FileMood

Download IT ebooks

IT ebooks

Name

IT ebooks

  DOWNLOAD Copy Link

Trouble downloading? see How To

Total Size

25.6 GB

Total Files

2720

Last Seen

2025-07-18 00:07

Hash

7F1A67B84B2A9F3E3B148FEDEF5EBC5027FD1DC4

/Security-HackingEbooks2/

netcat_power_tools.pdf

16.8 MB

100-uC-OS-II-002.pdf

4.3 MB

A Day in the Life of a Flux Reversal - Count Zero.pdf

205.1 KB

advanced bash scripting guide.pdf

2.7 MB

Algorithms Explained.doc

160.8 KB

Ankit Fadia Hacking Guide.pdf

1.3 MB

BackTrack 5 Cookbook.pdf

23.4 MB

BackTrack 5 Wireless Penetration Testing Beginners Guide[NepsterJay].pdf

17.4 MB

Bash Reference Manual by Chet Ramey and Brian Fox.pdf

716.9 KB

Bluetooth Hacking.pdf

362.1 KB

CCENT Cisco Certified Entry Networking Technician (2013).pdf

16.6 MB

CCNA Wireless Study Guide_ IUWNE Exam 640-721 - Lammle, Todd.pdf

14.3 MB

Certified Ethical Hacker Study Guide.pdf

7.0 MB

CompTIA_Network_N10-005.pdf

261.4 KB

CWTS_ Certified Wireless Technology Specialist Official Study Guide_ Exam PW0-070 - Robert J. Bartz.pdf

8.8 MB

Data Mining and Machine Learning in Cybersecurity.pdf

3.3 MB

debian-handbook.pdf

30.0 MB

Firebug 1.5 Editing Debugging and Monitoring Web Pages [eBook].pdf

5.9 MB

firewalls.doc

45.1 KB

FTP Exploits By Ankit Fadia.pdf

36.2 KB

Gathering Info on Remote Host.doc

55.3 KB

Getting geographical Information using an IP Address.doc

52.2 KB

GoogleHackingforPenetrationTesters.pdf

33.8 MB

Hack Proofing Your Web Server.pdf

86.5 KB

Hackers Delight - By Henry S. Warren,.pdf

10.3 MB

Hackers Survival Guide.pdf

545.5 KB

Hacking - Dangerous Google - Searching For Secrets by Michał Piotrowski.pdf

2.2 MB

Hacking - Firewalls And Networks How To Hack Into Remote Com.pdf

3.5 MB

Hacking Exposed 6 (ntwk security) - S. McClure, et. al., (McGraw-Hill, 2009) BBS.pdf

15.6 MB

Hacking Exposed 7.epub

47.4 MB

Hacking Into Computer Systems - Beginners.pdf

629.9 KB

Hacking Intranet Websites.pdf

5.7 MB

Hacking the Human.pdf

12.8 MB

Hacking Web Apps.pdf

23.0 MB

Hacking with Kali - Broad, James, Bindner, Andrew.pdf

9.6 MB

Hacking, 2nd Edition.pdf

5.1 MB

Hacking---Firewalls-And-Networks-How-To-Hack-Into-Remote-Computers.pdf

3.0 MB

hacking_gmail.pdf

5.5 MB

How to Crack CD Protections.pdf

30.7 KB

How to Make Key Generators.pdf

74.3 KB

How to Master CCNA v2.0.pdf

8.1 MB

HTML-Guide.pdf

21.8 MB

Identify Theft for Dummies - M. Arata (Wiley, 2010).pdf

5.4 MB

Instant Wireshark Starter [eBook].pdf

2.4 MB

Introduction to Linux; A Hands on Guide by Machtelt Garrels.pdf

1.6 MB

Java Programming From Problem Analysis To Program Design 4th ed.pdf

7.9 MB

Kali Linux Cookbook.pdf

11.2 MB

learnd2.pdf

1.7 MB

Learning Java, 4th Edition[A4].pdf

25.7 MB

Learning PHP, MySQL & JavaScript, 4th Edition.pdf

14.9 MB

Linux System Programming.pdf

2.9 MB

Linux Utilities Cookbook [eBook].pdf

10.5 MB

linux_server_hacks.pdf

35.9 MB

Low Tech Hacking -Street Smarts for Security Professionals [NepsterJay].pdf

33.1 MB

Mastering Microsoft Exchange Server 2013 - Elfassy, David.pdf

20.7 MB

metasplitable2_sih60b.pdf

597.1 KB

Metasploit Penetration Testing Cookbook, Second Edition [eBook].pdf

6.9 MB

Microsoft Windows Xp - Command-Line Reference A-Z.pdf

9.5 MB

Moore-Critical-Thinking-Intelligence-Analysis.pdf

12.8 MB

Net+ 2009.pdf

78.1 MB

Ninja-Hacking.pdf

10.3 MB

Nmap Network Scanning.pdf

57.6 MB

Offensive Security - Penetration Testing with BackTrack (Lab Guide)v3.2.pdf

11.0 MB

OpenVPN 2 Cookbook [eBook].pdf

7.9 MB

OS_and_application_fingerprinting.pdf

897.1 KB

PayPal Hacks.pdf

126.9 KB

PracticalPacketAnalysis2e.pdf

28.7 MB

Removing Banners from your site.doc

29.2 KB

Scalix- Linux Administrator’s Guide.pdf

8.9 MB

Secrets of Network Cartography A Comprehensive Guide to Nmap.pdf

1.1 MB

Seven Deadliest Web Application Attacks.pdf

3.0 MB

Simple Hacks - Addons, Macros And More.pdf

875.6 KB

Syngress.Asterisk.Hacking.May.2007.pdf

10.7 MB

TCP Wrappers Unwrapped.doc

35.3 KB

The Basics of Web Hacking - Pauli, Josh.pdf

5.3 MB

The Psychology of Interrogations and Confessions A Handbook - Gisli H. Gudjonsson.pdf

5.2 MB

Tracing IP,DNS,WHOIS-nsLOOKUP.pdf

24.4 KB

Understanding TCP_IP [eBook].pdf

11.5 MB

Untold Windows Tips and Secrets.doc

38.9 KB

Web Penetration Testing with Kali Linux.pdf

21.0 MB

Wiley.Ubuntu.Linux.Toolbox.1000.plus.Commands.for.Ubuntu.and.Debian.Power.Users.Nov.2007.pdf

3.4 MB

Wireshark Network Analysis_ The Official Wireshark Certork Analyst Study Guide - Laura Chappell & Gerald Combs.mobi

21.8 MB

WordPress Web Application Development [eBook].pdf

4.5 MB

/Technology, programming, IT, computer science, hacking/

netcat_power_tools.pdf

16.8 MB

100-uC-OS-II-002.pdf

4.3 MB

A Day in the Life of a Flux Reversal - Count Zero.pdf

205.1 KB

advanced bash scripting guide.pdf

2.7 MB

Advanced Penetration Testing for Highly-Secured Environments- The Ultimate Security Guide [eBook].pdf

13.4 MB

Algorithms Explained.doc

160.8 KB

An Introduction to the Analysis of Algorithms, 2nd Edition.pdf

5.8 MB

Ankit Fadia Hacking Guide.pdf

1.3 MB

Apress - Pro Bash Programming Scripting the GNULinux Shell (10-2009) (ATTiCA).pdf

1.5 MB

BackTrack 5 Cookbook.pdf

23.4 MB

BackTrack 5 Wireless Penetration Testing Beginners Guide[NepsterJay].pdf

17.4 MB

Bash Guide for Beginners.pdf

1.2 MB

Bash Reference Manual by Chet Ramey and Brian Fox.pdf

716.9 KB

Bluetooth Hacking.pdf

362.1 KB

Buffer Overflow Attacks - Detect, Exploit, Prevent (Syngress, 2005) BBS.pdf

5.6 MB

CCENT Cisco Certified Entry Networking Technician (2013).pdf

16.6 MB

CCENT-CCNA ICND1 640-822 Official Cert Guide, 3rd Edition.pdf

16.4 MB

CCNA Wireless Study Guide_ IUWNE Exam 640-721 - Lammle, Todd.pdf

14.3 MB

Certified Ethical Hacker Study Guide.pdf

7.0 MB

command-line.pdf

1.8 MB

CompTIA Linux Plus Study Guide 2013 for Exams LX0-101 and LX0-102 2nd Ed.pdf

11.1 MB

CompTIA_Network_N10-005.pdf

261.4 KB

CompTIA_Security_SY0-301.pdf

233.4 KB

CWTS_ Certified Wireless Technology Specialist Official Study Guide_ Exam PW0-070 - Robert J. Bartz.pdf

8.8 MB

Data Mining and Machine Learning in Cybersecurity.pdf

3.3 MB

debian-handbook.pdf

30.0 MB

Dos Attacked.pdf

18.7 KB

Fadia, Ankit - Encryption Algorithms Explained.pdf

345.8 KB

Firebug 1.5 Editing Debugging and Monitoring Web Pages [eBook].pdf

5.9 MB

firewalls(2).doc

45.1 KB

firewalls.doc

45.1 KB

FTP Exploits By Ankit Fadia.pdf

36.2 KB

Fundamentals of Computer Programming with C#.pdf

11.5 MB

Gathering Info on Remote Host.doc

55.3 KB

Getting geographical Information using an IP Address (1).doc

52.2 KB

Getting geographical Information using an IP Address.doc

52.2 KB

GNU-Linux Command-Line Tools Summary Gareth Anderson.pdf

698.8 KB

GoogleHackingforPenetrationTesters.pdf

33.8 MB

Hack Proofing Your Web Server.pdf

86.5 KB

Hack The Net.pdf

584.0 KB

Hackers Delight - By Henry S. Warren,.pdf

10.3 MB

Hackers Survival Guide.pdf

545.5 KB

Hacking - Dangerous Google - Searching For Secrets by Michał Piotrowski.pdf

2.2 MB

Hacking - Firewalls And Networks How To Hack Into Remote Com.pdf

3.5 MB

Hacking a Coke Machine.pdf

119.8 KB

Hacking and Network Defense.pdf

156.2 KB

Hacking Exposed 6 (ntwk security) - S. McClure, et. al., (McGraw-Hill, 2009) BBS.pdf

15.6 MB

Hacking Exposed 7.epub

47.4 MB

Hacking Exposed Computer Forensics Secrets & Solutions.pdf

12.2 MB

Hacking Exposed Wireless (ntwk security) 2nd ed - J. Cache, et al., (McGraw-Hill, 2010) BBS.pdf

11.6 MB

Hacking for Dummies 2.pdf

151.9 KB

Hacking Into Computer Systems - Beginners.pdf

629.9 KB

Hacking into Linux.doc

127.5 KB

Hacking Intranet Websites.pdf

5.7 MB

Hacking The Art Of Exploitation 2nd Edition V413HAV.pdf

4.2 MB

Hacking the Human.pdf

12.8 MB

Hacking The Linux.pdf

88.4 KB

Hacking Web Apps.pdf

23.0 MB

Hacking with Kali - Broad, James, Bindner, Andrew.pdf

9.6 MB

Hacking, 2nd Edition.pdf

5.1 MB

Hacking---Firewalls-And-Networks-How-To-Hack-Into-Remote-Computers.pdf

3.0 MB

Hacking.Into.Computer.Systems-A.Beginners.Guide---420ebooks.pdf

629.9 KB

hacking_gmail.pdf

5.5 MB

Hardcore Windows XP - The Step by Step Guide To Ultimate Performance.pdf

8.1 MB

hashcat_user_manual.pdf

2.3 MB

How to Crack CD Protections.pdf

30.7 KB

How to Make Key Generators.pdf

74.3 KB

How to Master CCNA v2.0.pdf

8.1 MB

How to Master Subnetting.pdf

2.6 MB

HTML-Guide.pdf

21.8 MB

HTTP_methods attacks.pdf

1.1 MB

Identify Theft for Dummies - M. Arata (Wiley, 2010).pdf

5.4 MB

Inside Cyber Warfar by Jeffrey Carr.pdf

3.0 MB

Instant Wireshark Starter [eBook].pdf

2.4 MB

Introduction to Linux; A Hands on Guide by Machtelt Garrels.pdf

1.6 MB

Introduction to Software Development.pdf

23.8 MB

Java Programming From Problem Analysis To Program Design 4th ed.pdf

7.9 MB

Kali Linux Cookbook.pdf

11.2 MB

Kevin Mitnick - The Art of Intrusion.pdf

3.2 MB

Kevin_Mitnick_-_Art_Of_Deception.pdf

5.4 MB

learnd2.pdf

1.7 MB

Learning Java, 4th Edition[A4].pdf

25.7 MB

Learning PHP, MySQL & JavaScript, 4th Edition.pdf

14.9 MB

Linux Kernel Development, 3rd Edition.pdf

4.5 MB

Linux Shell Scripting Cookbook, Second Edition [eBook].pdf

3.2 MB

Linux System Programming.pdf

2.9 MB

Linux Utilities Cookbook [eBook].pdf

10.5 MB

Linux-101-Hacks.pdf

1.6 MB

linux_server_hacks.pdf

35.9 MB

Low Tech Hacking -Street Smarts for Security Professionals [NepsterJay].pdf

33.1 MB

Machine Learning for hackers.pdf

25.1 MB

Mastering Metasploit- RAW [eBook].pdf

8.2 MB

Mastering Microsoft Exchange Server 2013 - Elfassy, David.pdf

20.7 MB

metasplitable2_sih60b.pdf

597.1 KB

Metasploit Penetration Testing Cookbook, Second Edition [eBook].pdf

6.9 MB

Metasploit Toolkit for Penetration Testing, Exploit Development, and Vulnerability Research.pdf

5.1 MB

Metasploit.pdf

7.2 MB

Microsoft Windows Xp - Command-Line Reference A-Z.pdf

9.5 MB

Moore-Critical-Thinking-Intelligence-Analysis.pdf

12.8 MB

More Password Cracking Decrypted.doc

130.0 KB

Nessus-Network-Auditing.pdf

4.8 MB

Net+ 2009.pdf

78.1 MB

Ninja-Hacking.pdf

10.3 MB

Nmap 6 Network Exploration and Security Auditing Cookbook.pdf

2.0 MB

Nmap Network Scanning.pdf

57.6 MB

Offensive Security - BackTrack to the Max Cracking the Perimeter V 1.0.pdf

3.7 MB

Offensive Security - Penetration Testing with BackTrack (Lab Guide)v3.2.pdf

11.0 MB

Offensive.Security.WiFu.v2.0.pdf

15.2 MB

OpenVPN 2 Cookbook [eBook].pdf

7.9 MB

OS_and_application_fingerprinting.pdf

897.1 KB

Own-The-Box.pdf

4.8 MB

Packt.Metasploit.Penetration.Testing.Cookbook.Jun.2012.RETAIL.eBook-ELOHiM.pdf

3.8 MB

PayPal Hacks.pdf

126.9 KB

PracticalPacketAnalysis2e.pdf

28.7 MB

Programming in Objective-C, 6th Edition.pdf

6.6 MB

Removing Banners from your site.doc

29.2 KB

RTFM - Red Team Field Manual v2.pdf

3.1 MB

Scalix- Linux Administrator’s Guide.pdf

8.9 MB

Scene of the Cybercrime - Computer Forensics Handbook.pdf

2.3 MB

Secrets of Network Cartography A Comprehensive Guide to Nmap.pdf

1.1 MB

Sendmail and Beyond.doc

63.5 KB

SET_User_Manual.pdf

1.7 MB

Seven Deadliest Web Application Attacks.pdf

3.0 MB

Simple Hacks - Addons, Macros And More.pdf

875.6 KB

SSH_Tectia.pdf

73.8 KB

SSL Torn Apart.doc

79.4 KB

SSL VPN - Understanding, evaluating and planning secure, web-based remote access [eBook].pdf

4.0 MB

Syngress.Asterisk.Hacking.May.2007.pdf

10.7 MB

TCP Wrappers Unwrapped.doc

35.3 KB

The Art of Readable Code.pdf

26.1 MB

The Basics of Web Hacking - Pauli, Josh.pdf

5.3 MB

The Basics of Web Hacking.epub

3.7 MB

The Linux Command Line by William Shotts.pdf

2.1 MB

The Psychology of Interrogations and Confessions A Handbook - Gisli H. Gudjonsson.pdf

5.2 MB

The Web Application Hackers Handbook.pdf

11.7 MB

Tracing IP,DNS,WHOIS-nsLOOKUP.pdf

24.4 KB

Transparent Proxies in Squid.doc

30.2 KB

Truths!!!--What they Dont teach in Manuals!!!.pdf

23.2 KB

Understanding TCP_IP [eBook].pdf

11.5 MB

Untold Windows Tips and Secrets.doc

38.9 KB

User_Manual.pdf

1.7 MB

we-are-anon.pdf

1.6 MB

Web Penetration Testing with Kali Linux.pdf

21.0 MB

web_for_pentester.pdf

2.5 MB

Wiley.Ubuntu.Linux.Toolbox.1000.plus.Commands.for.Ubuntu.and.Debian.Power.Users.Nov.2007.pdf

3.4 MB

Windows Password Files Torn Apart.doc

36.9 KB

Wireshark Network Analysis_ The Official Wireshark Certified Network Analyst Study Guide - Laura Chappell.pdf

37.0 MB

Wireshark Network Analysis_ The Official Wireshark Certork Analyst Study Guide - Laura Chappell & Gerald Combs.mobi

21.8 MB

WordPress Web Application Development [eBook].pdf

4.5 MB

WordPress.3.Ultimate.Security.pdf

8.7 MB

/.../_ Informatyka. Word Excel Acces (napomoc) (1)/

Walkenbach J - Excel 2013 Bible.pdf

226.6 MB

Walkenbach J - Excel 2010 Power Programming with VBA.pdf

12.9 MB

Walkenbach J - Excel 2013 PL. Programowanie w VBA dla bystrzaków. wyd 3.pdf

14.0 MB

/.../1 - Basic Programming & Data Structures/

Bjarne Stroustrup-The C++ Programming Language, 4th Edition-Addison-Wesley Professional (2013).pdf

19.7 MB

Nicolai M. Josuttis-The C++ Standard Library_ A Tutorial and Reference-Addison-Wesley (2012).pdf

14.5 MB

Scott Meyers-Effective Modern C++_ 42 Specific Ways to Improve Your Use of C++11 and C++14-O'Reilly Media (2014).epub

19.1 MB

Stanley B. Lippman, Josée Lajoie, Barbara E. Moo-C++ Primer-Addison-Wesley Professional (2012).pdf

52.8 MB

Adam Drozdek-Data Structures and Algorithms in C++-Cengage Learning (2012).pdf

22.4 MB

(2nd Edition) Bjarne Stroustrup-Programming_ Principles and Practice Using C++-Addison-Wesley Professional (2014).epub

34.9 MB

(Addison-Wesley Professional Computing Series) Scott Meyers-Effective C++. 55 specific ways to improve your programs and designs-Addison-Wesley Professional (2005).djvu

2.7 MB

/.../2 - Learn your way around an Unix shell, Make, System Programming and C/

Brian W. Kernighan, Dennis M. Ritchie-The C Programming Language (2nd Edition)-Prentice Hall (1988).pdf

16.6 MB

Jeffrey Richter and Christophe Nasarre-Windows via C_C++-Microsoft Press (2008).chm

3.4 MB

Johnson M. Hart-Windows System Programming-Addison-Wesley Professional (2010).pdf

10.9 MB

K. N. King-C Programming_ A Modern Approach-W. W. Norton & Company (2008).pdf

106.8 MB

W. Richard Stevens, Stephen A. Rago-Advanced Programming in the UNIX Environment.pdf

20.6 MB

/.../2 - Computer Organization and Architecture/

Randal E. Bryant, David R. O'Hallaron-Computer Systems_ A Programmer's Perspective-Pearson (2015).pdf

37.7 MB

/Computer Science/4 - Operating Systems/

Abraham Silberschatz, Peter B. Galvin, Greg Gagne-Operating System Concepts-Wiley (2012).pdf

7.0 MB

Andrew S. Tanenbaum, Herbert Bos-Modern Operating Systems-Pearson (2014).pdf

6.6 MB

/Computer Science/6 - Algorithms/

Dexter C. Kozen-The Design and Analysis of Algorithms-Springer (1992).djvu

2.3 MB

Jon Kleinberg, Éva Tardos-Algorithm Design-Addison-Wesley (2005).epub

4.0 MB

Robert Sedgewick and Philippe Flajolet-An Introduction to the Analysis of Algorithms-Addison-Wesley Professional (2013).pdf

7.0 MB

Robert Sedgewick-Algorithms in C++ Part 5_ Graph Algorithms. 3 ed.-Addison-Wesley Professional (2002).epub

11.4 MB

Robert Sedgewick-Algorithms in C++, Parts 1-4_ Fundamentals, Data Structure, Sorting, Searching-Addison-Wesley Professional (1998).chm

6.1 MB

Thomas H. Cormen, Charles E. Leiserson, Ronald L. Rivest, Clifford Stein-Introduction to Algorithms, Third Edition (2009).pdf

5.6 MB

/Computer Science/9 - Parallel Programming/

Aaftab Munshi, Benedict Gaster, Timothy Mattson, James Fung, Dan Ginsburg-OpenCL Programming Guide -Addison-Wesley Professional (2011).epub

13.2 MB

Ananth Grama-Introduction to Parallel Computing-Addison Wesley (2003).pdf

12.9 MB

Anthony Williams-C++ Concurrency in Action_ Practical Multithreading-Manning Publications (2012).epub

6.9 MB

Benedict Gaster, Lee Howes, David R. Kaeli, Perhaad Mistry, Dana Schaa-Heterogeneous computing with OpenCL_ revised OpenCL 1.2 edition-Morgan Kaufmann (2012).pdf

14.7 MB

Matthew Scarpino-OpenCL in Action_ How to Accelerate Graphics and Computations-Manning Publications (2011).pdf

17.7 MB

Peter Pacheco-An Introduction to Parallel Programming-Morgan Kaufmann (2011).pdf

3.8 MB

/Computer Science/10 - Networks/

Dimitri Bertsekas, Robert Gallager-Instructor's Solutions Manual for Data Networks-Pearson (1993).pdf

10.0 MB

Dimitri P. Bertsekas, Gallager-Data Networks (2nd Edition)-Prentice Hall (1992).pdf

34.4 MB

Larry L. Peterson, Bruce S. Davie-Computer Networks_ A Systems Approach, Fifth Edition -Elsevier (2011).pdf

30.3 MB

Radia Perlman-Interconnections_ Bridges, Routers, Switches, and Internetworking Protocols -Addison-Wesley Professional (1999).pdf

3.2 MB

W. Richard Stevens, Bill Fenner, Andrew M. Rudoff-Unix Network Programming, Volume 1_ The Sockets Networking API-Addison-Wesley Professional (2003).pdf

17.2 MB

/.../11 - Computer Security and Cryptography/

Jeffrey Hoffstein, Jill Pipher, Joseph H. Silverman (auth.)-An Introduction to Mathematical Cryptography-Springer-Verlag New York (2014).pdf

6.0 MB

Jonathan Katz, Yehuda Lindell-Introduction to Modern Cryptography, Second Edition.pdf

7.9 MB

Niels Ferguson, Bruce Schneier, Tadayoshi Kohno-Cryptography Engineering_ Design Principles and Practical Applications-Wiley (2010).djvu

5.4 MB

/.../12 - Information Theory and Coding Theory/

Abbas El Gamal, Young-Han Kim-Network Information Theory-Cambridge University Press (2012).pdf

4.4 MB

Andrew J. Viterbi, Jim K. Omura-Principles of Digital Communication and Coding (2009).epub

47.0 MB

Claude E Shannon, Warren Weaver-The Mathematical Theory of Communication-U. Illinois (1963).djvu

1.3 MB

Khalid Sayood-Introduction to Data Compression, Fourth Edition-Morgan Kaufmann (2012).pdf

18.3 MB

Robert B. Ash-Information Theory-John Wiley & Sons, Inc. (1965).pdf

10.3 MB

Robert G. Gallager-Information theory and reliable communication-Wiley (1968).djvu

6.2 MB

Steven Roman-Coding and information theory- .djvu

6.8 MB

Thomas M. Cover, Joy A. Thomas-Elements of Information Theory-Wiley-Interscience (2006).pdf

10.6 MB

/.../13 - AI, Machine Learning, and Computer Vision/

Richard Szeliski-Computer Vision_ Algorithms and Applications-Springer (2011).pdf

37.1 MB

Stuart Russell, Peter Norvig-Artificial Intelligence_ A Modern Approach .pdf

15.6 MB

/.../15 - Computer Graphics and Image Processing/

John F. Hughes, Andries van Dam, Morgan McGuire, David F. Sklar, James D. Foley, Steven K. Feiner, Kurt Akeley-Computer Graphics_ Principles and Practice.pdf

