Machine Learning, and Computer Vision/
|
Richard Szeliski-Computer Vision_ Algorithms and Applications-Springer (2011).pdf
|
37.1 MB
|
Stuart Russell, Peter Norvig-Artificial Intelligence_ A Modern Approach .pdf
|
15.6 MB
|
/.../15 - Computer Graphics and Image Processing/
|
John F. Hughes, Andries van Dam, Morgan McGuire, David F. Sklar, James D. Foley, Steven K. Feiner, Kurt Akeley-Computer Graphics_ Principles and Practice.pdf
|
20.0 MB
|
Peter Shirley, Michael Ashikhmin, Steve Marschner-Fundamentals of Computer Graphics-A K Peters (2009).pdf
|
24.5 MB
|
Rafael C. Gonzalez, Richard E. Woods-Digital Image Processing-Pearson (2007).pdf
|
65.1 MB
|
/.../1 - Linear Programming Optimization/
|
Alexander Schrijver-Theory of Linear and Integer Programming-Wiley (1998).djvu
|
23.8 MB
|
Dimitris Bertsimas, John N. Tsitsiklis, Dimitris Bertsimas, John Tsitsiklis-Introduction to Linear Optimization.pdf
|
16.9 MB
|
/.../2 - Combinatorial Optimization and Network Flows/
|
Alexander Schrijver-Combinatorial Optimization_ Polyhedra and Efficiency.pdf
|
9.7 MB
|
Combinatorial Optimization.djvu
|
4.1 MB
|
Combinatorial Optimization_ Theory and Algorithms.pdf
|
5.4 MB
|
Network flows_ theory, algorithms, and applications.djvu
|
9.1 MB
|
/.../17 - Advanced Algorithms and Mathematical Optimization/3 - Convex Optimization/
|
Convex Optimization & Euclidean Distance Geometry by Dattorro.pdf
|
28.7 MB
|
Convex Optimization.pdf
|
6.0 MB
|
Lectures on Modern Convex Optimization Analysis, Algorithms, and Engineering Applications.pdf
|
5.4 MB
|
R. Tyrrell Rockafellar-Convex analysis .djvu
|
3.9 MB
|
/.../17 - Advanced Algorithms and Mathematical Optimization/4 - Approximation Algorithms/
|
Approximation Algorithms.pdf
|
1.7 MB
|
The design of approximation algorithms.pdf
|
2.4 MB
|
/.../17 - Advanced Algorithms and Mathematical Optimization/5 - Randomized Algorithms/
|
Motwani R., Raghavan P.-Randomized algorithms-Cambridge University Press (1995).djvu
|
8.1 MB
|
/.../19 - Computer Algebra Systems and Computer Arithmetic/
|
Handbook of Floating-Point Arithmetic.pdf
|
13.3 MB
|
Jean-Pierre Deschamps, Gery J.A. Bioul, Gustavo D. Sutter-Synthesis of Arithmetic Circuits_ FPGA, ASIC and Embedded Systems-Wiley-Interscience (2006).pdf
|
8.1 MB
|
Jean-Pierre Deschamps-Hardware Implementation of Finite-Field Arithmetic (2009).pdf
|
1.6 MB
|
Mircea Vlăduţiu (auth.)-Computer Arithmetic_ Algorithms and Hardware Implementations (2012).djvu
|
2.5 MB
|
Richard Brent, Paul Zimmermann-Modern Computer Arithmetic-Cambridge University Press (2010).pdf
|
2.2 MB
|
von zur Gathen J., Gerhard J.-Modern computer algebra-Cambridge University Press (2013).djvu
|
10.3 MB
|
/Computer Science/20 - Mathematics/
|
(Prentice Hall Signal Processing Series) Alan V. Oppenheim, Ronald W. Schafer-Discrete-Time Signal Processing-Prentice Hall (2010).pdf
|
11.2 MB
|
Alan V. Oppenheim, Alan S. Willsky, with S. Hamid-Signals and Systems-Prentice Hall (1996).pdf
|
35.6 MB
|
Cameron P.J.-Combinatorics_ Topics, Techniques, Algorithms-CUP (1995).djvu
|
5.7 MB
|
David A. Brannan, Matthew F. Esplen, Jeremy J. Gray-Geometry-Cambridge University Press (2012).pdf
|
12.5 MB
|
Hardy G.H., Wright E.M.-An introduction to the theory of numbers- OUP (2008).djvu
|
8.9 MB
|
Jack B. Kuipers-Quaternions and rotation sequences_ a primer with applications to orbits, aerospace, and virtual reality-Princeton University Press (1999).djvu
|
3.0 MB
|
John Harris, Jeffry L. Hirst, Michael Mossinghoff-Combinatorics and Graph Theory (Undergraduate Texts in Mathematics)-Springer (2008).djvu
|
4.4 MB
|
Larry Wasserman-All of Statistics - A Concise Course in Statistical Inference-Springer (2004).pdf
|
9.1 MB
|
Philippe Flajolet, Robert Sedgewick-Analytic Combinatorics-Cambridge University Press (2009).pdf
|
11.5 MB
|
Sheldon M. Ross-Introduction to Probability Models, Ninth Edition-Academic Press (2006).pdf
|
4.0 MB
|
/.../24 - OS Development/
|
Daniel P. Bovet, Marco Cesati Ph.D.-Understanding the Linux Kernel, Third Edition-O'Reilly Media (2005).epub
|
4.4 MB
|
John R. Levine-Linkers & Loaders-Morgan Kaufmann (1999).pdf
|
3.7 MB
|
Jonathan Corbet, Alessandro Rubini, Greg Kroah-Hartman-Linux Device Drivers-O'Reilly Media (2005).epub
|
2.9 MB
|
Mark E. Russinovich, David A. Solomon, Alex Ionescu-Windows Internals, Part 1_ Covering Windows Server® 2008 R2 and Windows 7-Microsoft Press (2012).epub
|
19.0 MB
|
Mark E. Russinovich, David A. Solomon, Alex Ionescu-Windows Internals, Part 2-Microsoft Press (2012).pdf
|
22.7 MB
|
Marshall Kirk McKusick, George V. Neville-Neil, Robert N.M. Watson-The Design and Implementation of the FreeBSD Operating System-Addison-Wesley Professional (2014).pdf
|
25.5 MB
|
Maurice J. Bach-The design of the UNIX operating system (1986).djvu
|
6.2 MB
|
Robert Love-Linux Kernel Development-Addison-Wesley Professional (2010).pdf
|
2.5 MB
|
/.../25 - Reverse Engineering and Malware Analysis/
|
A Guide to Kernel Exploitation_ Attacking the Core-Syngress (2010).pdf
|
5.5 MB
|
Bill Blunden-The Rootkit Arsenal_ Escape and Evasion in the Dark Corners of the System-Jones & Bartlett Learning (2012).pdf
|
111.3 MB
|
Chris Anley, John Heasman, Felix Lindner, Gerardo Richarte-The Shellcoder's Handbook_ Discovering and Exploiting Security Holes-Wiley (2007).pdf
|
9.2 MB
|
Eldad Eilam-Reversing_ secrets of reverse engineering-Wiley (2005).epub
|
9.1 MB
|
Michael Sikorski, Andrew Honig-Practical Malware Analysis_ The Hands-On Guide to Dissecting Malicious Software-No Starch Press (2012).epub
|
11.5 MB
|
Practical reverse engineering_ x86, x64, ARM, Windows Kernel, reversing tools, and obfuscation-Wiley (2014).epub
|
3.3 MB
|
/.../26 - Software Engineering, Development, and Project Management/
|
Andrew Hunt, David Thomas-The Pragmatic Programmer_ From Journeyman to Master.mobi
|
2.5 MB
|
Design Patterns_ Elements of Reusable Object-Oriented Software (1994).epub
|
11.1 MB
|
Frederick P. Brooks-The Mythical Man-Month_ Essays on Software Engineering, Anniversary Edition-Addison-Wesley Professional (2008).djvu
|
6.1 MB
|
Michael Feathers-Working Effectively with Legacy Code-Prentice Hall (2004).epub
|
4.0 MB
|
Robert C. Martin-Clean Code_ A Handbook of Agile Software Craftsmanship-Prentice Hall (2008).pdf
|
3.1 MB
|
Steve McConnell-Code Complete_ A Practical Handbook of Software Construction-Microsoft Press (2004).pdf
|
10.2 MB
|
Tom DeMarco, Tim Lister-Peopleware_ Productive Projects and Teams-Addison-Wesley Professional (2013).pdf
|
4.3 MB
|
/.../28 - Distributed Systems and Computing/
|
Andrew S. Tanenbaum, Maarten Van Steen-Distributed Systems_ Principles and Paradigms (2nd Edition)-Prentice Hall (2006).pdf
|
10.0 MB
|
Hagit Attiya, Jennifer Welch-Distributed Computing_ Fundamentals, Simulations, and Advanced Topics-Wiley-Interscience (2004).djvu
|
4.2 MB
|
Nancy A. Lynch-Distributed Algorithms(1996).pdf
|
40.9 MB
|
Tel G.-Introduction to Distributed Algorithms-Cambridge University Press (2000).pdf
|
7.2 MB
|
/.../1 - Overviews and Engines/
|
Jason Gregory-Game Engine Architecture, Second Edition-CRC Press (2014).pdf
|
68.2 MB
|
Steve Rabin-Introduction to Game Development, Second Edition-Cengage Learning (2009).pdf
|
9.3 MB
|
/.../29 - Game Development/2 - Graphics/
|
Eric Lengyel-Mathematics for 3D Game Programming and Computer Graphics, Third Edition-Cengage (2011).pdf
|
8.8 MB
|
Matt Pharr, Greg Humphreys-Physically Based Rendering, Second Edition_ From Theory To Implementation -Morgan Kaufmann (2010).pdf
|
126.1 MB
|
Tomas Akenine-Moller, Eric Haines, Naty Hoffman-Real-Time Rendering, Third Edition-A K Peters_CRC Press (2008).djvu
|
9.4 MB
|
/.../29 - Game Development/3 - Physics/
|
Christer Ericson-Real-Time Collision Detection-Morgan Kaufmann (2005).pdf
|
3.1 MB
|
David H. Eberly-Game Physics, Second Edition-Morgan Kaufmann (2010).pdf
|
15.7 MB
|
/.../29 - Game Development/4 - Artificial Ingelligence/
|
Ian Millington, John Funge-Artificial Intelligence for Games, Second Edition-Morgan Kaufmann (2009).pdf
|
4.5 MB
|
Rabin, Steven-Game AI Pro _ Collected Wisdom of Game AI Professionals-CRC Press (2013).pdf
|
5.9 MB
|
Steven Rabin-Game AI Pro 2_ Collected Wisdom of Game AI Professionals-A K Peters_CRC Press (2015).pdf
|
26.1 MB
|
/.../30 - Miscellaneous References/
|
Harold Abelson, Gerald Jay Sussman, Julie Sussman-Structure and Interpretation of Computer Programs .pdf
|
2.6 MB
|
Henry S. Warren-Hacker's Delight-Addison-Wesley Professional (2012).epub
|
47.0 MB
|
Jon Bentley-Programming Pearls-Addison-Wesley Professional (1999).djvu
|
2.1 MB
|
Peter G. Neumann-Computer-Related Risks-Addison-Wesley Professional (1994).pdf
|
479.2 KB
|
/.../31 - Interesting Books/
|
(Center for the Study of Language and Information - CSLI Lecture Notes 139) Donald E. Knuth-Selected Papers on Computer Languages-CSLI Publications (2002).djvu
|
5.2 MB
|
(Frontiers in Physics) Richard P. Feynman-Feynman lectures on computation-Addison-Wesley (1996).djvu
|
3.1 MB
|
(Graduate Texts in Mathematics 114) Neal Koblitz (auth.)-A Course in Number Theory and Cryptography-Springer US (1987).djvu
|
3.6 MB
|
(History of Computing) Nathan L. Ensmenger-The Computer Boys Take Over_ Computers, Programmers, and the Politics of Technical Expertise-The MIT Press (2010).epub
|
4.0 MB
|
Brian W. Kernighan, P. J. Plauger-The elements of programming style-Computing Mcgraw-Hill (1978).djvu
|
1.2 MB
|
Brown, Steven T-Tokyo cyberpunk _ posthumanism in Japanese visual culture-Palgrave Macmillan (2010).pdf
|
4.6 MB
|
Central-European Olympiad in Informatics 2002 - tasks and solutions.pdf
|
401.8 KB
|
Central-European Olympiad in Informatics 2004 - ta.pdf
|
498.4 KB
|
Charles Petzold-Code_ The Hidden Language of Computer Hardware and Software-Microsoft Press (2000).epub
|
6.2 MB
|
Daniel P. Friedman, Carl Eastlund-The Little Prover-MIT Press (2015).pdf
|
3.4 MB
|
Daniel P. Friedman, William E. Byrd, Oleg Kiselyov-The Reasoned Schemer-MIT Press (2005).pdf
|
4.4 MB
|
Douglas Coupland-Microserfs .epub
|
747.8 KB
|
Evi Nemeth, Garth Snyder, Trent R. Hein, Ben Whaley-UNIX and Linux System Administration Handbook (4th Edition)-Prentice Hall (2010).djvu
|
9.8 MB
|
Felleisen M., Friedman D.P.-The little MLer-MIT (1997).djvu
|
2.9 MB
|
Fred Vogelstein-Dogfight_ How Apple and Google Went to War and Started a Revolution-Sarah Crichton Books (2013).epub
|
3.3 MB
|
Jon Louis Bentley-More Programming Pearls_ Confessions of a Coder (1988).pdf
|
11.3 MB
|
L. Lovász-Combinatorial problems and exercises-North Holland (1993).djvu
|
4.0 MB
|
Nelsen R.-Proofs without words 1. Exercises in visual thinking-MAA (1993).djvu
|
2.8 MB
|
Nelsen R.-Proofs without words 2. More exercises in visual thinking-MAA (2000).djvu
|
4.7 MB
|
Peteris Krumins-Perl One-Liners_ 130 Programs That Get Things Done-No Starch Press (2013).epub
|
1.3 MB
|
Raymond M. Smullyan-To mock a mockingbird and other logic puzzles_ Including an amazing adventure in combinatory logic-Knopf (1985).djvu
|
1.3 MB
|
Scott Rosenberg-Dreaming in Code_ Two Dozen Programmers, Three Years, 4,732 Bugs, and One Quest for Transcendent Software-Crown (2007).epub
|
527.5 KB
|
Steven Levy-Hackers_ Heroes of the Computer Revolution - 25th Anniversary Edition-O'Reilly Media (2010).epub
|
1.1 MB
|
The Little Book of Semaphores.pdf
|
1.0 MB
|
The Unix Haters Handbook .pdf
|
3.6 MB
|
Tracy Kidder-The Soul of A New Machine-Back Bay Books (2000).epub
|
284.0 KB
|
/.../32 - Must read/
|
(Addison-Wesley Signature Series) Martin Fowler-Patterns of Enterprise Application Architecture-Addison-Wesley Professional (2002).pdf
|
5.3 MB
|
(MIT Electrical Engineering and Computer Science) Harold Abelson, Gerald Jay Sussman-Structure and Interpretation of Computer Programs - 2nd Edition-The MIT Press (1996).pdf
|
9.4 MB
|
Alan Cooper-Inmates Are Running the Asylum, The_ Why High-Tech Products Drive Us Crazy and How to Restore the Sanity-Sams, (2004).pdf
|
3.8 MB
|
Alfred V. Aho, Monica S. Lam, Ravi Sethi, Jeffrey D. Ullman-Compilers - Principles, Techniques, and Tools-Pearson_Addison Wesley (2006).pdf
|
6.1 MB
|
Andrew Hunt, David Thomas-The Pragmatic Programmer_ From Journeyman to Master-addison-wesley (1999).pdf
|
2.4 MB
|
Charles E. Leiserson, Ronald L. Rivest, Clifford Stein, Thomas H. Coreman-Introduction to Algorithms_ Instructor's Manual (2005).pdf
|
1.7 MB
|
Charles Petzold-Code_ The Hidden Language of Computer Hardware and Software-Microsoft Press (2000).epub
|
6.2 MB
|
Douglas R. Hofstadter-Gödel, Escher, Bach_ An Eternal Golden Braid (Twentieth-Anniversary Edition)-Basic Books (1999).pdf
|
32.8 MB
|
Erich Gamma, Richard Helm, Ralph Johnson, John M. Vlissides-Design Patterns_ Elements of Reusable Object-Oriented Software -Addison-Wesley Professional (1994).pdf
|
19.2 MB
|
Frederick P. Brooks-The Mythical Man-Month_ Essays on Software Engineering, Anniversary Edition (2nd Edition)-Addison-Wesley Professional (1995).pdf
|
20.3 MB
|
Joshua Bloch-Effective Java-Prentice Hall PTR (2008).pdf
|
2.2 MB
|
Martin Fowler, Kent Beck, John Brant, William Opdyke, Don Roberts-Refactoring_ Improving the Design of Existing Code-Addison-Wesley Professional (1999).pdf
|
2.4 MB
|
Michael Feathers-Working Effectively with Legacy Code-Prentice Hall (2004).epub
|
4.0 MB
|
Peter Seibel-Coders at Work_ Reflections on the Craft of Programming-Apress (2009).pdf
|
5.6 MB
|
Robert C. Martin-Clean Code_ A Handbook of Agile Software Craftsmanship-Prentice Hall (2008).pdf
|
3.1 MB
|
Steve McConnell-Code Complete_ A Practical Handbook of Software Construction-Microsoft Press (2004).pdf
|
10.2 MB
|
Thomas H. Cormen, Charles E. Leiserson, Ronald L. Rivest, Clifford Stein-Introduction to Algorithms, Third Edition (2009).pdf
|
5.6 MB
|
Tom DeMarco, Tim Lister-Peopleware_ Productive Projects and Teams-Addison-Wesley Professional (2013).pdf
|
4.3 MB
|
why the lucky stiff-Why's (poignant) Guide to Ruby.pdf
|
8.9 MB
|
/Cybersecurity Ebooks/AAA_smistare/
|
(Information science and statistics) Christopher M. Bishop-Pattern Recognition and Machine Learning-Springer (2006).pdf
|
8.5 MB
|
2014-apt-study.pdf
|
169.5 KB
|
15344.pdf
|
53.3 KB
|
Aamir Lakhani, Joseph Muniz-Penetration Testing with Raspberry Pi-Packt Publishing (2015).pdf
|
10.2 MB
|
Aaron Johns-Mastering Wireless Penetration Testing for Highly-Secured Environments-Packt Publishing (2015).pdf
|
12.9 MB
|
advanced-persistent-threat-id52631.pdf
|
83.8 KB
|
Allen Downey B.-Think Bayes-O'Reilly Media (2013).pdf
|
12.3 MB
|
analisi_tecnica_rsi_relative_strentgh_index_significato_formula_intepretazione_tempi_ed_esempi.pdf
|
408.5 KB
|
Bachaalany, Elias_ Koret, Joxean-The Antivirus Hacker's Handbook-Wiley (2015).pdf
|
5.9 MB
|
Bastian Ballmann-Understanding Network Hacks_ Attack and Defense with Python-Springer (2015).pdf
|
11.4 MB
|
Ben Clark-Rtfm_ Red Team Field Manual-CreateSpace Independent Publishing Platform (2014).pdf
|
10.7 MB
|
Chris Sanders and Jason Smith (Auth.)-Applied Network Security Monitoring. Collection, Detection, and Analysis (2014).pdf
|
39.2 MB
|
David Nathans-Designing and Building Security Operations Center-Syngress (2014).pdf
|
3.6 MB
|
Douglas Berdeaux-Penetration Testing with Perl-Packt Publishing - ebooks Account (2015).pdf
|
4.6 MB
|
Drew Conway, John Myles White-Machine Learning for Hackers-O'Reilly Media (2012).pdf
|
1.8 MB
|
FirstStrike_Plus.pdf
|
175.3 KB
|
Ivan Ristic-Bulletproof SSL and TLS_ Understanding and Deploying SSL_TLS and PKI to Secure Servers and Web Applications-Feisty Duck (2014).pdf
|
7.1 MB
|
J.J. MURPHY-ANALISI TECNICA DEI MERCATI FINANZIARI.pdf
|
16.2 MB
|
Jacob Perkins-Python 3 Text Processing with NLTK 3 Cookbook-Packt Publishing - ebooks Account (2014).pdf
|
1.7 MB
|
Jason Andress, Ryan Linn-Coding for Penetration Testers_ Building Better Tools -Syngress (2011).pdf
|
10.4 MB
|
Jay Jacobs, Bob Rudis-Data-Driven Security_ Analysis, Visualization and Dashboards-Wiley (2014).pdf
|
8.6 MB
|
Jennifer Golbeck-Introduction to Social Media Investigation_ A Hands-on Approach-Syngress (2015).pdf
|
62.2 MB
|
Jeremy Faircloth-Penetration Tester's Open Source Toolkit, Third Edition -Elsevier Science (2011).pdf
|
17.8 MB
|
Johnny Long, Bill Gardner, Justin Brown-Google Hacking for Penetration Testers-Syngress (2015).pdf
|
38.5 MB
|
Loraine Blaxter, Christina Hughes, Malcolm Tight-How to Research, 4th Edition -Open University Press (2010).pdf
|
1.3 MB
|
Luis Pedro Coelho, Willi Richert-Building Machine Learning Systems with Python-Packt Publishing (2015).pdf
|
6.8 MB
|
Lutz M.-Python pocket reference-O'Reilly (2014).pdf
|
2.5 MB
|
Matthew A. Russell-Mining the social web_ data mining Facebook, Twitter, LinkedIn, Google+, GitHub, and more-O'Reilly Media (2013).pdf
|
22.1 MB
|
Micha Gorelick, Ian Ozsvald-High Performance Python_ Practical Performant Programming for Humans-O'Reilly Media (2014).pdf
|
8.0 MB
|
Michael Collins-Network Security Through Data Analysis_ Building Situational Awareness-O'Reilly Media (2014).pdf
|
14.1 MB
|
Paulino Calderon Pale-Mastering Nmap Scripting Engine-Packt Publishing (2015).pdf
|
2.0 MB
|
Qing Li, Gregory Clark-Security Intelligence_ A Practitioner's Guide to Solving Enterprise Security Challenges-Wiley (2015).pdf
|
22.6 MB
|
Richard Lawson-Web Scraping with Python-Packt Publishing (2015).pdf
|
5.5 MB
|
Ryan Mitchell-Web Scraping with Python_ Collecting Data from the Modern Web-O'Reilly Media (2015).pdf
|
6.4 MB
|
Sam Newman-Building Microservices-O'Reilly Media (2015).pdf
|
5.0 MB
|
Steven Bird, Ewan Klein, Edward Loper-Natural Language Processing with Python-O'Reilly Media (2009).pdf
|
5.4 MB
|
The_Art_of_Human_Hacking.pdf
|
6.4 MB
|
Toby Segaran-Programming Collective Intelligence_ Building Smart Web 2.0 Applications-O'Reilly Media (2007).pdf
|
3.5 MB
|
Tyler Wrightson-Advanced Persistent Threat Hacking_ The Art and Science of Hacking Any Organization-McGraw-Hill (2015).pdf
|
11.1 MB
|
Wes McKinney-Python for Data Analysis-O'Reilly Media (2012).pdf
|
14.8 MB
|
wireless_hacking_presentation.pdf
|
2.3 MB
|
Yuxing Yan-Python for Finance-Packt Publishing - ebooks Account (2014).pdf
|
5.1 MB
|
Yves Hilpisch-Python for Finance_ Analyze Big Financial Data-O'Reilly Media (2014).pdf
|
11.0 MB
|
/.../Learning Penetration Testing with Python/
|
C# Programming From Problem Analysis to Program Design, 3rd Edition.pdf
|
58.3 MB
|
JavaScript by Example, 2nd Edition.pdf
|
28.2 MB
|
Learning Penetration Testing wi - Christopher Duffy.pdf
|
9.6 MB
|
Learning Penetration Testing with Python.pdf
|
9.6 MB
|
/Cybersecurity Ebooks/Antiviruses/
|
2012_EPP_CAR_Consumer_Exploit_Evasion_Defenses_0.pdf
|
275.5 KB
|
34591.pdf
|
1.1 MB
|
An Automated Online Packing Service for Optimal Antivirus Evasion.pdf
|
175.6 KB
|
Antivirus , Firewall evasion techiniques.pdf
|
633.7 KB
|
AV-Sandbox-Presentation_v2.0.pdf
|
257.8 KB
|
AV_Evasion.pdf
|
443.4 KB
|
avevasion-techniques.pdf
|
771.2 KB
|
BypassAVDynamics.pdf
|
1.0 MB
|
bypassing-av.pdf
|
1.1 MB
|
Evading Antivirus Metasploit Webcast.pdf
|
628.9 KB
|
evasive_threats.pdf
|
1.3 MB
|
Fighting_Advanced_Threats.pdf
|
2.1 MB
|
IJOPCM(vol.1.2.3.S.08).pdf
|
86.5 KB
|
MalWareBytes_sSecurity_IO#113914_Eguide_031714_LI#839558.pdf
|
775.3 KB
|
Practical Anti-virus Evasion - avevasion_pentestmag.pdf
|
362.2 KB
|
rp-nss-labs-corporate-exploit-evasion-defenses.pdf
|
189.6 KB
|
Ryan Linn - Getting Shells When Metasploit Fails - Sector 2012.pdf
|
673.5 KB
|
security-guide-how-to-evade-anti-virus-detection.pdf
|
172.0 KB
|
Testing antivirus engines to determine theireffectiveness as a security layer.pdf
|
570.7 KB
|
The Deathof AV DefenseinDepth _- revisiting Anti-Virus Software.pdf
|
2.4 MB
|
The State of the Veil Framework - Will Schroeder and Chris Truncer.pdf
|
744.6 KB
|
us-14-Mesbahi-One-Packer-To-Rule-Them-All-WP.pdf
|
2.5 MB
|
us-15-Xenakis-ROPInjector-Using-Return-Oriented-Programming-For-Polymorphism-And-Antivirus-Evasion-wp.pdf
|
724.3 KB
|
us-15-Xenakis-ROPInjector-Using-Return-Oriented-Programming-For-Polymorphism-And-Antivirus-Evasion.pdf
|
383.5 KB
|
Why_Antivirus_Fails_-_Daniel_Sauder.pdf
|
1.3 MB
|
why_malware_works_in_face_of_antivirus_software.pdf
|
793.8 KB
|
woot09-polypack-pres.pdf
|
1.9 MB
|
WP_SerialVariantEvasionTactics.pdf
|
1.2 MB
|
Writing Zero Days for Security - APT Penetration Testing Framework v1.0.pdf
|
3.7 MB
|
/Cybersecurity Ebooks/APT/
|
2014-apt-study.pdf
|
169.5 KB
|
advance-penetration-testing-kali-linux-training.pdf
|
36.1 KB