20.0 MB

Peter Shirley, Michael Ashikhmin, Steve Marschner-Fundamentals of Computer Graphics-A K Peters (2009).pdf

24.5 MB

Rafael C. Gonzalez, Richard E. Woods-Digital Image Processing-Pearson (2007).pdf

65.1 MB

/.../1 - Linear Programming Optimization/

Alexander Schrijver-Theory of Linear and Integer Programming-Wiley (1998).djvu

23.8 MB

Dimitris Bertsimas, John N. Tsitsiklis, Dimitris Bertsimas, John Tsitsiklis-Introduction to Linear Optimization.pdf

16.9 MB

/.../2 - Combinatorial Optimization and Network Flows/

Alexander Schrijver-Combinatorial Optimization_ Polyhedra and Efficiency.pdf

9.7 MB

Combinatorial Optimization.djvu

4.1 MB

Combinatorial Optimization_ Theory and Algorithms.pdf

5.4 MB

Network flows_ theory, algorithms, and applications.djvu

9.1 MB

/.../17 - Advanced Algorithms and Mathematical Optimization/3 - Convex Optimization/

Convex Optimization & Euclidean Distance Geometry by Dattorro.pdf

28.7 MB

Convex Optimization.pdf

6.0 MB

Lectures on Modern Convex Optimization Analysis, Algorithms, and Engineering Applications.pdf

5.4 MB

R. Tyrrell Rockafellar-Convex analysis .djvu

3.9 MB

/.../17 - Advanced Algorithms and Mathematical Optimization/4 - Approximation Algorithms/

Approximation Algorithms.pdf

1.7 MB

The design of approximation algorithms.pdf

2.4 MB

/.../17 - Advanced Algorithms and Mathematical Optimization/5 - Randomized Algorithms/

Motwani R., Raghavan P.-Randomized algorithms-Cambridge University Press (1995).djvu

8.1 MB

/.../19 - Computer Algebra Systems and Computer Arithmetic/

Handbook of Floating-Point Arithmetic.pdf

13.3 MB

Jean-Pierre Deschamps, Gery J.A. Bioul, Gustavo D. Sutter-Synthesis of Arithmetic Circuits_ FPGA, ASIC and Embedded Systems-Wiley-Interscience (2006).pdf

8.1 MB

Jean-Pierre Deschamps-Hardware Implementation of Finite-Field Arithmetic (2009).pdf

1.6 MB

Mircea Vlăduţiu (auth.)-Computer Arithmetic_ Algorithms and Hardware Implementations (2012).djvu

2.5 MB

Richard Brent, Paul Zimmermann-Modern Computer Arithmetic-Cambridge University Press (2010).pdf

2.2 MB

von zur Gathen J., Gerhard J.-Modern computer algebra-Cambridge University Press (2013).djvu

10.3 MB

/Computer Science/20 - Mathematics/

(Prentice Hall Signal Processing Series) Alan V. Oppenheim, Ronald W. Schafer-Discrete-Time Signal Processing-Prentice Hall (2010).pdf

11.2 MB

Alan V. Oppenheim, Alan S. Willsky, with S. Hamid-Signals and Systems-Prentice Hall (1996).pdf

35.6 MB

Cameron P.J.-Combinatorics_ Topics, Techniques, Algorithms-CUP (1995).djvu

5.7 MB

David A. Brannan, Matthew F. Esplen, Jeremy J. Gray-Geometry-Cambridge University Press (2012).pdf

12.5 MB

Hardy G.H., Wright E.M.-An introduction to the theory of numbers- OUP (2008).djvu

8.9 MB

Jack B. Kuipers-Quaternions and rotation sequences_ a primer with applications to orbits, aerospace, and virtual reality-Princeton University Press (1999).djvu

3.0 MB

John Harris, Jeffry L. Hirst, Michael Mossinghoff-Combinatorics and Graph Theory (Undergraduate Texts in Mathematics)-Springer (2008).djvu

4.4 MB

Larry Wasserman-All of Statistics - A Concise Course in Statistical Inference-Springer (2004).pdf

9.1 MB

Philippe Flajolet, Robert Sedgewick-Analytic Combinatorics-Cambridge University Press (2009).pdf

11.5 MB

Sheldon M. Ross-Introduction to Probability Models, Ninth Edition-Academic Press (2006).pdf

4.0 MB

/.../24 - OS Development/

Daniel P. Bovet, Marco Cesati Ph.D.-Understanding the Linux Kernel, Third Edition-O'Reilly Media (2005).epub

4.4 MB

John R. Levine-Linkers & Loaders-Morgan Kaufmann (1999).pdf

3.7 MB

Jonathan Corbet, Alessandro Rubini, Greg Kroah-Hartman-Linux Device Drivers-O'Reilly Media (2005).epub

2.9 MB

Mark E. Russinovich, David A. Solomon, Alex Ionescu-Windows Internals, Part 1_ Covering Windows Server® 2008 R2 and Windows 7-Microsoft Press (2012).epub

19.0 MB

Mark E. Russinovich, David A. Solomon, Alex Ionescu-Windows Internals, Part 2-Microsoft Press (2012).pdf

22.7 MB

Marshall Kirk McKusick, George V. Neville-Neil, Robert N.M. Watson-The Design and Implementation of the FreeBSD Operating System-Addison-Wesley Professional (2014).pdf

25.5 MB

Maurice J. Bach-The design of the UNIX operating system (1986).djvu

6.2 MB

Robert Love-Linux Kernel Development-Addison-Wesley Professional (2010).pdf

2.5 MB

/.../25 - Reverse Engineering and Malware Analysis/

A Guide to Kernel Exploitation_ Attacking the Core-Syngress (2010).pdf

5.5 MB

Bill Blunden-The Rootkit Arsenal_ Escape and Evasion in the Dark Corners of the System-Jones & Bartlett Learning (2012).pdf

111.3 MB

Chris Anley, John Heasman, Felix Lindner, Gerardo Richarte-The Shellcoder's Handbook_ Discovering and Exploiting Security Holes-Wiley (2007).pdf

9.2 MB

Eldad Eilam-Reversing_ secrets of reverse engineering-Wiley (2005).epub

9.1 MB

Michael Sikorski, Andrew Honig-Practical Malware Analysis_ The Hands-On Guide to Dissecting Malicious Software-No Starch Press (2012).epub

11.5 MB

Practical reverse engineering_ x86, x64, ARM, Windows Kernel, reversing tools, and obfuscation-Wiley (2014).epub

3.3 MB

/.../26 - Software Engineering, Development, and Project Management/

Andrew Hunt, David Thomas-The Pragmatic Programmer_ From Journeyman to Master.mobi

2.5 MB

Design Patterns_ Elements of Reusable Object-Oriented Software (1994).epub

11.1 MB

Frederick P. Brooks-The Mythical Man-Month_ Essays on Software Engineering, Anniversary Edition-Addison-Wesley Professional (2008).djvu

6.1 MB

Michael Feathers-Working Effectively with Legacy Code-Prentice Hall (2004).epub

4.0 MB

Robert C. Martin-Clean Code_ A Handbook of Agile Software Craftsmanship-Prentice Hall (2008).pdf

3.1 MB

Steve McConnell-Code Complete_ A Practical Handbook of Software Construction-Microsoft Press (2004).pdf

10.2 MB

Tom DeMarco, Tim Lister-Peopleware_ Productive Projects and Teams-Addison-Wesley Professional (2013).pdf

4.3 MB

/.../28 - Distributed Systems and Computing/

Andrew S. Tanenbaum, Maarten Van Steen-Distributed Systems_ Principles and Paradigms (2nd Edition)-Prentice Hall (2006).pdf

10.0 MB

Hagit Attiya, Jennifer Welch-Distributed Computing_ Fundamentals, Simulations, and Advanced Topics-Wiley-Interscience (2004).djvu

4.2 MB

Nancy A. Lynch-Distributed Algorithms(1996).pdf

40.9 MB

Tel G.-Introduction to Distributed Algorithms-Cambridge University Press (2000).pdf

7.2 MB

/.../1 - Overviews and Engines/

Jason Gregory-Game Engine Architecture, Second Edition-CRC Press (2014).pdf

68.2 MB

Steve Rabin-Introduction to Game Development, Second Edition-Cengage Learning (2009).pdf

9.3 MB

/.../29 - Game Development/2 - Graphics/

Eric Lengyel-Mathematics for 3D Game Programming and Computer Graphics, Third Edition-Cengage (2011).pdf

8.8 MB

Matt Pharr, Greg Humphreys-Physically Based Rendering, Second Edition_ From Theory To Implementation -Morgan Kaufmann (2010).pdf

126.1 MB

Tomas Akenine-Moller, Eric Haines, Naty Hoffman-Real-Time Rendering, Third Edition-A K Peters_CRC Press (2008).djvu

9.4 MB

/.../29 - Game Development/3 - Physics/

Christer Ericson-Real-Time Collision Detection-Morgan Kaufmann (2005).pdf

3.1 MB

David H. Eberly-Game Physics, Second Edition-Morgan Kaufmann (2010).pdf

15.7 MB

/.../29 - Game Development/4 - Artificial Ingelligence/

Ian Millington, John Funge-Artificial Intelligence for Games, Second Edition-Morgan Kaufmann (2009).pdf

4.5 MB

Rabin, Steven-Game AI Pro _ Collected Wisdom of Game AI Professionals-CRC Press (2013).pdf

5.9 MB

Steven Rabin-Game AI Pro 2_ Collected Wisdom of Game AI Professionals-A K Peters_CRC Press (2015).pdf

26.1 MB

/.../30 - Miscellaneous References/

Harold Abelson, Gerald Jay Sussman, Julie Sussman-Structure and Interpretation of Computer Programs .pdf

2.6 MB

Henry S. Warren-Hacker's Delight-Addison-Wesley Professional (2012).epub

47.0 MB

Jon Bentley-Programming Pearls-Addison-Wesley Professional (1999).djvu

2.1 MB

Peter G. Neumann-Computer-Related Risks-Addison-Wesley Professional (1994).pdf

479.2 KB

/.../31 - Interesting Books/

(Center for the Study of Language and Information - CSLI Lecture Notes 139) Donald E. Knuth-Selected Papers on Computer Languages-CSLI Publications (2002).djvu

5.2 MB

(Frontiers in Physics) Richard P. Feynman-Feynman lectures on computation-Addison-Wesley (1996).djvu

3.1 MB

(Graduate Texts in Mathematics 114) Neal Koblitz (auth.)-A Course in Number Theory and Cryptography-Springer US (1987).djvu

3.6 MB

(History of Computing) Nathan L. Ensmenger-The Computer Boys Take Over_ Computers, Programmers, and the Politics of Technical Expertise-The MIT Press (2010).epub

4.0 MB

Brian W. Kernighan, P. J. Plauger-The elements of programming style-Computing Mcgraw-Hill (1978).djvu

1.2 MB

Brown, Steven T-Tokyo cyberpunk _ posthumanism in Japanese visual culture-Palgrave Macmillan (2010).pdf

4.6 MB

Central-European Olympiad in Informatics 2002 - tasks and solutions.pdf

401.8 KB

Central-European Olympiad in Informatics 2004 - ta.pdf

498.4 KB

Charles Petzold-Code_ The Hidden Language of Computer Hardware and Software-Microsoft Press (2000).epub

6.2 MB

Daniel P. Friedman, Carl Eastlund-The Little Prover-MIT Press (2015).pdf

3.4 MB

Daniel P. Friedman, William E. Byrd, Oleg Kiselyov-The Reasoned Schemer-MIT Press (2005).pdf

4.4 MB

Douglas Coupland-Microserfs .epub

747.8 KB

Evi Nemeth, Garth Snyder, Trent R. Hein, Ben Whaley-UNIX and Linux System Administration Handbook (4th Edition)-Prentice Hall (2010).djvu

9.8 MB

Felleisen M., Friedman D.P.-The little MLer-MIT (1997).djvu

2.9 MB

Fred Vogelstein-Dogfight_ How Apple and Google Went to War and Started a Revolution-Sarah Crichton Books (2013).epub

3.3 MB

Jon Louis Bentley-More Programming Pearls_ Confessions of a Coder (1988).pdf

11.3 MB

L. Lovász-Combinatorial problems and exercises-North Holland (1993).djvu

4.0 MB

Nelsen R.-Proofs without words 1. Exercises in visual thinking-MAA (1993).djvu

2.8 MB

Nelsen R.-Proofs without words 2. More exercises in visual thinking-MAA (2000).djvu

4.7 MB

Peteris Krumins-Perl One-Liners_ 130 Programs That Get Things Done-No Starch Press (2013).epub

1.3 MB

Raymond M. Smullyan-To mock a mockingbird and other logic puzzles_ Including an amazing adventure in combinatory logic-Knopf (1985).djvu

1.3 MB

Scott Rosenberg-Dreaming in Code_ Two Dozen Programmers, Three Years, 4,732 Bugs, and One Quest for Transcendent Software-Crown (2007).epub

527.5 KB

Steven Levy-Hackers_ Heroes of the Computer Revolution - 25th Anniversary Edition-O'Reilly Media (2010).epub

1.1 MB

The Little Book of Semaphores.pdf

1.0 MB

The Unix Haters Handbook .pdf

3.6 MB

Tracy Kidder-The Soul of A New Machine-Back Bay Books (2000).epub

284.0 KB

/.../32 - Must read/

(Addison-Wesley Signature Series) Martin Fowler-Patterns of Enterprise Application Architecture-Addison-Wesley Professional (2002).pdf

5.3 MB

(MIT Electrical Engineering and Computer Science) Harold Abelson, Gerald Jay Sussman-Structure and Interpretation of Computer Programs - 2nd Edition-The MIT Press (1996).pdf

9.4 MB

Alan Cooper-Inmates Are Running the Asylum, The_ Why High-Tech Products Drive Us Crazy and How to Restore the Sanity-Sams, (2004).pdf

3.8 MB

Alfred V. Aho, Monica S. Lam, Ravi Sethi, Jeffrey D. Ullman-Compilers - Principles, Techniques, and Tools-Pearson_Addison Wesley (2006).pdf

6.1 MB

Andrew Hunt, David Thomas-The Pragmatic Programmer_ From Journeyman to Master-addison-wesley (1999).pdf

2.4 MB

Charles E. Leiserson, Ronald L. Rivest, Clifford Stein, Thomas H. Coreman-Introduction to Algorithms_ Instructor’'s Manual (2005).pdf

1.7 MB

Charles Petzold-Code_ The Hidden Language of Computer Hardware and Software-Microsoft Press (2000).epub

6.2 MB

Douglas R. Hofstadter-Gödel, Escher, Bach_ An Eternal Golden Braid (Twentieth-Anniversary Edition)-Basic Books (1999).pdf

32.8 MB

Erich Gamma, Richard Helm, Ralph Johnson, John M. Vlissides-Design Patterns_ Elements of Reusable Object-Oriented Software -Addison-Wesley Professional (1994).pdf

19.2 MB

Frederick P. Brooks-The Mythical Man-Month_ Essays on Software Engineering, Anniversary Edition (2nd Edition)-Addison-Wesley Professional (1995).pdf

20.3 MB

Joshua Bloch-Effective Java-Prentice Hall PTR (2008).pdf

2.2 MB

Martin Fowler, Kent Beck, John Brant, William Opdyke, Don Roberts-Refactoring_ Improving the Design of Existing Code-Addison-Wesley Professional (1999).pdf

2.4 MB

Michael Feathers-Working Effectively with Legacy Code-Prentice Hall (2004).epub

4.0 MB

Peter Seibel-Coders at Work_ Reflections on the Craft of Programming-Apress (2009).pdf

5.6 MB

Robert C. Martin-Clean Code_ A Handbook of Agile Software Craftsmanship-Prentice Hall (2008).pdf

3.1 MB

Steve McConnell-Code Complete_ A Practical Handbook of Software Construction-Microsoft Press (2004).pdf

10.2 MB

Thomas H. Cormen, Charles E. Leiserson, Ronald L. Rivest, Clifford Stein-Introduction to Algorithms, Third Edition (2009).pdf

5.6 MB

Tom DeMarco, Tim Lister-Peopleware_ Productive Projects and Teams-Addison-Wesley Professional (2013).pdf

4.3 MB

why the lucky stiff-Why's (poignant) Guide to Ruby.pdf

8.9 MB

/Cybersecurity Ebooks/AAA_smistare/

(Information science and statistics) Christopher M. Bishop-Pattern Recognition and Machine Learning-Springer (2006).pdf

8.5 MB

2014-apt-study.pdf

169.5 KB

15344.pdf

53.3 KB

Aamir Lakhani, Joseph Muniz-Penetration Testing with Raspberry Pi-Packt Publishing (2015).pdf

10.2 MB

Aaron Johns-Mastering Wireless Penetration Testing for Highly-Secured Environments-Packt Publishing (2015).pdf

12.9 MB

advanced-persistent-threat-id52631.pdf

83.8 KB

Allen Downey B.-Think Bayes-O'Reilly Media (2013).pdf

12.3 MB

analisi_tecnica_rsi_relative_strentgh_index_significato_formula_intepretazione_tempi_ed_esempi.pdf

408.5 KB

Bachaalany, Elias_ Koret, Joxean-The Antivirus Hacker's Handbook-Wiley (2015).pdf

5.9 MB

Bastian Ballmann-Understanding Network Hacks_ Attack and Defense with Python-Springer (2015).pdf

11.4 MB

Ben Clark-Rtfm_ Red Team Field Manual-CreateSpace Independent Publishing Platform (2014).pdf

10.7 MB

Chris Sanders and Jason Smith (Auth.)-Applied Network Security Monitoring. Collection, Detection, and Analysis (2014).pdf

39.2 MB

David Nathans-Designing and Building Security Operations Center-Syngress (2014).pdf

3.6 MB

Douglas Berdeaux-Penetration Testing with Perl-Packt Publishing - ebooks Account (2015).pdf

4.6 MB

Drew Conway, John Myles White-Machine Learning for Hackers-O'Reilly Media (2012).pdf

1.8 MB

FirstStrike_Plus.pdf

175.3 KB

Ivan Ristic-Bulletproof SSL and TLS_ Understanding and Deploying SSL_TLS and PKI to Secure Servers and Web Applications-Feisty Duck (2014).pdf

7.1 MB

J.J. MURPHY-ANALISI TECNICA DEI MERCATI FINANZIARI.pdf

16.2 MB

Jacob Perkins-Python 3 Text Processing with NLTK 3 Cookbook-Packt Publishing - ebooks Account (2014).pdf

1.7 MB

Jason Andress, Ryan Linn-Coding for Penetration Testers_ Building Better Tools -Syngress (2011).pdf

10.4 MB

Jay Jacobs, Bob Rudis-Data-Driven Security_ Analysis, Visualization and Dashboards-Wiley (2014).pdf

8.6 MB

Jennifer Golbeck-Introduction to Social Media Investigation_ A Hands-on Approach-Syngress (2015).pdf

62.2 MB

Jeremy Faircloth-Penetration Tester's Open Source Toolkit, Third Edition -Elsevier Science (2011).pdf

17.8 MB

Johnny Long, Bill Gardner, Justin Brown-Google Hacking for Penetration Testers-Syngress (2015).pdf

38.5 MB

Loraine Blaxter, Christina Hughes, Malcolm Tight-How to Research, 4th Edition -Open University Press (2010).pdf

1.3 MB

Luis Pedro Coelho, Willi Richert-Building Machine Learning Systems with Python-Packt Publishing (2015).pdf

6.8 MB

Lutz M.-Python pocket reference-O'Reilly (2014).pdf

2.5 MB

Matthew A. Russell-Mining the social web_ data mining Facebook, Twitter, LinkedIn, Google+, GitHub, and more-O'Reilly Media (2013).pdf

22.1 MB

Micha Gorelick, Ian Ozsvald-High Performance Python_ Practical Performant Programming for Humans-O'Reilly Media (2014).pdf

8.0 MB

Michael Collins-Network Security Through Data Analysis_ Building Situational Awareness-O'Reilly Media (2014).pdf

14.1 MB

Paulino Calderon Pale-Mastering Nmap Scripting Engine-Packt Publishing (2015).pdf

2.0 MB

Qing Li, Gregory Clark-Security Intelligence_ A Practitioner's Guide to Solving Enterprise Security Challenges-Wiley (2015).pdf

22.6 MB

Richard Lawson-Web Scraping with Python-Packt Publishing (2015).pdf

5.5 MB

Ryan Mitchell-Web Scraping with Python_ Collecting Data from the Modern Web-O'Reilly Media (2015).pdf

6.4 MB

Sam Newman-Building Microservices-O'Reilly Media (2015).pdf

5.0 MB

Steven Bird, Ewan Klein, Edward Loper-Natural Language Processing with Python-O'Reilly Media (2009).pdf

5.4 MB

The_Art_of_Human_Hacking.pdf

6.4 MB

Toby Segaran-Programming Collective Intelligence_ Building Smart Web 2.0 Applications-O'Reilly Media (2007).pdf

3.5 MB

Tyler Wrightson-Advanced Persistent Threat Hacking_ The Art and Science of Hacking Any Organization-McGraw-Hill (2015).pdf

11.1 MB

Wes McKinney-Python for Data Analysis-O'Reilly Media (2012).pdf

14.8 MB

wireless_hacking_presentation.pdf

2.3 MB

Yuxing Yan-Python for Finance-Packt Publishing - ebooks Account (2014).pdf

5.1 MB

Yves Hilpisch-Python for Finance_ Analyze Big Financial Data-O'Reilly Media (2014).pdf

11.0 MB

/.../Learning Penetration Testing with Python/

C# Programming From Problem Analysis to Program Design, 3rd Edition.pdf

58.3 MB

JavaScript by Example, 2nd Edition.pdf

28.2 MB

Learning Penetration Testing wi - Christopher Duffy.pdf

9.6 MB

Learning Penetration Testing with Python.pdf

9.6 MB

/Cybersecurity Ebooks/Antiviruses/

2012_EPP_CAR_Consumer_Exploit_Evasion_Defenses_0.pdf

275.5 KB

34591.pdf

1.1 MB

An Automated Online Packing Service for Optimal Antivirus Evasion.pdf

175.6 KB

Antivirus , Firewall evasion techiniques.pdf

633.7 KB

AV-Sandbox-Presentation_v2.0.pdf

257.8 KB

AV_Evasion.pdf

443.4 KB

avevasion-techniques.pdf

771.2 KB

BypassAVDynamics.pdf

1.0 MB

bypassing-av.pdf

1.1 MB

Evading Antivirus Metasploit Webcast.pdf

628.9 KB

evasive_threats.pdf

1.3 MB

Fighting_Advanced_Threats.pdf

2.1 MB

IJOPCM(vol.1.2.3.S.08).pdf

86.5 KB

MalWareBytes_sSecurity_IO#113914_Eguide_031714_LI#839558.pdf

775.3 KB

Practical Anti-virus Evasion - avevasion_pentestmag.pdf

362.2 KB

rp-nss-labs-corporate-exploit-evasion-defenses.pdf

189.6 KB

Ryan Linn - Getting Shells When Metasploit Fails - Sector 2012.pdf

673.5 KB

security-guide-how-to-evade-anti-virus-detection.pdf

172.0 KB

Testing antivirus engines to determine theireffectiveness as a security layer.pdf

570.7 KB

The Deathof AV DefenseinDepth _- revisiting Anti-Virus Software.pdf

2.4 MB

The State of the Veil Framework - Will Schroeder and Chris Truncer.pdf

744.6 KB

us-14-Mesbahi-One-Packer-To-Rule-Them-All-WP.pdf

2.5 MB

us-15-Xenakis-ROPInjector-Using-Return-Oriented-Programming-For-Polymorphism-And-Antivirus-Evasion-wp.pdf

724.3 KB

us-15-Xenakis-ROPInjector-Using-Return-Oriented-Programming-For-Polymorphism-And-Antivirus-Evasion.pdf

383.5 KB

Why_Antivirus_Fails_-_Daniel_Sauder.pdf

1.3 MB

why_malware_works_in_face_of_antivirus_software.pdf

793.8 KB

woot09-polypack-pres.pdf

1.9 MB

WP_SerialVariantEvasionTactics.pdf

1.2 MB

Writing Zero Days for Security - APT Penetration Testing Framework v1.0.pdf

3.7 MB

/Cybersecurity Ebooks/APT/

2014-apt-study.pdf

169.5 KB

advance-penetration-testing-kali-linux-training.pdf

36.1 KB

Advanced Penetration Testing for Highly Secured Environments.pdf

16.6 MB

Advanced Persistent Threat Hacking, The Art & Science.pdf

11.1 MB

b-advanced_persistent_threats_WP_21215957.en-us.pdf

3.1 MB

CybraryAdvancedPenSlides.pdf

2.4 MB

esg-apts-deep-discovery-whitepaper-en.pdf

494.0 KB

Syngress.Advanced.Persistent.Threat.Nov.2012.ISBN.1597499498.pdf

7.5 MB

Will Gragido, John Pirc-Cybercrime and Espionage_ An Analysis of Subversive Multi-Vector Threats-Syngress (2011).pdf

15.0 MB

/Cybersecurity Ebooks/Big Data/

Apress.Big.Data.Imperatives.Jun.2013.ISBN.1430248726.pdf

10.5 MB

Morgan.Kaufmann.Data.Warehousing.In.The.Age.Of.Big.Data.Jun.2013.ISBN.0124058914.pdf

17.2 MB

OReilly.Data.Science.For.Business.Aug.2013.ISBN.1449361323.pdf

15.2 MB

OReilly.Ethics.Of.Big.Data.Sep.2012.ISBN.1449311792.pdf

6.2 MB

Packt.Big.Data.Analytics.With.R.And.Hadoop.Nov.2013.ISBN.178216328X.pdf

3.2 MB

Wiley.Big.Data.Oct.2013.ISBN.1118739574(1).pdf

21.6 MB

Wiley.Big.Feb.2015.ISBN.1118965833.pdf

4.8 MB

Wiley.Data.May.2013.ISBN.111844714X.pdf

33.6 MB

Wiley.Data.Mining.May.2014.ISBN.1119977134.pdf

16.5 MB

Wiley.Making.2nd.Edition.Aug.2014.ISBN.1118407415.pdf

8.4 MB

/Cybersecurity Ebooks/CEH/

Advanced Python Programming.pdf

199.0 KB

Attacking The DNS Protocol.pdf

330.2 KB

CEH-Handbook-v2.0.pdf

56.6 MB

Certified Ethical Hacker 3.0 Official Course.pdf

27.1 MB

Hacking - CEH Cheat Sheet Exercises.pdf

336.2 KB

HII_Remote_and_Local_File_Inclusion_Vulnerabilities.pdf

1.9 MB

Pen_Testing_and_Ethical_Hacking_Study_Guide.pdf

1.7 MB

/Cybersecurity Ebooks/CEH/CEH 7&8/

CEHV7 - Module 01 - Introduction to Ethical Hacking.pdf

5.2 MB

CEHV7 - Module 02 - Footprinting and Reconnaissance.pdf

8.9 MB

CEHV7 - Module 03 - Scanning Networks.pdf

16.7 MB

CEHV7 - Module 04 - Enumeration.pdf

7.0 MB

CEHV7 - Module 05 - System Hacking.pdf

23.9 MB

CEHV7 - Module 06 - Trojans and Backdoors.pdf

15.2 MB

CEHV7 - Module 07 - Viruses and Worms.pdf

12.0 MB

CEHV7 - Module 08 - Sniffers.pdf

13.8 MB

CEHV7 - Module 09 - Social Engineering.pdf

11.1 MB

CEHV7 - Module 10 - Denial of Service.pdf

10.0 MB

CEHV7 - Module 11 - Session Hijacking.pdf

7.9 MB

CEHV7 - Module 12 - Hacking Webservers.pdf

12.3 MB

CEHV7 - Module 13 - Hacking Web Applications.pdf

24.7 MB

CEHV7 - Module 14 - SQL Injection.pdf

15.4 MB

CEHV7 - Module 15 - Hacking Wireless Networks.pdf

25.0 MB

CEHV7 - Module 16 - Evading IDS, Firewalls, and Honeypots.pdf

17.2 MB

CEHV7 - Module 17 - Buffer Overflow.pdf

8.7 MB

CEHV7 - Module 18 - Cryptography.pdf

7.4 MB

CEHV7 - Module 19 - Penetration Testing.pdf

10.9 MB

CEHV7- Certified Ethical Hacker Study Guide.pdf

7.0 MB

CEHV8 - Hacker Halted.pdf

1.2 MB

CEHV8 - Module 00 - Labs Countermeasures.pdf

101.5 KB

CEHV8 - Module 01 - Introduction to Ethical Hacking.pdf

4.1 MB

CEHV8 - Module 02 - Footprinting and Reconnaissance.pdf

8.2 MB

CEHV8 - Module 02 - Labs Footprinting and Reconnaissance.pdf

3.6 MB

CEHV8 - Module 03 - Labs Scanning Networks.pdf

6.8 MB

CEHV8 - Module 03 - Scanning Networks.pdf

8.7 MB

CEHV8 - Module 04 - Enumeration.pdf

4.0 MB

CEHV8 - Module 04 - Labs Enumeration.pdf

1.5 MB

CEHV8 - Module 05 - Labs System Hacking.pdf

4.8 MB

CEHV8 - Module 05 - System Hacking.pdf

14.7 MB

CEHV8 - Module 06 - Labs Trojans and Backdoors.pdf

4.4 MB

CEHV8 - Module 06 - Trojans and Backdoors.pdf

9.1 MB

CEHV8 - Module 07 - Labs Viruses and Worms.pdf

2.5 MB

CEHV8 - Module 07 - Viruses and Worms.pdf

5.1 MB

CEHV8 - Module 08 - Labs Sniffers.pdf

4.4 MB

CEHV8 - Module 08 - Sniffing.pdf

8.4 MB

CEHV8 - Module 09 - Labs Social Engineering.pdf

1.2 MB

CEHV8 - Module 10 - Denial of Service.pdf

5.1 MB

CEHV8 - Module 10 - Labs Denial of Service.pdf

523.9 KB

CEHV8 - Module 11 - Labs Session Hijacking.pdf

684.0 KB

CEHV8 - Module 11 - Session Hijacking.pdf

4.5 MB

CEHV8 - Module 12 - Hacking Webservers.pdf

6.0 MB

CEHV8 - Module 12 - Labs Hacking Webservers.pdf

1.3 MB

CEHV8 - Module 13 - Hacking Web Applications.pdf

12.5 MB

CEHV8 - Module 13 - Labs Hacking Web Applications.pdf

907.4 KB

CEHV8 - Module 14 - Labs SQL Injection.pdf

1.6 MB

CEHV8 - Module 14 - SQL Injection.pdf

7.2 MB

CEHV8 - Module 15 - Hacking Wireless Networks.pdf

12.7 MB

CEHV8 - Module 15 - Labs Hacking Wireless Networks.pdf

1.3 MB

CEHV8 - Module 16 - Hacking Mobile Platforms.pdf

7.3 MB

CEHV8 - Module 17 - Evading IDS, Firewalls, and Honeypots.pdf

6.8 MB

CEHV8 - Module 17 - Labs Evading IDS, Firewalls and Honeypots.pdf

2.4 MB

CEHV8 - Module 18 - Buffer Overflow.pdf

4.2 MB

CEHV8 - Module 18 - Labs Buffer Overflow.pdf

466.7 KB

CEHV8 - Module 19 - Cryptography.pdf

4.2 MB

CEHV8 - Module 19 - Labs Cryptography.pdf

1.9 MB

CEHV8 - Module 20 - Penetration Testing.pdf

4.6 MB

CEHV8 - References.pdf

2.9 MB

Cybercriminalité, Enquète sur les mafias qui envahissent le web.pdf

3.4 MB

Frankenstein Slides.pdf

2.0 MB

Les virus informatiques théorie, pratique et applications [584 pages].pdf

20.5 MB

Techniques virales avancées [292 pages].pdf

14.7 MB

/Cybersecurity Ebooks/CEH/CEH 2009/

CEH-Classroom-Lab-Setup-v6.pdf

1.6 MB

CEHv6 Module 00 Student Introduction.pdf

604.9 KB

CEHv6 Module 01 Introduction to Ethical Hacking.pdf

3.2 MB

CEHv6 Module 02 Hacking Laws.pdf

3.8 MB

CEHv6 Module 03 Footprinting.pdf

10.5 MB

CEHv6 Module 04 Google Hacking.pdf

4.4 MB

CEHv6 Module 05 Scanning.pdf

17.5 MB

CEHv6 Module 06 Enumeration.pdf

4.2 MB

CEHv6 Module 07 System Hacking.pdf

15.8 MB

CEHv6 Module 08 Trojans and Backdoors.pdf

9.5 MB

CEHv6 Module 09 Viruses and Worms.pdf

5.8 MB

CEHv6 Module 10 Sniffers.pdf

10.5 MB

CEHv6 Module 11 Social Engineering.pdf

5.3 MB

CEHv6 Module 12 Phishing.pdf

2.7 MB

CEHv6 Module 13 Hacking Email Accounts.pdf

1.9 MB

CEHv6 Module 14 Denial of Service.pdf

3.7 MB

CEHv6 Module 15 Session Hijacking.pdf

2.0 MB

CEHv6 Module 16 Hacking Webservers.pdf

5.1 MB

CEHv6 Module 17 Web Application Vulnerabilities.pdf

4.8 MB

CEHv6 Module 18 Web based Password Cracking Techniques.pdf

5.7 MB

CEHv6 Module 19 SQL Injection.pdf

3.4 MB

CEHv6 Module 20 Hacking Wireless Networks.pdf

13.6 MB

CEHv6 Module 21 Physical Security.pdf

3.2 MB

CEHv6 Module 22 Linux Hacking.pdf

6.4 MB

CEHv6 Module 23 Evading IDS Firewall and Honeypot.pdf

5.0 MB

CEHv6 Module 24 Buffer Overflows.pdf

1.4 MB

CEHv6 Module 25 Cryptography.pdf

4.3 MB

CEHv6 Module 26 Penetration Testing.pdf

5.9 MB

CEHv6 Module 28 Writing Virus Codes.pdf

613.4 KB

CEHv6 Module 29 Assembly Language Tutorial.pdf

1.0 MB

CEHv6 Module 30 Exploit Writing.pdf

2.1 MB

CEHv6 Module 31 Exploit Writing.pdf

244.7 KB

CEHv6 Module 32 Exploit Writing.pdf

656.2 KB

CEHv6 Module 33 Reverse Engineering Techniques.pdf

2.9 MB

CEHv6 Module 34 MAC OS X Hacking.pdf

1.3 MB

CEHv6 Module 35 Hacking Routers, Cable Modems and Firewalls.pdf

3.4 MB

CEHv6 Module 36 Hacking Mobile Phones, PDA and Handheld Devices.pdf

4.2 MB

CEHv6 Module 37 Bluetooth Hacking.pdf

2.6 MB

CEHv6 Module 38 VoIP Hacking.pdf

4.1 MB

CEHv6 Module 39 RFID Hacking.pdf

2.3 MB

CEHv6 Module 40 Spamming.pdf

2.8 MB

CEHv6 Module 41 Hacking USB Devices.pdf

1.9 MB

CEHv6 Module 42 Hacking Database Servers.pdf

1.7 MB

CEHv6 Module 43 Cyber Warfare- Hacking Al-Qaida and Terrorism.pdf

2.8 MB

CEHv6 Module 44 Internet Content Filtering Techniques.pdf

2.0 MB

CEHv6 Module 45 Privacy on the Internet.pdf

5.7 MB

CEHv6 Module 46 Securing Laptop Computers.pdf

2.0 MB

CEHv6 Module 47 Spying Technologies.pdf

4.5 MB

CEHv6 Module 48 Corporate Espionage by Insiders.pdf

2.3 MB

CEHv6 Module 49 Creating Security Policies.pdf

2.2 MB

CEHv6 Module 50 Software Piracy and W.pdf

2.2 MB

CEHv6 Module 51 Hacking and Cheating Online Games.pdf

2.1 MB

CEHv6 Module 52 Hacking RSS and Atom.pdf

1.7 MB

CEHv6 Module 53 Hacking Web Browsers.pdf

2.0 MB

CEHv6 Module 54 Proxy Server Technologies.pdf

2.4 MB

CEHv6 Module 55 Preventing Data Loss.pdf

3.9 MB

CEHv6 Module 56 Hacking Global Positioning System.pdf

2.2 MB

CEHv6 Module 57 Computer Forensics and Incident Handling.pdf

2.6 MB

CEHv6 Module 58 Credit Card Frauds.pdf

2.2 MB

CEHv6 Module 59 How to Steal Passwords.pdf

1.6 MB

CEHv6 Module 60 Firewall Technologies.pdf

3.0 MB

CEHv6 Module 61 Threats and Countermeasures.pdf

1.0 MB

CEHv6 Module 62 Case Studies.pdf

731.0 KB

CEHv6 Module 63 Botnets.pdf

1.2 MB

CEHv6 Module 64 Economic Espionage.pdf

668.9 KB

CEHv6 Module 65 Patch Management.pdf

7.4 MB

CEHv6 Module 66 Security Convergence.pdf

645.7 KB

CEHv6 Module 67 Identifying the Terrorists.pdf

1.8 MB

prova 312-50.pdf

2.9 MB

/Cybersecurity Ebooks/CEH/CEH 2010/

CEH Official Certified Ethical Hacker Review Guide (2010) CT.pdf

8.4 MB

CEH v01 Ethical Hacking & Countermeasures Attack Phases (2010) CT.pdf

17.9 MB

CEH v02 Ethical Hacking & Countermeasures Threats & Defense Mechanisms (2010) CT.pdf

16.0 MB

CEH v03 Ethical Hacking & Countermeasures Web Applications & Data Servers (2010) CT.pdf

14.1 MB

CEH v04 Ethical Hacking & Countermeasures Linux, Macintosh & Mobile Systems (2010) CT.pdf

6.7 MB

CEH v05 Ethical Hacking & Countermeasures Secure Network Infrastructures (2010) CT.pdf

8.3 MB

CHFI v01 Computer Forensics Investigation Procedures & Response (2010) CT.pdf

4.0 MB

CHFI v02 Computer Forensics Investigating Hard Disks, File & Operating Systems (2010) CT.pdf

10.8 MB

CHFI v03 Computer Forensics Investigating Data & Image Files (2010) CT.pdf

18.2 MB

CHFI v04 Computer Forensics Investigating Network Intrusions & Cyber Crimes (2010) CT.pdf

25.2 MB

CHFI v05 Computer Forensics Investigating Wireless Networks & Devices (2010) CT.pdf

5.6 MB

ECDR-ECVT v01 Disaster Recovery (2011) CT.pdf

9.5 MB

ECDR-ECVT v02 Virtualization Security (2011) CT.pdf

8.0 MB

ECSA v01 Security Analysis (2011) CT.pdf

21.3 MB

ECSA v02 Procedures & Methodologies (2011) CT.pdf

8.3 MB

ECSA v03 Network & Perimeter Testing (2011) CT.pdf

11.2 MB

ECSA v04 Communication Media Testing (2011) CT.pdf

13.0 MB

ECSA v05 Network Threat Testing (2011) CT.pdf

8.8 MB

ENSA v01 Network Defense; Fundamentals & Protocols (2011) CT.pdf

16.6 MB

ENSA v02 Network Defense; Security Policy & Threats (2011) CT.pdf

13.1 MB

ENSA v03 Network Defense; Perimeter Defense Mechanisms (2011) CT.pdf

6.0 MB

ENSA v04 Network Defense; Securing & Troubleshooting Network Operating Systems (2011) CT.pdf

13.8 MB

ENSA v05 Network Defense; Security & Vulnerability Assessment (2011) CT.pdf

13.0 MB

Network 5; Network Safety Certification (2011) CT.pdf

3.3 MB

Wireless 5; Wireless Safety Certification (2010) CT.pdf

3.5 MB

/Cybersecurity Ebooks/CEH/CEHv6/

Exploit Writing Using Metasploit Framework.pdf

656.2 KB

Module 03 Footprinting.pdf

10.5 MB

Module 04 Google Hacking.pdf

4.4 MB

Module 05 Scanning.pdf

17.5 MB

Module 06 Enumeration.pdf

4.2 MB

Module 07 System Hacking.pdf

15.8 MB

Module 08 Trojans and Backdoors.pdf

9.5 MB

Module 09 Viruses and Worms.pdf

5.8 MB

Module 10 Sniffers.pdf

10.5 MB

Module 11 Social Engineering.pdf

5.3 MB

Module 12 Phishing.pdf

2.7 MB

Module 13 Hacking Email Accounts.pdf

1.9 MB

Module 14 Denial of Service.pdf

3.7 MB

Module 15 Session Hijacking.pdf

2.0 MB

Module 16 Hacking Webservers.pdf

5.1 MB

Module 17 Web Application Vulnerabilities.pdf

4.8 MB

Module 18 Web based Password Cracking Techniques.pdf

5.7 MB

Module 19 SQL Injection.pdf

3.4 MB

Module 20 Hacking Wireless Networks.pdf

13.6 MB

Module 21 Physical Security.pdf

3.2 MB

Module 22 Linux Hacking.pdf

6.4 MB

Module 23 Evading IDS Firewall and Honeypot.pdf

5.0 MB

Module 24 Buffer Overflows.pdf

1.4 MB

Module 25 Cryptography.pdf

4.3 MB

Module 26 Penetration Testing.pdf

5.9 MB

Module 28 Writing Virus Codes.pdf

613.4 KB

Module 29 Assembly Language Tutorial.pdf

1.0 MB

Module 30 Exploit Writing.pdf

2.1 MB

Module 31 Windows Based Buffer Overflow Exploit Writing.pdf

244.7 KB

Module 33 Reverse Engineering Techniques.pdf

2.9 MB

Module 34 MAC OS X Hacking.pdf

1.3 MB

Module 35 Hacking Routers, Cable Modems and Firewalls.pdf

3.4 MB

Module 36 Hacking Mobile Phones, PDA and Handheld Devices.pdf

4.2 MB

Module 37 Bluetooth Hacking.pdf

2.6 MB

Module 38 VoIP Hacking.pdf

4.1 MB

Module 39 RFID Hacking.pdf

2.3 MB

Module 40 Spamming.pdf

2.8 MB

Module 41 Hacking USB Devices.pdf

1.9 MB

Module 42 Hacking Database Servers.pdf

1.7 MB

Module 43 Cyber Warfare- Hacking Al-Qaida and Terrorism.pdf

2.8 MB

Module 44 Internet Content Filtering Techniques.pdf

2.0 MB

Module 45 Privacy on the Internet.pdf

5.7 MB

Module 46 Securing Laptop Computers.pdf

2.0 MB

Module 47 Spying Technologies.pdf

4.5 MB

Module 48 Corporate Espionage by Insiders.pdf

2.3 MB

Module 49 Creating Security Policies.pdf

2.2 MB

Module 50 Software Piracy and Warez.pdf

2.2 MB

Module 51 Hacking and Cheating Online Games.pdf

2.1 MB

Module 52 Hacking RSS and Atom.pdf

1.7 MB

Module 53 Hacking Web Browsers.pdf

2.0 MB

Module 54 Proxy Server Technologies.pdf

2.4 MB

Module 55 Preventing Data Loss.pdf

3.9 MB

Module 56 Hacking Global Positioning System.pdf

2.2 MB

Module 57 Computer Forensics and Incident Handling.pdf

2.6 MB

Module 58 Credit Card Frauds.pdf

2.2 MB

Module 59 How to Steal Passwords.pdf

1.6 MB

Module 60 Firewall Technologies.pdf

3.0 MB

Module 61 Threats and Countermeasures.pdf

26.1 MB

Module 62 Case Studies.pdf

731.0 KB

Module 63 Botnets.pdf

1.2 MB

Module 64 Economic Espionage.pdf

668.9 KB

Module 65 Patch Management.pdf

7.4 MB

Module 66 Security Convergence.pdf

645.7 KB

Module 67 Identifying the Terrorists.pdf

1.8 MB

/Cybersecurity Ebooks/Computer Security/

Addison.Wesley.Crimeware.Understanding.New.Attacks.And.Defenses.Apr.2008.ISBN.0321501950.chm

10.8 MB

Addison.Wesley.The.Technical.And.Social.History.Of.Software.Engineering.Dec.2013.ISBN.0321903420.pdf

1.6 MB

Apress.Healthcare.Jun.2014.ISBN.1430266767.pdf

2.5 MB

McGraw.Hill.Principles.Of.Computer.Security.CompTIA.Security.Plus.And.Beyond.Lab.Manual.2nd.Edition.Dec.2010.ISBN.0071748563.pdf

5.8 MB

Syngress.The.Basics.Of.Digital.Privacy.May.2013.ISBN.0128000112.pdf

8.6 MB

/Cybersecurity Ebooks/Cryptography/

A cryptographic file system for unix.pdf

112.3 KB

ADVANCED ENCRYPTION STANDARD.pdf

1.4 MB

Attacking NTLM with Precomputed Hashtables.pdf

122.2 KB

Attacking Unbalanced RSA-CRT Using SPA.pdf

239.1 KB

Cryptanalysis of Hash Functions of the MD4-Family.pdf

933.8 KB

Cryptography.pdf

1.7 MB

D1T2 - Skyper - Cracking the GSM A5_1 Encryption in Seconds.pdf

3.6 MB

Defeating_Encryption.pdf

502.8 KB

DES.pdf

443.4 KB

Detecting and Defeating Government Interception Attacks Against SSL.pdf

607.2 KB

DETECTING HIDDEN MESSAGES USING HIGHER-ORDER STATISTICAL MODELS.pdf

171.3 KB

Detecting Hidden Messages Using Higher-Order Statistics and Support Vector Machines.pdf

506.5 KB

Detecting Steganographic Content on the Internet.pdf

840.9 KB

FUNDAMENTALS OF CRYPTOLOGY.pdf

3.0 MB

How to Break MD5 and Other Hash Functions.pdf

188.9 KB

Improved Collision Attack on Hash Function MD5.pdf

321.9 KB

Improved Collision Attack on MD5.pdf

163.9 KB

Information Hiding—A Survey.pdf

3.5 MB

IntroToCrypto.pdf

3.7 MB

Malicious Cryptography Techniques for Unreversable.pdf

1.3 MB

Malicious Cryptology and Mathematics 29700.pdf

293.1 KB

MD5.pdf

421.8 KB

MONOALPHABETIC UNILATERAL SUBSTITUTION.pdf

536.5 KB

On The Limits of Steganography.pdf

159.5 KB

Pen_Testing_and_Ethical_Hacking_Study_Guide.pdf

1.7 MB

PublicandPrivateKeyCryptographyWhitePaper-Dec2014.pdf

1.7 MB

Securing_Enterprise_Web_Applications_at_the_Source.pdf

2.1 MB

Serpent. A Proposal for the Advanced Encryption Standard.pdf

194.8 KB

steganography seeing the unseen by neil f. johnson.pdf

2.4 MB

Syndrome Decoding in the Non-Standard Cases.pdf

109.7 KB

Weakness in the key scheduling algorithm of RC4.pdf

289.6 KB

westfeld-pfitzmann-ihw99.pdf

988.0 KB

Wiley.Malicious.Cryptography.Exposing.Cryptovirology.Feb.2004.ISBN.0764549758.pdf

30.5 MB

/Cybersecurity Ebooks/Ethical Hacking/

Ethical Hacking.pdf

23.5 MB

McGraw.Hill.Gray.Hat.Hacking.4th.Edition.Jan.2015.ISBN.0071832386.pdf

33.9 MB

McGraw.Hill.Hacking.Exposed.Linux.3rd.Edition.Jul.2008.ISBN.0072262575.pdf

11.0 MB

McGraw.Hill.Hacking.Exposed.Network.Security.Secrets.And.Solutions.2nd.Edition.Oct.2000.ISBN.0072127481.pdf

8.4 MB

McGraw.Hill.Hacking.Exposed.Network.Security.Secrets.And.Solutions.3rd.Edition.Sep.2001.ISBN.0072193816.pdf

6.1 MB

/Cybersecurity Ebooks/Exploit/

Addison.Wesley.Exploiting.Software.How.To.Break.Code.Feb.2004.ISBN.0201786958.pdf

8.0 MB

Syngress.Zero.Day.Exploit.Countdown.To.Darkness.Aug.2004.ISBN.1931836094.pdf

3.9 MB

Wiley.The.Shellcoders.Handbook.2nd.Edition.Aug.2007.ISBN.047008023X.pdf

3.7 MB

/Cybersecurity Ebooks/Forensics/

Prentice.Hall.Network.Forensics.Jun.2012.ISBN.0132564718.pdf

20.8 MB

Sybex.Mastering.Windows.Network.Forensics.And.Investigation.2nd.Edition.Jun.2012.ISBN.1118163826.pdf

42.1 MB

Syngress.The.Basics.Of.Digital.Forensics.Mar.2012.ISBN.1597496618.pdf

7.0 MB

Wiley.Memory.Jul.2014.ISBN.1118825098.pdf

7.5 MB

/Cybersecurity Ebooks/Hadoop/

Dayong Du-Apache Hive Essentials-Packt Publishing - ebooks Account (2015).epub

1.4 MB

Getting Started with Impala.pdf

808.1 KB

Getting Started with Impala2.pdf

798.4 KB

hadoop-illuminated.pdf

9.5 MB

Hadoop.pdf

923.8 KB

John Russell-Getting Started with Impala_ Interactive SQL for Apache Hadoop-O'Reilly Media (2014).epub