|
Advanced Penetration Testing for Highly Secured Environments.pdf
|
16.6 MB
|
Advanced Persistent Threat Hacking, The Art & Science.pdf
|
11.1 MB
|
b-advanced_persistent_threats_WP_21215957.en-us.pdf
|
3.1 MB
|
CybraryAdvancedPenSlides.pdf
|
2.4 MB
|
esg-apts-deep-discovery-whitepaper-en.pdf
|
494.0 KB
|
Syngress.Advanced.Persistent.Threat.Nov.2012.ISBN.1597499498.pdf
|
7.5 MB
|
Will Gragido, John Pirc-Cybercrime and Espionage_ An Analysis of Subversive Multi-Vector Threats-Syngress (2011).pdf
|
15.0 MB
|
/Cybersecurity Ebooks/Big Data/
|
Apress.Big.Data.Imperatives.Jun.2013.ISBN.1430248726.pdf
|
10.5 MB
|
Morgan.Kaufmann.Data.Warehousing.In.The.Age.Of.Big.Data.Jun.2013.ISBN.0124058914.pdf
|
17.2 MB
|
OReilly.Data.Science.For.Business.Aug.2013.ISBN.1449361323.pdf
|
15.2 MB
|
OReilly.Ethics.Of.Big.Data.Sep.2012.ISBN.1449311792.pdf
|
6.2 MB
|
Packt.Big.Data.Analytics.With.R.And.Hadoop.Nov.2013.ISBN.178216328X.pdf
|
3.2 MB
|
Wiley.Big.Data.Oct.2013.ISBN.1118739574(1).pdf
|
21.6 MB
|
Wiley.Big.Feb.2015.ISBN.1118965833.pdf
|
4.8 MB
|
Wiley.Data.May.2013.ISBN.111844714X.pdf
|
33.6 MB
|
Wiley.Data.Mining.May.2014.ISBN.1119977134.pdf
|
16.5 MB
|
Wiley.Making.2nd.Edition.Aug.2014.ISBN.1118407415.pdf
|
8.4 MB
|
/Cybersecurity Ebooks/CEH/
|
Advanced Python Programming.pdf
|
199.0 KB
|
Attacking The DNS Protocol.pdf
|
330.2 KB
|
CEH-Handbook-v2.0.pdf
|
56.6 MB
|
Certified Ethical Hacker 3.0 Official Course.pdf
|
27.1 MB
|
Hacking - CEH Cheat Sheet Exercises.pdf
|
336.2 KB
|
HII_Remote_and_Local_File_Inclusion_Vulnerabilities.pdf
|
1.9 MB
|
Pen_Testing_and_Ethical_Hacking_Study_Guide.pdf
|
1.7 MB
|
/Cybersecurity Ebooks/CEH/CEH 7&8/
|
CEHV7 - Module 01 - Introduction to Ethical Hacking.pdf
|
5.2 MB
|
CEHV7 - Module 02 - Footprinting and Reconnaissance.pdf
|
8.9 MB
|
CEHV7 - Module 03 - Scanning Networks.pdf
|
16.7 MB
|
CEHV7 - Module 04 - Enumeration.pdf
|
7.0 MB
|
CEHV7 - Module 05 - System Hacking.pdf
|
23.9 MB
|
CEHV7 - Module 06 - Trojans and Backdoors.pdf
|
15.2 MB
|
CEHV7 - Module 07 - Viruses and Worms.pdf
|
12.0 MB
|
CEHV7 - Module 08 - Sniffers.pdf
|
13.8 MB
|
CEHV7 - Module 09 - Social Engineering.pdf
|
11.1 MB
|
CEHV7 - Module 10 - Denial of Service.pdf
|
10.0 MB
|
CEHV7 - Module 11 - Session Hijacking.pdf
|
7.9 MB
|
CEHV7 - Module 12 - Hacking Webservers.pdf
|
12.3 MB
|
CEHV7 - Module 13 - Hacking Web Applications.pdf
|
24.7 MB
|
CEHV7 - Module 14 - SQL Injection.pdf
|
15.4 MB
|
CEHV7 - Module 15 - Hacking Wireless Networks.pdf
|
25.0 MB
|
CEHV7 - Module 16 - Evading IDS, Firewalls, and Honeypots.pdf
|
17.2 MB
|
CEHV7 - Module 17 - Buffer Overflow.pdf
|
8.7 MB
|
CEHV7 - Module 18 - Cryptography.pdf
|
7.4 MB
|
CEHV7 - Module 19 - Penetration Testing.pdf
|
10.9 MB
|
CEHV7- Certified Ethical Hacker Study Guide.pdf
|
7.0 MB
|
CEHV8 - Hacker Halted.pdf
|
1.2 MB
|
CEHV8 - Module 00 - Labs Countermeasures.pdf
|
101.5 KB
|
CEHV8 - Module 01 - Introduction to Ethical Hacking.pdf
|
4.1 MB
|
CEHV8 - Module 02 - Footprinting and Reconnaissance.pdf
|
8.2 MB
|
CEHV8 - Module 02 - Labs Footprinting and Reconnaissance.pdf
|
3.6 MB
|
CEHV8 - Module 03 - Labs Scanning Networks.pdf
|
6.8 MB
|
CEHV8 - Module 03 - Scanning Networks.pdf
|
8.7 MB
|
CEHV8 - Module 04 - Enumeration.pdf
|
4.0 MB
|
CEHV8 - Module 04 - Labs Enumeration.pdf
|
1.5 MB
|
CEHV8 - Module 05 - Labs System Hacking.pdf
|
4.8 MB
|
CEHV8 - Module 05 - System Hacking.pdf
|
14.7 MB
|
CEHV8 - Module 06 - Labs Trojans and Backdoors.pdf
|
4.4 MB
|
CEHV8 - Module 06 - Trojans and Backdoors.pdf
|
9.1 MB
|
CEHV8 - Module 07 - Labs Viruses and Worms.pdf
|
2.5 MB
|
CEHV8 - Module 07 - Viruses and Worms.pdf
|
5.1 MB
|
CEHV8 - Module 08 - Labs Sniffers.pdf
|
4.4 MB
|
CEHV8 - Module 08 - Sniffing.pdf
|
8.4 MB
|
CEHV8 - Module 09 - Labs Social Engineering.pdf
|
1.2 MB
|
CEHV8 - Module 10 - Denial of Service.pdf
|
5.1 MB
|
CEHV8 - Module 10 - Labs Denial of Service.pdf
|
523.9 KB
|
CEHV8 - Module 11 - Labs Session Hijacking.pdf
|
684.0 KB
|
CEHV8 - Module 11 - Session Hijacking.pdf
|
4.5 MB
|
CEHV8 - Module 12 - Hacking Webservers.pdf
|
6.0 MB
|
CEHV8 - Module 12 - Labs Hacking Webservers.pdf
|
1.3 MB
|
CEHV8 - Module 13 - Hacking Web Applications.pdf
|
12.5 MB
|
CEHV8 - Module 13 - Labs Hacking Web Applications.pdf
|
907.4 KB
|
CEHV8 - Module 14 - Labs SQL Injection.pdf
|
1.6 MB
|
CEHV8 - Module 14 - SQL Injection.pdf
|
7.2 MB
|
CEHV8 - Module 15 - Hacking Wireless Networks.pdf
|
12.7 MB
|
CEHV8 - Module 15 - Labs Hacking Wireless Networks.pdf
|
1.3 MB
|
CEHV8 - Module 16 - Hacking Mobile Platforms.pdf
|
7.3 MB
|
CEHV8 - Module 17 - Evading IDS, Firewalls, and Honeypots.pdf
|
6.8 MB
|
CEHV8 - Module 17 - Labs Evading IDS, Firewalls and Honeypots.pdf
|
2.4 MB
|
CEHV8 - Module 18 - Buffer Overflow.pdf
|
4.2 MB
|
CEHV8 - Module 18 - Labs Buffer Overflow.pdf
|
466.7 KB
|
CEHV8 - Module 19 - Cryptography.pdf
|
4.2 MB
|
CEHV8 - Module 19 - Labs Cryptography.pdf
|
1.9 MB
|
CEHV8 - Module 20 - Penetration Testing.pdf
|
4.6 MB
|
CEHV8 - References.pdf
|
2.9 MB
|
Cybercriminalité, Enquète sur les mafias qui envahissent le web.pdf
|
3.4 MB
|
Frankenstein Slides.pdf
|
2.0 MB
|
Les virus informatiques théorie, pratique et applications [584 pages].pdf
|
20.5 MB
|
Techniques virales avancées [292 pages].pdf
|
14.7 MB
|
/Cybersecurity Ebooks/CEH/CEH 2009/
|
CEH-Classroom-Lab-Setup-v6.pdf
|
1.6 MB
|
CEHv6 Module 00 Student Introduction.pdf
|
604.9 KB
|
CEHv6 Module 01 Introduction to Ethical Hacking.pdf
|
3.2 MB
|
CEHv6 Module 02 Hacking Laws.pdf
|
3.8 MB
|
CEHv6 Module 03 Footprinting.pdf
|
10.5 MB
|
CEHv6 Module 04 Google Hacking.pdf
|
4.4 MB
|
CEHv6 Module 05 Scanning.pdf
|
17.5 MB
|
CEHv6 Module 06 Enumeration.pdf
|
4.2 MB
|
CEHv6 Module 07 System Hacking.pdf
|
15.8 MB
|
CEHv6 Module 08 Trojans and Backdoors.pdf
|
9.5 MB
|
CEHv6 Module 09 Viruses and Worms.pdf
|
5.8 MB
|
CEHv6 Module 10 Sniffers.pdf
|
10.5 MB
|
CEHv6 Module 11 Social Engineering.pdf
|
5.3 MB
|
CEHv6 Module 12 Phishing.pdf
|
2.7 MB
|
CEHv6 Module 13 Hacking Email Accounts.pdf
|
1.9 MB
|
CEHv6 Module 14 Denial of Service.pdf
|
3.7 MB
|
CEHv6 Module 15 Session Hijacking.pdf
|
2.0 MB
|
CEHv6 Module 16 Hacking Webservers.pdf
|
5.1 MB
|
CEHv6 Module 17 Web Application Vulnerabilities.pdf
|
4.8 MB
|
CEHv6 Module 18 Web based Password Cracking Techniques.pdf
|
5.7 MB
|
CEHv6 Module 19 SQL Injection.pdf
|
3.4 MB
|
CEHv6 Module 20 Hacking Wireless Networks.pdf
|
13.6 MB
|
CEHv6 Module 21 Physical Security.pdf
|
3.2 MB
|
CEHv6 Module 22 Linux Hacking.pdf
|
6.4 MB
|
CEHv6 Module 23 Evading IDS Firewall and Honeypot.pdf
|
5.0 MB
|
CEHv6 Module 24 Buffer Overflows.pdf
|
1.4 MB
|
CEHv6 Module 25 Cryptography.pdf
|
4.3 MB
|
CEHv6 Module 26 Penetration Testing.pdf
|
5.9 MB
|
CEHv6 Module 28 Writing Virus Codes.pdf
|
613.4 KB
|
CEHv6 Module 29 Assembly Language Tutorial.pdf
|
1.0 MB
|
CEHv6 Module 30 Exploit Writing.pdf
|
2.1 MB
|
CEHv6 Module 31 Exploit Writing.pdf
|
244.7 KB
|
CEHv6 Module 32 Exploit Writing.pdf
|
656.2 KB
|
CEHv6 Module 33 Reverse Engineering Techniques.pdf
|
2.9 MB
|
CEHv6 Module 34 MAC OS X Hacking.pdf
|
1.3 MB
|
CEHv6 Module 35 Hacking Routers, Cable Modems and Firewalls.pdf
|
3.4 MB
|
CEHv6 Module 36 Hacking Mobile Phones, PDA and Handheld Devices.pdf
|
4.2 MB
|
CEHv6 Module 37 Bluetooth Hacking.pdf
|
2.6 MB
|
CEHv6 Module 38 VoIP Hacking.pdf
|
4.1 MB
|
CEHv6 Module 39 RFID Hacking.pdf
|
2.3 MB
|
CEHv6 Module 40 Spamming.pdf
|
2.8 MB
|
CEHv6 Module 41 Hacking USB Devices.pdf
|
1.9 MB
|
CEHv6 Module 42 Hacking Database Servers.pdf
|
1.7 MB
|
CEHv6 Module 43 Cyber Warfare- Hacking Al-Qaida and Terrorism.pdf
|
2.8 MB
|
CEHv6 Module 44 Internet Content Filtering Techniques.pdf
|
2.0 MB
|
CEHv6 Module 45 Privacy on the Internet.pdf
|
5.7 MB
|
CEHv6 Module 46 Securing Laptop Computers.pdf
|
2.0 MB
|
CEHv6 Module 47 Spying Technologies.pdf
|
4.5 MB
|
CEHv6 Module 48 Corporate Espionage by Insiders.pdf
|
2.3 MB
|
CEHv6 Module 49 Creating Security Policies.pdf
|
2.2 MB
|
CEHv6 Module 50 Software Piracy and W.pdf
|
2.2 MB
|
CEHv6 Module 51 Hacking and Cheating Online Games.pdf
|
2.1 MB
|
CEHv6 Module 52 Hacking RSS and Atom.pdf
|
1.7 MB
|
CEHv6 Module 53 Hacking Web Browsers.pdf
|
2.0 MB
|
CEHv6 Module 54 Proxy Server Technologies.pdf
|
2.4 MB
|
CEHv6 Module 55 Preventing Data Loss.pdf
|
3.9 MB
|
CEHv6 Module 56 Hacking Global Positioning System.pdf
|
2.2 MB
|
CEHv6 Module 57 Computer Forensics and Incident Handling.pdf
|
2.6 MB
|
CEHv6 Module 58 Credit Card Frauds.pdf
|
2.2 MB
|
CEHv6 Module 59 How to Steal Passwords.pdf
|
1.6 MB
|
CEHv6 Module 60 Firewall Technologies.pdf
|
3.0 MB
|
CEHv6 Module 61 Threats and Countermeasures.pdf
|
1.0 MB
|
CEHv6 Module 62 Case Studies.pdf
|
731.0 KB
|
CEHv6 Module 63 Botnets.pdf
|
1.2 MB
|
CEHv6 Module 64 Economic Espionage.pdf
|
668.9 KB
|
CEHv6 Module 65 Patch Management.pdf
|
7.4 MB
|
CEHv6 Module 66 Security Convergence.pdf
|
645.7 KB
|
CEHv6 Module 67 Identifying the Terrorists.pdf
|
1.8 MB
|
prova 312-50.pdf
|
2.9 MB
|
/Cybersecurity Ebooks/CEH/CEH 2010/
|
CEH Official Certified Ethical Hacker Review Guide (2010) CT.pdf
|
8.4 MB
|
CEH v01 Ethical Hacking & Countermeasures Attack Phases (2010) CT.pdf
|
17.9 MB
|
CEH v02 Ethical Hacking & Countermeasures Threats & Defense Mechanisms (2010) CT.pdf
|
16.0 MB
|
CEH v03 Ethical Hacking & Countermeasures Web Applications & Data Servers (2010) CT.pdf
|
14.1 MB
|
CEH v04 Ethical Hacking & Countermeasures Linux, Macintosh & Mobile Systems (2010) CT.pdf
|
6.7 MB
|
CEH v05 Ethical Hacking & Countermeasures Secure Network Infrastructures (2010) CT.pdf
|
8.3 MB
|
CHFI v01 Computer Forensics Investigation Procedures & Response (2010) CT.pdf
|
4.0 MB
|
CHFI v02 Computer Forensics Investigating Hard Disks, File & Operating Systems (2010) CT.pdf
|
10.8 MB
|
CHFI v03 Computer Forensics Investigating Data & Image Files (2010) CT.pdf
|
18.2 MB
|
CHFI v04 Computer Forensics Investigating Network Intrusions & Cyber Crimes (2010) CT.pdf
|
25.2 MB
|
CHFI v05 Computer Forensics Investigating Wireless Networks & Devices (2010) CT.pdf
|
5.6 MB
|
ECDR-ECVT v01 Disaster Recovery (2011) CT.pdf
|
9.5 MB
|
ECDR-ECVT v02 Virtualization Security (2011) CT.pdf
|
8.0 MB
|
ECSA v01 Security Analysis (2011) CT.pdf
|
21.3 MB
|
ECSA v02 Procedures & Methodologies (2011) CT.pdf
|
8.3 MB
|
ECSA v03 Network & Perimeter Testing (2011) CT.pdf
|
11.2 MB
|
ECSA v04 Communication Media Testing (2011) CT.pdf
|
13.0 MB
|
ECSA v05 Network Threat Testing (2011) CT.pdf
|
8.8 MB
|
ENSA v01 Network Defense; Fundamentals & Protocols (2011) CT.pdf
|
16.6 MB
|
ENSA v02 Network Defense; Security Policy & Threats (2011) CT.pdf
|
13.1 MB
|
ENSA v03 Network Defense; Perimeter Defense Mechanisms (2011) CT.pdf
|
6.0 MB
|
ENSA v04 Network Defense; Securing & Troubleshooting Network Operating Systems (2011) CT.pdf
|
13.8 MB
|
ENSA v05 Network Defense; Security & Vulnerability Assessment (2011) CT.pdf
|
13.0 MB
|
Network 5; Network Safety Certification (2011) CT.pdf
|
3.3 MB
|
Wireless 5; Wireless Safety Certification (2010) CT.pdf
|
3.5 MB
|
/Cybersecurity Ebooks/CEH/CEHv6/
|
Exploit Writing Using Metasploit Framework.pdf
|
656.2 KB
|
Module 03 Footprinting.pdf
|
10.5 MB
|
Module 04 Google Hacking.pdf
|
4.4 MB
|
Module 05 Scanning.pdf
|
17.5 MB
|
Module 06 Enumeration.pdf
|
4.2 MB
|
Module 07 System Hacking.pdf
|
15.8 MB
|
Module 08 Trojans and Backdoors.pdf
|
9.5 MB
|
Module 09 Viruses and Worms.pdf
|
5.8 MB
|
Module 10 Sniffers.pdf
|
10.5 MB
|
Module 11 Social Engineering.pdf
|
5.3 MB
|
Module 12 Phishing.pdf
|
2.7 MB
|
Module 13 Hacking Email Accounts.pdf
|
1.9 MB
|
Module 14 Denial of Service.pdf
|
3.7 MB
|
Module 15 Session Hijacking.pdf
|
2.0 MB
|
Module 16 Hacking Webservers.pdf
|
5.1 MB
|
Module 17 Web Application Vulnerabilities.pdf
|
4.8 MB
|
Module 18 Web based Password Cracking Techniques.pdf
|
5.7 MB
|
Module 19 SQL Injection.pdf
|
3.4 MB
|
Module 20 Hacking Wireless Networks.pdf
|
13.6 MB
|
Module 21 Physical Security.pdf
|
3.2 MB
|
Module 22 Linux Hacking.pdf
|
6.4 MB
|
Module 23 Evading IDS Firewall and Honeypot.pdf
|
5.0 MB
|
Module 24 Buffer Overflows.pdf
|
1.4 MB
|
Module 25 Cryptography.pdf
|
4.3 MB
|
Module 26 Penetration Testing.pdf
|
5.9 MB
|
Module 28 Writing Virus Codes.pdf
|
613.4 KB
|
Module 29 Assembly Language Tutorial.pdf
|
1.0 MB
|
Module 30 Exploit Writing.pdf
|
2.1 MB
|
Module 31 Windows Based Buffer Overflow Exploit Writing.pdf
|
244.7 KB
|
Module 33 Reverse Engineering Techniques.pdf
|
2.9 MB
|
Module 34 MAC OS X Hacking.pdf
|
1.3 MB
|
Module 35 Hacking Routers, Cable Modems and Firewalls.pdf
|
3.4 MB
|
Module 36 Hacking Mobile Phones, PDA and Handheld Devices.pdf
|
4.2 MB
|
Module 37 Bluetooth Hacking.pdf
|
2.6 MB
|
Module 38 VoIP Hacking.pdf
|
4.1 MB
|
Module 39 RFID Hacking.pdf
|
2.3 MB
|
Module 40 Spamming.pdf
|
2.8 MB
|
Module 41 Hacking USB Devices.pdf
|
1.9 MB
|
Module 42 Hacking Database Servers.pdf
|
1.7 MB
|
Module 43 Cyber Warfare- Hacking Al-Qaida and Terrorism.pdf
|
2.8 MB
|
Module 44 Internet Content Filtering Techniques.pdf
|
2.0 MB
|
Module 45 Privacy on the Internet.pdf
|
5.7 MB
|
Module 46 Securing Laptop Computers.pdf
|
2.0 MB
|
Module 47 Spying Technologies.pdf
|
4.5 MB
|
Module 48 Corporate Espionage by Insiders.pdf
|
2.3 MB
|
Module 49 Creating Security Policies.pdf
|
2.2 MB
|
Module 50 Software Piracy and Warez.pdf
|
2.2 MB
|
Module 51 Hacking and Cheating Online Games.pdf
|
2.1 MB
|
Module 52 Hacking RSS and Atom.pdf
|
1.7 MB
|
Module 53 Hacking Web Browsers.pdf
|
2.0 MB
|
Module 54 Proxy Server Technologies.pdf
|
2.4 MB
|
Module 55 Preventing Data Loss.pdf
|
3.9 MB
|
Module 56 Hacking Global Positioning System.pdf
|
2.2 MB
|
Module 57 Computer Forensics and Incident Handling.pdf
|
2.6 MB
|
Module 58 Credit Card Frauds.pdf
|
2.2 MB
|
Module 59 How to Steal Passwords.pdf
|
1.6 MB
|
Module 60 Firewall Technologies.pdf
|
3.0 MB
|
Module 61 Threats and Countermeasures.pdf
|
26.1 MB
|
Module 62 Case Studies.pdf
|
731.0 KB
|
Module 63 Botnets.pdf
|
1.2 MB
|
Module 64 Economic Espionage.pdf
|
668.9 KB
|
Module 65 Patch Management.pdf
|
7.4 MB
|
Module 66 Security Convergence.pdf
|
645.7 KB
|
Module 67 Identifying the Terrorists.pdf
|
1.8 MB
|
/Cybersecurity Ebooks/Computer Security/
|
Addison.Wesley.Crimeware.Understanding.New.Attacks.And.Defenses.Apr.2008.ISBN.0321501950.chm
|
10.8 MB
|
Addison.Wesley.The.Technical.And.Social.History.Of.Software.Engineering.Dec.2013.ISBN.0321903420.pdf
|
1.6 MB
|
Apress.Healthcare.Jun.2014.ISBN.1430266767.pdf
|
2.5 MB
|
McGraw.Hill.Principles.Of.Computer.Security.CompTIA.Security.Plus.And.Beyond.Lab.Manual.2nd.Edition.Dec.2010.ISBN.0071748563.pdf
|
5.8 MB
|
Syngress.The.Basics.Of.Digital.Privacy.May.2013.ISBN.0128000112.pdf
|
8.6 MB
|
/Cybersecurity Ebooks/Cryptography/
|
A cryptographic file system for unix.pdf
|
112.3 KB
|
ADVANCED ENCRYPTION STANDARD.pdf
|
1.4 MB
|
Attacking NTLM with Precomputed Hashtables.pdf
|
122.2 KB
|
Attacking Unbalanced RSA-CRT Using SPA.pdf
|
239.1 KB
|
Cryptanalysis of Hash Functions of the MD4-Family.pdf
|
933.8 KB
|
Cryptography.pdf
|
1.7 MB
|
D1T2 - Skyper - Cracking the GSM A5_1 Encryption in Seconds.pdf
|
3.6 MB
|
Defeating_Encryption.pdf
|
502.8 KB
|
DES.pdf
|
443.4 KB
|
Detecting and Defeating Government Interception Attacks Against SSL.pdf
|
607.2 KB
|
DETECTING HIDDEN MESSAGES USING HIGHER-ORDER STATISTICAL MODELS.pdf
|
171.3 KB
|
Detecting Hidden Messages Using Higher-Order Statistics and Support Vector Machines.pdf
|
506.5 KB
|
Detecting Steganographic Content on the Internet.pdf
|
840.9 KB
|
FUNDAMENTALS OF CRYPTOLOGY.pdf
|
3.0 MB
|
How to Break MD5 and Other Hash Functions.pdf
|
188.9 KB
|
Improved Collision Attack on Hash Function MD5.pdf
|
321.9 KB
|
Improved Collision Attack on MD5.pdf
|
163.9 KB
|
Information Hiding—A Survey.pdf
|
3.5 MB
|
IntroToCrypto.pdf
|
3.7 MB
|
Malicious Cryptography Techniques for Unreversable.pdf
|
1.3 MB
|
Malicious Cryptology and Mathematics 29700.pdf
|
293.1 KB
|
MD5.pdf
|
421.8 KB
|
MONOALPHABETIC UNILATERAL SUBSTITUTION.pdf
|
536.5 KB
|
On The Limits of Steganography.pdf
|
159.5 KB
|
Pen_Testing_and_Ethical_Hacking_Study_Guide.pdf
|
1.7 MB
|
PublicandPrivateKeyCryptographyWhitePaper-Dec2014.pdf
|
1.7 MB
|
Securing_Enterprise_Web_Applications_at_the_Source.pdf
|
2.1 MB
|
Serpent. A Proposal for the Advanced Encryption Standard.pdf
|
194.8 KB
|
steganography seeing the unseen by neil f. johnson.pdf
|
2.4 MB
|
Syndrome Decoding in the Non-Standard Cases.pdf
|
109.7 KB
|
Weakness in the key scheduling algorithm of RC4.pdf
|
289.6 KB
|
westfeld-pfitzmann-ihw99.pdf
|
988.0 KB
|
Wiley.Malicious.Cryptography.Exposing.Cryptovirology.Feb.2004.ISBN.0764549758.pdf
|
30.5 MB
|
/Cybersecurity Ebooks/Ethical Hacking/
|
Ethical Hacking.pdf
|
23.5 MB
|
McGraw.Hill.Gray.Hat.Hacking.4th.Edition.Jan.2015.ISBN.0071832386.pdf
|
33.9 MB
|
McGraw.Hill.Hacking.Exposed.Linux.3rd.Edition.Jul.2008.ISBN.0072262575.pdf
|
11.0 MB
|
McGraw.Hill.Hacking.Exposed.Network.Security.Secrets.And.Solutions.2nd.Edition.Oct.2000.ISBN.0072127481.pdf
|
8.4 MB
|
McGraw.Hill.Hacking.Exposed.Network.Security.Secrets.And.Solutions.3rd.Edition.Sep.2001.ISBN.0072193816.pdf
|
6.1 MB
|
/Cybersecurity Ebooks/Exploit/
|
Addison.Wesley.Exploiting.Software.How.To.Break.Code.Feb.2004.ISBN.0201786958.pdf
|
8.0 MB
|
Syngress.Zero.Day.Exploit.Countdown.To.Darkness.Aug.2004.ISBN.1931836094.pdf
|
3.9 MB
|
Wiley.The.Shellcoders.Handbook.2nd.Edition.Aug.2007.ISBN.047008023X.pdf
|
3.7 MB
|
/Cybersecurity Ebooks/Forensics/
|
Prentice.Hall.Network.Forensics.Jun.2012.ISBN.0132564718.pdf
|
20.8 MB
|
Sybex.Mastering.Windows.Network.Forensics.And.Investigation.2nd.Edition.Jun.2012.ISBN.1118163826.pdf
|
42.1 MB
|
Syngress.The.Basics.Of.Digital.Forensics.Mar.2012.ISBN.1597496618.pdf
|
7.0 MB
|
Wiley.Memory.Jul.2014.ISBN.1118825098.pdf
|
7.5 MB
|
/Cybersecurity Ebooks/Hadoop/
|
Dayong Du-Apache Hive Essentials-Packt Publishing - ebooks Account (2015).epub
|
1.4 MB
|
Getting Started with Impala.pdf
|
808.1 KB
|
Getting Started with Impala2.pdf
|
798.4 KB
|
hadoop-illuminated.pdf
|
9.5 MB
|
Hadoop.pdf
|
923.8 KB
|
John Russell-Getting Started with Impala_ Interactive SQL for Apache Hadoop-O'Reilly Media (2014).epub
|
208.1 KB
|
Manning.Hadoop.In.Practice.Oct.2012.ISBN.1617290238.pdf
|
15.5 MB
|
OReilly.Apache.Sqoop.Cookbook.Jul.2013.ISBN.1449364624.pdf
|
9.0 MB
|
OReilly.Hadoop.Operations.Oct.2012.ISBN.1449327052.pdf
|
7.7 MB
|
OReilly.Hadoop.The.Definitive.Guide.3rd.Edition.May.2012.ISBN.1449311520.pdf
|
14.5 MB
|
orielly-cloudera-impala-ebook.pdf
|
6.5 MB
|
Packt.Hadoop.Beginners.Guide.Feb.2013.ISBN.1849517304.pdf
|
12.0 MB
|
Packt.Hadoop.Cluster.Deployment.Nov.2013.ISBN.1783281715.pdf
|
4.5 MB
|
Packt.Learning.Cloudera.Impala.Dec.2013.ISBN.1783281278.pdf
|
2.9 MB
|
/Cybersecurity Ebooks/Javascript/
|
Apress.Pro.Data.Visualization.Using.R.And.JavaScript.Jun.2013.ISBN.1430258063.pdf
|
9.2 MB
|
Apress.Pro.PHP.And.JQuery.Add.Quick.Smooth.And.Easy.Interactivity.To.Your.PHP.Sites.With.JQuery.Jun.2010.ISBN.1430228474.pdf
|
11.4 MB
|
Manning.Secrets.Of.The.JavaScript.Ninja.Dec.2012.ISBN.193398869X.pdf
|
15.6 MB
|
Morgan.Kaufmann.Object.Oriented.Construction.Handbook.Oct.2004.ISBN.1558606874.pdf
|
6.3 MB
|
No.Starch.The.Principles.Of.Object.Oriented.JavaScript.Feb.2014.ISBN.1593275404.pdf
|
2.7 MB
|
OReilly.JavaScript.Testing.With.Jasmine.Apr.2013.ISBN.1449356370.pdf
|
1.5 MB
|
OReilly.JQuery.Cookbook.Solutions.And.Examples.For.JQuery.Developers.Dec.2009.ISBN.0596159773.pdf
|
6.0 MB
|
OReilly.Programming.JavaScript.Applications.Jul.2014.ISBN.1491950293.pdf
|
8.5 MB
|
Packt.CoffeeScript.Programming.With.JQuery.Rails.And.Node.JS.Dec.2012.ISBN.1849519587.pdf
|
4.2 MB
|
Packt.Creating.2nd.Edition.Feb.2015.ISBN.1783555114.pdf
|
4.5 MB
|
Packt.Creating.Mobile.Apps.With.JQuery.Mobile.Apr.2013.ISBN.178216006X.pdf
|
4.1 MB
|
Packt.JQuery.Mobile.Cookbook.Nov.2012.ISBN.1849517223.pdf
|
4.7 MB
|
Packt.JQuery.UI.1.8.The.User.Interface.Library.For.JQuery.Aug.2011.ISBN.1849516529.pdf
|
7.5 MB
|
Packt.Object.Oriented.JavaScript.2nd.Edition.Jul.2013.ISBN.1849693129.pdf
|
2.2 MB
|
Packt.Object.Oriented.JavaScript.Create.Scalable.Reusable.High.Quality.JavaScript.Applications.And.Libraries.Jul.2008.ISBN.1847194141.pdf
|
7.5 MB
|
Packt.PHP.AJAX.Cookbook.Dec.2011.ISBN.1849513082.pdf
|
5.8 MB
|
Sitepoint.Javascript.Jan.2015.ISBN.0992461251.pdf
|
5.1 MB
|
SitePoint.JQuery.Novice.To.Ninja.2nd.Edition.Feb.2012.ISBN.0987153013.pdf
|
16.9 MB
|
/Cybersecurity Ebooks/Javascript/nodejs/
|
Alex R. Young, Marc Harter-Node.js in Practice-Manning (2015).pdf
|
7.6 MB
|
Basarat Ali Syed (auth.)-Beginning Node.js-Apress (2014).pdf
|
7.3 MB
|
Fernando Doglio (auth.)-Pro REST API Development with Node.js-Apress (2015).pdf
|
7.5 MB
|
Krasimir Tsonev-Node.js By Example-Packt Publishing - ebooks Account (2015).epub
|
2.0 MB
|
Mario Casciaro-Node.js Design Patterns-Packt Publishing (2014).pdf
|
15.4 MB
|
/Cybersecurity Ebooks/Kali tuts/
|
CreateSpace.Publishing.Basic.Security.Testing.With.Kali.Linux.Jan.2014.ISBN.1494861275.pdf
|
14.4 MB
|
Packt.Kali.Linux.Apr.2014.ISBN.184951948X.pdf
|
8.2 MB
|
Packt.Kali.Linux.Cookbook.Oct.2013.ISBN.1783289597.pdf
|
11.2 MB
|
Packt.Kali.Linux.CTF.Blueprints.Jul.2014.ISBN.1783985984.pdf
|
3.7 MB
|
Packt.Kali.Linux.Network.Scanning.Cookbook.Aug.2014.ISBN.1783982144.pdf
|
4.8 MB
|
Packt.Kali.Linux.Social.Engineering.Dec.2013.ISBN.1783283270.pdf
|
4.0 MB
|
Packt.Mastering.Kali.Linux.For.Advanced.Penetration.Testing.Jun.2014.ISBN.1782163123.pdf
|
9.4 MB
|
Packt.Web.Penetration.Testing.With.Kali.Linux.Sep.2013.ISBN.1782163166.pdf
|
20.2 MB
|
/Cybersecurity Ebooks/Malwares/
|
-Mobile Malware Attacks And Defense-Syngress (2011).pdf
|
11.2 MB
|
0x90.se_-_Malware_Analysis_-_Part_I.pdf
|
927.3 KB
|
03_La complessità del malware.pdf
|
4.2 MB
|
1507.06955v1.pdf
|
159.2 KB
|
34516.pdf
|
207.6 KB
|
34591.pdf
|
1.1 MB
|
Addison.Wesley.The.Art.Of.Computer.Virus.Research.And.Defense.Feb.2005.ISBN.0321304543.chm
|
7.0 MB
|
Aditya Sood and Richard Enbody (Auth.)-Targeted Cyber Attacks. Multi-staged Attacks Driven by Exploits and Malware-Syngress (2014).pdf
|
5.8 MB
|
Advanced Polymorphic Techniques.pdf
|
731.0 KB
|
botnets-detection-measurement-disinfection-defence.pdf
|
4.1 MB
|
darkhotel_kl_07.11.pdf
|
2.7 MB
|
darkhotelappendixindicators_kl.pdf
|
1.4 MB
|
Data Mining Tools for Malware Detection Mehedy Masud, Latifur Khan, Bhavani Thuraisingham--Auerbach Publications,CRC Press (2011).pdf
|
9.4 MB
|
Detect_Malware_w_Memory_Forensics.pdf
|
2.5 MB
|
fighter-pos-whitepaper-en.pdf
|
5.8 MB
|
Financial Malware Analysis - Secrets of ZeuS.pdf
|
642.5 KB
|
FireEye_AdvMalwareExposed.pdf
|
795.5 KB
|
Malware Analyst's Cookbook and DVD.pdf
|
9.4 MB
|
Mohssen Mohammed_ Al-Sakib Khan Pathan-Automatic defense against zero-day polymorphic worms in communication networks-Auerbach (2013).pdf
|
17.1 MB
|
No.Starch.Practical.Malware.Analisys.Mar.2012.ISBN.1593272901.pdf
|
9.9 MB
|
Packt.Cuckoo.Malware.Analysis.Oct.2013.ISBN.1782169237.pdf
|
7.5 MB
|
Pattern-Oriented-Diagnostics-Debugging-Malware-Analysis-Reversing.pdf
|
10.2 MB
|
Patterns of a Cooperative Malware Analysis Workflow.pdf
|
621.8 KB
|
Springer.Android.Malware.Jun.2013.ISBN.1461473934.pdf
|
3.6 MB
|
Springer.Computer.Viruses.And.Malware.Advances.In.Information.Security.Jul.2006.ISBN.0387302360.pdf
|
11.3 MB
|
Springer.Computer.Viruses.From.Theory.To.Applications.Sep.2005.ISBN.2287239391.pdf
|
2.8 MB
|
Springer.Malware.Forensics.Field.Guide.For.Windows.Systems.Jun.2012.ISBN.1597494720.pdf
|
29.7 MB
|
Spyware_Adware.pdf
|
3.7 MB
|
Syngress.Malware.Forensics.Field.Guide.For.Linux.Systems.Jan.2014.ISBN.1597494704.pdf
|
41.4 MB
|
Syngress.Malware.Forensics.Investigating.And.Analyzing.Malicious.Code.Jun.2008.ISBN.159749268X.pdf
|
26.2 MB
|
The.Rootkit.Arsenal.Escape.and.Evasion.in.the.Dark.Corners.of.the.System,Second.Edition.pdf
|
98.7 MB
|
WGM12349USEN.PDF
|
2.5 MB
|
/Cybersecurity Ebooks/Malwares/crypters/
|
419evolution [DataScrambler ].pdf
|
1.9 MB
|
18242.pdf
|
1.0 MB
|
Hyperion_ Implementation of a PE-Crypter.pdf
|
238.7 KB
|
Malware Obfuscation with Threat Emulation.pdf
|
381.0 KB
|
Malware1.pdf
|
2.6 MB
|
Malware_Magazine_1.pdf
|
5.7 MB
|
MITM ATTACK WITH PATCHING BINARIES ON THE FLY BY ADDING SHELLCODES.pdf
|
10.9 MB
|
NocONName_2012-Evadiendo_Antivirus-Uso_de_Crypters.pdf
|
32.2 MB
|
ScyllaHide.pdf
|
429.4 KB
|
UNPROTECTING THE CRYPTER.pdf
|
1.0 MB
|
Utilisation de Stub En VB.NET.pdf
|
556.7 KB
|
vb201407-VB6.pdf
|
348.5 KB
|
/Cybersecurity Ebooks/Malwares/mem injection/
|
DEFCON-20-King-Reflective-Injection-Detection.pdf
|
447.7 KB
|
fatkit_dll_rc3.pdf
|
101.9 KB
|
HS-P005_ReflectiveDllInjection.pdf
|
165.9 KB
|
lumension_reflective-memory-injection.pdf
|
404.5 KB
|
/Cybersecurity Ebooks/Malwares/vectors/
|
An7i Security.html
|
870.7 KB
|
Vulnerability analysis, Security Papers, Exploit Tutorials - Part 32480.html
|
21.8 KB
|
/.../An7i Security_files/
|
422439_10150655860234757_828564756_8927229_56595808_n.jpg
|
1.4 KB
|
4205868711-css_bundle_v2.css
|
43.0 KB
|
a.jpeg
|
1.6 KB
|
anon36.png
|
1.7 KB
|
arrow_dropdown.gif
|
0.1 KB
|
authorization.css
|
0.1 KB
|
Avatar.jpeg
|
1.8 KB
|
b36-rounded.png
|
0.8 KB
|
cbgapi.loaded_0
|
171.2 KB
|
cbgapi.loaded_1
|
37.1 KB
|
cbgapi.loaded_2
|
7.9 KB
|
comment-iframe.html
|
8.2 KB
|
css.css
|
0.3 KB
|
fastbutton.html
|
39.0 KB
|
icon18_edit_allbkg.gif
|
0.2 KB
|
icon18_wrench_allbkg.png
|
0.5 KB
|
icon_feed12.png
|
0.5 KB
|
openid36-rounded.png
|
1.3 KB
|
photo.jpg
|
1.8 KB
|
photo_002.jpg
|
1.8 KB
|
photo_003.jpg
|
1.5 KB
|
photo_004.jpg
|
1.6 KB
|
postmessageRelay.html
|
0.6 KB
|
shCore.css
|
6.2 KB
|
shThemeDefault.css
|
2.9 KB
|
subscribe-netvibes.png
|
1.4 KB
|
subscribe-yahoo.png
|
0.6 KB
|
/.../comment-iframe_data/
|
4079081201-cmtfp.css
|
16.6 KB
|
blank.gif
|
0.0 KB
|
close.gif
|
0.3 KB
|
/.../An7i Security_files/fastbutton_data/
|
photo.jpg
|
0.8 KB
|
/.../Vulnerability analysis, Security Papers, Exploit Tutorials - Part 32480_files/
|
codecolorer.css
|
11.4 KB
|
css.css
|
1.5 KB
|
css_002.css
|
0.7 KB
|
Defaults.css
|
22.4 KB
|
edb-2015-theme-logo641.png
|
19.9 KB
|
exploit.css
|
5.0 KB
|
font-awesome.css
|
30.5 KB
|
fotorama.css
|
15.1 KB
|
magnific-popup.css
|
9.2 KB
|
motioncss-responsive.css
|
2.1 KB
|
motioncss.css
|
43.3 KB
|
responsive.css
|
10.9 KB
|
settings.css
|
55.2 KB
|
style.css
|
184.6 KB
|
ultimate.css
|
471.3 KB
|
us_impreza_custom_styles.css
|
34.8 KB
|
wbt.css
|
181.5 KB
|
/Cybersecurity Ebooks/Malwares/worms/
|
CHAPTER 9 Strategies of Computer Worms.pdf
|
1.7 MB
|
jxia-JCS-wormdetection.pdf
|
434.0 KB
|
/Cybersecurity Ebooks/Metasploit Books/
|
Aditya Balapure-Learning Metasploit Exploitation and Development-Packt Publishing (2013).pdf
|
9.5 MB
|
Monika Agarwal, Abhinav Singh-Metasploit Penetration Testing Cookbook, Second Edition-Packt Publishing (2013).pdf
|
7.2 MB
|
No.Starch.Meta.Jun.2011.ISBN.159327288X.pdf
|
7.2 MB
|
Packt.Mastering.Metasploit.May.2014.ISBN.1782162224.pdf
|
14.8 MB
|
Packt.Metasploit.Jun.2012.ISBN.1849517428.pdf
|
5.2 MB
|
/.../1. Instant Metasploit Starter/
|
Instant Metasploit Starter - Ranganath, Karthik.epub
|
8.4 MB
|
Instant Metasploit Starter - Ranganath, Karthik.jpg
|
34.1 KB
|
Instant Metasploit Starter - Ranganath, Karthik.opf
|
1.2 KB
|
/.../2. Learning Metasploit Exploitation and Development/
|
Learning Metasploit Exploitation and Development - Balapure, Aditya.epub
|
26.0 MB
|
Learning Metasploit Exploitation and Development - Balapure, Aditya.jpg
|
39.8 KB
|
Learning Metasploit Exploitation and Development - Balapure, Aditya.opf
|
1.3 KB
|
/Cybersecurity Ebooks/MISC/
|
32719.pdf
|
1.8 MB
|
Blackhat-europe-09-Damele-SQLInjection-slides.pdf
|
256.6 KB
|
nsa.pdf
|
11.9 MB
|
Radware_DDoS_Handbook_2015.pdf
|
1.0 MB
|
/Cybersecurity Ebooks/Mobile/
|
OReilly.20.Recipes.For.Programming.PhoneGap.Apr.2012.ISBN.1449319548.pdf
|
6.7 MB
|
Packt.PhoneGap.3.X.Mobile.Application.Development.Hotshot.May.2014.ISBN.1783287926.pdf
|
6.1 MB
|
/Cybersecurity Ebooks/Modern Web/
|
No.Starch.The.Modern.Web.Apr.2013.ISBN.1593274874.pdf
|
8.6 MB
|
OReilly.Building.Hypermedia.APIs.With.HTML5.And.Node.Dec.2011.ISBN.1449306578.pdf
|
7.2 MB
|
OReilly.Building.Web.Apps.With.Ember.JS.Aug.20214.ISBN.1449370926.pdf
|
12.1 MB
|
OReilly.Enterprise.Web.Development.Building.HTML5.Jul.2014.ISBN.1449356818.pdf
|
46.2 MB
|
OReilly.Full.Stack.Web.Development.With.Backbone.JS.Jun.2014.ISBN.1449370985.pdf
|
6.7 MB
|
OReilly.Getting.Started.With.GEO.CouchDB.And.Node.JS.Aug.2011.ISBN.1449307523.pdf
|
7.2 MB
|
OReilly.Programming.3D.Applications.With.HTML5.And.WebGL.Mar.2014.ISBN.1449362966.pdf
|
67.1 MB
|
OReilly.Programming.HTML5.Applications.Nov.2011.ISBN.1449399088.pdf
|
8.4 MB
|
OReilly.Restful.Web.Services.Cookbook.Mar.2010.ISBN.0596801688.pdf
|
2.3 MB
|
OReilly.Restful.Web.Services.May.2007.ISBN.0596529260.pdf
|
3.2 MB
|
OReilly.Web.Development.With.Node.And.Express.Jul.2014.ISBN.1491949309.pdf
|
8.5 MB
|
Packt.Building.Impressive.Presentations.With.Impress.Dot.JS.Mar.2013.ISBN.1849696489.pdf
|
2.2 MB
|
Packt.Data.Visualization.With.D3.JS.Cookbook.Oct.2013.ISBN.178216216X.pdf
|
3.2 MB
|
Packt.Data.Visualization.With.D3.JS.Oct.2013.ISBN.1782160000.pdf
|
3.6 MB
|
Packt.Developing.Windows.Store.Apps.With.HTML5.And.JavaScript.Aug.2013.ISBN.1849687102.pdf
|
2.5 MB
|
Packt.Ember.Feb.2013.ISBN.1782163387.pdf
|
3.8 MB
|
Packt.Getting.Started.With.Memcached.Nov.2013.ISBN.1782163220.pdf
|
870.8 KB
|
Packt.HTML5.Graphing.And.Data.Visualization.Cookbook.Nov.2012.ISBN.1849693706.pdf
|
3.8 MB
|
Packt.HTML5.IPhone.Web.Application.Development.May.2013.ISBN.1849691029.pdf
|
9.2 MB
|
Packt.HTML5.Web.Application.Development.By.Example.Jun.2013.ISBN.1849695946.pdf
|
3.0 MB
|
Packt.Oracle.Application.Express.4.0.With.Ext.JS.Mar.2011.ISBN.1849681066.pdf
|
10.0 MB
|
Packt.Social.Data.Visualization.With.HTML5.And.JavaScript.Sep.2013.ISBN.1782166548.pdf
|
1.3 MB
|
Packt.Tableau.Data.Visualization.Cookbook.Aug.2013.ISBN.1849689784.pdf
|
3.7 MB
|
Wrox.Developing.Jul.2009.ISBN.0470414642.pdf
|
6.5 MB
|
/Cybersecurity Ebooks/Pentesting Books/
|
No.Starch.Black.Hat.Python.Dec.2014.ISBN.1593275900.pdf
|
2.8 MB
|
No.Starch.Gray.Hat.Python.Aug.2009.ISBN.1593271921.pdf
|
3.7 MB
|
/Cybersecurity Ebooks/Pentesting Books/PenTest/
|
33859.pdf
|
1.5 MB
|
Cisco.Press.Penetration.Testing.And.Network.Defense.Nov.2005.ISBN.1587052083.chm
|
15.3 MB
|
CRC.Press.Ethical.Hacking.And.Penetration.Testing.Guide.Aug.2014.ISBN.1482231611.pdf
|
23.5 MB
|
CreateSpace.Publishing.The.Hacker.Playbook.Mar.2014.ISBN.1494932636.pdf
|
27.4 MB
|
Linux Penetration Testing Laptop Setup v2.pdf
|
35.9 KB
|
Linux Penetration Testing Laptop Setup v4.pdf
|
88.3 KB
|
No.Starch.Penetration.Testing.Jun.2014.ISBN.1593275641.pdf
|
12.8 MB
|
Packt.Penetration.Testing.With.BackBox.Feb.2014.ISBN.1783282975.pdf
|
6.6 MB
|
Packt.Penetration.Testing.With.The.Bash.Shell.May.2014.ISBN.1849695105.pdf
|
3.6 MB
|
Penetration Testing Philipp Lachberger.pdf
|
317.1 KB
|
Penetration_Testing_Guidance_March_2015.pdf
|
1.1 MB
|
Syngress.Basics.2nd.Edition.Aug.2013.ISBN.0124116442.pdf
|
4.7 MB
|
Syngress.Hacking.And.Penetration.Testing.With.Low.Power.Devices.Sep.2014.ISBN.0128007516.pdf
|
8.7 MB
|
Syngress.Ninja.Hacking.Unconventional.Penetration.Testing.Tactics.And.Techniques.Sep.2010.ISBN.1597495883.pdf
|
10.3 MB
|
The Basics of Hacking and Penetration.pdf
|
3.9 MB
|
Wargames.pdf
|
302.1 KB
|
/.../Professional Penetration Testing 2E- Syngress 2013 [Epub]/
|
Professional Penetration Testing - Wilhelm, Thomas.epub
|
26.3 MB
|
Professional Penetration Testing Cover.jpg
|
191.9 KB
|
/.../The Basics of Web Hacking- Syngress 2013 [Epub]/
|
Basics of Web Hacking, The - Pauli, Josh.epub
|
3.7 MB
|
Basics of Web Hacking, The - Pauli, Josh.jpg
|
122.9 KB
|
Basics of Web Hacking, The - Pauli, Josh.opf
|
1.3 KB
|
/Cybersecurity Ebooks/PHP/
|
Apress.PHP.Dec.2010.ISBN.1430233184.pdf
|
5.0 MB
|
OReilly.PHP.Cookbook.3rd.Edition.Jul.2014.ISBN.144936375X.pdf
|
12.6 MB
|
OReilly.PHP.Web.Services.May.2013.ISBN.1449356567.pdf
|
10.7 MB
|
Packt.PHP.Oracle.Web.Development.Data.Processing.Security.Caching.XML.Web.Services.And.AJAX.Jul.2007.ISBN.1847193633.pdf
|
7.4 MB
|
Packt.Restfull.Oct.2008.ISBN.1847195520.pdf
|
13.3 MB
|
/Cybersecurity Ebooks/Physical devices/
|
Syngress.Black.Oct.2004.ISBN.193226681X.pdf
|
74.8 MB
|
/.../Python Programming Books/
|
byteofpython_120.pdf
|
240.4 KB
|
Head First Python.pdf
|
29.6 MB
|
No_Starch_Press_-_Gray_Hat_Python_-_Python_Programming_for_Hackers_and_Reverse_Engineers_[]_(2009)_en.pdf
|
3.2 MB
|
Packt.Python.Data.Visualization.Cookbook.Nov.2013.ISBN.1782163360.pdf
|
5.5 MB
|
Packt.Python.Penetration.Testing.Essentials.Feb.2015.ISBN.1784398586.pdf
|
3.3 MB
|
Python Cookbook 3rd Edition 2013.pdf
|
10.3 MB
|
Python Programming for the Absolute Beginner, 3rd Edition -nelly-.pdf
|
13.2 MB
|
thinkpython.pdf
|
835.2 KB
|
/.../Invent with Python/
|
Invent with Python.pdf
|
4.8 MB
|
/.../Invent with Python/Comp Files/
|
AISim1.py
|
9.1 KB
|
AISim2.py
|
9.4 KB
|
AISim3.py
|
11.6 KB
|
animation.py
|
2.7 KB
|
background.mid
|
7.2 KB
|
baddie.png
|
0.4 KB
|
bagels.py
|
2.3 KB
|
buggy.py
|
0.3 KB
|
cherry.png
|
0.4 KB
|
cipher.py
|
1.4 KB
|
collisionDetection.py
|
4.0 KB
|
dodger.py
|
7.1 KB
|
dragon.py
|
1.2 KB
|
gameover.wav
|
258.9 KB
|
guess.py
|
0.9 KB
|
hangman.py
|
4.1 KB
|
hello.py
|
0.2 KB
|
hello2.py
|
0.2 KB
|
jokes.py
|
0.4 KB
|
pickup.wav
|
8.5 KB
|
player.png
|
0.9 KB
|
pygameHelloWorld.py
|
1.9 KB
|
pygameInput.py
|
3.6 KB
|
reversi.py
|
10.1 KB
|
sonar.py
|
7.3 KB
|
spritesAndSounds.py
|
4.3 KB
|
tictactoe.py
|
6.3 KB
|
/.../Python Programming Books/Violent Python/
|
Violent Python - A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers.pdf
|
8.2 MB
|
/.../Python Programming Books/Violent Python/Companion Files/CH1/
|
1-vulnScanner.py
|
1.3 KB
|
2-passwdCrack.py
|
0.8 KB
|
3-zipCrack.py
|
1.0 KB
|
dictionary.txt
|
0.1 KB
|
evil.zip
|
35.8 KB
|
passwords.txt
|
0.1 KB
|
vuln-banners.txt
|
0.4 KB
|
/.../Python Programming Books/Violent Python/Companion Files/CH2/
|
1-portScan.py
|
1.7 KB
|
2-nmapScan.py
|
0.9 KB
|
3-botNet.py
|
1.1 KB
|
3-bruteKey.py
|
2.4 KB
|
3-pxsshCommand.py
|
0.4 KB
|
3-sshBrute.py
|
1.9 KB
|
3-sshCommand.py
|
1.1 KB
|
4-anonLogin.py
|
0.5 KB
|
4-bruteLogin.py
|
0.8 KB
|
4-defaultPages.py
|
0.6 KB
|
4-injectPage.py
|
0.6 KB
|
4-massCompromise.py
|
3.5 KB
|
5-conficker.py
|
3.2 KB
|
6-freeFloat.py
|
3.1 KB
|
pass.txt
|
0.0 KB
|
userpass.txt
|
0.1 KB
|
/.../Python Programming Books/Violent Python/Companion Files/CH3/
|
1-discoverNetworks.py
|
2.4 KB
|
2-dumpRecycleBin.py
|
1.0 KB
|
3-pdfRead.py
|
0.8 KB
|
4-exifFetch.py
|
1.8 KB
|
5-skypeParse.py
|
3.1 KB
|
6-firefoxParse.py
|
3.7 KB
|
7-iphoneMessages.py
|
1.6 KB
|
firefox_profile.zip
|
32.4 KB
|
skype_profile.zip
|
10.7 KB
|
/.../Python Programming Books/Violent Python/Companion Files/CH4/
|
1-geoIP.py
|
0.5 KB
|
2-printDirection.py
|
0.5 KB
|
3-geoPrint.py
|
1.3 KB
|
4-googleEarthPcap.py
|
1.6 KB
|
5-findDDoS.py
|
2.9 KB
|
6-spoofDetect.py
|
1.4 KB
|
7-testFastFlux.py
|
0.7 KB
|
8-testDomainFlux.py
|
0.6 KB
|
9-mitnickAttack.py
|
2.0 KB
|
10-idsFoil.py
|
2.3 KB
|
attack.pcap
|
10.0 MB
|
domainFlux.pcap
|
4.3 KB
|
download.pcap
|
1.0 KB
|
fastFlux.pcap
|
8.7 KB
|
geotest.kml
|
2.1 KB
|
geotest.pcap
|
0.7 KB
|
hivemind.pcap
|
0.5 KB
|
/.../Python Programming Books/Violent Python/Companion Files/CH5/
|
1-testSniff.py
|
0.4 KB
|
2-creditSniff.py
|
1.1 KB
|
3-hotelSniff.py
|
0.9 KB
|
4-googleSniff.py
|
1.1 KB
|
5-ftpSniff.py
|
1.0 KB
|
6-sniffHidden.py
|
0.8 KB
|
6-sniffProbe.py
|
0.4 KB
|
7-dup.py
|
1.4 KB
|
7-uavSniff.py
|
1.9 KB
|
8-fireCatcher.py
|
1.1 KB
|
9-btFind.py
|
0.5 KB
|
9-btScan.py
|
0.4 KB
|
10-iphoneFinder.py
|
0.9 KB
|
11-rfcommScan.py
|
0.4 KB
|
12-sdpScan.py
|
0.4 KB
|
13-ninjaPrint.py
|
0.3 KB
|
14-blueBug.py
|
0.4 KB
|
dup.py
|
1.4 KB
|
/.../Python Programming Books/Violent Python/Companion Files/CH6/
|
.project
|
0.4 KB
|
.pydevproject
|
0.3 KB
|
1-viewPage.py
|
0.2 KB
|
2-proxyTest.py
|
0.3 KB
|
3-userAgentTest.py
|
0.4 KB
|
4-printCookies.py
|
0.3 KB
|
5-kittenTest.py
|
0.3 KB
|
6-linkParser.py
|
1.1 KB
|
7-imageMirror.py
|
1.3 KB
|
8-anonGoogle.py
|
1.3 KB
|
8-googleJson.py
|
0.4 KB
|
8-googleJumbled.py
|
0.3 KB
|
9-twitterClass.py
|
2.6 KB
|
9-twitterGeo.py
|
2.1 KB
|
9-twitterInterests.py
|
2.4 KB
|
9-twitterRecon.py
|
1.3 KB
|
10-sendMail.py
|
0.8 KB
|
10-sendSpam.py
|
2.7 KB
|
anonBrowser.py
|
1.2 KB
|
anonBrowser.pyc
|
2.4 KB
|
mlb-cities.txt
|
0.3 KB
|
twitterClass.py
|
2.6 KB
|
/.../Python Programming Books/Violent Python/Companion Files/CH6/.svn/
|
entries
|
3.9 KB
|
/.../Python Programming Books/Violent Python/Companion Files/CH6/.svn/prop-base/
|
twitter.pyc.svn-base
|
0.1 KB
|
violent_browser.pyc.svn-base
|
0.1 KB
|
violent_email.pyc.svn-base
|
0.1 KB
|
violent_person.pyc.svn-base
|
0.1 KB
|
web_common.pyc.svn-base
|
0.1 KB
|
/.../Python Programming Books/Violent Python/Companion Files/CH6/.svn/text-base/
|
.project.svn-base
|
0.4 KB
|
.pydevproject.svn-base
|
0.3 KB
|
anon_scrape.py.svn-base
|
4.4 KB
|
basic_usage.py.svn-base
|
0.3 KB
|
create_browser.py.svn-base
|
0.8 KB
|
facebook.py.svn-base
|
1.8 KB
|
google.py.svn-base
|
0.9 KB
|
parse_webpage.py.svn-base
|
0.4 KB
|
phishing.py.svn-base
|
2.3 KB
|
quarkbase.py.svn-base
|
1.8 KB
|
simple_scrape.py.svn-base
|
2.9 KB
|
temp.html.svn-base
|
19.7 KB
|
test.py.svn-base
|
0.2 KB
|
twitter.py.svn-base
|
1.0 KB
|
twitter.pyc.svn-base
|
1.0 KB
|
twitter_interests.py.svn-base
|
1.2 KB
|
twitter_locate.py.svn-base
|
0.7 KB
|
violent_browser.py.svn-base
|
1.6 KB
|
violent_browser.pyc.svn-base
|
2.4 KB
|
violent_email.py.svn-base
|
0.7 KB
|
violent_email.pyc.svn-base
|
1.2 KB
|
violent_person.py.svn-base
|
3.9 KB
|
violent_person.pyc.svn-base
|
3.9 KB
|
web_common.py.svn-base
|
1.3 KB
|
web_common.pyc.svn-base
|
1.3 KB
|
/.../Python Programming Books/Violent Python/Companion Files/CH7/
|
1-bindshell.py
|
1.6 KB
|
2-virusCheck.py
|
2.5 KB
|
/Cybersecurity Ebooks/Reverse Engineering/
|
Practical Reverse Engineering.pdf
|
5.5 MB
|
/Cybersecurity Ebooks/Semantic web/
|
Academic.Press.Introduction.To.The.Semantic.Web.And.Semantic.Web.Services.Jun.2007.ISBN.1584889330.pdf
|
9.2 MB
|
IGI.Global.Semantic.Web.Services.Theory.Tools.And.Applications.Mar.2007.ISBN.159904045X.pdf
|
10.2 MB
|
IOS.Press.Ontology.And.The.Semantic.Web.Volume.156.Frontiers.In.Artificial.Intelligence.And.Applications.Apr.2007.ISBN.1586037293.pdf
|
2.0 MB
|
MIT.Press.A.Semantic.Web.Primer.2nd.Edition.Mar.2008.ISBN.0262012421.pdf
|
2.5 MB
|
OReilly.Programming.The.Semantic.Web.Jul.2009.ISBN.0596153813.pdf
|
6.5 MB
|
Springer.Agent.Based.Semantic.Web.Service.Composition.Aug.2012.ISBN.1461446627.pdf
|
3.3 MB
|
Springer.Modeling.Semantic.Web.Services.The.Web.Service.Modeling.Language.Jul.2008.ISBN.3540681698.pdf
|
4.6 MB
|
Springer.Ontology.Management.Semantic.Web.Semantic.Web.Services.And.Business.Applications.Dec.2007.ISBN.038769899X.pdf
|
3.9 MB
|
Springer.Sem.Apr.2013.ISBN.3642364020.pdf
|
13.0 MB
|
Springer.Semantic.Web.Concepts.Technologies.And.Applications.Jan.2007.ISBN.184628581X.pdf
|
4.6 MB
|
Wiley.Semantic.Web.And.Model.Driven.Engineering.Jun.2012.ISBN.1118004175.pdf
|
6.8 MB
|
/Cybersecurity Ebooks/Social Engineering/
|
Wiley.Social.Engineering.And.Nonverbal.Behavior.Set.Feb.2014.ISBN.1118906713.pdf
|
145.9 MB
|
Wiley.Social.Engineering.The.Art.Of.Human.Hacking.Dec.2010.ISBN.0470639539.pdf
|
6.4 MB
|
/.../Web Hacking Books/
|
32373.pdf
|
1.8 MB
|
33253.pdf
|
453.0 KB
|
33931.pdf
|
847.2 KB
|
how-to-instrument-for-advanced-web-application-penetration-testing.pdf
|
981.4 KB
|
Kali Linux Cookbook.pdf
|
10.9 MB
|
Nmap Cookbook The Fat-free Guide to Network Scanning.pdf
|
6.6 MB
|
No.Starch.The.Tangled.Web.Nov.2011.ISBN.1593273886.pdf
|
4.2 MB
|
Packt.Dreamweaver.CS6.Mobile.And.Web.Development.With.HTML5.CSS3.And.JQuery.Mobile.May.2013.ISBN.1849694745.pdf
|
9.7 MB
|
pfSense 2 Cookbook (2011).pdf
|
12.3 MB
|
SQL Injection Attacks and Defense - Justin Clarke.2ed.pdf
|
9.0 MB
|
Syngress.Hacking.Web.Apps.Sep.2012.ISBN.159749951X.pdf
|
23.0 MB
|
Syngress.SQL.Injection.Attacks.And.Defense.2nd.Edition.Jul.2012.ISBN.1597499633.pdf
|
6.7 MB
|
Syngress.Web.Application.Vulnerabilities.Detect.Exploit.Prevent.Dec.2007.ISBN.1597492094.pdf
|
21.9 MB
|
Syngress.XSS.May.2007.ISBN.1597491543.pdf
|
60.3 MB
|
XSS Attacks - Exploits and Defense.pdf
|
7.7 MB
|
/.../No.Starch.Metasploit.Jul.2011/
|
No.Starch.Metasploit.Jul.2011.epub
|
3.7 MB
|
No.Starch.Metasploit.Jul.2011.pdf
|
7.3 MB
|
/.../The Web Application Hacker's Handbook -Finding and Exploiting Security Flaws V413HAV/
|
The Web Application Hacker's Handbook -Finding and Exploiting Security Flaws V413HAV.pdf
|
14.2 MB
|
/.../Windows Server 2012 Inside Out V413HAV/
|
Read Me.txt
|
0.7 KB
|
Windows Server 2012 Inside Out V413HAV.epub
|
21.4 MB
|
Windows Server 2012 Inside Out V413HAV.pdf
|
34.8 MB
|