208.1 KB

Manning.Hadoop.In.Practice.Oct.2012.ISBN.1617290238.pdf

15.5 MB

OReilly.Apache.Sqoop.Cookbook.Jul.2013.ISBN.1449364624.pdf

9.0 MB

OReilly.Hadoop.Operations.Oct.2012.ISBN.1449327052.pdf

7.7 MB

OReilly.Hadoop.The.Definitive.Guide.3rd.Edition.May.2012.ISBN.1449311520.pdf

14.5 MB

orielly-cloudera-impala-ebook.pdf

6.5 MB

Packt.Hadoop.Beginners.Guide.Feb.2013.ISBN.1849517304.pdf

12.0 MB

Packt.Hadoop.Cluster.Deployment.Nov.2013.ISBN.1783281715.pdf

4.5 MB

Packt.Learning.Cloudera.Impala.Dec.2013.ISBN.1783281278.pdf

2.9 MB

/Cybersecurity Ebooks/Javascript/

Apress.Pro.Data.Visualization.Using.R.And.JavaScript.Jun.2013.ISBN.1430258063.pdf

9.2 MB

Apress.Pro.PHP.And.JQuery.Add.Quick.Smooth.And.Easy.Interactivity.To.Your.PHP.Sites.With.JQuery.Jun.2010.ISBN.1430228474.pdf

11.4 MB

Manning.Secrets.Of.The.JavaScript.Ninja.Dec.2012.ISBN.193398869X.pdf

15.6 MB

Morgan.Kaufmann.Object.Oriented.Construction.Handbook.Oct.2004.ISBN.1558606874.pdf

6.3 MB

No.Starch.The.Principles.Of.Object.Oriented.JavaScript.Feb.2014.ISBN.1593275404.pdf

2.7 MB

OReilly.JavaScript.Testing.With.Jasmine.Apr.2013.ISBN.1449356370.pdf

1.5 MB

OReilly.JQuery.Cookbook.Solutions.And.Examples.For.JQuery.Developers.Dec.2009.ISBN.0596159773.pdf

6.0 MB

OReilly.Programming.JavaScript.Applications.Jul.2014.ISBN.1491950293.pdf

8.5 MB

Packt.CoffeeScript.Programming.With.JQuery.Rails.And.Node.JS.Dec.2012.ISBN.1849519587.pdf

4.2 MB

Packt.Creating.2nd.Edition.Feb.2015.ISBN.1783555114.pdf

4.5 MB

Packt.Creating.Mobile.Apps.With.JQuery.Mobile.Apr.2013.ISBN.178216006X.pdf

4.1 MB

Packt.JQuery.Mobile.Cookbook.Nov.2012.ISBN.1849517223.pdf

4.7 MB

Packt.JQuery.UI.1.8.The.User.Interface.Library.For.JQuery.Aug.2011.ISBN.1849516529.pdf

7.5 MB

Packt.Object.Oriented.JavaScript.2nd.Edition.Jul.2013.ISBN.1849693129.pdf

2.2 MB

Packt.Object.Oriented.JavaScript.Create.Scalable.Reusable.High.Quality.JavaScript.Applications.And.Libraries.Jul.2008.ISBN.1847194141.pdf

7.5 MB

Packt.PHP.AJAX.Cookbook.Dec.2011.ISBN.1849513082.pdf

5.8 MB

Sitepoint.Javascript.Jan.2015.ISBN.0992461251.pdf

5.1 MB

SitePoint.JQuery.Novice.To.Ninja.2nd.Edition.Feb.2012.ISBN.0987153013.pdf

16.9 MB

/Cybersecurity Ebooks/Javascript/nodejs/

Alex R. Young, Marc Harter-Node.js in Practice-Manning (2015).pdf

7.6 MB

Basarat Ali Syed (auth.)-Beginning Node.js-Apress (2014).pdf

7.3 MB

Fernando Doglio (auth.)-Pro REST API Development with Node.js-Apress (2015).pdf

7.5 MB

Krasimir Tsonev-Node.js By Example-Packt Publishing - ebooks Account (2015).epub

2.0 MB

Mario Casciaro-Node.js Design Patterns-Packt Publishing (2014).pdf

15.4 MB

/Cybersecurity Ebooks/Kali tuts/

CreateSpace.Publishing.Basic.Security.Testing.With.Kali.Linux.Jan.2014.ISBN.1494861275.pdf

14.4 MB

Packt.Kali.Linux.Apr.2014.ISBN.184951948X.pdf

8.2 MB

Packt.Kali.Linux.Cookbook.Oct.2013.ISBN.1783289597.pdf

11.2 MB

Packt.Kali.Linux.CTF.Blueprints.Jul.2014.ISBN.1783985984.pdf

3.7 MB

Packt.Kali.Linux.Network.Scanning.Cookbook.Aug.2014.ISBN.1783982144.pdf

4.8 MB

Packt.Kali.Linux.Social.Engineering.Dec.2013.ISBN.1783283270.pdf

4.0 MB

Packt.Mastering.Kali.Linux.For.Advanced.Penetration.Testing.Jun.2014.ISBN.1782163123.pdf

9.4 MB

Packt.Web.Penetration.Testing.With.Kali.Linux.Sep.2013.ISBN.1782163166.pdf

20.2 MB

/Cybersecurity Ebooks/Malwares/

-Mobile Malware Attacks And Defense-Syngress (2011).pdf

11.2 MB

0x90.se_-_Malware_Analysis_-_Part_I.pdf

927.3 KB

03_La complessità del malware.pdf

4.2 MB

1507.06955v1.pdf

159.2 KB

34516.pdf

207.6 KB

34591.pdf

1.1 MB

Addison.Wesley.The.Art.Of.Computer.Virus.Research.And.Defense.Feb.2005.ISBN.0321304543.chm

7.0 MB

Aditya Sood and Richard Enbody (Auth.)-Targeted Cyber Attacks. Multi-staged Attacks Driven by Exploits and Malware-Syngress (2014).pdf

5.8 MB

Advanced Polymorphic Techniques.pdf

731.0 KB

botnets-detection-measurement-disinfection-defence.pdf

4.1 MB

darkhotel_kl_07.11.pdf

2.7 MB

darkhotelappendixindicators_kl.pdf

1.4 MB

Data Mining Tools for Malware Detection Mehedy Masud, Latifur Khan, Bhavani Thuraisingham--Auerbach Publications,CRC Press (2011).pdf

9.4 MB

Detect_Malware_w_Memory_Forensics.pdf

2.5 MB

fighter-pos-whitepaper-en.pdf

5.8 MB

Financial Malware Analysis - Secrets of ZeuS.pdf

642.5 KB

FireEye_AdvMalwareExposed.pdf

795.5 KB

Malware Analyst's Cookbook and DVD.pdf

9.4 MB

Mohssen Mohammed_ Al-Sakib Khan Pathan-Automatic defense against zero-day polymorphic worms in communication networks-Auerbach (2013).pdf

17.1 MB

No.Starch.Practical.Malware.Analisys.Mar.2012.ISBN.1593272901.pdf

9.9 MB

Packt.Cuckoo.Malware.Analysis.Oct.2013.ISBN.1782169237.pdf

7.5 MB

Pattern-Oriented-Diagnostics-Debugging-Malware-Analysis-Reversing.pdf

10.2 MB

Patterns of a Cooperative Malware Analysis Workflow.pdf

621.8 KB

Springer.Android.Malware.Jun.2013.ISBN.1461473934.pdf

3.6 MB

Springer.Computer.Viruses.And.Malware.Advances.In.Information.Security.Jul.2006.ISBN.0387302360.pdf

11.3 MB

Springer.Computer.Viruses.From.Theory.To.Applications.Sep.2005.ISBN.2287239391.pdf

2.8 MB

Springer.Malware.Forensics.Field.Guide.For.Windows.Systems.Jun.2012.ISBN.1597494720.pdf

29.7 MB

Spyware_Adware.pdf

3.7 MB

Syngress.Malware.Forensics.Field.Guide.For.Linux.Systems.Jan.2014.ISBN.1597494704.pdf

41.4 MB

Syngress.Malware.Forensics.Investigating.And.Analyzing.Malicious.Code.Jun.2008.ISBN.159749268X.pdf

26.2 MB

The.Rootkit.Arsenal.Escape.and.Evasion.in.the.Dark.Corners.of.the.System,Second.Edition.pdf

98.7 MB

WGM12349USEN.PDF

2.5 MB

/Cybersecurity Ebooks/Malwares/crypters/

419evolution [DataScrambler ].pdf

1.9 MB

18242.pdf

1.0 MB

Hyperion_ Implementation of a PE-Crypter.pdf

238.7 KB

Malware Obfuscation with Threat Emulation.pdf

381.0 KB

Malware1.pdf

2.6 MB

Malware_Magazine_1.pdf

5.7 MB

MITM ATTACK WITH PATCHING BINARIES ON THE FLY BY ADDING SHELLCODES.pdf

10.9 MB

NocONName_2012-Evadiendo_Antivirus-Uso_de_Crypters.pdf

32.2 MB

ScyllaHide.pdf

429.4 KB

UNPROTECTING THE CRYPTER.pdf

1.0 MB

Utilisation de Stub En VB.NET.pdf

556.7 KB

vb201407-VB6.pdf

348.5 KB

/Cybersecurity Ebooks/Malwares/mem injection/

DEFCON-20-King-Reflective-Injection-Detection.pdf

447.7 KB

fatkit_dll_rc3.pdf

101.9 KB

HS-P005_ReflectiveDllInjection.pdf

165.9 KB

lumension_reflective-memory-injection.pdf

404.5 KB

/Cybersecurity Ebooks/Malwares/vectors/

An7i Security.html

870.7 KB

Vulnerability analysis, Security Papers, Exploit Tutorials - Part 32480.html

21.8 KB

/.../An7i Security_files/

422439_10150655860234757_828564756_8927229_56595808_n.jpg

1.4 KB

4205868711-css_bundle_v2.css

43.0 KB

a.jpeg

1.6 KB

anon36.png

1.7 KB

arrow_dropdown.gif

0.1 KB

authorization.css

0.1 KB

Avatar.jpeg

1.8 KB

b36-rounded.png

0.8 KB

cbgapi.loaded_0

171.2 KB

cbgapi.loaded_1

37.1 KB

cbgapi.loaded_2

7.9 KB

comment-iframe.html

8.2 KB

css.css

0.3 KB

fastbutton.html

39.0 KB

icon18_edit_allbkg.gif

0.2 KB

icon18_wrench_allbkg.png

0.5 KB

icon_feed12.png

0.5 KB

openid36-rounded.png

1.3 KB

photo.jpg

1.8 KB

photo_002.jpg

1.8 KB

photo_003.jpg

1.5 KB

photo_004.jpg

1.6 KB

postmessageRelay.html

0.6 KB

shCore.css

6.2 KB

shThemeDefault.css

2.9 KB

subscribe-netvibes.png

1.4 KB

subscribe-yahoo.png

0.6 KB

/.../comment-iframe_data/

4079081201-cmtfp.css

16.6 KB

blank.gif

0.0 KB

close.gif

0.3 KB

/.../An7i Security_files/fastbutton_data/

photo.jpg

0.8 KB

/.../Vulnerability analysis, Security Papers, Exploit Tutorials - Part 32480_files/

codecolorer.css

11.4 KB

css.css

1.5 KB

css_002.css

0.7 KB

Defaults.css

22.4 KB

edb-2015-theme-logo641.png

19.9 KB

exploit.css

5.0 KB

font-awesome.css

30.5 KB

fotorama.css

15.1 KB

magnific-popup.css

9.2 KB

motioncss-responsive.css

2.1 KB

motioncss.css

43.3 KB

responsive.css

10.9 KB

settings.css

55.2 KB

style.css

184.6 KB

ultimate.css

471.3 KB

us_impreza_custom_styles.css

34.8 KB

wbt.css

181.5 KB

/Cybersecurity Ebooks/Malwares/worms/

CHAPTER 9 Strategies of Computer Worms.pdf

1.7 MB

jxia-JCS-wormdetection.pdf

434.0 KB

/Cybersecurity Ebooks/Metasploit Books/

Aditya Balapure-Learning Metasploit Exploitation and Development-Packt Publishing (2013).pdf

9.5 MB

Monika Agarwal, Abhinav Singh-Metasploit Penetration Testing Cookbook, Second Edition-Packt Publishing (2013).pdf

7.2 MB

No.Starch.Meta.Jun.2011.ISBN.159327288X.pdf

7.2 MB

Packt.Mastering.Metasploit.May.2014.ISBN.1782162224.pdf

14.8 MB

Packt.Metasploit.Jun.2012.ISBN.1849517428.pdf

5.2 MB

/.../1. Instant Metasploit Starter/

Instant Metasploit Starter - Ranganath, Karthik.epub

8.4 MB

Instant Metasploit Starter - Ranganath, Karthik.jpg

34.1 KB

Instant Metasploit Starter - Ranganath, Karthik.opf

1.2 KB

/.../2. Learning Metasploit Exploitation and Development/

Learning Metasploit Exploitation and Development - Balapure, Aditya.epub

26.0 MB

Learning Metasploit Exploitation and Development - Balapure, Aditya.jpg

39.8 KB

Learning Metasploit Exploitation and Development - Balapure, Aditya.opf

1.3 KB

/Cybersecurity Ebooks/MISC/

32719.pdf

1.8 MB

Blackhat-europe-09-Damele-SQLInjection-slides.pdf

256.6 KB

nsa.pdf

11.9 MB

Radware_DDoS_Handbook_2015.pdf

1.0 MB

/Cybersecurity Ebooks/Mobile/

OReilly.20.Recipes.For.Programming.PhoneGap.Apr.2012.ISBN.1449319548.pdf

6.7 MB

Packt.PhoneGap.3.X.Mobile.Application.Development.Hotshot.May.2014.ISBN.1783287926.pdf

6.1 MB

/Cybersecurity Ebooks/Modern Web/

No.Starch.The.Modern.Web.Apr.2013.ISBN.1593274874.pdf

8.6 MB

OReilly.Building.Hypermedia.APIs.With.HTML5.And.Node.Dec.2011.ISBN.1449306578.pdf

7.2 MB

OReilly.Building.Web.Apps.With.Ember.JS.Aug.20214.ISBN.1449370926.pdf

12.1 MB

OReilly.Enterprise.Web.Development.Building.HTML5.Jul.2014.ISBN.1449356818.pdf

46.2 MB

OReilly.Full.Stack.Web.Development.With.Backbone.JS.Jun.2014.ISBN.1449370985.pdf

6.7 MB

OReilly.Getting.Started.With.GEO.CouchDB.And.Node.JS.Aug.2011.ISBN.1449307523.pdf

7.2 MB

OReilly.Programming.3D.Applications.With.HTML5.And.WebGL.Mar.2014.ISBN.1449362966.pdf

67.1 MB

OReilly.Programming.HTML5.Applications.Nov.2011.ISBN.1449399088.pdf

8.4 MB

OReilly.Restful.Web.Services.Cookbook.Mar.2010.ISBN.0596801688.pdf

2.3 MB

OReilly.Restful.Web.Services.May.2007.ISBN.0596529260.pdf

3.2 MB

OReilly.Web.Development.With.Node.And.Express.Jul.2014.ISBN.1491949309.pdf

8.5 MB

Packt.Building.Impressive.Presentations.With.Impress.Dot.JS.Mar.2013.ISBN.1849696489.pdf

2.2 MB

Packt.Data.Visualization.With.D3.JS.Cookbook.Oct.2013.ISBN.178216216X.pdf

3.2 MB

Packt.Data.Visualization.With.D3.JS.Oct.2013.ISBN.1782160000.pdf

3.6 MB

Packt.Developing.Windows.Store.Apps.With.HTML5.And.JavaScript.Aug.2013.ISBN.1849687102.pdf

2.5 MB

Packt.Ember.Feb.2013.ISBN.1782163387.pdf

3.8 MB

Packt.Getting.Started.With.Memcached.Nov.2013.ISBN.1782163220.pdf

870.8 KB

Packt.HTML5.Graphing.And.Data.Visualization.Cookbook.Nov.2012.ISBN.1849693706.pdf

3.8 MB

Packt.HTML5.IPhone.Web.Application.Development.May.2013.ISBN.1849691029.pdf

9.2 MB

Packt.HTML5.Web.Application.Development.By.Example.Jun.2013.ISBN.1849695946.pdf

3.0 MB

Packt.Oracle.Application.Express.4.0.With.Ext.JS.Mar.2011.ISBN.1849681066.pdf

10.0 MB

Packt.Social.Data.Visualization.With.HTML5.And.JavaScript.Sep.2013.ISBN.1782166548.pdf

1.3 MB

Packt.Tableau.Data.Visualization.Cookbook.Aug.2013.ISBN.1849689784.pdf

3.7 MB

Wrox.Developing.Jul.2009.ISBN.0470414642.pdf

6.5 MB

/Cybersecurity Ebooks/Pentesting Books/

No.Starch.Black.Hat.Python.Dec.2014.ISBN.1593275900.pdf

2.8 MB

No.Starch.Gray.Hat.Python.Aug.2009.ISBN.1593271921.pdf

3.7 MB

/Cybersecurity Ebooks/Pentesting Books/PenTest/

33859.pdf

1.5 MB

Cisco.Press.Penetration.Testing.And.Network.Defense.Nov.2005.ISBN.1587052083.chm

15.3 MB

CRC.Press.Ethical.Hacking.And.Penetration.Testing.Guide.Aug.2014.ISBN.1482231611.pdf

23.5 MB

CreateSpace.Publishing.The.Hacker.Playbook.Mar.2014.ISBN.1494932636.pdf

27.4 MB

Linux Penetration Testing Laptop Setup v2.pdf

35.9 KB

Linux Penetration Testing Laptop Setup v4.pdf

88.3 KB

No.Starch.Penetration.Testing.Jun.2014.ISBN.1593275641.pdf

12.8 MB

Packt.Penetration.Testing.With.BackBox.Feb.2014.ISBN.1783282975.pdf

6.6 MB

Packt.Penetration.Testing.With.The.Bash.Shell.May.2014.ISBN.1849695105.pdf

3.6 MB

Penetration Testing Philipp Lachberger.pdf

317.1 KB

Penetration_Testing_Guidance_March_2015.pdf

1.1 MB

Syngress.Basics.2nd.Edition.Aug.2013.ISBN.0124116442.pdf

4.7 MB

Syngress.Hacking.And.Penetration.Testing.With.Low.Power.Devices.Sep.2014.ISBN.0128007516.pdf

8.7 MB

Syngress.Ninja.Hacking.Unconventional.Penetration.Testing.Tactics.And.Techniques.Sep.2010.ISBN.1597495883.pdf

10.3 MB

The Basics of Hacking and Penetration.pdf

3.9 MB

Wargames.pdf

302.1 KB

/.../Professional Penetration Testing 2E- Syngress 2013 [Epub]/

Professional Penetration Testing - Wilhelm, Thomas.epub

26.3 MB

Professional Penetration Testing Cover.jpg

191.9 KB

/.../The Basics of Web Hacking- Syngress 2013 [Epub]/

Basics of Web Hacking, The - Pauli, Josh.epub

3.7 MB

Basics of Web Hacking, The - Pauli, Josh.jpg

122.9 KB

Basics of Web Hacking, The - Pauli, Josh.opf

1.3 KB

/Cybersecurity Ebooks/PHP/

Apress.PHP.Dec.2010.ISBN.1430233184.pdf

5.0 MB

OReilly.PHP.Cookbook.3rd.Edition.Jul.2014.ISBN.144936375X.pdf

12.6 MB

OReilly.PHP.Web.Services.May.2013.ISBN.1449356567.pdf

10.7 MB

Packt.PHP.Oracle.Web.Development.Data.Processing.Security.Caching.XML.Web.Services.And.AJAX.Jul.2007.ISBN.1847193633.pdf

7.4 MB

Packt.Restfull.Oct.2008.ISBN.1847195520.pdf

13.3 MB

/Cybersecurity Ebooks/Physical devices/

Syngress.Black.Oct.2004.ISBN.193226681X.pdf

74.8 MB

/.../Python Programming Books/

byteofpython_120.pdf

240.4 KB

Head First Python.pdf

29.6 MB

No_Starch_Press_-_Gray_Hat_Python_-_Python_Programming_for_Hackers_and_Reverse_Engineers_[]_(2009)_en.pdf

3.2 MB

Packt.Python.Data.Visualization.Cookbook.Nov.2013.ISBN.1782163360.pdf

5.5 MB

Packt.Python.Penetration.Testing.Essentials.Feb.2015.ISBN.1784398586.pdf

3.3 MB

Python Cookbook 3rd Edition 2013.pdf

10.3 MB

Python Programming for the Absolute Beginner, 3rd Edition -nelly-.pdf

13.2 MB

thinkpython.pdf

835.2 KB

/.../Invent with Python/

Invent with Python.pdf

4.8 MB

/.../Invent with Python/Comp Files/

AISim1.py

9.1 KB

AISim2.py

9.4 KB

AISim3.py

11.6 KB

animation.py

2.7 KB

background.mid

7.2 KB

baddie.png

0.4 KB

bagels.py

2.3 KB

buggy.py

0.3 KB

cherry.png

0.4 KB

cipher.py

1.4 KB

collisionDetection.py

4.0 KB

dodger.py

7.1 KB

dragon.py

1.2 KB

gameover.wav

258.9 KB

guess.py

0.9 KB

hangman.py

4.1 KB

hello.py

0.2 KB

hello2.py

0.2 KB

jokes.py

0.4 KB

pickup.wav

8.5 KB

player.png

0.9 KB

pygameHelloWorld.py

1.9 KB

pygameInput.py

3.6 KB

reversi.py

10.1 KB

sonar.py

7.3 KB

spritesAndSounds.py

4.3 KB

tictactoe.py

6.3 KB

/.../Python Programming Books/Violent Python/

Violent Python - A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers.pdf

8.2 MB

/.../Python Programming Books/Violent Python/Companion Files/CH1/

1-vulnScanner.py

1.3 KB

2-passwdCrack.py

0.8 KB

3-zipCrack.py

1.0 KB

dictionary.txt

0.1 KB

evil.zip

35.8 KB

passwords.txt

0.1 KB

vuln-banners.txt

0.4 KB

/.../Python Programming Books/Violent Python/Companion Files/CH2/

1-portScan.py

1.7 KB

2-nmapScan.py

0.9 KB

3-botNet.py

1.1 KB

3-bruteKey.py

2.4 KB

3-pxsshCommand.py

0.4 KB

3-sshBrute.py

1.9 KB

3-sshCommand.py

1.1 KB

4-anonLogin.py

0.5 KB

4-bruteLogin.py

0.8 KB

4-defaultPages.py

0.6 KB

4-injectPage.py

0.6 KB

4-massCompromise.py

3.5 KB

5-conficker.py

3.2 KB

6-freeFloat.py

3.1 KB

pass.txt

0.0 KB

userpass.txt

0.1 KB

/.../Python Programming Books/Violent Python/Companion Files/CH3/

1-discoverNetworks.py

2.4 KB

2-dumpRecycleBin.py

1.0 KB

3-pdfRead.py

0.8 KB

4-exifFetch.py

1.8 KB

5-skypeParse.py

3.1 KB

6-firefoxParse.py

3.7 KB

7-iphoneMessages.py

1.6 KB

firefox_profile.zip

32.4 KB

skype_profile.zip

10.7 KB

/.../Python Programming Books/Violent Python/Companion Files/CH4/

1-geoIP.py

0.5 KB

2-printDirection.py

0.5 KB

3-geoPrint.py

1.3 KB

4-googleEarthPcap.py

1.6 KB

5-findDDoS.py

2.9 KB

6-spoofDetect.py

1.4 KB

7-testFastFlux.py

0.7 KB

8-testDomainFlux.py

0.6 KB

9-mitnickAttack.py

2.0 KB

10-idsFoil.py

2.3 KB

attack.pcap

10.0 MB

domainFlux.pcap

4.3 KB

download.pcap

1.0 KB

fastFlux.pcap

8.7 KB

geotest.kml

2.1 KB

geotest.pcap

0.7 KB

hivemind.pcap

0.5 KB

/.../Python Programming Books/Violent Python/Companion Files/CH5/

1-testSniff.py

0.4 KB

2-creditSniff.py

1.1 KB

3-hotelSniff.py

0.9 KB

4-googleSniff.py

1.1 KB

5-ftpSniff.py

1.0 KB

6-sniffHidden.py

0.8 KB

6-sniffProbe.py

0.4 KB

7-dup.py

1.4 KB

7-uavSniff.py

1.9 KB

8-fireCatcher.py

1.1 KB

9-btFind.py

0.5 KB

9-btScan.py

0.4 KB

10-iphoneFinder.py

0.9 KB

11-rfcommScan.py

0.4 KB

12-sdpScan.py

0.4 KB

13-ninjaPrint.py

0.3 KB

14-blueBug.py

0.4 KB

dup.py

1.4 KB

/.../Python Programming Books/Violent Python/Companion Files/CH6/

.project

0.4 KB

.pydevproject

0.3 KB

1-viewPage.py

0.2 KB

2-proxyTest.py

0.3 KB

3-userAgentTest.py

0.4 KB

4-printCookies.py

0.3 KB

5-kittenTest.py

0.3 KB

6-linkParser.py

1.1 KB

7-imageMirror.py

1.3 KB

8-anonGoogle.py

1.3 KB

8-googleJson.py

0.4 KB

8-googleJumbled.py

0.3 KB

9-twitterClass.py

2.6 KB

9-twitterGeo.py

2.1 KB

9-twitterInterests.py

2.4 KB

9-twitterRecon.py

1.3 KB

10-sendMail.py

0.8 KB

10-sendSpam.py

2.7 KB

anonBrowser.py

1.2 KB

anonBrowser.pyc

2.4 KB

mlb-cities.txt

0.3 KB

twitterClass.py

2.6 KB

/.../Python Programming Books/Violent Python/Companion Files/CH6/.svn/

entries

3.9 KB

/.../Python Programming Books/Violent Python/Companion Files/CH6/.svn/prop-base/

twitter.pyc.svn-base

0.1 KB

violent_browser.pyc.svn-base

0.1 KB

violent_email.pyc.svn-base

0.1 KB

violent_person.pyc.svn-base

0.1 KB

web_common.pyc.svn-base

0.1 KB

/.../Python Programming Books/Violent Python/Companion Files/CH6/.svn/text-base/

.project.svn-base

0.4 KB

.pydevproject.svn-base

0.3 KB

anon_scrape.py.svn-base

4.4 KB

basic_usage.py.svn-base

0.3 KB

create_browser.py.svn-base

0.8 KB

facebook.py.svn-base

1.8 KB

google.py.svn-base

0.9 KB

parse_webpage.py.svn-base

0.4 KB

phishing.py.svn-base

2.3 KB

quarkbase.py.svn-base

1.8 KB

simple_scrape.py.svn-base

2.9 KB

temp.html.svn-base

19.7 KB

test.py.svn-base

0.2 KB

twitter.py.svn-base

1.0 KB

twitter.pyc.svn-base

1.0 KB

twitter_interests.py.svn-base

1.2 KB

twitter_locate.py.svn-base

0.7 KB

violent_browser.py.svn-base

1.6 KB

violent_browser.pyc.svn-base

2.4 KB

violent_email.py.svn-base

0.7 KB

violent_email.pyc.svn-base

1.2 KB

violent_person.py.svn-base

3.9 KB

violent_person.pyc.svn-base

3.9 KB

web_common.py.svn-base

1.3 KB

web_common.pyc.svn-base

1.3 KB

/.../Python Programming Books/Violent Python/Companion Files/CH7/

1-bindshell.py

1.6 KB

2-virusCheck.py

2.5 KB

/Cybersecurity Ebooks/Reverse Engineering/

Practical Reverse Engineering.pdf

5.5 MB

/Cybersecurity Ebooks/Semantic web/

Academic.Press.Introduction.To.The.Semantic.Web.And.Semantic.Web.Services.Jun.2007.ISBN.1584889330.pdf