/.../Web-Game Dev/
|
Addison.Wesley.Learning.Android.Game.Programming.Dec.2011.ISBN.0321769627.pdf
|
11.5 MB
|
Addison.Wesley.Learning.HTML5.Game.Programming.A.Handson.Guide.To.Building.Online.Games.Using.Canvas.SVG.And.WebGL.Oct.2011.ISBN.0321767365.pdf
|
5.2 MB
|
Apress.Beginning.Android.Web.Apps.Development.May.2012.ISBN.1430239573.pdf
|
36.2 MB
|
Apress.Beginning.Facebook.Game.Apps.Development.Mar.2012.ISBN.1430241705.pdf
|
40.6 MB
|
Apress.Beginning.HTML5.Games.With.CreateJS.Mar.2014.ISBN.1430263407.pdf
|
8.9 MB
|
Apress.Beginning.PhoneGap.Mobile.Web.Framework.For.JavaScript.And.HTML5.Feb.2012.ISBN.1430239034.pdf
|
28.3 MB
|
Apress.Building.JavaScript.Games.Sep.2014.ISBN.1430265388.pdf
|
7.2 MB
|
Apress.Enchant.JS.May.2013.ISBN.1430247436.pdf
|
7.2 MB
|
Apress.HTML5.Games.Most.Wanted.Build.The.Best.HTML5.Games.Apr.2012.ISBN.1430239786.pdf
|
26.1 MB
|
Apress.Metro.Revealed.Building.Windows.8.Apps.With.HTML5.And.JavaScript.Jun.2012.ISBN.1430244887.pdf
|
1.5 MB
|
Apress.Pro.Android.Web.Apps.Develop.For.Android.Using.HTML5.CSS3.And.JavaScript.Feb.2011.ISBN.1430232765.pdf
|
14.1 MB
|
Apress.Pro.Windows.8.Development.With.HTML5.And.JavaScript.Nov.2012.ISBN.1430244011.pdf
|
52.9 MB
|
beginning Visual C#.pdf
|
32.2 MB
|
OReilly.Introducing.HTML5.Game.Development.Feb.2012.ISBN.1449315178.pdf
|
6.9 MB
|
Packt.Game.Development.With.Three.JS.Oct.2013.ISBN.1782168532.pdf
|
1.8 MB
|
Packt.HTML5.Game.Development.With.GameMaker.Apr.2013.ISBN.1849694109(1).pdf
|
9.0 MB
|
Packt.HTML5.Game.Development.With.ImpactJS.Mar.2013.ISBN.1849694567.pdf
|
5.4 MB
|
Wiley.HTML5.Games.Creating.Fun.With.HTML5.CSS3.And.WebGL.Dec.2011.ISBN.1119975085.pdf
|
11.5 MB
|
/.../wifi 802.11/
|
Addison.Wesley.Real.802.Dot.11.Security.WiFi.Protected.Access.And.802.Dot.11.I.Jul.2003.ISBN.0321136209.chm
|
3.1 MB
|
Addison.Wesley.WiFoo.The.Secrets.Of.Wireless.Hacking.Jul.2004.ISBN.0321202171.chm
|
7.1 MB
|
Cisco.Press.WiFi.Hotspots.Setting.Up.Public.Wireless.Internet.Access.Oct.2006.ISBN.1587052660.chm
|
9.1 MB
|
McGraw.Hill.Hacking.Exposed.Wireless.2nd.Edition.Aug.2010.ISBN.0071666613.pdf
|
11.6 MB
|
Newnes.Bulletproof.Wireless.Security.Jun.2005.ISBN.0750677465.pdf
|
3.5 MB
|
OReilly.802.Dot.11.Security.Dec.2002.ISBN.0596002904.pdf
|
933.9 KB
|
/Gentoomen Library/Operating Systems/Linux/
|
Assembly Language Step-by-Step - Programming with Linux, 3rd Edition.pdf
|
4.2 MB
|
For Dummies - Linux All in One Desk Reference.pdf
|
20.7 MB
|
For Dummies - Linux Timesaving Techniques.pdf
|
16.1 MB
|
Linux All-In-One Desk Reference For Dummies (Feb 2005).pdf
|
19.9 MB
|
Linux For Dummies, 6th Edition (Feb 2005).pdf
|
11.6 MB
|
No Starch Press - Linux Appliance Design.pdf
|
8.9 MB
|
No Starch Press - Linux Firewalls.pdf
|
6.8 MB
|
No Starch Press - Linux For Non-Geeks (2004).chm
|
15.5 MB
|
No Starch Press - Programming Linux Games.pdf
|
1.9 MB
|
O'Reilly - Linux Cookbook.chm
|
1.7 MB
|
O'Reilly - Linux Networking Cookbook.pdf
|
4.9 MB
|
O'Reilly - Linux Security Cookbook.chm
|
673.0 KB
|
O'Reilly Fedora Linux.chm
|
8.4 MB
|
O'Reilly Linux Desktop Hacks.chm
|
2.6 MB
|
O'Reilly Linux Device Drivers (3rd Edition).chm
|
1.4 MB
|
O'Reilly Linux in a Nutshell (5th Edition).chm
|
1.4 MB
|
O'Reilly Linux Kernel in a Nutshell.pdf
|
3.3 MB
|
O'Reilly Linux Multimedia Hacks.chm
|
1.7 MB
|
O'Reilly Linux Network Administrator's Guide (3rd Edition).chm
|
1.1 MB
|
O'Reilly Linux Server Hacks.chm
|
616.1 KB
|
O'Reilly Linux System Administration.pdf
|
2.9 MB
|
O'Reilly Linux System Programming.pdf
|
1.3 MB
|
O'Reilly LPI Linux Certification In A Nutshell (2nd Edition).chm
|
2.4 MB
|
O'Reilly Running Linux (5th Edition).chm
|
5.7 MB
|
O'Reilly SUSE Linux.chm
|
5.7 MB
|
O'Reilly Understanding The Linux Kernel (3rd Edition).pdf
|
11.0 MB
|
O'Reilly_-_Linux_Command_Directory.pdf
|
10.9 MB
|
OReilly - Linux Networking Cookbook.pdf
|
4.7 MB
|
OReilly.Building.Embedded.Linux.Systems.Aug.2008.eBook-DDU.pdf
|
4.4 MB
|
Red Hat Enterprise Linux 4 for Dummies (Apr 2005).pdf
|
13.9 MB
|
Red Hat Linux Fedora for Dummies.chm
|
5.3 MB
|
Red Hat Software - Linux Complete Command Reference.pdf
|
19.3 MB
|
Sams - Teach Yourself Linux in 24 Hours.pdf
|
12.6 MB
|
SUSE Linux 9.3 For Dummies (May 2005).pdf
|
11.1 MB
|
SUSE Linux 10 for Dummies.pdf
|
13.7 MB
|
Wiley.Linux.Bible.2009.Edition.Jan.2009.pdf
|
37.9 MB
|
/Gentoomen Library/Operating Systems/Linux/Cluster/
|
Linux Enterprise Cluster.chm
|
3.9 MB
|
OReilly High Performance Linux Clusters With Oscar Rocks openmosix And Mpi.chm
|
1.8 MB
|
/.../Core Linux Concepts (Kernel,Networking,FineTuning,Device Drivers,Thin Client)/
|
Linux Thin Client Networks Design and Deployment.pdf
|
5.5 MB
|
O'Reilly - Linux Device Drivers 2nd Edition.pdf
|
7.7 MB
|
OReilly Zero Configuration Networking The Definitive Guide.chm
|
999.7 KB
|
shell_scripting.pdf
|
14.3 MB
|
Understanding Linux Network Internals.chm
|
7.9 MB
|
/Gentoomen Library/Operating Systems/Linux/DNS/
|
Bind9 Administration Reference Manual.pdf
|
660.1 KB
|
DNS and BIND, 5th ed.chm
|
2.5 MB
|
Dns in Action A Detailed and Practical Guide to Dns.pdf
|
3.6 MB
|
Pro DNS and BIND.pdf
|
3.3 MB
|
/Gentoomen Library/Operating Systems/Linux/Essentials Books/
|
Backup And Recovery.pdf
|
2.8 MB
|
Ebook Teach Yourself Linux In 24 Hours Sharereactor.pdf
|
4.0 MB
|
Hacking Linux Exposed.pdf
|
101.7 MB
|
How Linux Works - What Every Super-User Should Know.chm
|
1.0 MB
|
Linux Annoyances For Geeks.chm
|
2.4 MB
|
Linux Bible 2008 Edition.pdf
|
27.0 MB
|
Linux Newbie Administrator Guide.pdf
|
662.0 KB
|
Linux The Complete Reference.pdf
|
9.3 MB
|
Linux Timesaving Techniques for Dummies.pdf
|
16.0 MB
|
Linux Troubleshooting For System Administrators And Power Users .chm
|
4.3 MB
|
Linux+ Certification_Bible.pdf
|
3.8 MB
|
O'Reilly - Essential System Administration 3rd Edition.chm
|
4.5 MB
|
O'Reilly - Learning Red Hat Enterprise Linux & Fedora 4th Edition.chm
|
4.6 MB
|
O'Reilly - Learning the bash Shell 2nd Edition.chm
|
651.3 KB
|
O'Reilly - Learning the Vi Editor 6th Edition.pdf
|
2.0 MB
|
O'Reilly - UNIX in a Nutshell 3rd Edition.chm
|
1.2 MB
|
O'Reilly - UNIX Power Tools 3rd Edition.chm
|
2.3 MB
|
OReilly Linux System Administration.pdf
|
3.6 MB
|
Red Hat Linux Security And Optimization.pdf
|
5.4 MB
|
User Mode Linux.chm
|
1.2 MB
|
/.../Essentials Networking (VPN,SNMP,Load Balancing)/
|
O'Reilly - Server Load Balancing.pdf
|
3.3 MB
|
OpenVPN - Building And Integrating Virtual Private Networks.pdf
|
9.8 MB
|
/.../IDS Firewall & Security/
|
Configuring IPCop Firewalls - Closing Borders With Open Source.pdf
|
11.3 MB
|
O'Reilly Building Internet Firewalls 2nd Edition.pdf
|
5.1 MB
|
O'Reilly - Building Secure Servers with Linux.chm
|
1.6 MB
|
O'Reilly - Building Secure Servers with Linux.pdf
|
3.0 MB
|
O'Reilly - Network Security with OpenSSL.pdf
|
2.5 MB
|
O'Reilly - RADIUS.chm
|
634.5 KB
|
Security Warrior.chm
|
4.7 MB
|
Snort For Dummies.pdf
|
7.4 MB
|
The Best Damn Firewall Book Period .pdf
|
22.6 MB
|
The Tao Of Network Security Monitoring - Beyond Intrusion Detection.chm
|
16.2 MB
|
/Gentoomen Library/Operating Systems/Linux/LDAP/
|
O'Reilly - LDAP System Administration.chm
|
1.2 MB
|
/Gentoomen Library/Operating Systems/Linux/Mail Servers/
|
No Starch Press - The Book of Postfix.pdf
|
56.3 MB
|
O'Reilly - Postfix The Definitive Guide.pdf
|
2.7 MB
|
O'Reilly SendMail Cookbook.chm
|
816.9 KB
|
OReilly sendmail 4th Edition.pdf
|
7.5 MB
|
Packtpub.Linux.Email.Nov.2009.pdf
|
4.1 MB
|
/Gentoomen Library/Operating Systems/Linux/NFS & NIS/
|
O'Reilly - Managing NFS and NIS 2nd Edt.pdf
|
2.0 MB
|
/Gentoomen Library/Operating Systems/Linux/Samba/
|
O'Reilly Samba 2nd Edition.chm
|
3.3 MB
|
/Gentoomen Library/Operating Systems/Linux/SELinux/
|
SELinux By Example - Using Security Enhanced Linux .chm
|
4.1 MB
|
/Gentoomen Library/Operating Systems/Linux/Squid/
|
O'Reilly - Squid The Definitive Guide.chm
|
1.1 MB
|
O'Reilly - Squid The Definitive Guide.pdf
|
4.4 MB
|
/Gentoomen Library/Operating Systems/Linux/SSH & VPN/
|
IPsec Virtual Private Network Fundamentals.chm
|
19.2 MB
|
O'Reilly - SSH The Secure Shell The Definitive Guide.pdf
|
3.3 MB
|
O'Reilly - The Secure Shell The Definitive Guide.pdf
|
3.3 MB
|
/.../Web Server - Apache/
|
O'Reilly Apache The Definitive Guide 3rd Edition.chm
|
909.1 KB
|
/Gentoomen Library/Programming/Assembly/
|
ARM Assembly Language Programming - Pete Cockerell.pdf
|
1.7 MB
|
Assembly Language for x86 Processors 6th Ed.pdf
|
3.1 MB
|
Assembly Language Step-by-Step Programming with DOS and Linux.chm
|
9.0 MB
|
Assembly Language, The True Language Of Programmers.pdf
|
5.2 MB
|
IA-32 Intel® Architecture Software Developer's Manual (Volume 1 - Basic Architecture).pdf
|
2.6 MB
|
Jones and Bartlett,Introduction to 80x86 Assembly Language and Computer Architecture.pdf
|
5.2 MB
|
Linux Assembly Language Programming 2000.pdf
|
2.6 MB
|
MASMReference.pdf
|
661.1 KB
|
MIPS Assembly Language Programming 2003.pdf
|
537.3 KB
|
Professional Assembly Language.pdf
|
6.9 MB
|
Springer - Guide to Assembly Language Programming in Linux.pdf
|
32.2 MB
|
The Art Of Assembly Language 2003.chm
|
18.4 MB
|
The art of Assembly Language 8086.pdf
|
4.5 MB
|
The Zen Of Assembly Language 1990 - Michael Abrash.pdf
|
2.6 MB
|
Windows Assembly Language & Systems Programming- 16 And 32 Bit Low-Level Programming for the PC and Windows 1997 - Barry Kauler.pdf
|
13.3 MB
|
Windows assembly language and systems programming 1997.pdf
|
13.3 MB
|
Write Great Code Understanding the Machine, Volume I.chm
|
8.6 MB
|
WRITE GREAT CODE, Vol. 2 Thinking Low-Level, Writing High-Level.pdf
|
4.5 MB
|
/Gentoomen Library/Programming/Lua/
|
Beginning Lua Programming - Wrox.pdf
|
8.9 MB
|
Beginning Lua programming.epub
|
2.6 MB
|
Lua 5.1 Reference Manual.chm
|
158.1 KB
|
Lua Performance Ricing.pdf
|
152.8 KB
|
Lua Programming Gems.pdf
|
136.4 KB
|
Lua Reference-Manual.pdf
|
491.0 KB
|
Programming in Lua Second Edition.pdf
|
1.7 MB
|
Programming in Lua.pdf
|
1.5 MB
|
Wrox - Beginning Lua Programming.pdf
|
3.6 MB
|
/Gentoomen Library/Programming/Networking/
|
802.11 Wireless Networks The Definitive Guide Oreilly Excellent.pdf
|
11.5 MB
|
/Informatyka/_ Informatyka (napomoc)/
|
Altheide C, Carvey H - Informatyka śledcza. Przewodnik po narzędziach open source.pdf
|
4.5 MB
|
Bourg D - Fizyka dla programistów gier.djvu
|
4.6 MB
|
Brookshear G - Informatyka w ogólnym zarysie [brak 228-231].pdf
|
34.8 MB
|
Cisek J - Tworzenie nowoczesnych aplikacji graficznych w WPF.pdf
|
14.0 MB
|
Corel PHOTO-PAINT 11. Podręcznik użytkownika.pdf
|
9.5 MB
|
Evans E, Noble J, Hochenbaum J - Arduino w akcji.pdf
|
16.6 MB
|
Evjen B, Hanselman S, Rader D - Zaawansowane programowanie ASP.NET 4 z wykorzystaniem C# i VB.pdf
|
50.9 MB
|
Farbaniec D - Techniki twórców złośliwego oprogramowania. Elementarz programisty.pdf
|
4.0 MB
|
Huzar Z - Wprowadzenie do UML.pdf
|
595.5 KB
|
Internet od A do Z.pdf
|
1.5 MB
|
Monk S - Arduino dla początkujących. Podstawy i szkice.pdf
|
17.6 MB
|
Nathan A - WPF 4.5. Księga eksperta.pdf
|
13.6 MB
|
Nie za krótkie wprowadzenie do systemu Latex 2.pdf
|
935.5 KB
|
Pilone D - UML. Leksykon kieszonkowy.pdf
|
4.0 MB
|
Pyrchla A - Bios. Leksykon kieszonkowy.pdf
|
2.5 MB
|
Rutkowski L - Metody i techniki sztucznej inteligencji.pdf
|
36.4 MB
|
Schwaber K, Sutherland J - Tworzenie oprogramowania w 30 dni. Programuj zwinnie i szybko.pdf
|
13.0 MB
|
Snell M, Powers L - Microsoft Visual Studio 2010. Księga eksperta.pdf
|
78.1 MB
|
Stallings W - Organizacja i architektura systemu komputerowego.pdf
|
108.9 MB
|
Stubblebine T - Wyrażenia regularne. Leksykon kieszonkowy. wyd 2.pdf
|
14.7 MB
|
Szczepankowski S - Optymalizacja Windows XP w praktyce.pdf
|
2.0 MB
|
Tanenbaum A, Steen M - Systemy rozproszone. Zasady i paradygmaty.pdf
|
22.7 MB
|
Tidwell J - Projektowanie interfejsów. Sprawdzone wzorce projektowe.pdf
|
12.6 MB
|
Williams A - MFC czarna księga.pdf
|
2.4 MB
|
Wojciech Mielczarek W - Szeregowe interfejsy cyfrowe.pdf
|
15.0 MB
|
Wrycza S - Informatyka ekonomiczna. Podręcznik akademicki.pdf
|
36.8 MB
|
Wrycza S, Marcinkowski B, Wyrzykowski K - Język UML 2.0 w modelowaniu systemów informatycznych [brak 160-1, 338-9].pdf
|
20.0 MB
|
Zygmunt Ryznar - Encyklopedia informatyki w pigułce.rar
|
1.8 MB
|
/Informatyka/_ Informatyka (napomoc) (1)/
|
Martin R - Czysty kod. Podręcznik dobrego programisty.pdf
|
7.7 MB
|
Vacca J - Computer and Information Security Handbook. 2 ed.pdf
|
73.9 MB
|
/.../_ Informatyka. Algorytmy (napomoc)/
|
Aho A, Hopcroft J, Ullman J - Algorytmy i struktury danych.pdf
|
89.4 MB
|
Aho A, Hopcroft J, Ullman J - Projektowanie i analiza algorytmow komputerowych.pdf
|
81.4 MB
|
Aho A, Sethi R, Ullman J - Kompilatory. Reguly metody i narzędzia.pdf
|
33.8 MB
|
Algorytmy cpp.7z
|
8.6 KB
|
Algorytmy i struktury danych. Rachunek macierzowy.pdf
|
146.4 KB
|
algorytmy rózne.7z
|
71.1 KB
|
Algorytmy. Podstawowe pojęcia.pdf
|
10.1 MB
|
Banachowski L, Diks K, Ritter W - Algorytmy i struktury danych. wyd 5.pdf
|
19.0 MB
|
Bartman J - Algorytmy.7z
|
5.9 MB
|
Berg, Kreveld, Overmars, Schwarzkopf - Geometria obliczeniowa. Algorytmy i zastosowania.pdf
|
16.2 MB
|
Bilski T, Chmiel K, Stokłosa J - Zbiór zadań ze złożoności obliczeniowej algorytmów [część].pdf
|
7.5 MB
|
Cichy B - Algorytmy i struktury danych.7z
|
3.0 MB
|
Cormen T, Leiserson C, Rivest R - Wprowadzenie do algorytmów. wyd 4.pdf
|
27.9 MB
|
Cormen, Leiserson, Rivest, Stein - Introduction to Algorithms. 3ed.pdf
|
5.1 MB
|
Czech Z - Analiza algorytmow.pdf
|
297.7 KB
|
Drozdek A - C++ Algorytmy i struktury danych.pdf
|
69.5 MB
|
geomalgorithms.com 2014.7z
|
960.8 KB
|
Grodzicki S - Geometria tras. Algorytmy obliczeń, komputerowo wspomagane obliczanie.pdf
|
28.2 MB
|
Harel D - Rzecz o istocie informatyki. Algorytmika.pdf
|
12.9 MB
|
Harris S, Ross J - Algorytmy. Od podstaw.pdf
|
96.5 MB
|
Koronacki J, Ćwik J - Statystyczne systemy uczące się. wyd 2.pdf
|
34.4 MB
|
Kotulski Z - Generatory liczb losowych.pdf
|
564.6 KB
|
Krzaczkowski J - Złożoność obliczeniowa problemów związanych z rozwiązywaniem równań.pdf
|
978.7 KB
|
Kwiatkowska A, Łukasik E - Schematy zwarte NS. Przyklady i zadania.pdf
|
16.8 MB
|
Nowak R - Algorytmy i struktury danych.pdf
|
383.9 KB
|
Pokojski J, Bonarowski J, Jusis J - Algorytmy.pdf
|
1.4 MB
|
Prałat P - Algorytmy i struktury danych.pdf
|
890.6 KB
|
Stephens R - Essential Algorithms.pdf
|
7.5 MB
|
Sysło M - Algorytmy.pdf
|
77.6 MB
|
Sysło M - Piramidy szyszki i inne konstrukcje algorytmiczne. ver.pdf
|
5.3 MB
|
Sysło M - Piramidy szyszki i inne konstrukcje algorytmiczne.pdf
|
65.6 MB
|
Sysło M, Deo N, Kowalik J - Algorytmy optymalizacji dyskretnej. wyd 3.pdf
|
44.4 MB
|
Wieczorkowski R, Zieliński R - Komputerowe generatory liczb losowych.doc
|
4.2 MB
|
Wieczorkowski R, Zieliński R - Komputerowe generatory liczb losowych.pdf
|
1.8 MB
|
Wirth N - Algorytmy + struktury danych = programy.pdf
|
52.4 MB
|
Wróblewski P - Algorytmy. Struktury danych i techniki programowania. wyd 2. ver.pdf
|
45.1 MB
|
Wróblewski P - Algorytmy. Struktury danych i techniki programowania. wyd 2.pdf
|
28.1 MB
|
www.algorytm.org 2014.7z
|
12.7 MB
|
Zaborski A - Metody sortowania.pdf
|
175.7 KB
|
Zelinka I, Snasel V, Abraham A - Handbook of Optimization. From Classical to Modern Approach.pdf
|
40.6 MB
|
/.../_ Informatyka. Asembler (napomoc)/
|
Drozdowski B - Jezyk Asembler dla kazdego.pdf
|
1.2 MB
|
Dudek A - Jak pisać wirusy.pdf
|
7.3 MB
|
Duntemann J - Zrozumieć Asembler.pdf
|
104.3 MB
|
Farbaniec D - Asembler. Leksykon kieszonkowy.pdf
|
10.0 MB
|
Gałka P, Gałka P - Podstawy Programowania Mikrokontrolera 8051. DSM51v2.7z
|
1.1 MB
|
Gałka P, Gałka P - Podstawy Programowania Mikrokontrolera 8051.pdf
|
3.6 MB
|
Hyde R - Asembler. Sztuka programowania.pdf
|
19.6 MB
|
Kruk S - Asembler. Kurs programowania dla średnio zaawansowanych.pdf
|
20.0 MB
|
Kruk S - Asembler. Podręcznik użytkownika.pdf
|
5.4 MB
|
Lista rozkazow 8080.pdf
|
156.3 KB
|
Michałek G - Asembler. Miniprzewodnik.pdf
|
8.0 MB
|
Wróbel E - Praktyczny kurs asemblera.pdf
|
23.3 MB
|
Wróbel E - Programowanie w języku asemblera MASM. Laboratorium.pdf
|
15.0 MB
|
/.../_ Informatyka. Bazy Danych. SQL (napomoc)/
|
Analityczne bazy danych i podstawy eksploracji danych.7z
|
21.7 MB
|
Banachowski, Chądzyńska, Matejewski, Stencel - Bazy danych. Wykłady i ćwiczenia. ver.pdf
|
13.7 MB
|
Banachowski, Chądzyńska, Matejewski, Stencel - Bazy danych. Wykłady i ćwiczenia.pdf
|
33.2 MB
|
Bazy Danych-Język zapytań SQL-Programowanie Proceduralne.pdf
|
644.7 KB
|
Beighley L - SQL. Rusz głową.pdf
|
30.5 MB
|
Beynon-Davies P - Systemy baz danych. wyd 3.pdf
|
79.1 MB
|
Bowman J, Emerson S, Darnovsky M - Podręcznik języka SQL.pdf
|
71.8 MB
|
Chałon M - Systemy Baz Danych.pdf
|
3.0 MB
|
Connolly T, Begg C - Systemy baz danych. T 1. Praktyczne metody.pdf
|
62.6 MB
|
Conway D, White J - Uczenie maszynowe dla programistów.pdf
|
23.8 MB
|
Czapla K - Bazy danych. Podstawy projektowania i języka SQL.pdf
|
3.1 MB
|
Eksploracja danych. mimuw.7z
|
24.6 MB
|
Feuerstein S - Oracle PLSQL. Najlepsze praktyki (11g).pdf
|
13.0 MB
|
Gennick J - SQL leksykon kieszonkowy. wyd2.pdf
|
3.3 MB
|
Gnybek J - Oracle łatwiejszy niż przypuszczasz. wyd 2.pdf
|
20.5 MB
|
Hand D, Mannila H, Smyth P - Eksploracja danych.pdf
|
36.5 MB
|
Jones A - C#. Księga przykładów.pdf
|
11.6 MB
|
Krótki kurs data mining.pdf
|
1.2 MB
|
Kukuczka J- Relacyjne Bazy Danych.pdf
|
4.3 MB
|
Larose D - Odkrywanie wiedzy z danych.pdf
|
50.9 MB
|
Mendrala D, Szeliga M - SQL. Praktyczny kurs. wyd 3.pdf
|
4.1 MB
|
Myszkorowski K - Sytemy baz danych.pdf
|
4.1 MB
|
Pelikant A - Hurtownie Danych. Od przetwarzania analitycznego do raportowania.pdf
|
6.7 MB
|
Podstawy eksploracji danych.7z
|
36.2 MB
|
Reese G - MySQL leksykon kieszonkowy. wyd 2.pdf
|
1.9 MB
|
Rockoff L - Język SQL. Przyjazny podręcznik.pdf
|
33.9 MB
|
Schwartz i in - Wysoko wydajne MySQL. Optymalizacja, archiwizacja, replikacja. wyd 2.pdf
|
7.9 MB
|
Statystyczne metody analizy danych.7z
|
30.6 MB
|
Wykłady z Administracji bazą danych Oracle 2010.7z
|
293.7 KB
|
/Informatyka/_ Informatyka. C (napomoc)/
|
Albahari J, Albahari B - C# 5.0. Leksykon kieszonkowy. wyd 3.pdf
|
7.4 MB
|
Allain A - C++. Przewodnik dla początkujacych.pdf
|
5.7 MB
|
Boduch A - Wstęp do programowania w języku C#.pdf
|
3.5 MB
|
Borkowski M - Wykład C.zip
|
272.7 KB
|
Borland C++ Builder 5.7z
|
7.8 MB
|
Eckel B - Thinking in C++. Edycja polska.pdf
|
19.4 MB
|
Gorazd T - Wstęp do Programowania C.C++.pdf
|
520.5 KB
|
Greene J, Stellman A - C#. Rusz głową. wyd 3.pdf
|
28.2 MB
|
Jabłonowski J - Programowanie obiektowe i C++.pdf
|
869.9 KB
|
Josuttis N - C++ Biblioteka standardowa. Podręcznik programisty. wyd 2.pdf
|
6.7 MB
|
Kaczmarek P - Programowanie zorientowane Obiektowo czyli klasy w języku C++.pdf
|
140.6 KB
|
Kempa A, Staś T - Wstęp do programowania w C#. wyd 2.0.pdf
|
3.2 MB
|
Kisilewicz J - Język C w środowisku Borland C++. wyd 4.pdf
|
2.0 MB
|
Kisilewicz J - Język C++. Programowanie obiektowe. wyd 3.pdf
|
10.1 MB
|
Kochan S - Objective-C. Vademecum profesjonalisty. wyd 3.pdf
|
22.8 MB
|
Koza Z - Język C++ pierwsze starcie.pdf
|
10.4 MB
|
Krzaczkowski J - Zadania z programowania w języku C C++. cz 1.pdf
|
794.8 KB
|
Krzaczkowski J - Zadania z programowania w języku C C++. cz 2.pdf
|
864.0 KB
|
Kubiak M - C# zadania z programowania z przykadowymi rozwiązaniami.pdf
|
1.5 MB
|
Kubiak M - C++ Zadania z programowania z przykładowymi rozwiązaniami.7z
|
3.0 MB
|
Kuczmarski K - Kurs C++.pdf
|
5.0 MB
|
Lis M - C#. Praktyczny kurs. wyd 3.pdf
|
8.7 MB
|
Lis M - C#. Ćwiczenia. wyd 3.pdf
|
5.6 MB
|
Matulewski J - Visual Studio 2013. Podręcznik programowania w C# z zadaniami.pdf
|
9.5 MB
|
Microsoft Visual C# 2012 Step By Step. Practice files.7z
|
40.8 MB
|
Mikołajczak J - Język C++ podstawy programowania.pdf
|
1.8 MB
|
Mysior M - C# w praktyce.pdf
|
6.4 MB
|
Orłowski S, Grabek M - C#. Tworzenie aplikacji sieciowych. Gotowe projekty.pdf
|
5.5 MB
|
Parę programów w C++ (nieco praktyki).pdf
|
813.4 KB
|
Prata C - Szkoła programowania. Język C. wyd 5.pdf
|
23.4 MB
|
Rao S - C++ dla każdego. wyd 7.pdf
|
16.4 MB
|
Stasiewicz A - C++. Ćwiczenia praktyczne. wyd 3.pdf
|
46.4 MB
|
Stasiewicz A - C++11. Nowy standard. Ćwiczenia.pdf
|
9.3 MB
|
Stroustrup B - Język C++ Kompendium wiedzy. wyd 4.pdf
|
9.6 MB
|
Stroustrup B - Język C++. wyd 6.pdf
|
6.3 MB
|
Tłuczek M - Programowanie w języku C. Ćwiczenia praktyczne. wyd 2.pdf
|
2.4 MB
|