9.2 MB

IGI.Global.Semantic.Web.Services.Theory.Tools.And.Applications.Mar.2007.ISBN.159904045X.pdf

10.2 MB

IOS.Press.Ontology.And.The.Semantic.Web.Volume.156.Frontiers.In.Artificial.Intelligence.And.Applications.Apr.2007.ISBN.1586037293.pdf

2.0 MB

MIT.Press.A.Semantic.Web.Primer.2nd.Edition.Mar.2008.ISBN.0262012421.pdf

2.5 MB

OReilly.Programming.The.Semantic.Web.Jul.2009.ISBN.0596153813.pdf

6.5 MB

Springer.Agent.Based.Semantic.Web.Service.Composition.Aug.2012.ISBN.1461446627.pdf

3.3 MB

Springer.Modeling.Semantic.Web.Services.The.Web.Service.Modeling.Language.Jul.2008.ISBN.3540681698.pdf

4.6 MB

Springer.Ontology.Management.Semantic.Web.Semantic.Web.Services.And.Business.Applications.Dec.2007.ISBN.038769899X.pdf

3.9 MB

Springer.Sem.Apr.2013.ISBN.3642364020.pdf

13.0 MB

Springer.Semantic.Web.Concepts.Technologies.And.Applications.Jan.2007.ISBN.184628581X.pdf

4.6 MB

Wiley.Semantic.Web.And.Model.Driven.Engineering.Jun.2012.ISBN.1118004175.pdf

6.8 MB

/Cybersecurity Ebooks/Social Engineering/

Wiley.Social.Engineering.And.Nonverbal.Behavior.Set.Feb.2014.ISBN.1118906713.pdf

145.9 MB

Wiley.Social.Engineering.The.Art.Of.Human.Hacking.Dec.2010.ISBN.0470639539.pdf

6.4 MB

/.../Web Hacking Books/

32373.pdf

1.8 MB

33253.pdf

453.0 KB

33931.pdf

847.2 KB

how-to-instrument-for-advanced-web-application-penetration-testing.pdf

981.4 KB

Kali Linux Cookbook.pdf

10.9 MB

Nmap Cookbook The Fat-free Guide to Network Scanning.pdf

6.6 MB

No.Starch.The.Tangled.Web.Nov.2011.ISBN.1593273886.pdf

4.2 MB

Packt.Dreamweaver.CS6.Mobile.And.Web.Development.With.HTML5.CSS3.And.JQuery.Mobile.May.2013.ISBN.1849694745.pdf

9.7 MB

pfSense 2 Cookbook (2011).pdf

12.3 MB

SQL Injection Attacks and Defense - Justin Clarke.2ed.pdf

9.0 MB

Syngress.Hacking.Web.Apps.Sep.2012.ISBN.159749951X.pdf

23.0 MB

Syngress.SQL.Injection.Attacks.And.Defense.2nd.Edition.Jul.2012.ISBN.1597499633.pdf

6.7 MB

Syngress.Web.Application.Vulnerabilities.Detect.Exploit.Prevent.Dec.2007.ISBN.1597492094.pdf

21.9 MB

Syngress.XSS.May.2007.ISBN.1597491543.pdf

60.3 MB

XSS Attacks - Exploits and Defense.pdf

7.7 MB

/.../No.Starch.Metasploit.Jul.2011/

No.Starch.Metasploit.Jul.2011.epub

3.7 MB

No.Starch.Metasploit.Jul.2011.pdf

7.3 MB

/.../The Web Application Hacker's Handbook -Finding and Exploiting Security Flaws V413HAV/

The Web Application Hacker's Handbook -Finding and Exploiting Security Flaws V413HAV.pdf

14.2 MB

/.../Windows Server 2012 Inside Out V413HAV/

Read Me.txt

0.7 KB

Windows Server 2012 Inside Out V413HAV.epub

21.4 MB

Windows Server 2012 Inside Out V413HAV.pdf

34.8 MB

/.../Web-Game Dev/

Addison.Wesley.Learning.Android.Game.Programming.Dec.2011.ISBN.0321769627.pdf

11.5 MB

Addison.Wesley.Learning.HTML5.Game.Programming.A.Handson.Guide.To.Building.Online.Games.Using.Canvas.SVG.And.WebGL.Oct.2011.ISBN.0321767365.pdf

5.2 MB

Apress.Beginning.Android.Web.Apps.Development.May.2012.ISBN.1430239573.pdf

36.2 MB

Apress.Beginning.Facebook.Game.Apps.Development.Mar.2012.ISBN.1430241705.pdf

40.6 MB

Apress.Beginning.HTML5.Games.With.CreateJS.Mar.2014.ISBN.1430263407.pdf

8.9 MB

Apress.Beginning.PhoneGap.Mobile.Web.Framework.For.JavaScript.And.HTML5.Feb.2012.ISBN.1430239034.pdf

28.3 MB

Apress.Building.JavaScript.Games.Sep.2014.ISBN.1430265388.pdf

7.2 MB

Apress.Enchant.JS.May.2013.ISBN.1430247436.pdf

7.2 MB

Apress.HTML5.Games.Most.Wanted.Build.The.Best.HTML5.Games.Apr.2012.ISBN.1430239786.pdf

26.1 MB

Apress.Metro.Revealed.Building.Windows.8.Apps.With.HTML5.And.JavaScript.Jun.2012.ISBN.1430244887.pdf

1.5 MB

Apress.Pro.Android.Web.Apps.Develop.For.Android.Using.HTML5.CSS3.And.JavaScript.Feb.2011.ISBN.1430232765.pdf

14.1 MB

Apress.Pro.Windows.8.Development.With.HTML5.And.JavaScript.Nov.2012.ISBN.1430244011.pdf

52.9 MB

beginning Visual C#.pdf

32.2 MB

OReilly.Introducing.HTML5.Game.Development.Feb.2012.ISBN.1449315178.pdf

6.9 MB

Packt.Game.Development.With.Three.JS.Oct.2013.ISBN.1782168532.pdf

1.8 MB

Packt.HTML5.Game.Development.With.GameMaker.Apr.2013.ISBN.1849694109(1).pdf

9.0 MB

Packt.HTML5.Game.Development.With.ImpactJS.Mar.2013.ISBN.1849694567.pdf

5.4 MB

Wiley.HTML5.Games.Creating.Fun.With.HTML5.CSS3.And.WebGL.Dec.2011.ISBN.1119975085.pdf

11.5 MB

/.../wifi 802.11/

Addison.Wesley.Real.802.Dot.11.Security.WiFi.Protected.Access.And.802.Dot.11.I.Jul.2003.ISBN.0321136209.chm

3.1 MB

Addison.Wesley.WiFoo.The.Secrets.Of.Wireless.Hacking.Jul.2004.ISBN.0321202171.chm

7.1 MB

Cisco.Press.WiFi.Hotspots.Setting.Up.Public.Wireless.Internet.Access.Oct.2006.ISBN.1587052660.chm

9.1 MB

McGraw.Hill.Hacking.Exposed.Wireless.2nd.Edition.Aug.2010.ISBN.0071666613.pdf

11.6 MB

Newnes.Bulletproof.Wireless.Security.Jun.2005.ISBN.0750677465.pdf

3.5 MB

OReilly.802.Dot.11.Security.Dec.2002.ISBN.0596002904.pdf

933.9 KB

/Gentoomen Library/Operating Systems/Linux/

Assembly Language Step-by-Step - Programming with Linux, 3rd Edition.pdf

4.2 MB

For Dummies - Linux All in One Desk Reference.pdf

20.7 MB

For Dummies - Linux Timesaving Techniques.pdf

16.1 MB

Linux All-In-One Desk Reference For Dummies (Feb 2005).pdf

19.9 MB

Linux For Dummies, 6th Edition (Feb 2005).pdf

11.6 MB

No Starch Press - Linux Appliance Design.pdf

8.9 MB

No Starch Press - Linux Firewalls.pdf

6.8 MB

No Starch Press - Linux For Non-Geeks (2004).chm

15.5 MB

No Starch Press - Programming Linux Games.pdf

1.9 MB

O'Reilly - Linux Cookbook.chm

1.7 MB

O'Reilly - Linux Networking Cookbook.pdf

4.9 MB

O'Reilly - Linux Security Cookbook.chm

673.0 KB

O'Reilly Fedora Linux.chm

8.4 MB

O'Reilly Linux Desktop Hacks.chm

2.6 MB

O'Reilly Linux Device Drivers (3rd Edition).chm

1.4 MB

O'Reilly Linux in a Nutshell (5th Edition).chm

1.4 MB

O'Reilly Linux Kernel in a Nutshell.pdf

3.3 MB

O'Reilly Linux Multimedia Hacks.chm

1.7 MB

O'Reilly Linux Network Administrator's Guide (3rd Edition).chm

1.1 MB

O'Reilly Linux Server Hacks.chm

616.1 KB

O'Reilly Linux System Administration.pdf

2.9 MB

O'Reilly Linux System Programming.pdf

1.3 MB

O'Reilly LPI Linux Certification In A Nutshell (2nd Edition).chm

2.4 MB

O'Reilly Running Linux (5th Edition).chm

5.7 MB

O'Reilly SUSE Linux.chm

5.7 MB

O'Reilly Understanding The Linux Kernel (3rd Edition).pdf

11.0 MB

O'Reilly_-_Linux_Command_Directory.pdf

10.9 MB

OReilly - Linux Networking Cookbook.pdf

4.7 MB

OReilly.Building.Embedded.Linux.Systems.Aug.2008.eBook-DDU.pdf

4.4 MB

Red Hat Enterprise Linux 4 for Dummies (Apr 2005).pdf

13.9 MB

Red Hat Linux Fedora for Dummies.chm

5.3 MB

Red Hat Software - Linux Complete Command Reference.pdf

19.3 MB

Sams - Teach Yourself Linux in 24 Hours.pdf

12.6 MB

SUSE Linux 9.3 For Dummies (May 2005).pdf

11.1 MB

SUSE Linux 10 for Dummies.pdf

13.7 MB

Wiley.Linux.Bible.2009.Edition.Jan.2009.pdf

37.9 MB

/Gentoomen Library/Operating Systems/Linux/Cluster/

Linux Enterprise Cluster.chm

3.9 MB

OReilly High Performance Linux Clusters With Oscar Rocks openmosix And Mpi.chm

1.8 MB

/.../Core Linux Concepts (Kernel,Networking,FineTuning,Device Drivers,Thin Client)/

Linux Thin Client Networks Design and Deployment.pdf

5.5 MB

O'Reilly - Linux Device Drivers 2nd Edition.pdf

7.7 MB

OReilly Zero Configuration Networking The Definitive Guide.chm

999.7 KB

shell_scripting.pdf

14.3 MB

Understanding Linux Network Internals.chm

7.9 MB

/Gentoomen Library/Operating Systems/Linux/DNS/

Bind9 Administration Reference Manual.pdf

660.1 KB

DNS and BIND, 5th ed.chm

2.5 MB

Dns in Action A Detailed and Practical Guide to Dns.pdf

3.6 MB

Pro DNS and BIND.pdf

3.3 MB

/Gentoomen Library/Operating Systems/Linux/Essentials Books/

Backup And Recovery.pdf

2.8 MB

Ebook Teach Yourself Linux In 24 Hours Sharereactor.pdf

4.0 MB

Hacking Linux Exposed.pdf

101.7 MB

How Linux Works - What Every Super-User Should Know.chm

1.0 MB

Linux Annoyances For Geeks.chm

2.4 MB

Linux Bible 2008 Edition.pdf

27.0 MB

Linux Newbie Administrator Guide.pdf

662.0 KB

Linux The Complete Reference.pdf

9.3 MB

Linux Timesaving Techniques for Dummies.pdf

16.0 MB

Linux Troubleshooting For System Administrators And Power Users .chm

4.3 MB

Linux+ Certification_Bible.pdf

3.8 MB

O'Reilly - Essential System Administration 3rd Edition.chm

4.5 MB

O'Reilly - Learning Red Hat Enterprise Linux & Fedora 4th Edition.chm

4.6 MB

O'Reilly - Learning the bash Shell 2nd Edition.chm

651.3 KB

O'Reilly - Learning the Vi Editor 6th Edition.pdf

2.0 MB

O'Reilly - UNIX in a Nutshell 3rd Edition.chm

1.2 MB

O'Reilly - UNIX Power Tools 3rd Edition.chm

2.3 MB

OReilly Linux System Administration.pdf

3.6 MB

Red Hat Linux Security And Optimization.pdf

5.4 MB

User Mode Linux.chm

1.2 MB

/.../Essentials Networking (VPN,SNMP,Load Balancing)/

O'Reilly - Server Load Balancing.pdf

3.3 MB

OpenVPN - Building And Integrating Virtual Private Networks.pdf

9.8 MB

/.../IDS Firewall & Security/

Configuring IPCop Firewalls - Closing Borders With Open Source.pdf

11.3 MB

O'Reilly Building Internet Firewalls 2nd Edition.pdf

5.1 MB

O'Reilly - Building Secure Servers with Linux.chm

1.6 MB

O'Reilly - Building Secure Servers with Linux.pdf

3.0 MB

O'Reilly - Network Security with OpenSSL.pdf

2.5 MB

O'Reilly - RADIUS.chm

634.5 KB

Security Warrior.chm

4.7 MB

Snort For Dummies.pdf

7.4 MB

The Best Damn Firewall Book Period .pdf

22.6 MB

The Tao Of Network Security Monitoring - Beyond Intrusion Detection.chm

16.2 MB

/Gentoomen Library/Operating Systems/Linux/LDAP/

O'Reilly - LDAP System Administration.chm

1.2 MB

/Gentoomen Library/Operating Systems/Linux/Mail Servers/

No Starch Press - The Book of Postfix.pdf

56.3 MB

O'Reilly - Postfix The Definitive Guide.pdf

2.7 MB

O'Reilly SendMail Cookbook.chm

816.9 KB

OReilly sendmail 4th Edition.pdf

7.5 MB

Packtpub.Linux.Email.Nov.2009.pdf

4.1 MB

/Gentoomen Library/Operating Systems/Linux/NFS & NIS/

O'Reilly - Managing NFS and NIS 2nd Edt.pdf

2.0 MB

/Gentoomen Library/Operating Systems/Linux/Samba/

O'Reilly Samba 2nd Edition.chm

3.3 MB

/Gentoomen Library/Operating Systems/Linux/SELinux/

SELinux By Example - Using Security Enhanced Linux .chm

4.1 MB

/Gentoomen Library/Operating Systems/Linux/Squid/

O'Reilly - Squid The Definitive Guide.chm

1.1 MB

O'Reilly - Squid The Definitive Guide.pdf

4.4 MB

/Gentoomen Library/Operating Systems/Linux/SSH & VPN/

IPsec Virtual Private Network Fundamentals.chm

19.2 MB

O'Reilly - SSH The Secure Shell The Definitive Guide.pdf

3.3 MB

O'Reilly - The Secure Shell The Definitive Guide.pdf

3.3 MB

/.../Web Server - Apache/

O'Reilly Apache The Definitive Guide 3rd Edition.chm

909.1 KB

/Gentoomen Library/Programming/Assembly/

ARM Assembly Language Programming - Pete Cockerell.pdf

1.7 MB

Assembly Language for x86 Processors 6th Ed.pdf

3.1 MB

Assembly Language Step-by-Step Programming with DOS and Linux.chm

9.0 MB

Assembly Language, The True Language Of Programmers.pdf

5.2 MB

IA-32 Intel® Architecture Software Developer's Manual (Volume 1 - Basic Architecture).pdf

2.6 MB

Jones and Bartlett,Introduction to 80x86 Assembly Language and Computer Architecture.pdf

5.2 MB

Linux Assembly Language Programming 2000.pdf

2.6 MB

MASMReference.pdf

661.1 KB

MIPS Assembly Language Programming 2003.pdf

537.3 KB

Professional Assembly Language.pdf

6.9 MB

Springer - Guide to Assembly Language Programming in Linux.pdf

32.2 MB

The Art Of Assembly Language 2003.chm

18.4 MB

The art of Assembly Language 8086.pdf

4.5 MB

The Zen Of Assembly Language 1990 - Michael Abrash.pdf

2.6 MB

Windows Assembly Language & Systems Programming- 16 And 32 Bit Low-Level Programming for the PC and Windows 1997 - Barry Kauler.pdf

13.3 MB

Windows assembly language and systems programming 1997.pdf

13.3 MB

Write Great Code Understanding the Machine, Volume I.chm

8.6 MB

WRITE GREAT CODE, Vol. 2 Thinking Low-Level, Writing High-Level.pdf

4.5 MB

/Gentoomen Library/Programming/Lua/

Beginning Lua Programming - Wrox.pdf

8.9 MB

Beginning Lua programming.epub

2.6 MB

Lua 5.1 Reference Manual.chm

158.1 KB

Lua Performance Ricing.pdf

152.8 KB

Lua Programming Gems.pdf

136.4 KB

Lua Reference-Manual.pdf

491.0 KB

Programming in Lua Second Edition.pdf

1.7 MB

Programming in Lua.pdf

1.5 MB

Wrox - Beginning Lua Programming.pdf

3.6 MB

/Gentoomen Library/Programming/Networking/

802.11 Wireless Networks The Definitive Guide Oreilly Excellent.pdf

11.5 MB

/Informatyka/_ Informatyka (napomoc)/

Altheide C, Carvey H - Informatyka śledcza. Przewodnik po narzędziach open source.pdf

4.5 MB

Bourg D - Fizyka dla programistów gier.djvu

4.6 MB

Brookshear G - Informatyka w ogólnym zarysie [brak 228-231].pdf

34.8 MB

Cisek J - Tworzenie nowoczesnych aplikacji graficznych w WPF.pdf

14.0 MB

Corel PHOTO-PAINT 11. Podręcznik użytkownika.pdf

9.5 MB

Evans E, Noble J, Hochenbaum J - Arduino w akcji.pdf

16.6 MB

Evjen B, Hanselman S, Rader D - Zaawansowane programowanie ASP.NET 4 z wykorzystaniem C# i VB.pdf

50.9 MB

Farbaniec D - Techniki twórców złośliwego oprogramowania. Elementarz programisty.pdf

4.0 MB

Huzar Z - Wprowadzenie do UML.pdf

595.5 KB

Internet od A do Z.pdf

1.5 MB

Monk S - Arduino dla początkujących. Podstawy i szkice.pdf

17.6 MB

Nathan A - WPF 4.5. Księga eksperta.pdf

13.6 MB

Nie za krótkie wprowadzenie do systemu Latex 2.pdf

935.5 KB

Pilone D - UML. Leksykon kieszonkowy.pdf

4.0 MB

Pyrchla A - Bios. Leksykon kieszonkowy.pdf

2.5 MB

Rutkowski L - Metody i techniki sztucznej inteligencji.pdf

36.4 MB

Schwaber K, Sutherland J - Tworzenie oprogramowania w 30 dni. Programuj zwinnie i szybko.pdf

13.0 MB

Snell M, Powers L - Microsoft Visual Studio 2010. Księga eksperta.pdf

78.1 MB

Stallings W - Organizacja i architektura systemu komputerowego.pdf

108.9 MB

Stubblebine T - Wyrażenia regularne. Leksykon kieszonkowy. wyd 2.pdf

14.7 MB

Szczepankowski S - Optymalizacja Windows XP w praktyce.pdf

2.0 MB

Tanenbaum A, Steen M - Systemy rozproszone. Zasady i paradygmaty.pdf

22.7 MB

Tidwell J - Projektowanie interfejsów. Sprawdzone wzorce projektowe.pdf

12.6 MB

Williams A - MFC czarna księga.pdf

2.4 MB

Wojciech Mielczarek W - Szeregowe interfejsy cyfrowe.pdf

15.0 MB

Wrycza S - Informatyka ekonomiczna. Podręcznik akademicki.pdf

36.8 MB

Wrycza S, Marcinkowski B, Wyrzykowski K - Język UML 2.0 w modelowaniu systemów informatycznych [brak 160-1, 338-9].pdf

20.0 MB

Zygmunt Ryznar - Encyklopedia informatyki w pigułce.rar

1.8 MB

/Informatyka/_ Informatyka (napomoc) (1)/

Martin R - Czysty kod. Podręcznik dobrego programisty.pdf

7.7 MB

Vacca J - Computer and Information Security Handbook. 2 ed.pdf

73.9 MB

/.../_ Informatyka. Algorytmy (napomoc)/

Aho A, Hopcroft J, Ullman J - Algorytmy i struktury danych.pdf

89.4 MB

Aho A, Hopcroft J, Ullman J - Projektowanie i analiza algorytmow komputerowych.pdf

81.4 MB

Aho A, Sethi R, Ullman J - Kompilatory. Reguly metody i narzędzia.pdf

33.8 MB

Algorytmy cpp.7z

8.6 KB

Algorytmy i struktury danych. Rachunek macierzowy.pdf

146.4 KB

algorytmy rózne.7z

71.1 KB

Algorytmy. Podstawowe pojęcia.pdf

10.1 MB

Banachowski L, Diks K, Ritter W - Algorytmy i struktury danych. wyd 5.pdf

19.0 MB

Bartman J - Algorytmy.7z

5.9 MB

Berg, Kreveld, Overmars, Schwarzkopf - Geometria obliczeniowa. Algorytmy i zastosowania.pdf