Williams A - Język C++ i przetwarzanie współbieżne w akcji.pdf
|
4.1 MB
|
Wright C - C# Porady & metody.pdf
|
28.2 MB
|
Zychla W - C#. Programowanie pod Windows.pdf
|
1.9 MB
|
/Informatyka/_ Informatyka. C (napomoc) (1)/
|
Grębosz J - Symfonia C++. T 1.pdf
|
26.6 MB
|
Grębosz J - Symfonia C++. T 2.pdf
|
22.1 MB
|
Grębosz J - Symfonia C++. T 3.pdf
|
26.8 MB
|
Microsoft Visual C# 2012 Step By Step.pdf
|
139.7 MB
|
Żydzik K, Rak T - C# 6.0 i MVC 5. Tworzenie nowoczesnych portali internetowych.pdf
|
12.6 MB
|
/.../_ Informatyka. Database (napomoc)/
|
Access Database Design & Programming, 3rd Edition.pdf
|
2.4 MB
|
Beginning Database Design, 2nd Edition.pdf
|
14.9 MB
|
Connolly T, Begg C - Database Solutions.rar
|
30.5 MB
|
Database Systems 3ed.pdf
|
8.2 MB
|
Expert Oracle Database Architecture, 2nd Edition.pdf
|
7.6 MB
|
Expert Oracle Practices.pdf
|
6.4 MB
|
Learning Oracle Plsql.pdf
|
6.1 MB
|
Oracle Advanced PL_SQL Developer Professional Guide.pdf
|
6.0 MB
|
Oracle Database 11g Performance Tuning Recipes.pdf
|
33.5 MB
|
Oracle Essentials, 4th Edition.pdf
|
3.8 MB
|
Oracle Plsql Language Pocket Reference, 4th Edition.pdf
|
869.4 KB
|
Oracle Plsql Recipes.pdf
|
6.2 MB
|
/.../_ Informatyka. Database. Warehouse (napomoc)/
|
Abramson - Inmon vs Kimball.pdf
|
278.4 KB
|
Apress.Building.a.Data.Warehouse.With.Examples.in.SQL.Server.Dec.2007.pdf
|
12.7 MB
|
Building the Data Warehouse.pdf
|
12.5 MB
|
Business Driven Information Systems.pdf
|
35.6 MB
|
data warehouse.rar
|
2.2 MB
|
Data Warehousing Fundamentals Volume 1 Student Guide Oracle.pdf
|
2.2 MB
|
Data_Modeling_by_Example_a_Tutorial.pdf
|
1.5 MB
|
Dimension modeling.pdf
|
7.4 MB
|
From_ER_Models_to_Dimensional_Models_Part_I.pdf
|
350.8 KB
|
From_ER_Models_to_Dimensional_Models_Part_II.pdf
|
278.4 KB
|
Modelowanie danych [fragment].pdf
|
1.5 MB
|
RelationalModel.pdf
|
190.3 KB
|
The Data Warehouse ETL Toolkit.pdf
|
5.6 MB
|
The Data Warehouse Lifecycle Toolkit 2 toc.pdf
|
8.9 MB
|
The Data Warehouse Lifecycle Toolkit, 2nd Edition.pdf
|
9.2 MB
|
The Data Warehouse Toolkit, 3rd Edition.pdf
|
6.9 MB
|
Wróblewski J - Hurtownie danych.7z
|
4.3 MB
|
/.../_ Informatyka. English (napomoc)/
|
Ajax The Definitive Guide.pdf
|
16.0 MB
|
Beginning Ajax with PHP.pdf
|
4.3 MB
|
Blum R, Bresnahan C - Linux Command Line and Shell Scripting Bible. 2 Ed.pdf
|
9.0 MB
|
Bradford R - The Art of Computer Networking.pdf
|
2.4 MB
|
Css Pocket Reference, 4th Edition.pdf
|
4.6 MB
|
Head First jQuery.pdf
|
72.0 MB
|
Html Xhtml Pocket Reference, 4th Edition.pdf
|
2.7 MB
|
HTML5 The Missing Manual, 2nd Edition.pdf
|
61.3 MB
|
JavaScript & jQuery The Missing Manual, 2nd Edition.pdf
|
17.0 MB
|
Javascript Pocket Reference, 3rd Edition.pdf
|
6.8 MB
|
Learning PHP 5.pdf
|
2.1 MB
|
Learning PHP, MySQL, JavaScript and Css, 2nd Edition.pdf
|
18.6 MB
|
Learning Ruby.pdf
|
2.8 MB
|
Love R - Linux Kernel Development. 3 Ed.pdf
|
4.5 MB
|
Pro PHP and jQuery.pdf
|
12.9 MB
|
Professional Ajax, 2nd Edition.pdf
|
7.0 MB
|
Spurgeon C, Zimmerman J - Ethernet The Definitive Guide. 2 Ed.pdf
|
20.4 MB
|
Stutz M - Linux Cookbook. 2 Ed.pdf
|
8.5 MB
|
Xml Pocket Reference, 3rd Edition.pdf
|
695.1 KB
|
Zend Framework 2.0 by Example.pdf
|
5.8 MB
|
/.../_ Informatyka. Flash Photoshop (napomoc)/
|
ActionScript 3.0 for Adobe Flash Professional CS5. Classroom in a Book - files.url
|
0.1 KB
|
ActionScript 3.0 for Adobe Flash Professional CS5. Classroom in a Book. Instructor Notes.pdf
|
1.2 MB
|
ActionScript 3.0 for Adobe Flash Professional CS5. Classroom in a Book.pdf
|
62.3 MB
|
Adobe Flash Professional CS6 Classroom in a Book - files.URL
|
0.3 KB
|
Adobe Flash Professional CS6 Classroom in a Book.pdf
|
27.4 MB
|
Adobe Photoshop CS6 Classroom in a Book - files.URL
|
0.3 KB
|
Adobe Photoshop CS6 Classroom in a Book.pdf
|
61.3 MB
|
Kelby S - Photoshop CS4 PL. Pikantne efekty specjalne.pdf
|
57.2 MB
|
Owczarz-Dadan A - Photoshop CS3.pdf
|
35.1 MB
|
Peters K - AdvancED ActionScript 3.0. Animation.pdf
|
2.6 MB
|
Snider L - Adobe Photoshop CS6. Nieoficjalny podręcznik.pdf
|
30.1 MB
|
Ypenburg D - Actionscript 3.0.pdf
|
156.7 MB
|
Zapolski K - Adobe Illustrator. Podstawy.pdf
|
1.9 MB
|
/.../_ Informatyka. HTML (napomoc)/
|
Bunyan K - HTML 5. Tworzenie gier z wykorzystaniem CSS i JavaScript.pdf
|
32.1 MB
|
Burchard E - Tworzenie gier internetowych. Receptury HTML 5, JS.pdf
|
9.2 MB
|
Danowski B - Wstęp do HTML5 i CSS3.pdf
|
6.8 MB
|
Duckett J - HTML i CSS. Zaprojektuj i zbuduj witrynę WWW.pdf
|
23.0 MB
|
Freeman E, Robson E - HTML5. Rusz głową.pdf
|
28.1 MB
|
Gajda W - HTML, XHTML i CSS. Praktyczne projekty. wyd 2.pdf
|
8.6 MB
|
Gajda W - HTML5 i CSS3. Praktyczne projekty.pdf
|
12.4 MB
|
Goldberg K - XML Szybki start. wyd 2.pdf
|
13.5 MB
|
Head First HTML5 Programming.pdf
|
89.0 MB
|
HTML&CSS. design and build websites.pdf
|
19.7 MB
|
HTML5 and CSS3 Responsive Web Design Cookbook.pdf
|
6.1 MB
|
HTML5 Canvas Cookbook.pdf
|
4.2 MB
|
HTML5 Cookbook.pdf
|
21.9 MB
|
Kessin S - HTML5. Programowanie aplikacji.pdf
|
1.8 MB
|
Learn HTML5 by Creating Fun Games.pdf
|
6.6 MB
|
Lemay i in - HTML Vademecum Profesjonalisty.pdf
|
27.6 MB
|
Niederst J - HTML 4.0 leksykon Kieszonkowy.pdf
|
3.1 MB
|
Practical HTML5 Projects.pdf
|
48.5 MB
|
Pro HTML5 Accessibility.pdf
|
8.8 MB
|
Pro HTML5 Games.pdf
|
13.0 MB
|
Schafer S - HTML, XHTML i CSS. Biblia. wyd 5.pdf
|
34.5 MB
|
Seidelin J - HTML5. Tworzenie gier.pdf
|
4.6 MB
|
Weyl E - HTML5. Strony mobilne.pdf
|
26.3 MB
|
Wyke-Smith C - CSS. Witryny internetowe szyte na miarę. wyd 2.pdf
|
20.0 MB
|
/.../_ Informatyka. Java Javascript (napomoc)/
|
Ableson F, Sen R - Android w akcji. wyd 2.pdf
|
45.2 MB
|
Arnold K, Gosling J, Holmes D - The Java Programming Language. 4 ed.chm
|
2.3 MB
|
Benedetti R, Cranley R - jQuery. Rusz głową.pdf
|
31.2 MB
|
Bibeault B, Katz Y, Rosa A - jQuery w akcji. wyd 3.7z
|
98.1 MB
|
Borkowski M - Java.rar
|
783.6 KB
|
Cantelon M, Harter M, Holowaychuk T, Rajlich N - Node.js w akcji.pdf
|
7.7 MB
|
Collins C, Galpin M, Kaeppler M - Android w praktyce.pdf
|
20.7 MB
|
Conder S, Darcey L- Android. Programowanie aplikacji na urządzenia przenośne. Programy.zip
|
2.4 MB
|
Conder S, Darcey L- Android. Programowanie aplikacji na urządzenia przenośne. wyd 2. ver.pdf
|
76.3 MB
|
Conder S, Darcey L- Android. Programowanie aplikacji na urządzenia przenośne. wyd 2.pdf
|
129.7 MB
|
Darwin I - Android. Receptury.pdf
|
15.2 MB
|
Eckel B - Thinking In Java. wyd 4 [PL].pdf
|
114.6 MB
|
Evans B, Flanagan D - Java in a Nutshell. 6ed.pdf
|
6.6 MB
|
Goetz i in - Java. Współbieżność dla praktyków.pdf
|
42.0 MB
|
Griffiths D - Android. Programowanie aplikacji. Rusz głową.pdf
|
104.8 MB
|
Hall M - Java Script i Java Server Pages.pdf
|
4.3 MB
|
Horstmann C, Cornell G - Java. Podstawy. wyd 9.pdf
|
7.9 MB
|
Horstmann C, Cornell G - Java. Techniki zaawansowane. wyd 9.pdf
|
9.1 MB
|
Jade_Primer.zip
|
224.9 KB
|
Jendrock i in - Java EE 6. Zaawansowany przewodnik. wyd 4.pdf
|
5.2 MB
|
Kerfs J - Android. Programowanie gier na tablety.pdf
|
38.3 MB
|
Kochmer C, Frandsen E - JSL i XML.pdf
|
34.5 MB
|
Komatineni S, MacLean D, Hashimi S - Android 3. Tworzenie aplikacji.pdf
|
23.7 MB
|
Kubiak M - Java. Zadania z programowania z przykładowymi rozwiązaniami.pdf
|
1.3 MB
|
Lafore R - Java. Algorytmy i struktury danych.7z
|
63.4 MB
|
Lis M - Java. Ćwiczenia praktyczne. wyd 2.pdf
|
39.2 MB
|
Lis M - Java. Ćwiczenia zaawansowane.pdf.tmp
|
3.8 MB
|
Lis M - JavaScript. Praktyczny kurs [2009].pdf
|
4.8 MB
|
Lis M - JavaScript. Ćwiczenia praktyczne. wyd 3.pdf
|
3.2 MB
|
Lis M - JavaScript. Ćwiczenia praktyczne.doc
|
1.9 MB
|
Mehta B - REST. Najlepsze praktyki i wzorce w języku Java.pdf
|
40.3 MB
|
Rychlicki W - Programowanie w języku Java. Zbiór zadań z (p)odpowiedziami.pdf
|
22.5 MB
|
Sawyer McFarland D - JavaScript i jQuery. Nieoficjalny podręcznik.pdf
|
22.4 MB
|
Sierra K, Bates B - Java. Rusz głową. wyd 2.pdf
|
17.2 MB
|
Smołka J - Programowanie aplikacji dla systemu Android.pdf
|
38.0 MB
|
Stark J. - Android. Tworzenie aplikacji w oparciu o HTML CSS i JavaScript.pdf
|
2.2 MB
|
Stefanov S - Javascript dla programistów PHP.pdf
|
3.3 MB
|
Stpiczyński P, Brzuszek M - Programowanie współbieżne i rozproszone w języku Java.pdf
|
1.5 MB
|
Walczak K - Java. Nauka programowania dla początkujacych.7z
|
11.3 MB
|
Walls C - Spring w akcji. wyd 4.pdf
|
6.0 MB
|
Wantoch-Rekowski R - Android w praktyce. Projektowanie aplikacji.pdf
|
13.8 MB
|
Łupszaj A - Jade.7z
|
2.1 MB
|
/.../_ Informatyka. Kryptologia (napomoc)/
|
Abramson N - Teoria informacji i kodowania.pdf
|
5.6 MB
|
Bishop D - Introduction to Cryptography with Java Applets.pdf
|
10.2 MB
|
Borowiec R - Kodowanie i kryptografia.pdf
|
8.5 MB
|
Chudy W - Kłamcy profesjonalni. Praca dyplomaty i szpiega w ujęciu etyki.pdf
|
2.2 MB
|
Courtois N - Kryptografia wielu zmiennych.pdf
|
287.1 KB
|
Gaj K, Górski K, Zugaj A - Elementarz kryptologii. wyd 3.pdf
|
2.9 MB
|
Hoffstein J, Pipher J, Silverman J - An Introduction to Mathematical Cryptography.pdf
|
7.7 MB
|
Jacak W, Donderowicz W, Jacak J - Wstęp do informatyki i kryptografii kwantowej.pdf
|
1.3 MB
|
Jemec W - Kryptografia. Wyklad.pdf
|
423.5 KB
|
Karbowski M - Podstawy kryptografii. wyd 3.pdf
|
7.6 MB
|
Koblitz N - Wykład z teorii liczb i kryptografii.pdf
|
66.7 MB
|
Kozaczuk W - W kręgu enigmy.pdf
|
23.3 MB
|
Kryszewski W - Elementy kryptografii.pdf
|
1.6 MB
|
Kutyłowski M, Strothmann W - Kryptografia. Teoria i praktyka zabezpieczania systemów komputerowych.pdf
|
4.3 MB
|
Lunde P - Tajemnice szyfrów. Znaki Symbole Kody Kryptogramy.pdf
|
122.9 MB
|
Mochnacki W - Kody korekcyjne i kryptografia.pdf
|
2.3 MB
|
PHPsolutions 07-08.2006 - Kryptografia w PHP.pdf
|
8.1 MB
|
Stallings W - Kryptografia i bezpieczeństwo sieci komputerowych. wyd 5.pdf
|
25.5 MB
|
Stinson D - Kryptografia w teorii i praktyce. TAO.pdf
|
23.3 MB
|
Szczypiorski A - Wstęp do kryptografii sieciowej.pdf
|
2.2 MB
|
Szmidt J, Misztal M - Wstęp do kryptologii. wyd 3.pdf
|
12.5 MB
|
Tanaś R - Kryptografia kwantowa. Wykład popularny.pdf
|
617.6 KB
|
Tanaś R - Kryptografia. Wykład.pdf
|
636.1 KB
|
Wstęp do kryptologii. Skrypt WSiSiZ. 2006.pdf
|
912.9 KB
|
/.../_ Informatyka. Metaheurystyki (napomoc)/
|
Algorytm genetyczny. Slajdy.pdf
|
4.8 MB
|
Algorytmy decyzyjne i teoria złożoności. Wykłady.7z
|
114.8 KB
|
Algorytmy genetyczne i ewolucyjne. Artykuły.7z
|
29.5 MB
|
Algorytmy heurystyczne. Opracowania.7z
|
3.8 MB
|
Arabas J - Wyklady z algorytmow ewolucyjnych. ver.pdf
|
8.7 MB
|
Arabas J - Wyklady z algorytmow ewolucyjnych.pdf
|
6.5 MB
|
Arabas J - Wykłady z algorytmów ewolucyjnych. Oprogramowanie gabi.7z
|
210.2 KB
|
Bereta M - Algorytmy ewolucyjne. Wykład. Laboratorium.7z
|
6.9 MB
|
Bereta M - Metody klasyfikacji i rozpoznawania wzorców.7z
|
20.5 MB
|
Bieganowski J - Algorytmy genetyczne i procesy ewolucyjne. Wykład.7z
|
1.0 MB
|
Boryczka U - Algorytmy ewolucyjne. Materiały.7z
|
19.2 MB
|
Chambers L - The Practical Handbook of Genetic Algorithms. Application. 2 ed.pdf
|
23.6 MB
|
Chojnacki P - Generatory liczb losowych.pdf
|
186.1 KB
|
Delac K, Grgic M, Bartlett M - Recent Advances in Face Recognition.pdf
|
19.9 MB
|
Dorigo M, Stutzle T - Ant Colony Optimization.pdf
|
4.5 MB
|
Dudek G - Ekonomiczny rozdział obciążeń z zastosowaniem algorytmów ewolucyjnych. T 1.pdf
|
5.3 MB
|
El Ghazali Talbi - Metaheuristics. From Design to Implementation.pdf
|
5.2 MB
|
Floreano D, Mattiussi C - Bio-Inspired Artificial Intelligence. Theories, Methods, and Technologies.pdf
|
20.1 MB
|
Gendreau M, Potvin J Hadbook of Metaheuristics. 2 ed.pdf
|
5.8 MB
|
Goldberg D - Algorytmy genetyczne i ich zastosowania.pdf
|
49.1 MB
|
Grygiel K - Algorytmy.7z
|
2.4 MB
|
Grygiel K - Metaheurystyki. Notatki do wykładu.pdf
|
171.3 KB
|
Grygiel K - Metaheurystyki. Wykład 2005.7z
|
2.4 MB
|
Grygiel K - Metaheurystyki. Wykład 2012.7z
|
4.4 MB
|
Gwiazda T - Algorytmy genetyczne. Kompendium. T 1. Operator krzyżowania dla problemów numerycznych.pdf
|
16.9 MB
|
Hapke M - Modelowanie i Metaheurystyki. Wykład.7z
|
2.4 MB
|
Haupt R, Haupt S - Practical Genetic Algorithms. 2 ed.pdf
|
2.6 MB
|
Inteligencja obliczeniowa. AGH.7z
|
2.0 MB
|
Kaczyński P - Metody rozmyte i algorytmy ewolucyjne. Wykład.7z
|
2.3 MB
|
Komosiński M - Metaheurystyki. Metody optymalizacji.7z
|
9.2 MB
|
Luger G - Artificial Intelligence. Structures and Strategies for Complex Problem Solving. 5 ed.pdf
|
23.5 MB
|
Luque G, Alba A - Parallel Genetic Algorithms. Theory and Real World Applications.pdf
|
2.0 MB
|
Metaheurystyki. Artykuły.7z
|
4.3 MB
|
Metaheurystyki. Przykłady.7z
|
2.2 MB
|
Metaheurystyki. Uniwersytet Śląski.7z
|
26.5 MB
|
Michalewicz Z - Algorytmy genetyczne + struktury danych = programy ewolucyjne. wyd 2.pdf
|
22.2 MB
|
Michalewicz Z, Fogel D - Jak to rozwiązać czyli nowoczesna heurystyka.pdf
|
23.4 MB
|
Michel Gendreau, Jean-Yves Potvin - Handbook of Metaheuristics. 2 ed.pdf
|
5.8 MB
|
Mitchell M - An Introduction to Genetic Algorithms.pdf
|
2.2 MB
|
Molecki B - Algorytmy genetyczne a logika rozmyta.pdf
|
409.0 KB
|
Sean Luke - Essentials of Metaheuristics.pdf
|
5.1 MB
|
Sztangret Ł - Algorytmy ewolucyjne i automaty komórkowe. AGH.7z
|
3.4 MB
|
Tabu Search . Artykuły.7z
|
19.8 MB
|
Trojanowski K - Metaheurystyki parktycznie. wyd 2.pdf
|
68.3 MB
|
Trojanowski K - Metaheurystyki. Materiały pomocnicze.pdf
|
25.8 MB
|
Warsztaty algorytmów genetycznych. 2003.pdf
|
2.4 MB
|
Wróblewski J - Algorytmy genetyczne. Ćwiczenia.pdf
|
835.2 KB
|
Wróblewski J - Narzędzia sztucznej inteligencji.7z
|
2.5 MB
|
Xin She Yang - Engineering Optimization. An Introduction with Metaheuristic Applications.pdf
|
16.3 MB
|
/.../_ Informatyka. Metody numeryczne (napomoc)/
|
Analiza numeryczna.rar
|
448.4 KB
|
Bjorck A, Dahlquist G - Metody numeryczne.pdf
|
46.1 MB
|
Chwiej T - Metody numeryczne.7z
|
6.0 MB
|
Cichy B - Metody numeryczne.7z
|
939.1 KB
|
Demidowicz B, Maron I - Computational Mathematics.pdf
|
20.7 MB
|
Dudek-Dyduch Wąs i in - Metody numeryczne. Wybrane zagadnienia.pdf
|
8.3 MB
|
Fortuna Z, Macukow B, Wasowski J - Metody numeryczne.pdf
|
69.9 MB
|
Golec-Biernat K - Metody numeryczne dla fizyków.pdf
|
314.6 KB
|
Jankowscy M i J - Przegląd metod i algorytmów numerycznych. cz 1.pdf
|
23.0 MB
|
Jankowscy M i J - Przegląd metod i algorytmów numerycznych. cz 2.pdf
|
32.2 MB
|
Kincaid D, Cheney W - Analiza numeryczna.pdf
|
61.9 MB
|
Kosma Z - Metody i algorytmy numeryczne [2009].rar
|
3.1 MB
|
Kosma Z - Metody numeryczne dla zastosowań inżynierskich [2007].rar
|
2.9 MB
|
Kosma Z - Metody numeryczne dla zastosowań inżynierskich-Programy.rar
|
14.3 MB
|
Krupka Miękina Morawski Opalski - Wstęp do metod numerycznych dla studentów elektroniki.pdf
|
56.2 MB
|
Majchrzak E, Mochnacki B - Metody Numeryczne. Postawy teoretyczne, aspekty praktyczne i algorytmy.pdf
|
42.7 MB
|
Metody numeryczne. Politechnika Łódzka.rar
|
1.8 MB
|
Metody numeryczne. Politechnika Śląska.rar
|
2.1 MB
|
Moszyński K - Metody numeryczne dla informatyków.pdf
|
837.4 KB
|
Moszyński K - Metody numeryczne równań różniczkowych cząstkowych.pdf
|
441.2 KB
|
Numerical Recipes in C. 2ed.pdf
|
10.5 MB
|
Numerical Recipes in F77. Volume 1. 2ed.pdf
|
20.2 MB
|
Numerical Recipes in F90. Volume 2. 2ed.pdf
|
2.4 MB
|
Numerical Recipes. 3ed.pdf
|
21.4 MB
|
Pang Tao - Metody obliczeniowe w fizyce. Fizyka i komputery.pdf
|
47.7 MB
|
Pańczyk B, Łukasik E, Sikora J, Guziak T - Metody numeryczne w przykładach.pdf
|
3.5 MB
|
Popov O - Metody numeryczne i optymalizacja cz 1.pdf
|
23.8 MB
|
Potter D - Metody obliczeniowe fizyki. wyd 2. ver.pdf
|
53.0 MB
|
Potter D - Metody obliczeniowe fizyki. wyd 2.pdf
|
9.9 MB
|
Stoer J - Wstęp do metod numerycznych. T 1.pdf
|
22.0 MB
|
Szwabiński J. - Metody Numeryczne I.pdf
|
807.2 KB
|
Szwabiński J. - Metody Numeryczne II.7z
|
2.2 MB
|
Sędziwy S - Wstęp do metod numerycznych.pdf
|
877.6 KB
|
zagadnienia.7z
|
1.5 MB
|
/.../_ Informatyka. Pakiet R (napomoc)/
|
Biecek P - PogRomcy danych. Przetwarzanie danych w programie R.epub
|
7.8 MB
|
Biecek P - PogRomcy danych. Przetwarzanie danych w programie R.pdf
|
3.6 MB
|
Biecek P - PogRomcy danych. Wizualizacja i modelowanie.epub
|
11.3 MB
|
Biecek P - PogRomcy danych. Wizualizacja i modelowanie.pdf
|
11.6 MB
|
Biecek P - Przewodnik po pakiecie R [fragment].pdf
|
1.9 MB
|
Biecek P - Przewodnik po pakiecie R. ver.pdf
|
84.8 MB
|
Biecek P - Przewodnik po pakiecie R. wyd 3 [do str 168].pdf
|
1.7 MB
|
Biecek P - Przewodnik po pakiecie R.pdf
|
24.7 MB
|
Chang W - R Graphics Cookbook.pdf
|
10.0 MB
|
Komsta Ł - Wprowadzenie do środowiska R.pdf
|
992.0 KB
|
Nowak-Brzezińska A - Statystyczne metody analizy danych przy użyciu środowiska R.pdf
|
1.7 MB
|
Teetor P - R Cookbook.pdf
|
4.4 MB
|
/.../_ Informatyka. PHP (napomoc)/
|
Barney L, McLaughlin M - Oracle Database. Tworzenie aplikacji internetowych w AJAX i PHP.7z
|
15.1 MB
|
Bisz M - Ćwiczenia z. Język PHP.pdf
|
4.4 MB
|
Davis M, Philips J - PHP i MySQL. Wprowadzenie. wyd 2.pdf
|
14.9 MB
|
Gajda W - Symfony 2 od podstaw.pdf
|
5.1 MB
|
Gajda W - Symfony w przykładach.pdf
|
8.4 MB
|
Gilmore W - PHP i MySQL. Od podstaw. wyd 4.pdf
|
4.8 MB
|
Joshi V - PHP i jQuery. Receptury.pdf
|
8.0 MB
|
Lis M - jQuery. Ćwiczenia praktyczne.pdf
|
35.5 MB
|
Lis M - PHP 5 leksykon kieszonkowy.pdf
|
1.1 MB
|
Lis M - PHP 5. Praktyczny kurs. wyd 2.pdf
|
10.8 MB
|
Lis M - PHP i MySQL dla każdego. wyd 2.pdf
|
11.1 MB
|
Lis M - Tworzenie bezpiecznych aplikacji internetowych (z przykładami w PHP).pdf
|
12.4 MB
|
Majkowski W - jQuery. Tworzenie animowanych witryn internetowych.pdf
|
8.3 MB
|
Maskus P - Ćwiczenia z PHP i MySQL.pdf
|
15.7 MB
|
Matula T - Laravel. Tworzenie aplikacji. Receptury.pdf
|
27.7 MB
|
Nixon R - PHP, MySQL i JavaScript. Wprowadzenie. wyd 4.pdf
|
22.8 MB
|
PHP5, Apache i MySQL. Od podstaw.pdf
|
21.4 MB
|
Rutter J - Podręcznik jQuery. Interaktywne interfejsy internetowe.pdf
|
11.5 MB
|
Sanders W - PHP. Wzorce projektowe.pdf
|
6.1 MB
|
Shu-Wai Chow - PHP Web 2.0. Tworzenie aplikacji typu mashup.pdf
|
6.7 MB
|
Ullman L - PHP 6 i MySQL 5. Dynamiczne strony WWW. Szybki start.djvu
|
16.2 MB
|
Ullman L - PHP 6 i MySQL 5. Dynamiczne strony WWW. Szybki start.pdf
|
23.9 MB
|
Welling L, Thomson L - PHP i MySQL. Tworzenie stron WWW. Vademecum profesjonalisty. wyd 4.pdf
|
39.0 MB
|
Zandstra M - PHP Obiekty wzorce narzędzia. wyd 4.pdf
|
8.6 MB
|
/.../_ Informatyka. Programowanie (napomoc)/
|
Ahlersten K - An Introduction to Matlab.pdf
|
6.9 MB
|
Beazley D - Programowanie. Python.pdf
|
3.2 MB
|
Beazley D, Jones B - Python. Receptury. wyd 3.pdf
|
4.9 MB
|
Beck K - TDD. Sztuka tworzenia dobrego kodu.pdf
|
38.9 MB
|
Bentley J - Więcej perełek oprogramowania.pdf
|
24.1 MB
|
Borkowski P - AVR i ARM7. Programowanie mikrokontrolerów dla każdego [brak str 356].pdf
|
147.0 MB
|
Brozi A - Scilab w przykładach. ver.pdf
|
8.0 MB
|
Brozi A - Scilab w przykładach.pdf
|
41.6 MB
|
Cichoń J, Kobylański P - Wstęp do informatyki i programowania.pdf
|
1.1 MB
|
Coldwind G - Zrozumieć programowanie.pdf
|
11.8 MB
|
Dawson M - Python dla każdego. wyd 3.pdf
|
7.9 MB
|
Downey A - Myśl w języku Python. wyd 2.pdf
|
43.9 MB
|
Feathers M - Praca z zastanym kodem. Najlepsze techniki.pdf
|
4.9 MB
|
Hunt A, Thomas D - Pragmatyczny programista. Od czeladnika do mistrza.pdf
|
2.8 MB
|
Janczewski R - Python.7z
|
701.4 KB
|
Karbowski A - Programowanie równoległe i rozproszone.pdf
|
22.1 MB
|
Kierzkowski A - Turbo Pascal. Ćwiczenia praktyczne. wyd 2.pdf
|
15.8 MB
|
Kohl M - Introduction to statistical data analysis with R.pdf
|
10.5 MB
|
Lutz M - Python. Leksykon kieszonkowy. wyd 5.pdf
|
13.7 MB
|
Lutz M - Python. Wprowadzenie. wyd 4.pdf
|
63.6 MB
|
Martin R - Zwinne wytwarzanie oprogramowania.pdf
|
24.3 MB
|
Mazurek P - Delphi.7z
|
4.0 MB
|
Petzold C - Windows 8. Programowanie aplikacji z wykorzystaniem C# i XAML. wyd 6.pdf
|
56.3 MB
|
Rościszewski K, Wit R - Nauka Fortranu F90-95 przez przykłady dla początkujących.pdf
|
626.2 KB
|
RS 232C-Praktyczne programowanie.pdf
|
3.6 MB
|
Sadowski T - Turbo Pascal. Programowanie.pdf
|
1.1 MB
|
Sobierajski M, Łabuzek M - Programowanie w Matlabie dla elektryków.pdf
|
5.6 MB
|
Swacha J - Pascal. krótko.html
|
151.4 KB
|
Swacha J - Python.7z
|
91.5 KB
|
Weisfeld M - Myślenie obiektowe w programowaniu. wyd 4.pdf
|
5.5 MB
|
Wierzchołowski K - Turbo Pascal. Twój pierwszy program.pdf
|
1.3 MB
|
Zalewski A, Cegieła R - Matlab. Obiczenia numeryczne i ich zastosowania.pdf
|
12.1 MB
|
/.../_ Informatyka. Prolog (napomoc)/
|
Blackburn P, Bos J, Striegnitz K - Learn Prolog Now.pdf