16.2 MB

Bilski T, Chmiel K, Stokłosa J - Zbiór zadań ze złożoności obliczeniowej algorytmów [część].pdf

7.5 MB

Cichy B - Algorytmy i struktury danych.7z

3.0 MB

Cormen T, Leiserson C, Rivest R - Wprowadzenie do algorytmów. wyd 4.pdf

27.9 MB

Cormen, Leiserson, Rivest, Stein - Introduction to Algorithms. 3ed.pdf

5.1 MB

Czech Z - Analiza algorytmow.pdf

297.7 KB

Drozdek A - C++ Algorytmy i struktury danych.pdf

69.5 MB

geomalgorithms.com 2014.7z

960.8 KB

Grodzicki S - Geometria tras. Algorytmy obliczeń, komputerowo wspomagane obliczanie.pdf

28.2 MB

Harel D - Rzecz o istocie informatyki. Algorytmika.pdf

12.9 MB

Harris S, Ross J - Algorytmy. Od podstaw.pdf

96.5 MB

Koronacki J, Ćwik J - Statystyczne systemy uczące się. wyd 2.pdf

34.4 MB

Kotulski Z - Generatory liczb losowych.pdf

564.6 KB

Krzaczkowski J - Złożoność obliczeniowa problemów związanych z rozwiązywaniem równań.pdf

978.7 KB

Kwiatkowska A, Łukasik E - Schematy zwarte NS. Przyklady i zadania.pdf

16.8 MB

Nowak R - Algorytmy i struktury danych.pdf

383.9 KB

Pokojski J, Bonarowski J, Jusis J - Algorytmy.pdf

1.4 MB

Prałat P - Algorytmy i struktury danych.pdf

890.6 KB

Stephens R - Essential Algorithms.pdf

7.5 MB

Sysło M - Algorytmy.pdf

77.6 MB

Sysło M - Piramidy szyszki i inne konstrukcje algorytmiczne. ver.pdf

5.3 MB

Sysło M - Piramidy szyszki i inne konstrukcje algorytmiczne.pdf

65.6 MB

Sysło M, Deo N, Kowalik J - Algorytmy optymalizacji dyskretnej. wyd 3.pdf

44.4 MB

Wieczorkowski R, Zieliński R - Komputerowe generatory liczb losowych.doc

4.2 MB

Wieczorkowski R, Zieliński R - Komputerowe generatory liczb losowych.pdf

1.8 MB

Wirth N - Algorytmy + struktury danych = programy.pdf

52.4 MB

Wróblewski P - Algorytmy. Struktury danych i techniki programowania. wyd 2. ver.pdf

45.1 MB

Wróblewski P - Algorytmy. Struktury danych i techniki programowania. wyd 2.pdf

28.1 MB

www.algorytm.org 2014.7z

12.7 MB

Zaborski A - Metody sortowania.pdf

175.7 KB

Zelinka I, Snasel V, Abraham A - Handbook of Optimization. From Classical to Modern Approach.pdf

40.6 MB

/.../_ Informatyka. Asembler (napomoc)/

Drozdowski B - Jezyk Asembler dla kazdego.pdf

1.2 MB

Dudek A - Jak pisać wirusy.pdf

7.3 MB

Duntemann J - Zrozumieć Asembler.pdf

104.3 MB

Farbaniec D - Asembler. Leksykon kieszonkowy.pdf

10.0 MB

Gałka P, Gałka P - Podstawy Programowania Mikrokontrolera 8051. DSM51v2.7z

1.1 MB

Gałka P, Gałka P - Podstawy Programowania Mikrokontrolera 8051.pdf

3.6 MB

Hyde R - Asembler. Sztuka programowania.pdf

19.6 MB

Kruk S - Asembler. Kurs programowania dla średnio zaawansowanych.pdf

20.0 MB

Kruk S - Asembler. Podręcznik użytkownika.pdf

5.4 MB

Lista rozkazow 8080.pdf

156.3 KB

Michałek G - Asembler. Miniprzewodnik.pdf

8.0 MB

Wróbel E - Praktyczny kurs asemblera.pdf

23.3 MB

Wróbel E - Programowanie w języku asemblera MASM. Laboratorium.pdf

15.0 MB

/.../_ Informatyka. Bazy Danych. SQL (napomoc)/

Analityczne bazy danych i podstawy eksploracji danych.7z

21.7 MB

Banachowski, Chądzyńska, Matejewski, Stencel - Bazy danych. Wykłady i ćwiczenia. ver.pdf

13.7 MB

Banachowski, Chądzyńska, Matejewski, Stencel - Bazy danych. Wykłady i ćwiczenia.pdf

33.2 MB

Bazy Danych-Język zapytań SQL-Programowanie Proceduralne.pdf

644.7 KB

Beighley L - SQL. Rusz głową.pdf

30.5 MB

Beynon-Davies P - Systemy baz danych. wyd 3.pdf

79.1 MB

Bowman J, Emerson S, Darnovsky M - Podręcznik języka SQL.pdf

71.8 MB

Chałon M - Systemy Baz Danych.pdf

3.0 MB

Connolly T, Begg C - Systemy baz danych. T 1. Praktyczne metody.pdf

62.6 MB

Conway D, White J - Uczenie maszynowe dla programistów.pdf

23.8 MB

Czapla K - Bazy danych. Podstawy projektowania i języka SQL.pdf

3.1 MB

Eksploracja danych. mimuw.7z

24.6 MB

Feuerstein S - Oracle PLSQL. Najlepsze praktyki (11g).pdf

13.0 MB

Gennick J - SQL leksykon kieszonkowy. wyd2.pdf

3.3 MB

Gnybek J - Oracle łatwiejszy niż przypuszczasz. wyd 2.pdf

20.5 MB

Hand D, Mannila H, Smyth P - Eksploracja danych.pdf

36.5 MB

Jones A - C#. Księga przykładów.pdf

11.6 MB

Krótki kurs data mining.pdf

1.2 MB

Kukuczka J- Relacyjne Bazy Danych.pdf

4.3 MB

Larose D - Odkrywanie wiedzy z danych.pdf

50.9 MB

Mendrala D, Szeliga M - SQL. Praktyczny kurs. wyd 3.pdf

4.1 MB

Myszkorowski K - Sytemy baz danych.pdf

4.1 MB

Pelikant A - Hurtownie Danych. Od przetwarzania analitycznego do raportowania.pdf

6.7 MB

Podstawy eksploracji danych.7z

36.2 MB

Reese G - MySQL leksykon kieszonkowy. wyd 2.pdf

1.9 MB

Rockoff L - Język SQL. Przyjazny podręcznik.pdf

33.9 MB

Schwartz i in - Wysoko wydajne MySQL. Optymalizacja, archiwizacja, replikacja. wyd 2.pdf

7.9 MB

Statystyczne metody analizy danych.7z

30.6 MB

Wykłady z Administracji bazą danych Oracle 2010.7z

293.7 KB

/Informatyka/_ Informatyka. C (napomoc)/

Albahari J, Albahari B - C# 5.0. Leksykon kieszonkowy. wyd 3.pdf

7.4 MB

Allain A - C++. Przewodnik dla początkujacych.pdf

5.7 MB

Boduch A - Wstęp do programowania w języku C#.pdf

3.5 MB

Borkowski M - Wykład C.zip

272.7 KB

Borland C++ Builder 5.7z

7.8 MB

Eckel B - Thinking in C++. Edycja polska.pdf

19.4 MB

Gorazd T - Wstęp do Programowania C.C++.pdf

520.5 KB

Greene J, Stellman A - C#. Rusz głową. wyd 3.pdf

28.2 MB

Jabłonowski J - Programowanie obiektowe i C++.pdf

869.9 KB

Josuttis N - C++ Biblioteka standardowa. Podręcznik programisty. wyd 2.pdf

6.7 MB

Kaczmarek P - Programowanie zorientowane Obiektowo czyli klasy w języku C++.pdf

140.6 KB

Kempa A, Staś T - Wstęp do programowania w C#. wyd 2.0.pdf

3.2 MB

Kisilewicz J - Język C w środowisku Borland C++. wyd 4.pdf

2.0 MB

Kisilewicz J - Język C++. Programowanie obiektowe. wyd 3.pdf

10.1 MB

Kochan S - Objective-C. Vademecum profesjonalisty. wyd 3.pdf

22.8 MB

Koza Z - Język C++ pierwsze starcie.pdf

10.4 MB

Krzaczkowski J - Zadania z programowania w języku C C++. cz 1.pdf

794.8 KB

Krzaczkowski J - Zadania z programowania w języku C C++. cz 2.pdf

864.0 KB

Kubiak M - C# zadania z programowania z przykadowymi rozwiązaniami.pdf

1.5 MB

Kubiak M - C++ Zadania z programowania z przykładowymi rozwiązaniami.7z

3.0 MB

Kuczmarski K - Kurs C++.pdf

5.0 MB

Lis M - C#. Praktyczny kurs. wyd 3.pdf

8.7 MB

Lis M - C#. Ćwiczenia. wyd 3.pdf

5.6 MB

Matulewski J - Visual Studio 2013. Podręcznik programowania w C# z zadaniami.pdf

9.5 MB

Microsoft Visual C# 2012 Step By Step. Practice files.7z

40.8 MB

Mikołajczak J - Język C++ podstawy programowania.pdf

1.8 MB

Mysior M - C# w praktyce.pdf

6.4 MB

Orłowski S, Grabek M - C#. Tworzenie aplikacji sieciowych. Gotowe projekty.pdf

5.5 MB

Parę programów w C++ (nieco praktyki).pdf

813.4 KB

Prata C - Szkoła programowania. Język C. wyd 5.pdf

23.4 MB

Rao S - C++ dla każdego. wyd 7.pdf

16.4 MB

Stasiewicz A - C++. Ćwiczenia praktyczne. wyd 3.pdf

46.4 MB

Stasiewicz A - C++11. Nowy standard. Ćwiczenia.pdf

9.3 MB

Stroustrup B - Język C++ Kompendium wiedzy. wyd 4.pdf

9.6 MB

Stroustrup B - Język C++. wyd 6.pdf

6.3 MB

Tłuczek M - Programowanie w języku C. Ćwiczenia praktyczne. wyd 2.pdf

2.4 MB

Williams A - Język C++ i przetwarzanie współbieżne w akcji.pdf

4.1 MB

Wright C - C# Porady & metody.pdf

28.2 MB

Zychla W - C#. Programowanie pod Windows.pdf

1.9 MB

/Informatyka/_ Informatyka. C (napomoc) (1)/

Grębosz J - Symfonia C++. T 1.pdf

26.6 MB

Grębosz J - Symfonia C++. T 2.pdf

22.1 MB

Grębosz J - Symfonia C++. T 3.pdf

26.8 MB

Microsoft Visual C# 2012 Step By Step.pdf

139.7 MB

Żydzik K, Rak T - C# 6.0 i MVC 5. Tworzenie nowoczesnych portali internetowych.pdf

12.6 MB

/.../_ Informatyka. Database (napomoc)/

Access Database Design & Programming, 3rd Edition.pdf

2.4 MB

Beginning Database Design, 2nd Edition.pdf

14.9 MB

Connolly T, Begg C - Database Solutions.rar

30.5 MB

Database Systems 3ed.pdf

8.2 MB

Expert Oracle Database Architecture, 2nd Edition.pdf

7.6 MB

Expert Oracle Practices.pdf

6.4 MB

Learning Oracle Plsql.pdf

6.1 MB

Oracle Advanced PL_SQL Developer Professional Guide.pdf

6.0 MB

Oracle Database 11g Performance Tuning Recipes.pdf

33.5 MB

Oracle Essentials, 4th Edition.pdf

3.8 MB

Oracle Plsql Language Pocket Reference, 4th Edition.pdf

869.4 KB

Oracle Plsql Recipes.pdf

6.2 MB

/.../_ Informatyka. Database. Warehouse (napomoc)/

Abramson - Inmon vs Kimball.pdf

278.4 KB

Apress.Building.a.Data.Warehouse.With.Examples.in.SQL.Server.Dec.2007.pdf

12.7 MB

Building the Data Warehouse.pdf

12.5 MB

Business Driven Information Systems.pdf

35.6 MB

data warehouse.rar

2.2 MB

Data Warehousing Fundamentals Volume 1 Student Guide Oracle.pdf

2.2 MB

Data_Modeling_by_Example_a_Tutorial.pdf

1.5 MB

Dimension modeling.pdf

7.4 MB

From_ER_Models_to_Dimensional_Models_Part_I.pdf

350.8 KB

From_ER_Models_to_Dimensional_Models_Part_II.pdf

278.4 KB

Modelowanie danych [fragment].pdf

1.5 MB

RelationalModel.pdf

190.3 KB

The Data Warehouse ETL Toolkit.pdf

5.6 MB

The Data Warehouse Lifecycle Toolkit 2 toc.pdf

8.9 MB

The Data Warehouse Lifecycle Toolkit, 2nd Edition.pdf

9.2 MB

The Data Warehouse Toolkit, 3rd Edition.pdf

6.9 MB

Wróblewski J - Hurtownie danych.7z

4.3 MB

/.../_ Informatyka. English (napomoc)/

Ajax The Definitive Guide.pdf

16.0 MB

Beginning Ajax with PHP.pdf

4.3 MB

Blum R, Bresnahan C - Linux Command Line and Shell Scripting Bible. 2 Ed.pdf

9.0 MB

Bradford R - The Art of Computer Networking.pdf

2.4 MB

Css Pocket Reference, 4th Edition.pdf

4.6 MB

Head First jQuery.pdf

72.0 MB

Html Xhtml Pocket Reference, 4th Edition.pdf

2.7 MB

HTML5 The Missing Manual, 2nd Edition.pdf

61.3 MB

JavaScript & jQuery The Missing Manual, 2nd Edition.pdf

17.0 MB

Javascript Pocket Reference, 3rd Edition.pdf

6.8 MB

Learning PHP 5.pdf

2.1 MB

Learning PHP, MySQL, JavaScript and Css, 2nd Edition.pdf

18.6 MB

Learning Ruby.pdf

2.8 MB

Love R - Linux Kernel Development. 3 Ed.pdf

4.5 MB

Pro PHP and jQuery.pdf

12.9 MB

Professional Ajax, 2nd Edition.pdf

7.0 MB

Spurgeon C, Zimmerman J - Ethernet The Definitive Guide. 2 Ed.pdf

20.4 MB

Stutz M - Linux Cookbook. 2 Ed.pdf

8.5 MB

Xml Pocket Reference, 3rd Edition.pdf

695.1 KB

Zend Framework 2.0 by Example.pdf

5.8 MB

/.../_ Informatyka. Flash Photoshop (napomoc)/

ActionScript 3.0 for Adobe Flash Professional CS5. Classroom in a Book - files.url

0.1 KB

ActionScript 3.0 for Adobe Flash Professional CS5. Classroom in a Book. Instructor Notes.pdf

1.2 MB

ActionScript 3.0 for Adobe Flash Professional CS5. Classroom in a Book.pdf

62.3 MB

Adobe Flash Professional CS6 Classroom in a Book - files.URL

0.3 KB

Adobe Flash Professional CS6 Classroom in a Book.pdf

27.4 MB

Adobe Photoshop CS6 Classroom in a Book - files.URL

0.3 KB

Adobe Photoshop CS6 Classroom in a Book.pdf

61.3 MB

Kelby S - Photoshop CS4 PL. Pikantne efekty specjalne.pdf

57.2 MB

Owczarz-Dadan A - Photoshop CS3.pdf

35.1 MB

Peters K - AdvancED ActionScript 3.0. Animation.pdf

2.6 MB

Snider L - Adobe Photoshop CS6. Nieoficjalny podręcznik.pdf

30.1 MB

Ypenburg D - Actionscript 3.0.pdf

156.7 MB

Zapolski K - Adobe Illustrator. Podstawy.pdf

1.9 MB

/.../_ Informatyka. HTML (napomoc)/

Bunyan K - HTML 5. Tworzenie gier z wykorzystaniem CSS i JavaScript.pdf

32.1 MB

Burchard E - Tworzenie gier internetowych. Receptury HTML 5, JS.pdf

9.2 MB

Danowski B - Wstęp do HTML5 i CSS3.pdf

6.8 MB

Duckett J - HTML i CSS. Zaprojektuj i zbuduj witrynę WWW.pdf

23.0 MB

Freeman E, Robson E - HTML5. Rusz głową.pdf

28.1 MB

Gajda W - HTML, XHTML i CSS. Praktyczne projekty. wyd 2.pdf

8.6 MB

Gajda W - HTML5 i CSS3. Praktyczne projekty.pdf

12.4 MB

Goldberg K - XML Szybki start. wyd 2.pdf

13.5 MB

Head First HTML5 Programming.pdf

89.0 MB

HTML&CSS. design and build websites.pdf

19.7 MB

HTML5 and CSS3 Responsive Web Design Cookbook.pdf

6.1 MB

HTML5 Canvas Cookbook.pdf

4.2 MB

HTML5 Cookbook.pdf

21.9 MB

Kessin S - HTML5. Programowanie aplikacji.pdf

1.8 MB

Learn HTML5 by Creating Fun Games.pdf

6.6 MB

Lemay i in - HTML Vademecum Profesjonalisty.pdf

27.6 MB

Niederst J - HTML 4.0 leksykon Kieszonkowy.pdf

3.1 MB

Practical HTML5 Projects.pdf

48.5 MB

Pro HTML5 Accessibility.pdf

8.8 MB

Pro HTML5 Games.pdf

13.0 MB

Schafer S - HTML, XHTML i CSS. Biblia. wyd 5.pdf

34.5 MB

Seidelin J - HTML5. Tworzenie gier.pdf

4.6 MB

Weyl E - HTML5. Strony mobilne.pdf

26.3 MB

Wyke-Smith C - CSS. Witryny internetowe szyte na miarę. wyd 2.pdf

20.0 MB

/.../_ Informatyka. Java Javascript (napomoc)/

Ableson F, Sen R - Android w akcji. wyd 2.pdf

45.2 MB

Arnold K, Gosling J, Holmes D - The Java Programming Language. 4 ed.chm

2.3 MB

Benedetti R, Cranley R - jQuery. Rusz głową.pdf

31.2 MB

Bibeault B, Katz Y, Rosa A - jQuery w akcji. wyd 3.7z

98.1 MB

Borkowski M - Java.rar

783.6 KB

Cantelon M, Harter M, Holowaychuk T, Rajlich N - Node.js w akcji.pdf

7.7 MB

Collins C, Galpin M, Kaeppler M - Android w praktyce.pdf

20.7 MB

Conder S, Darcey L- Android. Programowanie aplikacji na urządzenia przenośne. Programy.zip

2.4 MB

Conder S, Darcey L- Android. Programowanie aplikacji na urządzenia przenośne. wyd 2. ver.pdf

76.3 MB

Conder S, Darcey L- Android. Programowanie aplikacji na urządzenia przenośne. wyd 2.pdf

129.7 MB

Darwin I - Android. Receptury.pdf

15.2 MB

Eckel B - Thinking In Java. wyd 4 [PL].pdf

114.6 MB

Evans B, Flanagan D - Java in a Nutshell. 6ed.pdf

6.6 MB

Goetz i in - Java. Współbieżność dla praktyków.pdf

42.0 MB

Griffiths D - Android. Programowanie aplikacji. Rusz głową.pdf

104.8 MB

Hall M - Java Script i Java Server Pages.pdf

4.3 MB

Horstmann C, Cornell G - Java. Podstawy. wyd 9.pdf

7.9 MB

Horstmann C, Cornell G - Java. Techniki zaawansowane. wyd 9.pdf

9.1 MB

Jade_Primer.zip

224.9 KB

Jendrock i in - Java EE 6. Zaawansowany przewodnik. wyd 4.pdf

5.2 MB

Kerfs J - Android. Programowanie gier na tablety.pdf

38.3 MB

Kochmer C, Frandsen E - JSL i XML.pdf

34.5 MB

Komatineni S, MacLean D, Hashimi S - Android 3. Tworzenie aplikacji.pdf

23.7 MB

Kubiak M - Java. Zadania z programowania z przykładowymi rozwiązaniami.pdf

1.3 MB

Lafore R - Java. Algorytmy i struktury danych.7z

63.4 MB

Lis M - Java. Ćwiczenia praktyczne. wyd 2.pdf

39.2 MB

Lis M - Java. Ćwiczenia zaawansowane.pdf.tmp

3.8 MB

Lis M - JavaScript. Praktyczny kurs [2009].pdf

4.8 MB

Lis M - JavaScript. Ćwiczenia praktyczne. wyd 3.pdf

3.2 MB

Lis M - JavaScript. Ćwiczenia praktyczne.doc

1.9 MB

Mehta B - REST. Najlepsze praktyki i wzorce w języku Java.pdf

40.3 MB

Rychlicki W - Programowanie w języku Java. Zbiór zadań z (p)odpowiedziami.pdf

22.5 MB

Sawyer McFarland D - JavaScript i jQuery. Nieoficjalny podręcznik.pdf

22.4 MB

Sierra K, Bates B - Java. Rusz głową. wyd 2.pdf

17.2 MB

Smołka J - Programowanie aplikacji dla systemu Android.pdf

38.0 MB

Stark J. - Android. Tworzenie aplikacji w oparciu o HTML CSS i JavaScript.pdf

2.2 MB

Stefanov S - Javascript dla programistów PHP.pdf

3.3 MB

Stpiczyński P, Brzuszek M - Programowanie współbieżne i rozproszone w języku Java.pdf

1.5 MB

Walczak K - Java. Nauka programowania dla początkujacych.7z

11.3 MB

Walls C - Spring w akcji. wyd 4.pdf

6.0 MB

Wantoch-Rekowski R - Android w praktyce. Projektowanie aplikacji.pdf

13.8 MB

Łupszaj A - Jade.7z

2.1 MB

/.../_ Informatyka. Kryptologia (napomoc)/

Abramson N - Teoria informacji i kodowania.pdf

5.6 MB

Bishop D - Introduction to Cryptography with Java Applets.pdf

10.2 MB

Borowiec R - Kodowanie i kryptografia.pdf

8.5 MB

Chudy W - Kłamcy profesjonalni. Praca dyplomaty i szpiega w ujęciu etyki.pdf

2.2 MB

Courtois N - Kryptografia wielu zmiennych.pdf

287.1 KB

Gaj K, Górski K, Zugaj A - Elementarz kryptologii. wyd 3.pdf

2.9 MB

Hoffstein J, Pipher J, Silverman J - An Introduction to Mathematical Cryptography.pdf

7.7 MB

Jacak W, Donderowicz W, Jacak J - Wstęp do informatyki i kryptografii kwantowej.pdf

1.3 MB

Jemec W - Kryptografia. Wyklad.pdf

423.5 KB

Karbowski M - Podstawy kryptografii. wyd 3.pdf

7.6 MB

Koblitz N - Wykład z teorii liczb i kryptografii.pdf

66.7 MB

Kozaczuk W - W kręgu enigmy.pdf

23.3 MB

Kryszewski W - Elementy kryptografii.pdf

1.6 MB

Kutyłowski M, Strothmann W - Kryptografia. Teoria i praktyka zabezpieczania systemów komputerowych.pdf

4.3 MB

Lunde P - Tajemnice szyfrów. Znaki Symbole Kody Kryptogramy.pdf

122.9 MB

Mochnacki W - Kody korekcyjne i kryptografia.pdf

2.3 MB

PHPsolutions 07-08.2006 - Kryptografia w PHP.pdf

8.1 MB

Stallings W - Kryptografia i bezpieczeństwo sieci komputerowych. wyd 5.pdf

25.5 MB

Stinson D - Kryptografia w teorii i praktyce. TAO.pdf

23.3 MB

Szczypiorski A - Wstęp do kryptografii sieciowej.pdf

2.2 MB

Szmidt J, Misztal M - Wstęp do kryptologii. wyd 3.pdf

12.5 MB

Tanaś R - Kryptografia kwantowa. Wykład popularny.pdf

617.6 KB

Tanaś R - Kryptografia. Wykład.pdf

636.1 KB

Wstęp do kryptologii. Skrypt WSiSiZ. 2006.pdf

912.9 KB

/.../_ Informatyka. Metaheurystyki (napomoc)/

Algorytm genetyczny. Slajdy.pdf

4.8 MB

Algorytmy decyzyjne i teoria złożoności. Wykłady.7z

114.8 KB

Algorytmy genetyczne i ewolucyjne. Artykuły.7z

29.5 MB

Algorytmy heurystyczne. Opracowania.7z

3.8 MB

Arabas J - Wyklady z algorytmow ewolucyjnych. ver.pdf

8.7 MB

Arabas J - Wyklady z algorytmow ewolucyjnych.pdf

6.5 MB

Arabas J - Wykłady z algorytmów ewolucyjnych. Oprogramowanie gabi.7z

210.2 KB

Bereta M - Algorytmy ewolucyjne. Wykład. Laboratorium.7z

6.9 MB

Bereta M - Metody klasyfikacji i rozpoznawania wzorców.7z

20.5 MB

Bieganowski J - Algorytmy genetyczne i procesy ewolucyjne. Wykład.7z

1.0 MB

Boryczka U - Algorytmy ewolucyjne. Materiały.7z

19.2 MB

Chambers L - The Practical Handbook of Genetic Algorithms. Application. 2 ed.pdf

23.6 MB

Chojnacki P - Generatory liczb losowych.pdf

186.1 KB

Delac K, Grgic M, Bartlett M - Recent Advances in Face Recognition.pdf

19.9 MB

Dorigo M, Stutzle T - Ant Colony Optimization.pdf

4.5 MB

Dudek G - Ekonomiczny rozdział obciążeń z zastosowaniem algorytmów ewolucyjnych. T 1.pdf