|
500.6 KB
|
Bratko I - Prolog Programming For Artificial Intelligence.pdf
|
20.7 MB
|
Clocksin W, Mellish C - Prolog. Programowanie.pdf
|
4.8 MB
|
Csenki A - Prolog Techniques.pdf
|
3.9 MB
|
Dembski J - Prolog.7z
|
194.2 KB
|
Dembski J - Przykładowe sprawdziany.htm
|
10.8 KB
|
Fulmański P - Programowanie w logice. Prolog.pdf
|
849.5 KB
|
Haskell różności.7z
|
2.7 MB
|
Hett W - Prolog. Course. Problems.7z
|
821.1 KB
|
Ligęza A - Prolog w 33 minuty.pdf
|
106.8 KB
|
Michalski A - Programowanie deklaratywne.7z
|
1.7 MB
|
Nillson U, Małuszyński J - Logic, Programming and Prolog [2ed].pdf
|
2.0 MB
|
Nowak A - Prolog.pdf
|
368.9 KB
|
Programowanie deklaratywne, różne.7z
|
6.3 KB
|
Programowanie deklaratywne, zadania.7z
|
20.3 KB
|
Programowanie w języku logiki.7z
|
859.2 KB
|
Prolog różności.7z
|
398.0 KB
|
Słabosz M, Hayn Ł - Prolog.pdf
|
804.5 KB
|
/.../_ Informatyka. Rails Ruby (napomoc)/
|
Berry E - Rails. Leksykon kieszonkowy.pdf
|
3.5 MB
|
Elder J - Ruby on Rails. Tworzenie aplikacji WWW.pdf
|
3.5 MB
|
Flanagan D, Matsumoto Y - Ruby. Programowanie.pdf
|
14.1 MB
|
/.../_ Informatyka. Sieci (napomoc)/
|
802.pdf
|
243.4 KB
|
Anderson A, Benedetti R - Sieci komputerowe. Head First.pdf
|
35.4 MB
|
Comer D - Internetworking With TCPIP 1. 6ed.pdf
|
2.7 MB
|
Comer D - Internetworking With TCPIP 3. 2ed.pdf
|
8.5 MB
|
Frames & Headers.pdf
|
145.9 KB
|
IP.pdf
|
242.5 KB
|
IP_Header.pdf
|
96.9 KB
|
IP_Header_v6.pdf
|
95.1 KB
|
Józefiok A - Budowa sieci komputerowych na przełącznikach i routerach Cisco.pdf
|
44.4 MB
|
Kiziukiewicz B - Sieci lokalne.pdf
|
604.6 KB
|
Kurose J, Ross K - Sieci komputerowe. Od ogółu do szczegółu z internetem w tle. wyd 3.pdf
|
52.7 MB
|
Ochrona informacji w sieciach. Wykłady PW.7z
|
39.2 MB
|
Ramachandran V - BackTrack 5. Testy penetracyjne sieci WiFi.pdf
|
18.3 MB
|
Serafin M - Sieci VPN. Zdalna praca i bezpieczeństwo danych. wyd 2.pdf
|
4.7 MB
|
Sieci Komputerowe - Opracowanie.pdf
|
960.0 KB
|
Sieci komputerowe I.rar
|
11.6 MB
|
Sportack M - Sieci komputerowe. Księga eksperta.pdf
|
5.1 MB
|
Stallings W - Protokoły SNMP i RMON. Vademecum profesjonalisty.pdf
|
16.1 MB
|
Stevens W R - TCPIP Illustrated 1. 2ed.pdf
|
20.5 MB
|
Stevens W R - TCPIP Illustrated 1.pdf
|
2.9 MB
|
Stevens W R - TCPIP Illustrated 2.pdf
|
31.8 MB
|
Stevens W R - TCPIP Illustrated 3.pdf
|
3.1 MB
|
Stevens W R, Fall K - TCPIP od środka. Protokoły. wyd 2.pdf
|
42.0 MB
|
Tanenbaum A - Sieci komputerowe. wyd 4.pdf
|
48.5 MB
|
TCP state transition diagram.pdf
|
34.4 KB
|
TCP_Header.pdf
|
115.7 KB
|
Tutorial_Slides_Mib-intro.pdf
|
158.5 KB
|
UDP_ICMP_Headers.pdf
|
81.1 KB
|
Windows XP Tworzenie połączenia sieciowego.pdf
|
1.8 MB
|
Wszelak S - Administrowanie sieciowymi protokołami komunikacyjnymi.pdf
|
25.4 MB
|
/.../_ Informatyka. Sieci neuronowe (napomoc)/
|
Bartecki K - Sztuczne sieci neuronowe w zastosowaniach. Zbiór ćwiczeń.pdf
|
5.4 MB
|
Bartkowiak A - Sieci neuronowe.pdf
|
2.5 MB
|
Koch C - Neural Networks. Algorithms, Applications And Programming Techniques.pdf
|
10.8 MB
|
Korbicz J, Obuchowicz A, Uciński D - Sztuczne sieci neuronowe.pdf
|
58.0 MB
|
Osowski S - Sieci neuronowe w ujeciu algorytmicznym.pdf
|
65.4 MB
|
Osowski S - Sieci neuronowe.pdf
|
21.5 MB
|
Principe J, Euliano N, Lefebvre W - Neural and Adaptive Systems. Fundamentals Through Simulations.7z
|
3.0 MB
|
Rojas R - Neural Networks-A Systematic Introduction.pdf
|
4.6 MB
|
Tadeusiewicz i in - Odkrywanie właściwości sieci neuronowych przy użyciu programów w języku C#.pdf
|
42.4 MB
|
Tadeusiewicz R - Badanie właściwosci układow samodzielnych.pdf
|
3.6 MB
|
Tadeusiewicz R - Biocybernetyka.pdf
|
14.9 MB
|
Tadeusiewicz R - Elementarne wprowadzenie do techniki sieci neuronowych z przykładowymi programami.7z
|
46.0 MB
|
Tadeusiewicz R - Problemy biocybernetyki.pdf
|
18.3 MB
|
Tadeusiewicz R - Sieci neuronowe.pdf
|
48.5 MB
|
Tadeusiewicz R - Wprowadzenie do praktyki stosowania sieci neuronowych.pdf
|
590.0 KB
|
Taylor J - Mathematical Approaches to Neural Networks.pdf
|
6.5 MB
|
Żurada J, Barski M, Jędruch W - Sztuczne sieci neuronowe. Podstawy teorii i zastosowania.pdf
|
36.2 MB
|
/.../_ Informatyka. Systemy operacyjne (napomoc)/
|
Barczak A, Sidoruk T - Bezpieczeństwo systemów informatycznych zarządzania.pdf
|
44.0 MB
|
Bezpieczeństwo systemów komputerowych.7z
|
6.2 MB
|
Borkowski M - Systemy Operacyjne.rar
|
864.0 KB
|
Jasińska-Suwada A, Plichta S - Przewodnik do ćwiczeń. Systemy Operacyjne.pdf
|
13.3 MB
|
Rommel F - Active Directory. Odtwarzanie po awarii.pdf
|
52.6 MB
|
Silberschatz A - Podstawy Systemów Operacyjnych. wyd 5.pdf
|
84.7 MB
|
Stencel K - Systemy operacyjne.pdf
|
38.0 MB
|
/.../_ Informatyka. Tablice informatyczne (napomoc)/
|
CSS Tablice informatyczne.pdf
|
703.7 KB
|
Tablice informatyczne AJAX.pdf
|
4.5 MB
|
Tablice informatyczne ASP.NET.pdf
|
15.4 MB
|
Tablice informatyczne BIOS.pdf
|
2.2 MB
|
Tablice informatyczne C#. wyd 2.pdf
|
13.4 MB
|
Tablice informatyczne C++. wyd 2.pdf
|
2.5 MB
|
Tablice informatyczne C++.pdf
|
6.6 MB
|
Tablice informatyczne CSS.pdf
|
5.0 MB
|
Tablice informatyczne CSS3.pdf
|
13.1 MB
|
Tablice informatyczne Delphi.pdf
|
1.2 MB
|
Tablice informatyczne DOS.pdf
|
11.1 MB
|
Tablice informatyczne Drupal.pdf
|
12.1 MB
|
Tablice informatyczne HTML i XHTML.pdf
|
3.4 MB
|
Tablice informatyczne HTML.pdf
|
3.9 MB
|
Tablice informatyczne HTML5.pdf
|
2.8 MB
|
Tablice informatyczne Java Script.pdf
|
6.5 MB
|
Tablice informatyczne Java. wyd 3.pdf
|
376.9 KB
|
Tablice informatyczne Joomla.pdf
|
9.0 MB
|
Tablice informatyczne jQuery.pdf
|
11.9 MB
|
Tablice informatyczne Linux. wyd 3.pdf
|
12.3 MB
|
Tablice informatyczne MS Access 2003.pdf
|
4.8 MB
|
Tablice informatyczne MS Excel 2007 PL. Funkcje.pdf
|
4.7 MB
|
Tablice informatyczne MS Windows Server 2008.pdf
|
4.4 MB
|
Tablice informatyczne Oracle.pdf
|
15.3 MB
|
Tablice informatyczne Photoshop CS3PL.pdf
|
5.1 MB
|
Tablice informatyczne PHP 5.pdf
|
3.4 MB
|
Tablice informatyczne PHP.pdf
|
4.8 MB
|
Tablice informatyczne SQL. wyd 2.pdf
|
2.4 MB
|
Tablice informatyczne Turbo Pascal.pdf
|
5.4 MB
|
Tablice informatyczne VBA Excel.pdf
|
3.2 MB
|
Tablice informatyczne Windows Vista PL.pdf
|
4.4 MB
|
Tablice informatyczne Windows XP.pdf
|
4.6 MB
|
Tablice informatyczne WordPress.pdf
|
14.3 MB
|
Tablice informatyczne XML.pdf
|
5.6 MB
|
/.../_ Informatyka. Unix (napomoc)/
|
Borkowski M - unix.rar
|
558.5 KB
|
Cooper M - Advanced Bash-Scripting Guide.pdf
|
2.2 MB
|
Harlow E - Linux. Tworzenie aplikacji.pdf
|
5.7 MB
|
Haviland, Gray, Salama - UNIX, programowanie systemowe.pdf
|
25.8 MB
|
Kirch O, Dawson T - Linux. Podręcznik administratora sieci.pdf
|
3.5 MB
|
Lewis J - Najlepsze narzędzia w systemie Linux. Wykorzystaj ponad 70 receptur.pdf
|
10.9 MB
|
Linux - księga eksperta.rar
|
2.4 MB
|
Madeja L - Ćwiczenia z systemu Linux. Podstawy obsługi systemu.pdf
|
16.5 MB
|
Matthew N, Stones R - Zaawansowane programowanie w systemie Linux.pdf
|
12.4 MB
|
Ray D, Ray E - Po prostu Unix.pdf
|
42.4 MB
|
Sobell M - Linux. Programowanie w powłoce. Praktyczny przewodnik. wyd 3.pdf
|
9.1 MB
|
Sosna Ł - Linux. Komendy i polecenia. wyd 4.pdf
|
7.5 MB
|
Stevens W R - Programowanie w środowisku systemu UNIX.pdf
|
26.8 MB
|
Stevens W R - Programowanie zastosowań sieciowych w systemie Unix.pdf
|
27.2 MB
|
Stutz M - Linux. Najlepsze przepisy. wyd 2.pdf
|
21.3 MB
|
Taylor D - Wicked Cool Shell Scripts.pdf.rar
|
5.2 MB
|
Ward B - Jak działa Linux. Podręcznik administratora. wyd 2.pdf
|
47.4 MB
|
/.../_ Informatyka. Word Excel Acces (napomoc)/
|
=Edytorstwo komputerowe.rar
|
1.3 MB
|
acces excel word.rar
|
20.9 MB
|
Bajorek T - Excel, Matlab. Ćwiczenia.7z
|
6.0 MB
|
excel szkolenie.7z
|
116.5 MB
|
excel-333 - Zamiana tekstu na liczby.mp4
|
4.8 MB
|
Gonet M - Excel w obliczeniach naukowych i inżynierskich. wyd 2.pdf
|
20.2 MB
|
Mendrala D, Szeliga M - Access 2010 PL. Ćwiczenia praktyczne.pdf
|
33.7 MB
|
Milton M - Excel. Rusz głową.pdf
|
39.5 MB
|
Robbins A - Edytory vi i Vim. Leksykon kieszonkowy.pdf
|
27.3 MB
|
Sikorski W - Excel dla studentów.pdf
|
8.0 MB
|
Spręga R - Ćwiczenia edytorskie dla liceum.pdf
|
459.8 KB
|
tutorial word excel photoshop [www.gohha.com 2014].7z
|
24.4 MB
|
Walkenbach J - 101 Excel 2013 Tips Tricks and Timesavers.pdf
|
47.8 MB
|
Walkenbach J - Excel 2013 PL Bibla.pdf
|
25.5 MB
|
Walkenbach J - Excel 2013 Power Programming with VBA.pdf
|
84.7 MB
|
Walkenbach J - Excel Charts.pdf
|
12.0 MB
|
Walkenbach J - Favorite Excel 2010 Tips & Tricks.pdf
|
13.7 MB
|
Word.txt
|
0.3 KB
|
Word_2003_Pomocnik.7z
|
6.0 MB
|
Wrotek W - VBA dla Excela 2013 PL. 200 praktycznych przykładów.pdf
|
8.0 MB
|
Wykorzystanie analizy wskaźnikowej do oceny sytuacji finansowej firmy.xls
|
48.1 KB
|
Zajecia_Word.7z
|
1.2 MB
|
Zajęcia_Excel.7z
|
1.3 MB
|
/.../_ Informatyka. WWW (napomoc)/
|
Allen J, Chudley J - Projektowanie witryn internetowych User eXperience.pdf
|
10.0 MB
|
Enge E, Spencer S, Stricchiolam J, Fishkin R - Sztuka SEO. Optymalizacja witryn internetowych.pdf
|
31.9 MB
|
Firduas T - Responsive Web Design. Nowoczesne strony WWW na przykładach.pdf
|
10.7 MB
|
Hedengren T - Podręcznik WordPressa.pdf
|
54.0 MB
|
Hope P, Walther B - Testowanie bezpieczeństwa aplikacji internetowych. Receptury.pdf
|
15.9 MB
|
Podręcznik projektantów WWW [Smashing Magazine].pdf
|
3.4 MB
|
Rice W - Tworzenie serwisów e-learningowych z Moodle 1.9.pdf
|
11.1 MB
|
Wójcik Ł, Bród M - WordPress 4. Instalacja i zarządzanie.pdf
|
21.7 MB
|
/.../_ Knuth D - Sztuka programowania (napomoc)/
|
Knuth D - Sztuka programowania. T 1. Algorytmy podstawowe.pdf
|
25.0 MB
|
Knuth D - Sztuka programowania. T 1. z 1. MMIX. ver.pdf
|
8.0 MB
|
Knuth D - Sztuka programowania. T 1. z 1. MMIX.pdf
|
5.0 MB
|
Knuth D - Sztuka programowania. T 2. Algorytmy seminumeryczne.pdf
|
38.9 MB
|
Knuth D - Sztuka programowania. T 3. Sortowanie i wyszukiwanie.pdf
|
52.6 MB
|
Knuth D - Sztuka programowania. T 4. z 2. Generowanie wszystkich krotek i permutacji.pdf
|
17.3 MB
|
/Lain Books/_Algorithms/
|
Algorithms in a Nutshell.epub
|
5.3 MB
|
Introduction to Algorithms - 3rd Edition.pdf
|
5.1 MB
|
/Lain Books/_Computer Science/
|
Advanced Computer Architecture and Parallel Processing.pdf
|
5.0 MB
|
Compilers - 2nd Edition.pdf
|
5.1 MB
|
Computational Complexity - A Modern Approach.pdf
|
4.2 MB
|
Computer Systems - A Programmer's Perspective.pdf
|
7.1 MB
|
Graph Teory.pdf
|
2.3 MB
|
/.../_EPUB and DJVU/
|
1458416490444.djvu
|
1.3 MB
|
1464883426092.djvu
|
44.4 MB
|
1465538669818-0.epub
|
425.6 KB
|
1465538934501-1.epub
|
458.4 KB
|
1465538934501-2.epub
|
442.0 KB
|
1469517838023.djvu
|
2.9 MB
|
1469979504138-1.djvu
|
6.7 MB
|
1478141100537.djvu
|
9.2 MB
|
1478370413142.djvu
|
1.9 MB
|
Hacking - The Art of Exploitation - 2nd Edition.epub
|
1.4 MB
|
Silence on the Wire.epub
|
5.4 MB
|
/Lain Books/_Linux-UNIX/
|
Advanced Programming in the UNIX Environment.pdf
|
20.6 MB
|
Linux System Programming.pdf
|
10.4 MB
|
Mastering Emacs.pdf
|
1.6 MB
|
SSH, the Secure Shell - The Definitive Guide.pdf
|
6.8 MB
|
The Linux Programming Interface.pdf
|
7.3 MB
|
The Practice of System and Network Administration - 2nd Edition.pdf
|
6.2 MB
|
Unix Toolbox.pdf
|
388.0 KB
|
/Lain Books/_Others/
|
Bitcoin for The Befuddled.epub
|
24.9 MB
|
Code Complete - 2nd Edition.pdf
|
8.9 MB
|
Concurrent Programming in ML.pdf
|
908.3 KB
|
Developing with PDF.pdf
|
9.8 MB
|
Distributed Systems - Concepts and Design.pdf
|
10.2 MB
|
Elementary Linear Algebra.pdf
|
2.4 MB
|
Foundation of Digital Electronics and Logic Design.pdf
|
7.3 MB
|
Free Software, Free Society Selected Essays of Richard M. Stallman.epub
|
1.4 MB
|
Getting Started with Julia Programming.pdf
|
2.8 MB
|
Googling the Error Message.pdf
|
184.1 KB
|
Hacker's Delight - 2nd Edition.pdf
|
22.1 MB
|
How to be a Programmer - A Short, Comprehensive, and Personal Summary.pdf
|
164.4 KB
|
Introduction to Computing Systems.pdf
|
13.7 MB
|
Introduction to Lambda Calculus.pdf
|
554.9 KB
|
Learning PHP, MySQL, JavaScript, CSS and HTML5.pdf
|
21.2 MB
|
Operating Systems - Three Easy Pieces.pdf
|
4.6 MB
|
Practical Malware Analysis.pdf
|
9.7 MB
|
Programming in Lua - 3rd Edition.pdf
|
2.1 MB
|
Real Time Systems.pdf
|
2.6 MB
|
Regular Expression - Pocket Reference.pdf
|
1.0 MB
|
RESTful Web Clients - Early Release.pdf
|
5.1 MB
|
Starting Out with Programming Logic and Design.pdf
|
3.9 MB
|
Steal this Computer Book 4.0.pdf
|
20.0 MB
|
Steal This File Sharing Book.pdf
|
23.8 MB
|
Structure and Interpretation of Computer Programs - 2nd Edition.pdf
|
5.1 MB
|
Structure and Interpretation of Computer Programs.pdf
|
9.4 MB
|
Surreal Numbers.pdf
|
13.6 MB
|
The Architecture of Symbolic Computers.pdf
|
24.7 MB
|
The Little Book of Semaphores.pdf
|
1.2 MB
|
The Little Schemer.pdf
|
3.0 MB
|
The Not So Short Introduction to LaTeX 2e.pdf
|
1.7 MB
|
The Practice of Programming.pdf
|
5.1 MB
|
The Smart Girl's Guide to Privacy.pdf
|
2.2 MB
|
The Web Application Hacker's Handbook.pdf
|
15.4 MB
|
Turtle Geometry.pdf
|
6.2 MB
|
Understanding Computation.pdf
|
11.0 MB
|
Understanding Computers and Cognition.pdf
|
11.6 MB
|
Writing a Simple Operating System from Scratch.pdf
|
774.4 KB
|
/Lain Books/Assembly/
|
MIPS Assembly Language Programming.pdf
|
537.3 KB
|
Professional Assembly Language.pdf
|
6.9 MB
|
The Art of Assembly Language.pdf
|
4.5 MB
|
The Zen of Assembly Language.pdf
|
2.6 MB
|
/Lain Books/C and C++/
|
21st Century C.pdf
|
6.0 MB
|
Beej's Guide to Network Programming - Using Internet Sockets.pdf
|
767.2 KB
|
Expert C Programming.pdf
|
2.2 MB
|
Practical C Programming.pdf
|
6.2 MB
|
The C Programming Language - 2nd Edition.pdf
|
2.9 MB
|
The C++ Programming Language - 4th Edition.pdf
|
19.7 MB
|
Thinking in C++ - 2nd Edition - Volume 2 Standard Libraries and Advanced Topics.pdf.pdf
|
2.1 MB
|
Understanding and Using C Pointers.pdf
|
7.7 MB
|
/Lain Books/Clojure/
|
Clojure for the Brave and True.pdf
|
6.2 MB
|
Clojure Programming.pdf
|
12.1 MB
|
Clojure Reactive Programming.pdf
|
13.1 MB
|
Clojure Web Development Essentials.pdf
|
4.6 MB
|
Learning ClojureScript.pdf
|
5.0 MB
|
The Joy of Clojure.pdf
|
8.9 MB
|
/Lain Books/Elixir/
|
Elixir Cookbook.pdf
|
3.6 MB
|
Elixir in Action.pdf
|
5.8 MB
|
Introducing Elixir.pdf
|
3.1 MB
|
Learning Elixir.pdf
|
13.7 MB
|
The Little Elixir and OTP Guidebook.pdf
|
6.4 MB
|
/Lain Books/Haskell/
|
Learn You a Haskell for Great Good.pdf
|
3.1 MB
|
Thinking Functionally with Haskell.pdf
|
1.8 MB
|
/Lain Books/Java/
|
Data Structures and Algorithms in Java.pdf
|
10.4 MB
|
Effective Java - Programming Language Guide.pdf
|
2.9 MB
|
RESTful Java with JAX-RS 2.0.pdf
|
7.5 MB
|
/Lain Books/Python/
|
Data Structures and Algorithms in Python.pdf
|
6.9 MB
|
Introduction to Computation and Programming Using Python - With Application to Understanding Data.pdf
|
19.5 MB
|
Learn Python the Hard Way.pdf
|
2.7 MB
|
Learning Python - 5th Edition.pdf
|
15.4 MB
|
Python Crash Course.pdf
|
5.6 MB
|
Python Programming - An Introduction to Computer Science - 2nd Edition.pdf
|
2.2 MB
|
The Quick Python Book.pdf
|
4.6 MB
|
Think Python - How to Think Like a Computer Scientist.pdf
|
813.8 KB
|
/Lain Books/Ruby/
|
Computer Science Programming Basics in Ruby.pdf
|
8.2 MB
|
Confident Ruby.pdf
|
491.4 KB
|
Everyday Scripting with Ruby.pdf
|
2.7 MB
|
Metaprogramming Ruby - 2nd Edition.pdf
|
15.4 MB
|
Practical Ruby Projects.pdf
|
3.2 MB
|
Ruby Under a Microscope.pdf
|
12.7 MB
|
Wicked Cool Ruby Scripts.pdf
|
1.8 MB
|
/Lain Books/Scheme/
|
The Little Schemer.pdf
|
5.7 MB
|
The Seasoned Schemer.pdf
|
9.0 MB
|
/Security-Computing_Ebooks/
|
(70-229) Mcad Mcsd Mcse - Designing And Implementing Sql 2000 Server - Testking v1-1.pdf
|
986.7 KB
|
(e-Book) CCDA Exam Certification Guide, 2nd Ed. (640-861) - Cisco Press 2004.pdf
|
28.3 MB
|
(Ebook - Computer) Hacking The Windows Registry.pdf
|
227.2 KB
|
(ebook - pdf) how to crack cd protections.pdf
|
30.7 KB
|
(eBook - PDF) Hugo Cornwall - The Hacker's Handbook .pdf
|
284.7 KB
|
(Ebook OCR) Leslie Lamport - Latex A document preparation system (1994 2nd).pdf
|
12.0 MB
|
(ebook pdf) hacking into computer systems - a beginners guide.pdf
|
629.9 KB
|
(eBook) - ITU-T - H323-SIP.pdf
|
57.9 KB
|
(eBook) - Network Security Guide - NSA.pdf
|
240.7 KB
|
(ebook) Hacking Manual HACKING INTO COMPUTER SYSTEMS.doc
|
1.7 MB
|
(Ebook) Php 5 For Dummies (2004).pdf
|
3.8 KB
|
(ebook) ted the tool - mit guide to lock picking.pdf
|
521.1 KB
|
(ebook-pdf) - Programming - Website Database Basics With PHP and MySQL.PDF
|
104.6 KB
|
(eTrain) MS Press - MCAD.MCSD.Self.Paced.Training.Kit.Developing.XML.Web.Services.And.Server.Components.With.MS.Visual.Basic.Dot.NET.And.MS.CSharp.chm
|
12.7 MB
|
(Nokia) Getting Started with Python.pdf
|
280.0 KB
|
(Nokia) Programming with Python.pdf
|
1.1 MB
|
-Sybex, MCSA MCSE (Exam 70-270) Windows XP Professional Study Guide (2005), 3Ed DDU OCR 7.0-2.6 LotB.pdf
|
18.6 MB
|
2 2 Sybex - 70-290 Mcsa Mcse - Windows Xp Professional Study Guide (2Nd Edition).pdf
|
12.1 MB
|
2__Test King - 070-290 - Version 03.00 - Managing and Maintaining a Microsoft Windows Server 2003 Environment (MCSE).pdf
|
1.2 MB
|
2_Cisco Press - CCNA ICND Exam Certification Guide.2004.pdf
|
13.2 MB
|
2_MCDBA 70-291 MCSE MCSA - Win Server 2003 Network Infrastructure by Syngress.pdf
|
11.9 MB
|
2_Oracle OCP Admin Exam.doc
|
11.6 MB
|
2_SCJP Exam - TestKing 310-055 Sun Java Certified Programmer v3.0.pdf
|
252.9 KB
|
2_Testking - 70-290 Microsoft MCSE 2003 Managing and Maintaining a MS Win Server 2003 Environment Edt 6.0 .pdf
|
6.3 MB
|
2_TestKing Ccnp Cisco 642-801 BSCI v4.0.pdf
|
2.8 MB
|
11 Passwords.pdf
|
266.8 KB
|
12 Tips for Dreamweaver 4.pdf
|
796.7 KB
|
70-215 MCSE Windows 2000 Server Study Guide 2nd Edition Sybex.pdf
|
9.7 MB
|
70-215 MCSE Windows 2000 Server Training.pdf
|
24.7 MB
|
70-216 MCSE Windows 2000 Network Infrastructure Administration Study Guide 2nd Edition Sybex.pdf
|
10.5 MB
|
70-216 Sybex - MCSE Training Guide.pdf
|
7.0 MB
|
70-219 testking mcse study guide Case studies w2k.designing.active.directory.edition 1.1.pdf
|
786.8 KB
|
70-220 - Sybex - Windows 2000 Network Security Design.pdf
|
5.0 MB
|
70-228 Mspress - Mcdba Exam 70-228 Sql Server 2K System Administration 2 Ed Dec.pdf
|
6.3 MB
|
70-229 Designing Databases SQL 2000 TestKing.pdf
|
959.6 KB
|
70-270 - McGraw-Hill - MCSE - Windows XP Professional Study Guide.pdf
|
9.9 MB
|
70-270 - Test King - MCSE 2003 - Study Guide, Installing, COnfiguring, and Administering Windows XP Pro.pdf
|
15.6 MB
|
70-270 Mcse - Testking - Xp Pro 7.0.pdf
|
2.1 MB
|
70-270 Question Correct Exams MCSE Exam Q&A v6.0.pdf
|
2.0 MB
|
70-270 TestKing - Microsoft Exam - Q And A - v26.0.pdf
|
3.3 MB
|
70-270 Testking Microsoft Exam Q And A v20.0.pdf
|
2.7 MB
|
70-270 Testking Windows XP Complete.pdf
|
6.0 MB
|
70-270 TestKing.Microsoft.Exam.Q.And.A.V21.0.doc
|
5.8 MB
|
70-270 TestKing.Microsoft.Exam.Q.And.A.V21.0.pdf
|
2.8 MB
|
70-284 TestKing - Microsoft Exam - Q And A - v28.0.pdf
|
2.4 MB
|
70-290 - Mcse - 2003 - Addison Wesley - Inside Windows Server 2003.chm
|
15.2 MB
|
70-290 actual Tests.pdf
|
1.2 MB
|
70-291 - MCSE + MCSA - 2003 - O'Reilly - DNS on Windows Server 2003.chm
|
2.8 MB
|
70-291 Mcsa-Mcse Self-Paced Training Kit Implementing, Managing And Maintaining A Microsoft Windows Server 2003 Network Infrastructure(1).pdf
|
11.5 MB
|
70-291 Testking.Microsoft.Exam.Q.And.A.v36.0.pdf
|
7.1 MB
|
70-291 Windows Server 2003 Network Infrastructure, Implementation, Management & Maintenance - MCSE Study Guide - Sybex.pdf
|
14.1 MB
|
70-292-Ebook Syngress - Mcsa Mcse Exam 70-292 - Managing And Maintaining w2003 For w2000 Mcsas.pdf
|
9.3 MB
|
70-294 testking planning implementing and maintaining a microsoft windows server 2003 active directory infrastructure v15.1 144q.pdf
|
4.5 MB
|
70-294 Testking v21.0.pdf
|
11.3 MB
|
70-298 - MicroSoft - MCSE Self Paced Training Kit Designing Security For A MicroSoft Windows Server 2003 Network (Exam 70-298).pdf
|
11.1 MB
|
70-298 TestKing.Microsoft.Exam.Q.And.A.V8.0.pdf
|
3.4 MB
|
70-298-MSPress-Designing Security for Windows Server 2003 Network (2004).pdf
|
9.6 MB
|
70-305 Mcad-Mcsd Net Developing And Implementing Web Applications With Visual Basic And Visual Studio Net (Exam 70-305) By Xabel.pdf
|
19.6 MB
|
70-306 TestKing - Developing Windows Applications.pdf
|
833.3 KB
|
003 - Activar Windows XP - WindowsXP 01.pdf
|
1.9 MB
|