5.3 MB

El Ghazali Talbi - Metaheuristics. From Design to Implementation.pdf

5.2 MB

Floreano D, Mattiussi C - Bio-Inspired Artificial Intelligence. Theories, Methods, and Technologies.pdf

20.1 MB

Gendreau M, Potvin J Hadbook of Metaheuristics. 2 ed.pdf

5.8 MB

Goldberg D - Algorytmy genetyczne i ich zastosowania.pdf

49.1 MB

Grygiel K - Algorytmy.7z

2.4 MB

Grygiel K - Metaheurystyki. Notatki do wykładu.pdf

171.3 KB

Grygiel K - Metaheurystyki. Wykład 2005.7z

2.4 MB

Grygiel K - Metaheurystyki. Wykład 2012.7z

4.4 MB

Gwiazda T - Algorytmy genetyczne. Kompendium. T 1. Operator krzyżowania dla problemów numerycznych.pdf

16.9 MB

Hapke M - Modelowanie i Metaheurystyki. Wykład.7z

2.4 MB

Haupt R, Haupt S - Practical Genetic Algorithms. 2 ed.pdf

2.6 MB

Inteligencja obliczeniowa. AGH.7z

2.0 MB

Kaczyński P - Metody rozmyte i algorytmy ewolucyjne. Wykład.7z

2.3 MB

Komosiński M - Metaheurystyki. Metody optymalizacji.7z

9.2 MB

Luger G - Artificial Intelligence. Structures and Strategies for Complex Problem Solving. 5 ed.pdf

23.5 MB

Luque G, Alba A - Parallel Genetic Algorithms. Theory and Real World Applications.pdf

2.0 MB

Metaheurystyki. Artykuły.7z

4.3 MB

Metaheurystyki. Przykłady.7z

2.2 MB

Metaheurystyki. Uniwersytet Śląski.7z

26.5 MB

Michalewicz Z - Algorytmy genetyczne + struktury danych = programy ewolucyjne. wyd 2.pdf

22.2 MB

Michalewicz Z, Fogel D - Jak to rozwiązać czyli nowoczesna heurystyka.pdf

23.4 MB

Michel Gendreau, Jean-Yves Potvin - Handbook of Metaheuristics. 2 ed.pdf

5.8 MB

Mitchell M - An Introduction to Genetic Algorithms.pdf

2.2 MB

Molecki B - Algorytmy genetyczne a logika rozmyta.pdf

409.0 KB

Sean Luke - Essentials of Metaheuristics.pdf

5.1 MB

Sztangret Ł - Algorytmy ewolucyjne i automaty komórkowe. AGH.7z

3.4 MB

Tabu Search . Artykuły.7z

19.8 MB

Trojanowski K - Metaheurystyki parktycznie. wyd 2.pdf

68.3 MB

Trojanowski K - Metaheurystyki. Materiały pomocnicze.pdf

25.8 MB

Warsztaty algorytmów genetycznych. 2003.pdf

2.4 MB

Wróblewski J - Algorytmy genetyczne. Ćwiczenia.pdf

835.2 KB

Wróblewski J - Narzędzia sztucznej inteligencji.7z

2.5 MB

Xin She Yang - Engineering Optimization. An Introduction with Metaheuristic Applications.pdf

16.3 MB

/.../_ Informatyka. Metody numeryczne (napomoc)/

Analiza numeryczna.rar

448.4 KB

Bjorck A, Dahlquist G - Metody numeryczne.pdf

46.1 MB

Chwiej T - Metody numeryczne.7z

6.0 MB

Cichy B - Metody numeryczne.7z

939.1 KB

Demidowicz B, Maron I - Computational Mathematics.pdf

20.7 MB

Dudek-Dyduch Wąs i in - Metody numeryczne. Wybrane zagadnienia.pdf

8.3 MB

Fortuna Z, Macukow B, Wasowski J - Metody numeryczne.pdf

69.9 MB

Golec-Biernat K - Metody numeryczne dla fizyków.pdf

314.6 KB

Jankowscy M i J - Przegląd metod i algorytmów numerycznych. cz 1.pdf

23.0 MB

Jankowscy M i J - Przegląd metod i algorytmów numerycznych. cz 2.pdf

32.2 MB

Kincaid D, Cheney W - Analiza numeryczna.pdf

61.9 MB

Kosma Z - Metody i algorytmy numeryczne [2009].rar

3.1 MB

Kosma Z - Metody numeryczne dla zastosowań inżynierskich [2007].rar

2.9 MB

Kosma Z - Metody numeryczne dla zastosowań inżynierskich-Programy.rar

14.3 MB

Krupka Miękina Morawski Opalski - Wstęp do metod numerycznych dla studentów elektroniki.pdf

56.2 MB

Majchrzak E, Mochnacki B - Metody Numeryczne. Postawy teoretyczne, aspekty praktyczne i algorytmy.pdf

42.7 MB

Metody numeryczne. Politechnika Łódzka.rar

1.8 MB

Metody numeryczne. Politechnika Śląska.rar

2.1 MB

Moszyński K - Metody numeryczne dla informatyków.pdf

837.4 KB

Moszyński K - Metody numeryczne równań różniczkowych cząstkowych.pdf

441.2 KB

Numerical Recipes in C. 2ed.pdf

10.5 MB

Numerical Recipes in F77. Volume 1. 2ed.pdf

20.2 MB

Numerical Recipes in F90. Volume 2. 2ed.pdf

2.4 MB

Numerical Recipes. 3ed.pdf

21.4 MB

Pang Tao - Metody obliczeniowe w fizyce. Fizyka i komputery.pdf

47.7 MB

Pańczyk B, Łukasik E, Sikora J, Guziak T - Metody numeryczne w przykładach.pdf

3.5 MB

Popov O - Metody numeryczne i optymalizacja cz 1.pdf

23.8 MB

Potter D - Metody obliczeniowe fizyki. wyd 2. ver.pdf

53.0 MB

Potter D - Metody obliczeniowe fizyki. wyd 2.pdf

9.9 MB

Stoer J - Wstęp do metod numerycznych. T 1.pdf

22.0 MB

Szwabiński J. - Metody Numeryczne I.pdf

807.2 KB

Szwabiński J. - Metody Numeryczne II.7z

2.2 MB

Sędziwy S - Wstęp do metod numerycznych.pdf

877.6 KB

zagadnienia.7z

1.5 MB

/.../_ Informatyka. Pakiet R (napomoc)/

Biecek P - PogRomcy danych. Przetwarzanie danych w programie R.epub

7.8 MB

Biecek P - PogRomcy danych. Przetwarzanie danych w programie R.pdf

3.6 MB

Biecek P - PogRomcy danych. Wizualizacja i modelowanie.epub

11.3 MB

Biecek P - PogRomcy danych. Wizualizacja i modelowanie.pdf

11.6 MB

Biecek P - Przewodnik po pakiecie R [fragment].pdf

1.9 MB

Biecek P - Przewodnik po pakiecie R. ver.pdf

84.8 MB

Biecek P - Przewodnik po pakiecie R. wyd 3 [do str 168].pdf

1.7 MB

Biecek P - Przewodnik po pakiecie R.pdf

24.7 MB

Chang W - R Graphics Cookbook.pdf

10.0 MB

Komsta Ł - Wprowadzenie do środowiska R.pdf

992.0 KB

Nowak-Brzezińska A - Statystyczne metody analizy danych przy użyciu środowiska R.pdf

1.7 MB

Teetor P - R Cookbook.pdf

4.4 MB

/.../_ Informatyka. PHP (napomoc)/

Barney L, McLaughlin M - Oracle Database. Tworzenie aplikacji internetowych w AJAX i PHP.7z

15.1 MB

Bisz M - Ćwiczenia z. Język PHP.pdf

4.4 MB

Davis M, Philips J - PHP i MySQL. Wprowadzenie. wyd 2.pdf

14.9 MB

Gajda W - Symfony 2 od podstaw.pdf

5.1 MB

Gajda W - Symfony w przykładach.pdf

8.4 MB

Gilmore W - PHP i MySQL. Od podstaw. wyd 4.pdf

4.8 MB

Joshi V - PHP i jQuery. Receptury.pdf

8.0 MB

Lis M - jQuery. Ćwiczenia praktyczne.pdf

35.5 MB

Lis M - PHP 5 leksykon kieszonkowy.pdf

1.1 MB

Lis M - PHP 5. Praktyczny kurs. wyd 2.pdf

10.8 MB

Lis M - PHP i MySQL dla każdego. wyd 2.pdf

11.1 MB

Lis M - Tworzenie bezpiecznych aplikacji internetowych (z przykładami w PHP).pdf

12.4 MB

Majkowski W - jQuery. Tworzenie animowanych witryn internetowych.pdf

8.3 MB

Maskus P - Ćwiczenia z PHP i MySQL.pdf

15.7 MB

Matula T - Laravel. Tworzenie aplikacji. Receptury.pdf

27.7 MB

Nixon R - PHP, MySQL i JavaScript. Wprowadzenie. wyd 4.pdf

22.8 MB

PHP5, Apache i MySQL. Od podstaw.pdf

21.4 MB

Rutter J - Podręcznik jQuery. Interaktywne interfejsy internetowe.pdf

11.5 MB

Sanders W - PHP. Wzorce projektowe.pdf

6.1 MB

Shu-Wai Chow - PHP Web 2.0. Tworzenie aplikacji typu mashup.pdf

6.7 MB

Ullman L - PHP 6 i MySQL 5. Dynamiczne strony WWW. Szybki start.djvu

16.2 MB

Ullman L - PHP 6 i MySQL 5. Dynamiczne strony WWW. Szybki start.pdf

23.9 MB

Welling L, Thomson L - PHP i MySQL. Tworzenie stron WWW. Vademecum profesjonalisty. wyd 4.pdf

39.0 MB

Zandstra M - PHP Obiekty wzorce narzędzia. wyd 4.pdf

8.6 MB

/.../_ Informatyka. Programowanie (napomoc)/

Ahlersten K - An Introduction to Matlab.pdf

6.9 MB

Beazley D - Programowanie. Python.pdf

3.2 MB

Beazley D, Jones B - Python. Receptury. wyd 3.pdf

4.9 MB

Beck K - TDD. Sztuka tworzenia dobrego kodu.pdf

38.9 MB

Bentley J - Więcej perełek oprogramowania.pdf

24.1 MB

Borkowski P - AVR i ARM7. Programowanie mikrokontrolerów dla każdego [brak str 356].pdf

147.0 MB

Brozi A - Scilab w przykładach. ver.pdf

8.0 MB

Brozi A - Scilab w przykładach.pdf

41.6 MB

Cichoń J, Kobylański P - Wstęp do informatyki i programowania.pdf

1.1 MB

Coldwind G - Zrozumieć programowanie.pdf

11.8 MB

Dawson M - Python dla każdego. wyd 3.pdf

7.9 MB

Downey A - Myśl w języku Python. wyd 2.pdf

43.9 MB

Feathers M - Praca z zastanym kodem. Najlepsze techniki.pdf

4.9 MB

Hunt A, Thomas D - Pragmatyczny programista. Od czeladnika do mistrza.pdf

2.8 MB

Janczewski R - Python.7z

701.4 KB

Karbowski A - Programowanie równoległe i rozproszone.pdf

22.1 MB

Kierzkowski A - Turbo Pascal. Ćwiczenia praktyczne. wyd 2.pdf

15.8 MB

Kohl M - Introduction to statistical data analysis with R.pdf

10.5 MB

Lutz M - Python. Leksykon kieszonkowy. wyd 5.pdf

13.7 MB

Lutz M - Python. Wprowadzenie. wyd 4.pdf

63.6 MB

Martin R - Zwinne wytwarzanie oprogramowania.pdf

24.3 MB

Mazurek P - Delphi.7z

4.0 MB

Petzold C - Windows 8. Programowanie aplikacji z wykorzystaniem C# i XAML. wyd 6.pdf

56.3 MB

Rościszewski K, Wit R - Nauka Fortranu F90-95 przez przykłady dla początkujących.pdf

626.2 KB

RS 232C-Praktyczne programowanie.pdf

3.6 MB

Sadowski T - Turbo Pascal. Programowanie.pdf

1.1 MB

Sobierajski M, Łabuzek M - Programowanie w Matlabie dla elektryków.pdf

5.6 MB

Swacha J - Pascal. krótko.html

151.4 KB

Swacha J - Python.7z

91.5 KB

Weisfeld M - Myślenie obiektowe w programowaniu. wyd 4.pdf

5.5 MB

Wierzchołowski K - Turbo Pascal. Twój pierwszy program.pdf

1.3 MB

Zalewski A, Cegieła R - Matlab. Obiczenia numeryczne i ich zastosowania.pdf

12.1 MB

/.../_ Informatyka. Prolog (napomoc)/

Blackburn P, Bos J, Striegnitz K - Learn Prolog Now.pdf

500.6 KB

Bratko I - Prolog Programming For Artificial Intelligence.pdf

20.7 MB

Clocksin W, Mellish C - Prolog. Programowanie.pdf

4.8 MB

Csenki A - Prolog Techniques.pdf

3.9 MB

Dembski J - Prolog.7z

194.2 KB

Dembski J - Przykładowe sprawdziany.htm

10.8 KB

Fulmański P - Programowanie w logice. Prolog.pdf

849.5 KB

Haskell różności.7z

2.7 MB

Hett W - Prolog. Course. Problems.7z

821.1 KB

Ligęza A - Prolog w 33 minuty.pdf

106.8 KB

Michalski A - Programowanie deklaratywne.7z

1.7 MB

Nillson U, Małuszyński J - Logic, Programming and Prolog [2ed].pdf

2.0 MB

Nowak A - Prolog.pdf

368.9 KB

Programowanie deklaratywne, różne.7z

6.3 KB

Programowanie deklaratywne, zadania.7z

20.3 KB

Programowanie w języku logiki.7z

859.2 KB

Prolog różności.7z

398.0 KB

Słabosz M, Hayn Ł - Prolog.pdf

804.5 KB

/.../_ Informatyka. Rails Ruby (napomoc)/

Berry E - Rails. Leksykon kieszonkowy.pdf

3.5 MB

Elder J - Ruby on Rails. Tworzenie aplikacji WWW.pdf

3.5 MB

Flanagan D, Matsumoto Y - Ruby. Programowanie.pdf

14.1 MB

/.../_ Informatyka. Sieci (napomoc)/

802.pdf

243.4 KB

Anderson A, Benedetti R - Sieci komputerowe. Head First.pdf

35.4 MB

Comer D - Internetworking With TCPIP 1. 6ed.pdf

2.7 MB

Comer D - Internetworking With TCPIP 3. 2ed.pdf

8.5 MB

Frames & Headers.pdf

145.9 KB

IP.pdf

242.5 KB

IP_Header.pdf

96.9 KB

IP_Header_v6.pdf

95.1 KB

Józefiok A - Budowa sieci komputerowych na przełącznikach i routerach Cisco.pdf

44.4 MB

Kiziukiewicz B - Sieci lokalne.pdf

604.6 KB

Kurose J, Ross K - Sieci komputerowe. Od ogółu do szczegółu z internetem w tle. wyd 3.pdf

52.7 MB

Ochrona informacji w sieciach. Wykłady PW.7z

39.2 MB

Ramachandran V - BackTrack 5. Testy penetracyjne sieci WiFi.pdf

18.3 MB

Serafin M - Sieci VPN. Zdalna praca i bezpieczeństwo danych. wyd 2.pdf

4.7 MB

Sieci Komputerowe - Opracowanie.pdf

960.0 KB

Sieci komputerowe I.rar

11.6 MB

Sportack M - Sieci komputerowe. Księga eksperta.pdf

5.1 MB

Stallings W - Protokoły SNMP i RMON. Vademecum profesjonalisty.pdf

16.1 MB

Stevens W R - TCPIP Illustrated 1. 2ed.pdf

20.5 MB

Stevens W R - TCPIP Illustrated 1.pdf

2.9 MB

Stevens W R - TCPIP Illustrated 2.pdf

31.8 MB

Stevens W R - TCPIP Illustrated 3.pdf

3.1 MB

Stevens W R, Fall K - TCPIP od środka. Protokoły. wyd 2.pdf

42.0 MB

Tanenbaum A - Sieci komputerowe. wyd 4.pdf

48.5 MB

TCP state transition diagram.pdf

34.4 KB

TCP_Header.pdf

115.7 KB

Tutorial_Slides_Mib-intro.pdf

158.5 KB

UDP_ICMP_Headers.pdf

81.1 KB

Windows XP Tworzenie połączenia sieciowego.pdf

1.8 MB

Wszelak S - Administrowanie sieciowymi protokołami komunikacyjnymi.pdf

25.4 MB

/.../_ Informatyka. Sieci neuronowe (napomoc)/

Bartecki K - Sztuczne sieci neuronowe w zastosowaniach. Zbiór ćwiczeń.pdf

5.4 MB

Bartkowiak A - Sieci neuronowe.pdf

2.5 MB

Koch C - Neural Networks. Algorithms, Applications And Programming Techniques.pdf

10.8 MB

Korbicz J, Obuchowicz A, Uciński D - Sztuczne sieci neuronowe.pdf

58.0 MB

Osowski S - Sieci neuronowe w ujeciu algorytmicznym.pdf

65.4 MB

Osowski S - Sieci neuronowe.pdf

21.5 MB

Principe J, Euliano N, Lefebvre W - Neural and Adaptive Systems. Fundamentals Through Simulations.7z

3.0 MB

Rojas R - Neural Networks-A Systematic Introduction.pdf

4.6 MB

Tadeusiewicz i in - Odkrywanie właściwości sieci neuronowych przy użyciu programów w języku C#.pdf

42.4 MB

Tadeusiewicz R - Badanie właściwosci układow samodzielnych.pdf

3.6 MB

Tadeusiewicz R - Biocybernetyka.pdf

14.9 MB

Tadeusiewicz R - Elementarne wprowadzenie do techniki sieci neuronowych z przykładowymi programami.7z

46.0 MB

Tadeusiewicz R - Problemy biocybernetyki.pdf

18.3 MB

Tadeusiewicz R - Sieci neuronowe.pdf

48.5 MB

Tadeusiewicz R - Wprowadzenie do praktyki stosowania sieci neuronowych.pdf

590.0 KB

Taylor J - Mathematical Approaches to Neural Networks.pdf

6.5 MB

Żurada J, Barski M, Jędruch W - Sztuczne sieci neuronowe. Podstawy teorii i zastosowania.pdf

36.2 MB

/.../_ Informatyka. Systemy operacyjne (napomoc)/

Barczak A, Sidoruk T - Bezpieczeństwo systemów informatycznych zarządzania.pdf

44.0 MB

Bezpieczeństwo systemów komputerowych.7z

6.2 MB

Borkowski M - Systemy Operacyjne.rar

864.0 KB

Jasińska-Suwada A, Plichta S - Przewodnik do ćwiczeń. Systemy Operacyjne.pdf

13.3 MB

Rommel F - Active Directory. Odtwarzanie po awarii.pdf

52.6 MB

Silberschatz A - Podstawy Systemów Operacyjnych. wyd 5.pdf

84.7 MB

Stencel K - Systemy operacyjne.pdf

38.0 MB

/.../_ Informatyka. Tablice informatyczne (napomoc)/

CSS Tablice informatyczne.pdf

703.7 KB

Tablice informatyczne AJAX.pdf

4.5 MB

Tablice informatyczne ASP.NET.pdf

15.4 MB

Tablice informatyczne BIOS.pdf

2.2 MB

Tablice informatyczne C#. wyd 2.pdf

13.4 MB

Tablice informatyczne C++. wyd 2.pdf

2.5 MB

Tablice informatyczne C++.pdf

6.6 MB

Tablice informatyczne CSS.pdf

5.0 MB

Tablice informatyczne CSS3.pdf

13.1 MB

Tablice informatyczne Delphi.pdf

1.2 MB

Tablice informatyczne DOS.pdf

11.1 MB

Tablice informatyczne Drupal.pdf

12.1 MB

Tablice informatyczne HTML i XHTML.pdf

3.4 MB

Tablice informatyczne HTML.pdf

3.9 MB

Tablice informatyczne HTML5.pdf

2.8 MB

Tablice informatyczne Java Script.pdf

6.5 MB

Tablice informatyczne Java. wyd 3.pdf

376.9 KB

Tablice informatyczne Joomla.pdf

9.0 MB

Tablice informatyczne jQuery.pdf

11.9 MB

Tablice informatyczne Linux. wyd 3.pdf

12.3 MB

Tablice informatyczne MS Access 2003.pdf

4.8 MB

Tablice informatyczne MS Excel 2007 PL. Funkcje.pdf

4.7 MB

Tablice informatyczne MS Windows Server 2008.pdf

4.4 MB

Tablice informatyczne Oracle.pdf

15.3 MB

Tablice informatyczne Photoshop CS3PL.pdf

5.1 MB

Tablice informatyczne PHP 5.pdf

3.4 MB

Tablice informatyczne PHP.pdf

4.8 MB

Tablice informatyczne SQL. wyd 2.pdf

2.4 MB

Tablice informatyczne Turbo Pascal.pdf

5.4 MB

Tablice informatyczne VBA Excel.pdf

3.2 MB

Tablice informatyczne Windows Vista PL.pdf

4.4 MB

Tablice informatyczne Windows XP.pdf

4.6 MB

Tablice informatyczne WordPress.pdf

14.3 MB

Tablice informatyczne XML.pdf

5.6 MB

/.../_ Informatyka. Unix (napomoc)/

Borkowski M - unix.rar

558.5 KB

Cooper M - Advanced Bash-Scripting Guide.pdf

2.2 MB

Harlow E - Linux. Tworzenie aplikacji.pdf

5.7 MB

Haviland, Gray, Salama - UNIX, programowanie systemowe.pdf

25.8 MB

Kirch O, Dawson T - Linux. Podręcznik administratora sieci.pdf

3.5 MB

Lewis J - Najlepsze narzędzia w systemie Linux. Wykorzystaj ponad 70 receptur.pdf

10.9 MB

Linux - księga eksperta.rar

2.4 MB

Madeja L - Ćwiczenia z systemu Linux. Podstawy obsługi systemu.pdf

16.5 MB

Matthew N, Stones R - Zaawansowane programowanie w systemie Linux.pdf

12.4 MB

Ray D, Ray E - Po prostu Unix.pdf

42.4 MB

Sobell M - Linux. Programowanie w powłoce. Praktyczny przewodnik. wyd 3.pdf

9.1 MB

Sosna Ł - Linux. Komendy i polecenia. wyd 4.pdf

7.5 MB

Stevens W R - Programowanie w środowisku systemu UNIX.pdf

26.8 MB

Stevens W R - Programowanie zastosowań sieciowych w systemie Unix.pdf

27.2 MB

Stutz M - Linux. Najlepsze przepisy. wyd 2.pdf

21.3 MB

Taylor D - Wicked Cool Shell Scripts.pdf.rar

5.2 MB

Ward B - Jak działa Linux. Podręcznik administratora. wyd 2.pdf

47.4 MB

/.../_ Informatyka. Word Excel Acces (napomoc)/

=Edytorstwo komputerowe.rar

1.3 MB

acces excel word.rar

20.9 MB

Bajorek T - Excel, Matlab. Ćwiczenia.7z

6.0 MB

excel szkolenie.7z

116.5 MB

excel-333 - Zamiana tekstu na liczby.mp4

4.8 MB

Gonet M - Excel w obliczeniach naukowych i inżynierskich. wyd 2.pdf

20.2 MB

Mendrala D, Szeliga M - Access 2010 PL. Ćwiczenia praktyczne.pdf

33.7 MB

Milton M - Excel. Rusz głową.pdf

39.5 MB

Robbins A - Edytory vi i Vim. Leksykon kieszonkowy.pdf

27.3 MB

Sikorski W - Excel dla studentów.pdf

8.0 MB

Spręga R - Ćwiczenia edytorskie dla liceum.pdf

459.8 KB

tutorial word excel photoshop [www.gohha.com 2014].7z

24.4 MB

Walkenbach J - 101 Excel 2013 Tips Tricks and Timesavers.pdf

47.8 MB

Walkenbach J - Excel 2013 PL Bibla.pdf

25.5 MB

Walkenbach J - Excel 2013 Power Programming with VBA.pdf

84.7 MB

Walkenbach J - Excel Charts.pdf

12.0 MB

Walkenbach J - Favorite Excel 2010 Tips & Tricks.pdf

13.7 MB

Word.txt

0.3 KB

Word_2003_Pomocnik.7z

6.0 MB

Wrotek W - VBA dla Excela 2013 PL. 200 praktycznych przykładów.pdf

8.0 MB

Wykorzystanie analizy wskaźnikowej do oceny sytuacji finansowej firmy.xls

48.1 KB

Zajecia_Word.7z

1.2 MB

Zajęcia_Excel.7z

1.3 MB

/.../_ Informatyka. WWW (napomoc)/

Allen J, Chudley J - Projektowanie witryn internetowych User eXperience.pdf

10.0 MB

Enge E, Spencer S, Stricchiolam J, Fishkin R - Sztuka SEO. Optymalizacja witryn internetowych.pdf