070 292 Test King MCSE Windows Server 2003 Managing A Network Environment MCSA Upgrade Study Guide v1.0(70-292).pdf
|
997.4 KB
|
070-215.TestKing.v13.Q209.pdf
|
5.5 MB
|
070-228 Test King Mcdba Study Guide (70-228).pdf
|
1.7 MB
|
070-271 actualtests supporting users and troubleshooting a ms windows xp os v07.01.05 200q.pdf
|
2.7 MB
|
070-284 MCSE 2003 Installing, Configuring and Administering Microsoft Exchange 2003 v26 [TestKing.pdf
|
4.1 MB
|
070-292 Actual Tests MCSE Exam Q&A v10.22.03.pdf
|
14.1 MB
|
070-310 - Test King - MCSD-MCAD - Developing XML Web Services and Server Components with Microsoft Visual Basic .NET Q & A.pdf
|
626.8 KB
|
330 Java Tips.pdf
|
1.2 MB
|
361q_Test King Cisco 640-607 Exam Q&A v11.1.pdf
|
2.0 MB
|
376-karplus molecular computer simulation.pdf
|
1.3 MB
|
640-607 Cisco Press CCNA 3.0 Study Guide (con indice).PDF
|
12.9 MB
|
640-801 - Cisco CCNA - TestKing 15.1.pdf
|
12.8 MB
|
640-861.Ciscopress.Exam.Certification.Guide.ccda.pdf
|
19.7 MB
|
720_User_Guide.pdf
|
1.1 MB
|
2003-11-12 TEST KING 70-229 MCDBA.pdf
|
1.6 MB
|
70290Training.pdf
|
9.0 MB
|
285063-Hacker.Bibel.[278.kB_www.netz.ru].pdf
|
285.1 KB
|
731986-Hacker's Desk Reference.pdf
|
732.0 KB
|
3077366-HackerHighSchool.pdf
|
3.1 MB
|
24742335-Bash-Shell-Referance.pdf
|
278.3 KB
|
0321108957.Addison-Wesley Professional.Honeypots- Tracking Hackers.pdf
|
2.2 MB
|
[Addison-Wesley] Latex Companion, 2nd Edition.pdf
|
2.8 MB
|
[Cisco Press] CCSP IPS Exam Certification Guide (2005) - DDU.chm
|
12.9 MB
|
[eBook] - CCNA Exam 640-607 Certification Guide - Cisco Press 2002.pdf
|
204.8 KB
|
[eBook] Manning - Java Swing 2nd Edition (2003).pdf
|
11.2 MB
|
[eBook][Java]log4j The Complete Manual.pdf
|
2.0 MB
|
[Manning - 2004] Tapestry In Action.pdf
|
12.8 MB
|
[MCAD-MCSD 70-300] Analyzing Requirements and Defining .NET Solution Architectures [MS Press, 2003, 0-7356-1894-1].chm
|
1.6 MB
|
[Network] Cisco Seminar - Securing 802.11 Wireless Networks.pdf
|
1.7 MB
|
[Wiley] Cryptography for Dummies.pdf
|
3.8 KB
|
A Buffer Overflow Study - Attacks and Defenses (2002).pdf
|
481.6 KB
|
A Byte of Python, v1.20 (for Python 2.x) (2005).pdf
|
345.2 KB
|
A+ Certification for Dummies.pdf
|
3.8 KB
|
Actualtest 642-501 v02.24.05.pdf
|
1.4 MB
|
ActualTest 642-501 v03.20.04.pdf
|
1.0 MB
|
Actualtest 642-501 v05.08.04.pdf
|
893.0 KB
|
ActualTest 642-501 v07.25.05.pdf
|
733.4 KB
|
Actualtest 642-501 v12.14.04.pdf
|
1.2 MB
|
Addison Wesley - Hack I.T. Security Through Penetration Test.chm
|
4.8 MB
|
Addison Wesley - Hackers Delight 2002.pdf
|
6.4 MB
|
Addison-Wesley Effective Java - Programming Language Guide.pdf
|
2.9 MB
|
Addison.Wesley.Advanced.Linux.Networking.chm
|
3.4 MB
|
Addison.Wesley.Moving.to.Ubuntu.Linux.Aug.2006.chm
|
16.9 MB
|
Addison.Wesley.The.Java.Programming.Language.4th.Edition.Aug.2005.chm
|
2.3 MB
|
Addison.Wesley.The.Ruby.Way.2nd.Edition.Oct.2006.chm
|
1.9 MB
|
Administering Cisco Qos.pdf
|
3.9 MB
|
Advanced Software Vulnerability Assessment.pdf
|
158.3 KB
|
AFF - A New Format for Storing Hard Drive Images.pdf
|
64.0 KB
|
AFF - Advanced Forensic Format.pdf
|
363.4 KB
|
Ahmad-Reza_Sadeghi,_David_Naccache,_Pim_Tuyls-Towards_Hardware-Intrinsic_Security__Foundations_and_Practice_(Information_Security_and_Cryptography)(2010).pdf
|
8.4 MB
|
AJAX In Action(2).pdf
|
11.8 MB
|
Ajax Patterns and Best Practices - C. Gross - Apress - 2006.pdf
|
16.4 MB
|
Analyse_forensique_d_un_systeme_Windows.pdf
|
2.6 MB
|
Apress - Beginning JavaScript with DOM Scripting and Ajax - From Novice to Professional.pdf
|
17.3 MB
|
Apress - Expert Spring Mvc And Web Flow - Feb 2006.pdf
|
5.1 MB
|
Apress - Pro Apache Ant - 2005.pdf
|
7.9 MB
|
APress - The Definitive Guide to MySQL, 2nd Ed - 2004 - (By Laxxuss).chm
|
9.1 MB
|
Apress.Foundations.of.Ajax.Oct.2005.pdf
|
39.5 MB
|
Apress.Hardening.Apache.eBook-LiB.chm
|
1.1 MB
|
Apress.Pro.JSF.and.Ajax.Building.Rich.Internet.Components.Feb.2006.pdf
|
4.0 MB
|
Apress.Sanghera.SCJP.2006.pdf
|
5.9 MB
|
Artech House - Fundamentals of Network Security.pdf
|
4.9 MB
|
ARTIFICAL IGNORANCE How To Implement Artifical Ignorance Log Analysis.pdf
|
17.4 KB
|
Attacking the DNS Protocol.pdf
|
330.2 KB
|
Auerbach.Practical.Hacking.Techniques.and.Countermeasures.Nov.2006.pdf
|
151.0 MB
|
Auerbach.Pub.The.ABCs.of.LDAP.How.to.Install.Run.and.Administer.LDAP.Services.eBook-DDU.chm
|
11.8 MB
|
Auerbach.Pub.The.Hackers.Handbook.The.Strategy.Behind.Breaking.into.and.Defending.Networks.Nov.20.pdf
|
18.9 MB
|
Botnet Detection Countering the Largest Security Threat.pdf
|
2.0 MB
|
Botnets - The killer web applications.pdf
|
7.3 MB
|
Build Your Own Security Lab A Field Guide for Network Testing.pdf
|
9.0 MB
|
Building_VPN_tunnels_using_IKE_between_NetScreen_and_Cisco_IOS.pdf
|
996.4 KB
|
CCDA (Cisco Certified Design Associates) Study Guide.pdf
|
7.7 MB
|
CCSP Cisco Secure PIX Firewall Advanced Exam Certification Guide 2nd Edition (2005) Cisco Press.chm
|
7.5 MB
|
CCSP Self-Study CCSP CSI Exam Certification Guide 2nd Edition (2005) Cisco Press.chm
|
7.5 MB
|
Certified Ethical Hacker (CEH) v3.0 Official Course.pdf
|
27.1 MB
|
Charles.C.Thomas-Document.Security.Protecting.Physical.and.Electronic.Content.2007.RETAiL.EBook.pdf
|
1.4 MB
|
Cisco - BGP4 - Case Studies.pdf
|
255.9 KB
|
Cisco - CCNP Support Exam Guide (640-606).pdf
|
4.2 MB
|
Cisco - Designing Network Security.pdf
|
1.3 MB
|
Cisco IP Routing Fundamentals.pdf
|
2.3 MB
|
Cisco Network Essentials.pdf
|
567.6 KB
|
Cisco Press Ccie Security Exam Certification Guide Ccie Self Study 2Nd Edition May 2005 Ebook-Lib.chm
|
15.2 MB
|
Cisco Press, CCNP (Exam 642-811) BCMSN Exam Certification Guide.(2005),.3Ed.BBL.LotB.chm
|
2.9 MB
|
Cisco Router Handbook.pdf
|
286.8 KB
|
Cisco.Press,.CCSP.SNRS.(Exam.642-502).Exam.Certification.Guide.(2005),.2Ed.BBL.LotB.chm
|
10.4 MB
|
Cisco.Press.CCIE.Security.Exam.Certification.Guide.CCIE.Self.Study.2nd.Edition.May.2005.eBook-LiB.chm
|
15.2 MB
|
Cleaning Windows XP For Dummies (2004).pdf
|
3.8 KB
|
Comparing Web Frameworks; Struts, Spring MVC, WebWork, Tapestry & JSF.pdf
|
307.2 KB
|
Computer - Hackers Secrets - e-book.pdf
|
504.5 KB
|
Computer and Network Forensics.pdf
|
497.7 KB
|
Computer Forensics_ Investigating Networ - EC-Council.pdf
|
25.2 MB
|
Computer Vulnerability(March 9 2000).pdf
|
399.7 KB
|
Cracking_Passwords_Guide.pdf
|
278.4 KB
|
Crackproof Your Software(No Starch-2002).pdf
|
7.5 MB
|
Credit Card Visa Hack(Cambridge Lab-2003).pdf
|
228.7 KB
|
Credit.Card.Visa.Hack.Ucam.Cl.Tr.560.[223.kB_www.netz.ru].pdf
|
228.7 KB
|
Cross Site Scripting Attacks Xss Exploits and Defense.pdf
|
7.7 MB
|
Cyberdeterrence and Cyberwar.pdf
|
14.5 MB
|
DangerousGoogle-SearchingForSecrets.pdf
|
2.2 MB
|
Dhtml Utopia.pdf
|
1.1 MB
|
Digital Forensics for Network, Internet, and Cloud Computing.pdf
|
13.5 MB
|
Digital Forensics of the Digital Memory.pdf
|
300.4 KB
|
Digital.Press.IPv6.Network.Programming.ISBN1555583180.pdf
|
3.3 MB
|
Dummies - Hack How To Create Keygens (1).pdf
|
9.8 KB
|
EBook - A+ Certification Guide.pdf
|
23.5 MB
|
Ebook O'reilly High Performance Mysql.pdf
|
1.5 MB
|
eBook.MS.Press.-.Microsoft.Encyclopedia.of.Security.ShareReactor.pdf
|
11.0 MB
|
eBook.Windows_2000_Active_Directory_Survival_Guide.ShareReactor.pdf
|
16.0 MB
|
eBook_Linux.Administration.Made.Easy.ShareReactor.pdf
|
351.8 KB
|
eBook_MySQL-PHP_Database_Applications.ShareReactor.pdf
|
3.7 MB
|
eBook_Navy.Seal.Physical.Fitness.Guide.ShareReactor.pdf
|
16.6 MB
|
eBook_Protected_Internet_Intranet_&_Virtual_Private_Networks.NoFearLevenT.ShareReactor.pdf
|
3.6 MB
|
eBook_Web_Application_Development_With_PHP_4.0_ShareReactor.pdf
|
6.6 MB
|
Excel Advanced Report Development (2005).pdf
|
13.5 MB
|
EXE File Format.pdf
|
14.5 KB
|
Exploring Macromedia Studio 8 (2005).pdf
|
17.9 MB
|
For Dummies Firewalls for Dummies.pdf
|
3.9 KB
|
For.Dummies.Hacking.Wireless.Networks.For.Dummies.Sep.2005.eBook-DDU.pdf
|
11.5 MB
|
For.Dummies.Visual.Basic.2005.Express.Edition.For.Dummies.Dec.2005.pdf
|
3.9 KB
|
For.Dummies.Wireless.Network.Hacks.and.Mods.For.Dummies.Sep.2005.eBook-DDU.pdf
|
3.9 KB
|
For.Dummies.XML.For.Dummies.The.Fourth.Edition.May.2005.eBook-DDU.pdf
|
3.8 KB
|
Forensic Analysis of Microsoft Internet Explorer Cookie Files.pdf
|
216.8 KB
|
Forensic Computer Crime Investigation.pdf
|
2.8 MB
|
Forensic Disk Imaging Step-by-Step.pdf
|
22.1 KB
|
Friendsofed Css Mastery Advanced Web Standards Solutions Feb 2006.pdf
|
10.3 MB
|
FTP-HTTP-ERROR-Codes.pdf
|
3.9 KB
|
Google Hacking for Penetration Tester (Syngress-2005).pdf
|
14.1 MB
|
Gray Hat Hacking~The Ethical Hacker's Handbook, 3e [2011].pdf
|
12.8 MB
|
Gray Hat Python.pdf
|
3.2 MB
|
Hack Attacks Revealed- A Complete Reference with Custom Security Hacking Toolkit (Wiley-2001).pdf
|
8.5 MB
|
Hack IT Security Through Penetration Testing.pdf
|
12.9 MB
|
Hack Proofing Linux A Guide to Open Source Security - Stangler, Lane - Syngress - ISBN 1-928994-34-2.pdf
|
12.4 MB
|
Hack Proofing Sun Solaris 8.pdf
|
7.1 MB
|
Hack Proofing Your E-Commerce Site.pdf
|
7.7 MB
|
Hack Proofing Your Identity in the Information Age (Syngress-2002).pdf
|
9.3 MB
|
Hack Proofing Your Network - Internet Tradecraft (Syngress-2000).pdf
|
3.1 MB
|
Hack Proofing Your Network Second Edition.pdf
|
9.2 MB
|
Hacker Crackdown, The.pdf
|
647.7 KB
|
Hackers Beware (NewRiders -2002).pdf
|
4.8 MB
|
Hacking Exposed Malware AND Rootkits - McGrawHill - 2010.pdf
|
10.9 MB
|
Hacking Exposed. Malware and Rootkits (McGraw-Hill, 2010).pdf
|
10.9 MB
|
How to Crack CD Protections.pdf
|
30.7 KB
|
How to Make a Forensic Copy Through the Network.pdf
|
24.6 KB
|
How.To.Install.Microsoft.Exchange.2000.on.Windows.Server.2003.-.LinkoManija.net.pdf
|
28.5 KB
|
Html Utopia - Designing Without Tables Using Css.pdf
|
1.9 MB
|
Interconeccion de Dispositivos de Red Cisco (eBook spanish espaDol).pdf
|
4.7 MB
|
Java 2 Network Security.pdf
|
5.9 MB
|
Java 2004- Manning- Tapestry In Action- the definitive guide to web application development with Tapestry.pdf
|
9.2 MB
|
Java Programming Language Handbook 1.pdf
|
3.0 MB
|
JavaServer.Faces.JSF.in.Action_Manning.pdf
|
12.8 MB
|
Jess_Garcia-Web_Forensics.pdf
|
594.5 KB
|
John Wiley And Sons - Data Mining-Concepts Models Methods And Algorithms Ebook-Fos.chm
|
261.7 KB
|
Kennedy D., O'Gorman J., Kearns D., Aharoni M. - Metasploit. The Penetration Tester's Guide -.pdf
|
7.2 MB
|
Learn Windows PowerShell In A Month Of Lunches.pdf
|
10.8 MB
|
LPI Linux Certification.doc
|
1.5 MB
|
Managing Cisco Network Security Second Edition.pdf
|
6.5 MB
|
Manning - JSTL in Action - 2003.pdf
|
6.2 MB
|
Manning - Struts In Action - Building web applications with the leading Java framework.pdf
|
5.1 MB
|
Manning Art Of Java Web Development - Struts, Tapestry, Commons, Velocity, Junit, Axis, Cocoon, Internetbeans, Webwork (2007).pdf
|
15.9 MB
|
Manning,.IntelliJ.IDEA.in.Action.(2006).BBL.pdf
|
12.0 MB
|
Manning.Ajax.in.Action.Oct.2005.pdf
|
9.7 MB
|
Mathematics For Game Developers (2004).pdf
|
15.5 MB
|
MCAD MCSD Visual Basic .NET Windows and Web Applications Study Guide.chm
|
21.7 MB
|
McGraw Hill - Cisco TCP-IP Routing Professional Reference.pdf
|
18.0 MB
|
mcgraw hill cisco security architectures [found via www.filedonkey.com].pdf
|
10.1 MB
|
McGraw.Hill.-.Oracle.Database.10g..High.Availablity.with.RAC.Flashback.&.Data.Guard.chm
|
9.8 MB
|
McGrawHill-Oracle_Database_10g_New_Features.chm
|
1.7 MB
|
MCSE - Deploying Virtual Private Networks with Microsoft Windows Server 2003 [MS Press 2004].chm
|
6.5 MB
|
Mcse - Microsoft Windows Xp Professional Training Kit (Exam 70-270).chm
|
8.8 MB
|
MCSE Microsoft Training Kit - 70-216 - Windows 2000 Network Infrastructure Administration.CHM
|
7.1 MB
|
MCSE Training Kit - M$ Win2000 Server 70-215 (CHM-11,302,984).pdf
|
108.8 MB
|
MCSE.Training.Kit.Microsoft.SQL.Server.2000.Database.Desing.and.Implementation.Exam.70-229.eBook.eng.chm
|
4.3 MB
|
Microsoft Office Access 2003 Step By Step (2004).pdf
|
10.6 MB
|
Microsoft Office Excel 2003 Bible (2003).pdf
|
20.6 MB
|
Microsoft Office Excel 2003 Programming Inside Out (2004).pdf
|
8.5 MB
|
Microsoft Press Mcse Self Paced Training Kit Exam 70-298 Designing Security For A Microsoft Windows Server 2003 Network Ebook-Lib.chm
|
11.7 MB
|
Microsoft.Press.MCSE.Self.Paced.Training.Kit.Exam.70-294.Planning.Implementing.and.Maintaining.a.Microsoft.Windows.Server.2003.Active.Directory.Infras.chm
|
24.5 MB
|
Microsoft.Press.MCSE.Self.Paced.Training.Kit.Exam.70-298.Designing.Security.for.a.Microsoft.Windows.Server.2003.Network.eBook-LiB.chm
|
11.7 MB
|
Microsoft.Press.MCSE.Self.Paced.Training.Kit.Exam.70.293.Planning.and.Maintaining.a.Microsoft.Windows.Server.2003.Network.Infrastructure.eBook-LiB.chm
|
12.5 MB
|
Microsoft.Press.Microsoft.ASP.Dot.NET.Coding.Strategies.with.the.Microsoft.ASP.Dot.NET.Team.eBook-LiB.chm
|
5.9 MB
|
MS Press - MCAD MCSD 70-306 70-316 - Developing .NET (2002).chm
|
1.9 MB
|
MS Press - MCAD.MCSE.MCDBA.Self-Paced.Training.Kit-Microsoft.SQL.Server.2000.Database.Design.and.Implementation.Second.Edition.Exam.70-229.chm
|
7.0 MB
|
MS Press - MCDBA Training Kit - SQL 7.0 Data Warehousing.chm
|
7.0 MB
|
MS Press - MCDBA Training Kit - SQL 7.0 Database Implementation.chm
|
5.1 MB
|
MS Press - MCDBA Training Kit - SQL 7.0 System Administration.chm
|
5.1 MB
|
MS Press - MCSD Training Kit - Desktop Applications with MS Visual C++ 6.0.CHM
|
1.7 MB
|
Nessus Network Auditing 2ed [AAVV] Syngress.pdf
|
11.3 MB
|
nessus_4.2_user_guideplus.pdf
|
1.9 MB
|
New Riders - Web Application Development With PHP4.chm
|
1.5 MB
|
Nmap network security scanner man page.doc
|
164.4 KB
|
No.Starch.Press.Wicked.Cool.Shell.Scripts-101.Scripts.for.Linux.Mac.OS.X.and.Unix.Systems.eBook-LiB.chm
|
1.5 MB
|
Novell.Press.Linux.Firewalls.3rd.Edition.Sep.2005.chm
|
1.7 MB
|
O'Reilly - Apache Cookbook - 2003 ! - (By Laxxuss).chm
|
859.4 KB
|
O'Reilly - JavaServer Pages, 3rd Edition.pdf
|
4.4 MB
|
O'Reilly - Windows XP Annoyances.chm
|
2.5 MB
|
O'Reilly, Version Control with Subversion (2004) DDU.chm
|
698.8 KB
|
O'Reilly,.Learning.Red.Hat.Enterprise.Linux.and.Fedora.(2004).4Ed.DDU.ShareConnector.chm
|
4.6 MB
|
OReilly - Python Pocket Reference, 2nd Ed 2001.chm
|
179.7 KB
|
OReilly - Sed & Awk 2nd Edition.pdf
|
2.2 MB
|
OReilly _LPI-Linux Certification in a nutshell.pdf
|
3.9 KB
|
OReilly,.Managing.Projects.with.GNU.make.(2004),.3Ed.DDU.chm
|
527.6 KB
|
OReilly.-.Unix.Backup.and.Recovery.pdf
|
5.9 MB
|
OReilly.Essential.PHP.Security.Oct.2005.chm
|
377.8 KB
|
OReilly.Fedora.Linux.Oct.2006.chm
|
8.4 MB
|
OReilly.Java.Cookbook.2nd.Edition.Jun.30.2004.eBook-DDU.chm
|
3.5 MB
|
Oreilly.linux.device.drivers.3rd.edition.feb.2005.ebook-ddu.chm
|
458.1 KB
|
OReilly.Mac.OS.X.Tiger.for.Unix.Geeks.Jun.2005.eBook-DDU.chm
|
6.9 MB
|
OReilly.Oracle.PL.SQL.for.DBAs.Oct.2005.chm
|
951.3 KB
|
OReilly.PHP.Cookbook.2nd.Edition.Aug.2006.chm
|
1.5 MB
|
OReilly.Producing.Open.Source.Software.Oct.2005.eBook-DDU.chm
|
643.2 KB
|
OReilly.SELinux.NSAs.Open.Source.Security.Enhanced.Linux.Oct.2004.eBook-DDU.chm
|
1.1 MB
|
OReilly.SSH.The.Secure.Shell.The.Definitive.Guide.2nd.Edition.May.2005.eBook-DDU.chm
|
3.7 MB
|
OReilly.Unix.in.a.Nutshell.4th.Edition.Oct.2005.eBook-DDU.chm
|
1.4 MB
|
OReilly_ Java Programming On Linux.pdf
|
3.8 KB
|
Password_Policy.pdf
|
3.8 KB
|
Peachpit.Press.JavaScript.and.Ajax.for.the.Web.6th.Edition.Aug.2006.chm
|
13.4 MB
|
Penetration_Tester__s_Open_Source_Toolkitplus.pdf
|
17.8 MB
|
Practical-Reverse-Engineering-x86-x64-ARM-Windows-Kernel-Reversing-Tools-and-Obfuscation.epub
|
3.3 MB
|
Premier - PHP Fast And Easy Web Development 2nd Edition.chm
|
3.5 MB
|
Premier.Press.Game.Programming.with.Python.Lua.and.Ruby.ebook-LiB.chm
|
2.4 MB
|
Prentice.Hall.Java.How.to.Program.6th.Edition.Aug.2004.INTERNAL.chm
|
16.6 MB
|
Prentice.Hall.Network.Forensics.Jun.2012.pdf
|
20.8 MB
|
Prentice.Hall.PTR.Embedded.Linux.Primer.A.Practical.Real.World.Approach.Sep.2006.chm
|
3.5 MB
|
Prentice.Hall.PTR.Linux.Quick.Fix.Notebook.Mar.2005.chm
|
2.9 MB
|
Prentice.Hall.PTR.PHP.5.Power.Programming.Oct.2004.eBook-LiB.chm
|
8.1 MB
|
Prentice.Hall.PTR.Samba.3.by.Example.Practical.Exercises.to.Successful.Deployment.2nd.Edition.Aug.2005.chm
|
3.6 MB
|
Prentice.Hall.PTR.SELinux.by.Example.Using.Security.Enhanced.Linux.Jul.2006.chm
|
4.1 MB
|
Prentice.Hall.PTR.Solaris.Performance.and.Tools.Jul.2006.chm
|
1.6 MB
|
Prentice.Hall.PTR.The.Official.Samba.3.HOWTO.and.Reference.Guide.2nd.Edition.Aug.2005.chm
|
4.6 MB
|
Prentice.Hall.PTR.Understanding.AJAX.Using.JavaScript.to.Create.Rich.Internet.Applications.Aug.2006.chm
|
6.5 MB
|
Prentice.Oracle.DBA.Guide.To.Data.Warehousing.And.Star.Schemas.eBook-LiB.chm
|
1.6 MB
|
Prentice.Oracle.PL.SQL.By.Example.3rd.Edition-LiB.chm
|
1.1 MB
|
Prentice.Programming.Oracle.Triggers.And.Stored.Procedures.3rd.Edition.eBook-LiB.chm
|
1.3 MB
|
Prentice.Technical.Java.Developing.Scientific.And.Engineering.Applications.eBook-LiB.chm
|
1.4 MB
|
Princess_Activity_Kit.pdf
|
4.8 MB
|
Pro Jakarta Velocity.pdf
|
575.6 KB
|
Programming Spiders, Bots, and Aggregators in Java [Sybex, 2.pdf
|
3.1 MB
|
Que - MCSE 070-294 Win Server 2003 Active Directory Infrastructure Exam Cram 2.chm
|
4.1 MB
|
Que MCAD MCSD Developing XML Web.Services And Server Components With Visual C Sharp .NET And the .NET Framework Exam Cram 2 Kalani (Exam 70-320)(2003).chm
|
1.7 MB
|
Que,.MCAD.MCSE.MCDBA.(Exam.70-229).Designing.and.Implementing.Databases.with.SQL.Server.2000.(2005).BBL.LotB.chm
|
3.4 MB
|
Que.CCNA.Practice.Questions.Exam.Cram.2.2nd.Edition.Dec.2005.eBook-DDU.chm
|
830.9 KB
|
Que.MCSA.MCSE.Implementing.and.Managing.Exchange.Server.2003.Exam.Cram.2.Exam.Cram.70-284.chm
|
7.5 MB
|
Que.MCSA.MCSE.Managing.And.Maintaining.A.Microsoft.Windows.Server.2003.Environment.Exam.Cram.2.Exam.70-290.eBook-LiB.chm
|
5.3 MB
|
Red Hat Linux Bible - Fedora and Enterprise Edition.chm
|
14.4 MB
|
Risk Analysis and Security Countermeasure selection.pdf
|
15.5 MB
|
rootkit- Rootkits.for.Dummies 2007.pdf
|
7.2 MB
|
S C Enterprise Hackers Secrets Revealed.pdf
|
3.9 KB
|
S C Enterprises Hacking Secrets Revealed Information and.pdf
|
3.8 KB
|
Sams - C++ Primer Plus, Fourth Edition.chm
|
4.6 MB
|
Sams - MySQL and JSP Web Applications Data Driven Programming Using Tomcat And MySQL.chm
|
5.3 MB
|
Sams - PostgreSQL Developers Handbook.chm
|
2.3 MB
|
Sams - Teach Yourself BEA WebLogic Server 7.0 in 21 Days - 2002 - (By Laxxuss).chm
|
6.6 MB
|
Sams, Mysql Tutorial (2004).chm
|
653.8 KB
|
Sams.Advanced.PHP.Programming.Feb.2004.INTERNAL.chm
|
3.3 MB
|
Sams.FreeBSD.6.Unleashed.Jun.2006.chm
|
6.7 MB
|
Sams.MySQL.Phrasebook.Essential.Code.and.Commands.Mar.2006.chm
|
628.5 KB
|
Sams.PHP.5.Unleashed.Dec.2004.eBook-LiB.chm
|
5.1 MB
|
Sams.PostgreSQL.2nd.Edition.Jul.2005.chm
|
7.0 MB
|
Sams.SUSE.Linux.10.Unleashed.Nov.2005.eBook-DDU.chm
|
20.4 MB
|
SANS Incident Handling Step by step.pdf
|
504.6 KB
|
SANS Intrusion Dectection.pdf
|
343.9 KB
|
Scambray - Hacking Exposed - Windows 3E (Mcgraw, 2008)plus-.pdf
|
8.4 MB
|
Scene of the Cybercrime - Computer Forensics Handbook (Syngress).pdf
|
6.1 MB
|
SCJP Exam - 310-055.Exam.Q.and.A.12.06.05-BBL.pdf
|
9.4 MB
|
SCJP Sun Certified Programmer for Java 5 Study Guide (Exam 310-055).pdf
|
12.2 MB
|
SitePoint.The.CSS.Anthology.101.Essential.Tips.Tricks.and.Hacks.pdf
|
9.2 MB
|
SkillSoft.Press.Migrating.from.Exchange.Server.to.qmail.eBook-LiB.chm
|
9.6 MB
|
Stealing the Network - How to Own an Identity.pdf
|
8.1 MB
|
Stealing the Network How to Own the Box.pdf
|
3.8 KB
|
stealing-the-network-how-to-own-a-shadow.pdf
|
9.6 MB
|
Steve'S Rhce Study Guide.doc
|
768.5 KB
|
Steven Levy - Hackers Heroes of the Computer Revolution - 2010.pdf
|
13.2 MB
|
Struts Recipes Chp2.pdf
|
1.3 MB
|
Stylin' with CSS - A Designer's Guide.pdf
|
839.0 KB
|
Sun - Core JSTL Mastering the JSP Standard Tag Library.pdf
|
6.3 MB
|
Sybex - .NET Development Security Solutions.chm
|
9.4 MB
|
Sybex - Mcad Mcsd Visual Basic Net Xml Web Services And Server Components Study Guide(2003).chm
|
9.1 MB
|
Sybex - MCSE Training Guide - Exam 70-220_web.pdf
|
5.0 MB
|
Sybex - MCSE.Windows.Server.2003.Network.Security.Design.Study.Guide.70.298.May.2004.chm
|
14.7 MB
|
Sybex - Pc.Disaster.And.Recovery.Ebook.chm
|
26.3 MB
|
Sybex.Effective.Software.Test.Automation.Developing.an.Automated.Software.Testing.Tool.eBook-LiB.chm
|
7.7 MB
|
Sybex.EnCase.Computer.Forensics.Study.Guide.2nd.Edition.Dec.2007.pdf
|
24.0 MB
|
Sybex.Linux.Network.Servers.eBook-EEn.pdf
|
7.0 MB
|
Sybex.Mastering.Active.Directory.for.Windows.Server.2003.eBook-KB.pdf
|
13.1 MB
|
Sybex.MCSE.Windows.Server.2003.Network.Security.Design.Study.Guide.70.298.May.2004.eBook-DDU(1).chm
|
14.7 MB
|
Sybex.MCSE.Windows.Server.2003.Network.Security.Design.Study.Guide.70.298.May.2004.eBook-DDU.chm
|
14.7 MB
|
Sybex.TCP.IP.Foundations.Aug.2004.eBook-DDU.pdf
|
7.1 MB
|
Syngress - Exam 70-297 MCSE Designing a Windows Server 2003 Active Directory and Network Infrastructure.chm
|
13.6 MB
|
Syngress - Mcse Designing Security For A Windows Server 2003 Network Exam 70-298 Study Guide - 2004 - (By Laxxuss).chm
|
15.8 MB
|
Syngress - Secure Your Network for Free Using NMAP, WIRESHARK, SNORT, NESSUS, and MRTG - 2007.pdf
|
7.6 MB
|
Syngress,.Nessus.Snort.and.Ethereal.Power.Tools.Customizing.Open.Source.Security.Applications.(2005).DDU.pdf
|
7.5 MB
|
Syngress,.Writing.Security.Tools.and.Exploits.(2006).DDU.pdf
|
11.7 MB
|
Syngress-Hack Proofing Linux (2001).pdf
|
12.4 MB
|
Syngress.Force.Emerging.Threat.Analysis.From.Mischief.to.Malicious.Oct.2006.pdf
|
8.3 MB
|
Syngress.Hacking.a.Terror.Network.Nov.2004.ISBN1928994989.pdf
|
8.6 MB
|
Syngress.InfoSecurity.2008.Threat.Analysis.Nov.2007plus.pdf
|
12.0 MB
|
Syngress.Nessus.Network.Auditing.Second.Edition.May.2008.eBook-DDU.pdf
|
10.9 MB
|
Syngress.Nmap.in.the.Enterprise.Your.Guide.to.Network.Scanning.Jan.2008plus.pdf
|
6.0 MB
|
Syslog Notes.pdf
|
75.3 KB
|
Teach Yourself Visual C++ 6 in 21 days.pdf
|
7.3 MB
|
The Dark Visitor - The Dark Visitor- Inside the World of Chinese Hackers.zip
|
6.4 MB
|
The Internet and Crime.pdf
|
1.3 MB
|
The Javascript Anthology 101 Essential Tips, Tricks & Hacks-Sample (2006 - Sitepoint).pdf
|
2.0 MB
|
The Little Black Book of Computer Virus.pdf
|
1.5 MB
|
The-Art-of-Exploitation_2nd-Ed.pdf
|
4.6 MB
|
the.pragmatic.programmers_pragmatic.ajax.pdf
|
6.3 MB
|
The.Shellcoder_s.Handbook.Discovering.and.Exploiting.Security.Holes.2nd.Edition 2007plus.pdf
|
9.2 MB
|
The_Art_of_Deception.pdf
|
1.6 MB
|
Tutorial For Building j2Ee Applications Using Jboss And Eclipse.chm
|
4.6 MB
|
UNIX and Linux Forensic Analysis DVD Toolkit.2008.pdf
|
5.1 MB
|
Value-Range Analysis of C Programs.pdf
|
2.5 MB
|
Visual Basic C++ 6.doc
|
1.0 MB
|
VoIP.Cisco.Introduction to IP Telephony.pdf
|
10.5 MB
|
VoIP.Syngress.Cisco AVVID and IP Telephony Design And Implementation.pdf
|
7.8 MB
|
VoIP.Syngress.Configuring Cisco Voice Over IP Second Edition.pdf
|
9.1 MB
|
WebWork In Action.pdf
|
7.0 MB
|
Wiley - Java Open Source Programming With Xdoclet, Junit, Webwork, Hibernate.pdf
|
6.2 MB
|
Wiley Publishing, Inc - Hacking Video Game Consoles. Turn Your Old Video Game Systems into Awesom.pdf
|
70.2 MB
|
Wiley Publishing, Inc - The CISSP Prep Guide. Gold Edition.pdf
|
9.7 MB
|
Wiley Publishing, Inc - Wireless Network Hacks AND Mods for Dummies.pdf
|
7.5 MB
|
Windows 2000 - TCPIP Implementation.doc
|
865.8 KB
|
Windows Forensic Analysis.pdf
|
6.2 MB
|
Wordware Publishing - DirectX9 Audio Exposed Interactive Audio Development.chm
|
7.1 MB
|
Wrox - Professional Javascript For Web Developers - 2005 - (By Laxxuss).pdf
|
9.7 MB
|
Wrox Press - Professional Apache Tomcat 5.pdf
|
11.1 MB
|
WVS Manual.pdf
|
4.3 MB
|
WVS Mmanual+.pdf
|
2.7 MB
|
/Security-Hacking_Ebooks1/
|
Advanced Penetration Testing for Highly-Secured Environments- The Ultimate Security Guide [eBook].pdf
|
13.4 MB
|
An Introduction to the Analysis of Algorithms, 2nd Edition.pdf
|
5.8 MB
|
Apress - Pro Bash Programming Scripting the GNULinux Shell (10-2009) (ATTiCA).pdf
|
1.5 MB
|
Bash Guide for Beginners.pdf
|
1.2 MB
|
Buffer Overflow Attacks - Detect, Exploit, Prevent (Syngress, 2005) BBS.pdf
|
5.6 MB
|
CCENT-CCNA ICND1 640-822 Official Cert Guide, 3rd Edition.pdf
|
16.4 MB
|
command-line.pdf
|
1.8 MB
|
CompTIA Linux Plus Study Guide 2013 for Exams LX0-101 and LX0-102 2nd Ed.pdf
|
11.1 MB
|
CompTIA_Security_SY0-301.pdf
|
233.4 KB
|
Dos Attacked.pdf
|
18.7 KB
|
Fadia, Ankit - Encryption Algorithms Explained.pdf
|
345.8 KB
|
firewalls(2).doc
|
45.1 KB
|
Fundamentals of Computer Programming with C#.pdf
|
11.5 MB
|
Getting geographical Information using an IP Address (1).doc
|
52.2 KB
|
GNU-Linux Command-Line Tools Summary Gareth Anderson.pdf
|
698.8 KB
|
Hack The Net.pdf
|
584.0 KB
|
Hacking a Coke Machine.pdf
|
119.8 KB
|
Hacking and Network Defense.pdf
|
156.2 KB
|
Hacking Exposed Computer Forensics Secrets & Solutions.pdf
|
12.2 MB
|
Hacking Exposed Wireless (ntwk security) 2nd ed - J. Cache, et al., (McGraw-Hill, 2010) BBS.pdf
|
11.6 MB
|
Hacking for Dummies 2.pdf
|
151.9 KB
|
Hacking into Linux.doc
|
127.5 KB
|
Hacking The Art Of Exploitation 2nd Edition V413HAV.pdf
|
4.2 MB
|
Hacking The Linux.pdf
|
88.4 KB
|
Hacking.Into.Computer.Systems-A.Beginners.Guide---420ebooks.pdf
|
629.9 KB
|
Hardcore Windows XP - The Step by Step Guide To Ultimate Performance.pdf
|
8.1 MB
|
hashcat_user_manual.pdf
|
2.3 MB
|
How to Master Subnetting.pdf
|
2.6 MB
|
HTTP_methods attacks.pdf
|
1.1 MB
|
Inside Cyber Warfar by Jeffrey Carr.pdf
|
3.0 MB
|
Introduction to Software Development.pdf
|
23.8 MB
|
Kevin Mitnick - The Art of Intrusion.pdf
|
3.2 MB
|
Kevin_Mitnick_-_Art_Of_Deception.pdf
|
5.4 MB
|
Linux Kernel Development, 3rd Edition.pdf
|
4.5 MB
|
Linux Shell Scripting Cookbook, Second Edition [eBook].pdf
|
3.2 MB
|
Linux-101-Hacks.pdf
|
1.6 MB
|
Machine Learning for hackers.pdf
|
25.1 MB
|
Mastering Metasploit- RAW [eBook].pdf
|
8.2 MB
|
Metasploit Toolkit for Penetration Testing, Exploit Development, and Vulnerability Research.pdf
|
5.1 MB
|
Metasploit.pdf
|
7.2 MB
|
More Password Cracking Decrypted.doc
|
130.0 KB
|
Nessus-Network-Auditing.pdf
|
4.8 MB
|
Nmap 6 Network Exploration and Security Auditing Cookbook.pdf
|
2.0 MB
|
Offensive Security - BackTrack to the Max Cracking the Perimeter V 1.0.pdf
|
3.7 MB
|
Offensive.Security.WiFu.v2.0.pdf
|
15.2 MB
|
Own-The-Box.pdf
|
4.8 MB
|
Packt.Metasploit.Penetration.Testing.Cookbook.Jun.2012.RETAIL.eBook-ELOHiM.pdf
|
3.8 MB
|
Programming in Objective-C, 6th Edition.pdf
|
6.6 MB
|
RTFM - Red Team Field Manual v2.pdf
|
3.1 MB
|
Scene of the Cybercrime - Computer Forensics Handbook.pdf
|
2.3 MB
|
Sendmail and Beyond.doc
|
63.5 KB
|
SET_User_Manual.pdf
|
1.7 MB
|
SSH_Tectia.pdf
|
73.8 KB
|
SSL Torn Apart.doc
|
79.4 KB
|
SSL VPN - Understanding, evaluating and planning secure, web-based remote access [eBook].pdf
|
4.0 MB
|
The Art of Readable Code.pdf
|
26.1 MB
|
The Basics of Web Hacking.epub
|
3.7 MB
|
The Linux Command Line by William Shotts.pdf
|
2.1 MB
|
The Web Application Hackers Handbook.pdf
|
11.7 MB
|
Transparent Proxies in Squid.doc
|
30.2 KB
|
Truths!!!--What they Dont teach in Manuals!!!.pdf
|
23.2 KB
|
User_Manual.pdf
|
1.7 MB
|
we-are-anon.pdf
|
1.6 MB
|
web_for_pentester.pdf
|
2.5 MB
|
Windows Password Files Torn Apart.doc
|
36.9 KB
|
Wireshark Network Analysis_ The Official Wireshark Certified Network Analyst Study Guide - Laura Chappell.pdf
|
37.0 MB
|
WordPress.3.Ultimate.Security.pdf
|
8.7 MB
|
/Python/
|
A Byte of Python, v1.20 (for Python 2.x) (2005).pdf
|
345.2 KB
|
A Byte of Python, v1.92 (for Python 3.0) (2009).pdf
|
623.2 KB
|
A Learner's Guide to Programming Using the Python Language (2009).pdf
|
17.6 MB
|
A Primer on Scientific Programming with Python (2009).pdf
|
7.2 MB
|
A Primer on Scientific Programming with Python, 3rd Edition.pdf
|
5.5 MB
|
Apress.Foundations.of.Python.3.Network.Programming.2nd.Edition.Dec.2010.pdf
|
5.0 MB
|
Beginning Game Development with Python and Pygame - From Novice to Professional (2007).pdf
|
8.0 MB
|
Beginning Python (2005).pdf
|
18.3 MB
|
Beginning Python - From Novice to Professional (2005) - BBL.pdf
|
14.0 MB
|
Beginning Python - From Novice to Professional, Second Edition (2008).pdf
|
2.8 MB
|
Beginning Python - Using Python 2.6 and Python 3.1 (2010).pdf
|
4.6 MB
|
Beginning Python Visualization - Crafting Visual Transformation Scripts (2009).pdf
|
2.3 MB
|
Bioinformatics Programming Using Python, First Edition (2009).pdf
|
4.3 MB
|
CherryPy Essentials - Rapid Python Web Application Development (2007).pdf
|
5.7 MB
|
Core Python Applns. Pgmg. 3rd ed. - W. Chun (Pearson, 2012) BBS.pdf
|
9.8 MB
|
Core Python Programming, Second Edition (2006).chm
|
3.6 MB
|
Data Structures and Algorithms with Object-Oriented Design Patterns in Python (2003).chm
|
3.5 MB
|
Dive Into Python 3, r867 (2010).pdf
|
2.6 MB
|
Dive Into Python 3, r870 (2010).pdf
|
2.6 MB
|
diveintopython.pdf
|
1.3 MB
|
Expert Python Programming (2008).pdf
|
10.7 MB
|
Foundations of Agile Python Development (2008).pdf
|
7.2 MB
|
Game Programming with Python, Lua, and Ruby (2003).chm
|
2.4 MB
|
Game Programming with Python, Lua, and Ruby (2003).pdf
|
2.9 MB
|
Getting Started with Pyparsing (2007).pdf
|
639.0 KB
|
Gray Hat Python - Python Programming for Hackers and Reverse Engineers (2009).pdf
|
3.2 MB
|
GUI Programming with Python - QT Edition (2002).chm
|
16.7 MB
|
Guide to NumPy (for Python) (2006).pdf
|
2.1 MB
|
Hello World - Computer Programming for Kids and Other Beginners, Fourth printing (2009).pdf
|
31.3 MB
|
Invent Your Own Computer Games with Python (2008).pdf
|
2.8 MB
|
IronPython in Action (2009).pdf
|
14.9 MB
|
Jython For Java Programmers, First Edition (2001).chm
|
730.1 KB
|
Learning Python, Fourth Edition (2009).pdf
|
16.3 MB
|
Learning to Program - Python (2006).pdf
|
1.2 MB
|
Making Use of Python (2002).pdf
|
7.2 MB
|
Matplotlib for Python Developers (2009).pdf
|
11.9 MB
|
Mobile Python - Rapid Prototyping of Applications on the Mobile Platform (2007).pdf
|
3.1 MB
|
Natural Language Processing with Python (2009).pdf
|
3.2 MB
|
Next-Generation Web Frameworks in Python (2007).chm
|
489.6 KB
|
Numerical Methods in Engineering with Python (2005).pdf
|
7.4 MB
|
Perl To Python Migration (2001).chm
|
436.5 KB
|
Practical Programming - An Introduction to Computer Science Using Python, v.2009-5-6 (2009).pdf
|
9.6 MB
|
Pro IronPython (2009).pdf
|
3.2 MB
|
Professional Python Frameworks - Web 2.0 Programming with Django and TurboGears (2007).pdf
|
10.8 MB
|
Programming Computer Vision with Python.pdf
|
72.6 MB
|
Programming in Python 3 - A Complete Introduction to the Python Language, Second Edition (2010).pdf
|
2.7 MB
|
Programming Python, 3rd Edition (2006).chm
|
10.1 MB
|
Python & XML - XML Processing with Python, First Edition (2002).pdf
|
3.7 MB
|
Python - Create-Modify-Reuse (2008).pdf
|
6.6 MB
|
Python - How to Program, 1e (2002).pdf
|
26.2 MB
|
Python - Visual QuickStart Guide (2001).chm
|
11.6 MB
|
Python 2.1 Bible (2001).pdf
|
6.8 MB
|
Python 2.6 Quick Reference (Letter) (2009).pdf
|
915.4 KB
|
Python 3 for Absolute Beginners (2009).pdf
|
8.0 MB
|
Python Cookbook, 2nd Edition (2005).chm
|
1.5 MB
|
Python Cookbook, 2nd Edition (2005).pdf
|
3.3 MB
|
Python Developer's Handbook, First Edition (2000).pdf
|
15.7 MB
|
Python Essential Reference, Fourth Edition (2009).pdf
|
2.6 MB
|
Python for Dummies (2006).pdf
|
1.8 MB
|
Python for Software Design - How to Think Like a Computer Scientist (2009).pdf
|
802.7 KB
|
Python for Unix and Linux System Administration (2008).pdf
|
3.6 MB
|
Python in a Nutshell, 2nd Edition (2006).chm
|
1.2 MB
|
Python Phrasebook - Essential Code and Commands (2006).chm
|
785.5 KB
|
Python Pocket Reference, 4th Edition (2009).pdf
|
2.4 MB
|
Python Power - The Comprehensive Guide (2008).pdf
|
6.4 MB
|
Python Programming - An Introduction to Computer Science - v1.0rc2 (2002).pdf
|
1.3 MB
|
Python Programming for the Absolute Beginner (2003).chm
|
5.7 MB
|
Python Programming on Win32, First Edition (2000).chm
|
2.2 MB
|
Python Programming with the Java Class Libraries - A Tutorial for Building Web and Enterprise Applications with Jython (2002).chm
|
1.9 MB
|
Python Scripting for Computational Science, Third Edition (2008).pdf
|
5.3 MB
|
Python Testing - Beginner's Guide (2010).pdf
|
4.8 MB
|
Rapid GUI Programming with Python and Qt - The Definitive Guide to PyQt Programming (2008).pdf
|
7.3 MB
|
Rapid Web Applications with TurboGears - Using Python to Create Ajax-Powered Sites (2006).chm
|
6.5 MB
|
Snake Wrangling for Kids - Learning to Program with Python 2, linux-v0.7.2 (2007).pdf
|
1.3 MB
|
Snake Wrangling for Kids - Learning to Program with Python 2, mac-v0.7.2 (2007).pdf
|
1.3 MB
|
Snake Wrangling for Kids - Learning to Program with Python 2, win-v0.7.2 (2007).pdf
|
1.3 MB
|
Snake Wrangling for Kids - Learning to Program with Python 3, linux-v0.7.7 (2007).pdf
|
1.4 MB
|
Snake Wrangling for Kids - Learning to Program with Python 3, mac-v0.7.7 (2007).pdf
|
1.4 MB
|
Snake Wrangling for Kids - Learning to Program with Python 3, win-v0.7.7 (2007).pdf
|
1.4 MB
|
Starting Out with Python (2009).pdf
|
35.5 MB
|
Teach Yourself Python in 24 Hours (2000).chm
|
2.6 MB
|
Text Processing in Python (2003).chm
|
875.8 KB
|
The Definitive Guide to Jython - Python for the Java Platform (2010).pdf
|
8.1 MB
|
The Quick Python Book, Second Edition (2010).pdf
|
4.6 MB
|
Thinking in Tkinter (2005).pdf
|
289.0 KB
|
Tkinter 8.4 reference - a GUI for Python (2010).pdf
|
1.5 MB
|
Twisted Network Programming Essentials - Event-driven Network Programming with Python (2005).chm
|
1.3 MB
|
wxPython in Action (2006).pdf
|
13.2 MB
|
XML Processing with Perl, Python, and PHP (2002).pdf
|
2.2 MB
|
/.../Offensive Security - Advanced Windows Exploitation (AWE) v 1.1/
|
AWE-1.pdf
|
11.1 MB
|
AWE-2.pdf
|
11.2 MB
|
AWE-3.pdf
|
13.0 MB
|
AWE-4.pdf
|
7.9 MB
|
/Phrack/
|
phrack1.tar.gz
|
10.7 KB
|
phrack2.tar.gz
|
18.7 KB
|
phrack3.tar.gz
|
21.5 KB
|
phrack4.tar.gz
|
35.4 KB
|
phrack5.tar.gz
|
45.9 KB
|
phrack6.tar.gz
|
81.2 KB
|
phrack7.tar.gz
|
35.7 KB
|
phrack8.tar.gz
|
40.2 KB
|
phrack9.tar.gz
|
35.2 KB
|
phrack10.tar.gz
|
31.2 KB
|
phrack11.tar.gz
|
44.8 KB
|
phrack12.tar.gz
|
42.7 KB
|
phrack13.tar.gz
|
37.1 KB
|
phrack14.tar.gz
|
36.4 KB
|
phrack15.tar.gz
|
25.4 KB
|
phrack16.tar.gz
|
26.3 KB
|
phrack17.tar.gz
|
46.2 KB
|
phrack18.tar.gz
|
50.9 KB
|
phrack19.tar.gz
|
25.7 KB
|
phrack20.tar.gz
|
126.0 KB
|
phrack21.tar.gz
|
82.3 KB
|
phrack22.tar.gz
|
93.1 KB
|
phrack23.tar.gz
|
59.4 KB
|
phrack24.tar.gz
|
73.0 KB
|
phrack25.tar.gz
|
69.2 KB
|
phrack26.tar.gz
|
70.0 KB
|
phrack27.tar.gz
|
91.9 KB
|
phrack28.tar.gz
|
85.1 KB
|
phrack29.tar.gz
|
86.2 KB
|
/Python/
|
A Byte of Python, v1.20 (for Python 2.x) (2005).pdf
|
345.2 KB
|
A Byte of Python, v1.92 (for Python 3.0) (2009).pdf
|
623.2 KB
|
A Learner's Guide to Programming Using the Python Language (2009).pdf
|
17.6 MB
|
A Primer on Scientific Programming with Python (2009).pdf
|
7.2 MB
|
A Primer on Scientific Programming with Python, 3rd Edition.pdf
|
5.5 MB
|
Apress.Foundations.of.Python.3.Network.Programming.2nd.Edition.Dec.2010.pdf
|
5.0 MB
|
Beginning Game Development with Python and Pygame - From Novice to Professional (2007).pdf
|
8.0 MB
|
Beginning Python (2005).pdf
|
18.3 MB
|
Beginning Python - From Novice to Professional (2005) - BBL.pdf
|
14.0 MB
|
Beginning Python - From Novice to Professional, Second Edition (2008).pdf
|
2.8 MB
|
Beginning Python - Using Python 2.6 and Python 3.1 (2010).pdf
|
4.6 MB
|
Beginning Python Visualization - Crafting Visual Transformation Scripts (2009).pdf
|
2.3 MB
|
Bioinformatics Programming Using Python, First Edition (2009).pdf
|
4.3 MB
|
CherryPy Essentials - Rapid Python Web Application Development (2007).pdf
|
5.7 MB
|
Core Python Applns. Pgmg. 3rd ed. - W. Chun (Pearson, 2012) BBS.pdf
|
9.8 MB
|
Core Python Programming, Second Edition (2006).chm
|
3.6 MB
|
Data Structures and Algorithms with Object-Oriented Design Patterns in Python (2003).chm
|
3.5 MB
|
Dive Into Python 3, r867 (2010).pdf
|
2.6 MB
|
Dive Into Python 3, r870 (2010).pdf
|
2.6 MB
|
diveintopython.pdf
|
1.3 MB
|
Expert Python Programming (2008).pdf
|
10.7 MB
|
Foundations of Agile Python Development (2008).pdf
|
7.2 MB
|
Game Programming with Python, Lua, and Ruby (2003).chm
|
2.4 MB
|
Game Programming with Python, Lua, and Ruby (2003).pdf
|
2.9 MB
|
Getting Started with Pyparsing (2007).pdf
|
639.0 KB
|
Gray Hat Python - Python Programming for Hackers and Reverse Engineers (2009).pdf
|
3.2 MB
|
GUI Programming with Python - QT Edition (2002).chm
|
16.7 MB
|
Guide to NumPy (for Python) (2006).pdf
|
2.1 MB
|
Hello World - Computer Programming for Kids and Other Beginners, Fourth printing (2009).pdf
|
31.3 MB
|
Invent Your Own Computer Games with Python (2008).pdf
|
2.8 MB
|
IronPython in Action (2009).pdf
|
14.9 MB
|
Jython For Java Programmers, First Edition (2001).chm
|
730.1 KB
|
Learning Python, Fourth Edition (2009).pdf
|
16.3 MB
|
Learning to Program - Python (2006).pdf
|
1.2 MB
|
Making Use of Python (2002).pdf
|
7.2 MB
|
Matplotlib for Python Developers (2009).pdf
|
11.9 MB
|
Mobile Python - Rapid Prototyping of Applications on the Mobile Platform (2007).pdf
|
3.1 MB
|
Natural Language Processing with Python (2009).pdf
|
3.2 MB
|
Next-Generation Web Frameworks in Python (2007).chm
|
489.6 KB
|
Numerical Methods in Engineering with Python (2005).pdf
|
7.4 MB
|
Perl To Python Migration (2001).chm
|
436.5 KB
|
Practical Programming - An Introduction to Computer Science Using Python, v.2009-5-6 (2009).pdf
|
9.6 MB
|
Pro IronPython (2009).pdf
|
3.2 MB
|
Professional Python Frameworks - Web 2.0 Programming with Django and TurboGears (2007).pdf
|
10.8 MB
|
Programming Computer Vision with Python.pdf
|
72.6 MB
|
Programming in Python 3 - A Complete Introduction to the Python Language, Second Edition (2010).pdf
|
2.7 MB
|
Programming Python, 3rd Edition (2006).chm
|
10.1 MB
|
Python & XML - XML Processing with Python, First Edition (2002).pdf
|
3.7 MB
|
Python - Create-Modify-Reuse (2008).pdf
|
6.6 MB
|
Python - How to Program, 1e (2002).pdf
|
26.2 MB
|
Python - Visual QuickStart Guide (2001).chm
|
11.6 MB
|
Python 2.1 Bible (2001).pdf
|
6.8 MB
|
Python 2.6 Quick Reference (Letter) (2009).pdf
|
915.4 KB
|
Python 3 for Absolute Beginners (2009).pdf
|
8.0 MB
|
Python Cookbook, 2nd Edition (2005).chm
|
1.5 MB
|
Python Cookbook, 2nd Edition (2005).pdf
|
3.3 MB
|
Python Developer's Handbook, First Edition (2000).pdf
|
15.7 MB
|
Python Essential Reference, Fourth Edition (2009).pdf
|
2.6 MB
|
Python for Dummies (2006).pdf
|
1.8 MB
|
Python for Software Design - How to Think Like a Computer Scientist (2009).pdf
|
802.7 KB
|
Python for Unix and Linux System Administration (2008).pdf
|
3.6 MB
|
Python in a Nutshell, 2nd Edition (2006).chm
|
1.2 MB
|
Python Phrasebook - Essential Code and Commands (2006).chm
|
785.5 KB
|
Python Pocket Reference, 4th Edition (2009).pdf
|
2.4 MB
|
Python Power - The Comprehensive Guide (2008).pdf
|
6.4 MB
|
Python Programming - An Introduction to Computer Science - v1.0rc2 (2002).pdf
|
1.3 MB
|
Python Programming for the Absolute Beginner (2003).chm
|
5.7 MB
|
Python Programming on Win32, First Edition (2000).chm
|
2.2 MB
|
Python Programming with the Java Class Libraries - A Tutorial for Building Web and Enterprise Applications with Jython (2002).chm
|
1.9 MB
|
Python Scripting for Computational Science, Third Edition (2008).pdf
|
5.3 MB
|
Python Testing - Beginner's Guide (2010).pdf
|
4.8 MB
|
Rapid GUI Programming with Python and Qt - The Definitive Guide to PyQt Programming (2008).pdf
|
7.3 MB
|
Rapid Web Applications with TurboGears - Using Python to Create Ajax-Powered Sites (2006).chm
|
6.5 MB
|
Snake Wrangling for Kids - Learning to Program with Python 2, linux-v0.7.2 (2007).pdf
|
1.3 MB
|
Snake Wrangling for Kids - Learning to Program with Python 2, mac-v0.7.2 (2007).pdf
|
1.3 MB
|
Snake Wrangling for Kids - Learning to Program with Python 2, win-v0.7.2 (2007).pdf
|
1.3 MB
|
Snake Wrangling for Kids - Learning to Program with Python 3, linux-v0.7.7 (2007).pdf
|
1.4 MB
|
Snake Wrangling for Kids - Learning to Program with Python 3, mac-v0.7.7 (2007).pdf
|
1.4 MB
|
Snake Wrangling for Kids - Learning to Program with Python 3, win-v0.7.7 (2007).pdf
|
1.4 MB
|
Starting Out with Python (2009).pdf
|
35.5 MB
|
Teach Yourself Python in 24 Hours (2000).chm
|
2.6 MB
|
Text Processing in Python (2003).chm
|
875.8 KB
|
The Definitive Guide to Jython - Python for the Java Platform (2010).pdf
|
8.1 MB
|
The Quick Python Book, Second Edition (2010).pdf
|
4.6 MB
|
Thinking in Tkinter (2005).pdf
|
289.0 KB
|
Tkinter 8.4 reference - a GUI for Python (2010).pdf
|
1.5 MB
|
Twisted Network Programming Essentials - Event-driven Network Programming with Python (2005).chm
|
1.3 MB
|
wxPython in Action (2006).pdf
|
13.2 MB
|
XML Processing with Perl, Python, and PHP (2002).pdf
|
2.2 MB
|
Total files 2720
|