31.9 MB

Firduas T - Responsive Web Design. Nowoczesne strony WWW na przykładach.pdf

10.7 MB

Hedengren T - Podręcznik WordPressa.pdf

54.0 MB

Hope P, Walther B - Testowanie bezpieczeństwa aplikacji internetowych. Receptury.pdf

15.9 MB

Podręcznik projektantów WWW [Smashing Magazine].pdf

3.4 MB

Rice W - Tworzenie serwisów e-learningowych z Moodle 1.9.pdf

11.1 MB

Wójcik Ł, Bród M - WordPress 4. Instalacja i zarządzanie.pdf

21.7 MB

/.../_ Knuth D - Sztuka programowania (napomoc)/

Knuth D - Sztuka programowania. T 1. Algorytmy podstawowe.pdf

25.0 MB

Knuth D - Sztuka programowania. T 1. z 1. MMIX. ver.pdf

8.0 MB

Knuth D - Sztuka programowania. T 1. z 1. MMIX.pdf

5.0 MB

Knuth D - Sztuka programowania. T 2. Algorytmy seminumeryczne.pdf

38.9 MB

Knuth D - Sztuka programowania. T 3. Sortowanie i wyszukiwanie.pdf

52.6 MB

Knuth D - Sztuka programowania. T 4. z 2. Generowanie wszystkich krotek i permutacji.pdf

17.3 MB

/Lain Books/_Algorithms/

Algorithms in a Nutshell.epub

5.3 MB

Introduction to Algorithms - 3rd Edition.pdf

5.1 MB

/Lain Books/_Computer Science/

Advanced Computer Architecture and Parallel Processing.pdf

5.0 MB

Compilers - 2nd Edition.pdf

5.1 MB

Computational Complexity - A Modern Approach.pdf

4.2 MB

Computer Systems - A Programmer's Perspective.pdf

7.1 MB

Graph Teory.pdf

2.3 MB

/.../_EPUB and DJVU/

1458416490444.djvu

1.3 MB

1464883426092.djvu

44.4 MB

1465538669818-0.epub

425.6 KB

1465538934501-1.epub

458.4 KB

1465538934501-2.epub

442.0 KB

1469517838023.djvu

2.9 MB

1469979504138-1.djvu

6.7 MB

1478141100537.djvu

9.2 MB

1478370413142.djvu

1.9 MB

Hacking - The Art of Exploitation - 2nd Edition.epub

1.4 MB

Silence on the Wire.epub

5.4 MB

/Lain Books/_Linux-UNIX/

Advanced Programming in the UNIX Environment.pdf

20.6 MB

Linux System Programming.pdf

10.4 MB

Mastering Emacs.pdf

1.6 MB

SSH, the Secure Shell - The Definitive Guide.pdf

6.8 MB

The Linux Programming Interface.pdf

7.3 MB

The Practice of System and Network Administration - 2nd Edition.pdf

6.2 MB

Unix Toolbox.pdf

388.0 KB

/Lain Books/_Others/

Bitcoin for The Befuddled.epub

24.9 MB

Code Complete - 2nd Edition.pdf

8.9 MB

Concurrent Programming in ML.pdf

908.3 KB

Developing with PDF.pdf

9.8 MB

Distributed Systems - Concepts and Design.pdf

10.2 MB

Elementary Linear Algebra.pdf

2.4 MB

Foundation of Digital Electronics and Logic Design.pdf

7.3 MB

Free Software, Free Society Selected Essays of Richard M. Stallman.epub

1.4 MB

Getting Started with Julia Programming.pdf

2.8 MB

Googling the Error Message.pdf

184.1 KB

Hacker's Delight - 2nd Edition.pdf

22.1 MB

How to be a Programmer - A Short, Comprehensive, and Personal Summary.pdf

164.4 KB

Introduction to Computing Systems.pdf

13.7 MB

Introduction to Lambda Calculus.pdf

554.9 KB

Learning PHP, MySQL, JavaScript, CSS and HTML5.pdf

21.2 MB

Operating Systems - Three Easy Pieces.pdf

4.6 MB

Practical Malware Analysis.pdf

9.7 MB

Programming in Lua - 3rd Edition.pdf

2.1 MB

Real Time Systems.pdf

2.6 MB

Regular Expression - Pocket Reference.pdf

1.0 MB

RESTful Web Clients - Early Release.pdf

5.1 MB

Starting Out with Programming Logic and Design.pdf

3.9 MB

Steal this Computer Book 4.0.pdf

20.0 MB

Steal This File Sharing Book.pdf

23.8 MB

Structure and Interpretation of Computer Programs - 2nd Edition.pdf

5.1 MB

Structure and Interpretation of Computer Programs.pdf

9.4 MB

Surreal Numbers.pdf

13.6 MB

The Architecture of Symbolic Computers.pdf

24.7 MB

The Little Book of Semaphores.pdf

1.2 MB

The Little Schemer.pdf

3.0 MB

The Not So Short Introduction to LaTeX 2e.pdf

1.7 MB

The Practice of Programming.pdf

5.1 MB

The Smart Girl's Guide to Privacy.pdf

2.2 MB

The Web Application Hacker's Handbook.pdf

15.4 MB

Turtle Geometry.pdf

6.2 MB

Understanding Computation.pdf

11.0 MB

Understanding Computers and Cognition.pdf

11.6 MB

Writing a Simple Operating System from Scratch.pdf

774.4 KB

/Lain Books/Assembly/

MIPS Assembly Language Programming.pdf

537.3 KB

Professional Assembly Language.pdf

6.9 MB

The Art of Assembly Language.pdf

4.5 MB

The Zen of Assembly Language.pdf

2.6 MB

/Lain Books/C and C++/

21st Century C.pdf

6.0 MB

Beej's Guide to Network Programming - Using Internet Sockets.pdf

767.2 KB

Expert C Programming.pdf

2.2 MB

Practical C Programming.pdf

6.2 MB

The C Programming Language - 2nd Edition.pdf

2.9 MB

The C++ Programming Language - 4th Edition.pdf

19.7 MB

Thinking in C++ - 2nd Edition - Volume 2 Standard Libraries and Advanced Topics.pdf.pdf

2.1 MB

Understanding and Using C Pointers.pdf

7.7 MB

/Lain Books/Clojure/

Clojure for the Brave and True.pdf

6.2 MB

Clojure Programming.pdf

12.1 MB

Clojure Reactive Programming.pdf

13.1 MB

Clojure Web Development Essentials.pdf

4.6 MB

Learning ClojureScript.pdf

5.0 MB

The Joy of Clojure.pdf

8.9 MB

/Lain Books/Elixir/

Elixir Cookbook.pdf

3.6 MB

Elixir in Action.pdf

5.8 MB

Introducing Elixir.pdf

3.1 MB

Learning Elixir.pdf

13.7 MB

The Little Elixir and OTP Guidebook.pdf

6.4 MB

/Lain Books/Haskell/

Learn You a Haskell for Great Good.pdf

3.1 MB

Thinking Functionally with Haskell.pdf

1.8 MB

/Lain Books/Java/

Data Structures and Algorithms in Java.pdf

10.4 MB

Effective Java - Programming Language Guide.pdf

2.9 MB

RESTful Java with JAX-RS 2.0.pdf

7.5 MB

/Lain Books/Python/

Data Structures and Algorithms in Python.pdf

6.9 MB

Introduction to Computation and Programming Using Python - With Application to Understanding Data.pdf

19.5 MB

Learn Python the Hard Way.pdf

2.7 MB

Learning Python - 5th Edition.pdf

15.4 MB

Python Crash Course.pdf

5.6 MB

Python Programming - An Introduction to Computer Science - 2nd Edition.pdf

2.2 MB

The Quick Python Book.pdf

4.6 MB

Think Python - How to Think Like a Computer Scientist.pdf

813.8 KB

/Lain Books/Ruby/

Computer Science Programming Basics in Ruby.pdf

8.2 MB

Confident Ruby.pdf

491.4 KB

Everyday Scripting with Ruby.pdf

2.7 MB

Metaprogramming Ruby - 2nd Edition.pdf

15.4 MB

Practical Ruby Projects.pdf

3.2 MB

Ruby Under a Microscope.pdf

12.7 MB

Wicked Cool Ruby Scripts.pdf

1.8 MB

/Lain Books/Scheme/

The Little Schemer.pdf

5.7 MB

The Seasoned Schemer.pdf

9.0 MB

/Security-Computing_Ebooks/

(70-229) Mcad Mcsd Mcse - Designing And Implementing Sql 2000 Server - Testking v1-1.pdf

986.7 KB

(e-Book) CCDA Exam Certification Guide, 2nd Ed. (640-861) - Cisco Press 2004.pdf

28.3 MB

(Ebook - Computer) Hacking The Windows Registry.pdf

227.2 KB

(ebook - pdf) how to crack cd protections.pdf

30.7 KB

(eBook - PDF) Hugo Cornwall - The Hacker's Handbook .pdf

284.7 KB

(Ebook OCR) Leslie Lamport - Latex A document preparation system (1994 2nd).pdf

12.0 MB

(ebook pdf) hacking into computer systems - a beginners guide.pdf

629.9 KB

(eBook) - ITU-T - H323-SIP.pdf

57.9 KB

(eBook) - Network Security Guide - NSA.pdf

240.7 KB

(ebook) Hacking Manual HACKING INTO COMPUTER SYSTEMS.doc

1.7 MB

(Ebook) Php 5 For Dummies (2004).pdf

3.8 KB

(ebook) ted the tool - mit guide to lock picking.pdf

521.1 KB

(ebook-pdf) - Programming - Website Database Basics With PHP and MySQL.PDF

104.6 KB

(eTrain) MS Press - MCAD.MCSD.Self.Paced.Training.Kit.Developing.XML.Web.Services.And.Server.Components.With.MS.Visual.Basic.Dot.NET.And.MS.CSharp.chm

12.7 MB

(Nokia) Getting Started with Python.pdf

280.0 KB

(Nokia) Programming with Python.pdf

1.1 MB

-Sybex, MCSA MCSE (Exam 70-270) Windows XP Professional Study Guide (2005), 3Ed DDU OCR 7.0-2.6 LotB.pdf

18.6 MB

2 2 Sybex - 70-290 Mcsa Mcse - Windows Xp Professional Study Guide (2Nd Edition).pdf

12.1 MB

2__Test King - 070-290 - Version 03.00 - Managing and Maintaining a Microsoft Windows Server 2003 Environment (MCSE).pdf

1.2 MB

2_Cisco Press - CCNA ICND Exam Certification Guide.2004.pdf

13.2 MB

2_MCDBA 70-291 MCSE MCSA - Win Server 2003 Network Infrastructure by Syngress.pdf

11.9 MB

2_Oracle OCP Admin Exam.doc

11.6 MB

2_SCJP Exam - TestKing 310-055 Sun Java Certified Programmer v3.0.pdf

252.9 KB

2_Testking - 70-290 Microsoft MCSE 2003 Managing and Maintaining a MS Win Server 2003 Environment Edt 6.0 .pdf

6.3 MB

2_TestKing Ccnp Cisco 642-801 BSCI v4.0.pdf

2.8 MB

11 Passwords.pdf

266.8 KB

12 Tips for Dreamweaver 4.pdf

796.7 KB

70-215 MCSE Windows 2000 Server Study Guide 2nd Edition Sybex.pdf

9.7 MB

70-215 MCSE Windows 2000 Server Training.pdf

24.7 MB

70-216 MCSE Windows 2000 Network Infrastructure Administration Study Guide 2nd Edition Sybex.pdf

10.5 MB

70-216 Sybex - MCSE Training Guide.pdf

7.0 MB

70-219 testking mcse study guide Case studies w2k.designing.active.directory.edition 1.1.pdf

786.8 KB

70-220 - Sybex - Windows 2000 Network Security Design.pdf

5.0 MB

70-228 Mspress - Mcdba Exam 70-228 Sql Server 2K System Administration 2 Ed Dec.pdf

6.3 MB

70-229 Designing Databases SQL 2000 TestKing.pdf

959.6 KB

70-270 - McGraw-Hill - MCSE - Windows XP Professional Study Guide.pdf

9.9 MB

70-270 - Test King - MCSE 2003 - Study Guide, Installing, COnfiguring, and Administering Windows XP Pro.pdf

15.6 MB

70-270 Mcse - Testking - Xp Pro 7.0.pdf

2.1 MB

70-270 Question Correct Exams MCSE Exam Q&A v6.0.pdf

2.0 MB

70-270 TestKing - Microsoft Exam - Q And A - v26.0.pdf

3.3 MB

70-270 Testking Microsoft Exam Q And A v20.0.pdf

2.7 MB

70-270 Testking Windows XP Complete.pdf

6.0 MB

70-270 TestKing.Microsoft.Exam.Q.And.A.V21.0.doc

5.8 MB

70-270 TestKing.Microsoft.Exam.Q.And.A.V21.0.pdf

2.8 MB

70-284 TestKing - Microsoft Exam - Q And A - v28.0.pdf

2.4 MB

70-290 - Mcse - 2003 - Addison Wesley - Inside Windows Server 2003.chm

15.2 MB

70-290 actual Tests.pdf

1.2 MB

70-291 - MCSE + MCSA - 2003 - O'Reilly - DNS on Windows Server 2003.chm

2.8 MB

70-291 Mcsa-Mcse Self-Paced Training Kit Implementing, Managing And Maintaining A Microsoft Windows Server 2003 Network Infrastructure(1).pdf

11.5 MB

70-291 Testking.Microsoft.Exam.Q.And.A.v36.0.pdf

7.1 MB

70-291 Windows Server 2003 Network Infrastructure, Implementation, Management & Maintenance - MCSE Study Guide - Sybex.pdf

14.1 MB

70-292-Ebook Syngress - Mcsa Mcse Exam 70-292 - Managing And Maintaining w2003 For w2000 Mcsas.pdf

9.3 MB

70-294 testking planning implementing and maintaining a microsoft windows server 2003 active directory infrastructure v15.1 144q.pdf

4.5 MB

70-294 Testking v21.0.pdf

11.3 MB

70-298 - MicroSoft - MCSE Self Paced Training Kit Designing Security For A MicroSoft Windows Server 2003 Network (Exam 70-298).pdf

11.1 MB

70-298 TestKing.Microsoft.Exam.Q.And.A.V8.0.pdf

3.4 MB

70-298-MSPress-Designing Security for Windows Server 2003 Network (2004).pdf

9.6 MB

70-305 Mcad-Mcsd Net Developing And Implementing Web Applications With Visual Basic And Visual Studio Net (Exam 70-305) By Xabel.pdf

19.6 MB

70-306 TestKing - Developing Windows Applications.pdf

833.3 KB

003 - Activar Windows XP - WindowsXP 01.pdf

1.9 MB

070 292 Test King MCSE Windows Server 2003 Managing A Network Environment MCSA Upgrade Study Guide v1.0(70-292).pdf

997.4 KB

070-215.TestKing.v13.Q209.pdf

5.5 MB

070-228 Test King Mcdba Study Guide (70-228).pdf

1.7 MB

070-271 actualtests supporting users and troubleshooting a ms windows xp os v07.01.05 200q.pdf

2.7 MB

070-284 MCSE 2003 Installing, Configuring and Administering Microsoft Exchange 2003 v26 [TestKing.pdf

4.1 MB

070-292 Actual Tests MCSE Exam Q&A v10.22.03.pdf

14.1 MB

070-310 - Test King - MCSD-MCAD - Developing XML Web Services and Server Components with Microsoft Visual Basic .NET Q & A.pdf

626.8 KB

330 Java Tips.pdf

1.2 MB

361q_Test King Cisco 640-607 Exam Q&A v11.1.pdf

2.0 MB

376-karplus molecular computer simulation.pdf

1.3 MB

640-607 Cisco Press CCNA 3.0 Study Guide (con indice).PDF

12.9 MB

640-801 - Cisco CCNA - TestKing 15.1.pdf

12.8 MB

640-861.Ciscopress.Exam.Certification.Guide.ccda.pdf

19.7 MB

720_User_Guide.pdf

1.1 MB

2003-11-12 TEST KING 70-229 MCDBA.pdf

1.6 MB

70290Training.pdf

9.0 MB

285063-Hacker.Bibel.[278.kB_www.netz.ru].pdf

285.1 KB

731986-Hacker's Desk Reference.pdf

732.0 KB

3077366-HackerHighSchool.pdf

3.1 MB

24742335-Bash-Shell-Referance.pdf

278.3 KB

0321108957.Addison-Wesley Professional.Honeypots- Tracking Hackers.pdf

2.2 MB

[Addison-Wesley] Latex Companion, 2nd Edition.pdf

2.8 MB

[Cisco Press] CCSP IPS Exam Certification Guide (2005) - DDU.chm

12.9 MB

[eBook] - CCNA Exam 640-607 Certification Guide - Cisco Press 2002.pdf

204.8 KB

[eBook] Manning - Java Swing 2nd Edition (2003).pdf

11.2 MB

[eBook][Java]log4j The Complete Manual.pdf

2.0 MB

[Manning - 2004] Tapestry In Action.pdf

12.8 MB

[MCAD-MCSD 70-300] Analyzing Requirements and Defining .NET Solution Architectures [MS Press, 2003, 0-7356-1894-1].chm

1.6 MB

[Network] Cisco Seminar - Securing 802.11 Wireless Networks.pdf

1.7 MB

[Wiley] Cryptography for Dummies.pdf

3.8 KB

A Buffer Overflow Study - Attacks and Defenses (2002).pdf

481.6 KB

A Byte of Python, v1.20 (for Python 2.x) (2005).pdf

345.2 KB

A+ Certification for Dummies.pdf

3.8 KB

Actualtest 642-501 v02.24.05.pdf

1.4 MB

ActualTest 642-501 v03.20.04.pdf

1.0 MB

Actualtest 642-501 v05.08.04.pdf

893.0 KB

ActualTest 642-501 v07.25.05.pdf

733.4 KB

Actualtest 642-501 v12.14.04.pdf

1.2 MB

Addison Wesley - Hack I.T. Security Through Penetration Test.chm

4.8 MB

Addison Wesley - Hackers Delight 2002.pdf

6.4 MB

Addison-Wesley Effective Java - Programming Language Guide.pdf

2.9 MB

Addison.Wesley.Advanced.Linux.Networking.chm

3.4 MB

Addison.Wesley.Moving.to.Ubuntu.Linux.Aug.2006.chm

16.9 MB

Addison.Wesley.The.Java.Programming.Language.4th.Edition.Aug.2005.chm

2.3 MB

Addison.Wesley.The.Ruby.Way.2nd.Edition.Oct.2006.chm

1.9 MB

Administering Cisco Qos.pdf

3.9 MB

Advanced Software Vulnerability Assessment.pdf

158.3 KB

AFF - A New Format for Storing Hard Drive Images.pdf

64.0 KB

AFF - Advanced Forensic Format.pdf

363.4 KB

Ahmad-Reza_Sadeghi,_David_Naccache,_Pim_Tuyls-Towards_Hardware-Intrinsic_Security__Foundations_and_Practice_(Information_Security_and_Cryptography)(2010).pdf

8.4 MB

AJAX In Action(2).pdf

11.8 MB

Ajax Patterns and Best Practices - C. Gross - Apress - 2006.pdf

16.4 MB

Analyse_forensique_d_un_systeme_Windows.pdf

2.6 MB

Apress - Beginning JavaScript with DOM Scripting and Ajax - From Novice to Professional.pdf

17.3 MB

Apress - Expert Spring Mvc And Web Flow - Feb 2006.pdf

5.1 MB

Apress - Pro Apache Ant - 2005.pdf

7.9 MB

APress - The Definitive Guide to MySQL, 2nd Ed - 2004 - (By Laxxuss).chm

9.1 MB

Apress.Foundations.of.Ajax.Oct.2005.pdf

39.5 MB

Apress.Hardening.Apache.eBook-LiB.chm

1.1 MB

Apress.Pro.JSF.and.Ajax.Building.Rich.Internet.Components.Feb.2006.pdf

4.0 MB

Apress.Sanghera.SCJP.2006.pdf

5.9 MB

Artech House - Fundamentals of Network Security.pdf

4.9 MB

ARTIFICAL IGNORANCE How To Implement Artifical Ignorance Log Analysis.pdf

17.4 KB

Attacking the DNS Protocol.pdf

330.2 KB

Auerbach.Practical.Hacking.Techniques.and.Countermeasures.Nov.2006.pdf

151.0 MB

Auerbach.Pub.The.ABCs.of.LDAP.How.to.Install.Run.and.Administer.LDAP.Services.eBook-DDU.chm

11.8 MB

Auerbach.Pub.The.Hackers.Handbook.The.Strategy.Behind.Breaking.into.and.Defending.Networks.Nov.20.pdf

18.9 MB

Botnet Detection Countering the Largest Security Threat.pdf

2.0 MB

Botnets - The killer web applications.pdf

7.3 MB

Build Your Own Security Lab A Field Guide for Network Testing.pdf

9.0 MB

Building_VPN_tunnels_using_IKE_between_NetScreen_and_Cisco_IOS.pdf

996.4 KB

CCDA (Cisco Certified Design Associates) Study Guide.pdf

7.7 MB

CCSP Cisco Secure PIX Firewall Advanced Exam Certification Guide 2nd Edition (2005) Cisco Press.chm

7.5 MB

CCSP Self-Study CCSP CSI Exam Certification Guide 2nd Edition (2005) Cisco Press.chm

7.5 MB

Certified Ethical Hacker (CEH) v3.0 Official Course.pdf

27.1 MB

Charles.C.Thomas-Document.Security.Protecting.Physical.and.Electronic.Content.2007.RETAiL.EBook.pdf

1.4 MB

Cisco - BGP4 - Case Studies.pdf

255.9 KB

Cisco - CCNP Support Exam Guide (640-606).pdf

4.2 MB

Cisco - Designing Network Security.pdf

1.3 MB

Cisco IP Routing Fundamentals.pdf

2.3 MB

Cisco Network Essentials.pdf

567.6 KB

Cisco Press Ccie Security Exam Certification Guide Ccie Self Study 2Nd Edition May 2005 Ebook-Lib.chm

15.2 MB

Cisco Press, CCNP (Exam 642-811) BCMSN Exam Certification Guide.(2005),.3Ed.BBL.LotB.chm

2.9 MB

Cisco Router Handbook.pdf

286.8 KB

Cisco.Press,.CCSP.SNRS.(Exam.642-502).Exam.Certification.Guide.(2005),.2Ed.BBL.LotB.chm

10.4 MB

Cisco.Press.CCIE.Security.Exam.Certification.Guide.CCIE.Self.Study.2nd.Edition.May.2005.eBook-LiB.chm

15.2 MB

Cleaning Windows XP For Dummies (2004).pdf

3.8 KB

Comparing Web Frameworks; Struts, Spring MVC, WebWork, Tapestry & JSF.pdf

307.2 KB

Computer - Hackers Secrets - e-book.pdf

504.5 KB

Computer and Network Forensics.pdf

497.7 KB

Computer Forensics_ Investigating Networ - EC-Council.pdf

25.2 MB

Computer Vulnerability(March 9 2000).pdf

399.7 KB

Cracking_Passwords_Guide.pdf

278.4 KB

Crackproof Your Software(No Starch-2002).pdf

7.5 MB

Credit Card Visa Hack(Cambridge Lab-2003).pdf

228.7 KB

Credit.Card.Visa.Hack.Ucam.Cl.Tr.560.[223.kB_www.netz.ru].pdf

228.7 KB

Cross Site Scripting Attacks Xss Exploits and Defense.pdf

7.7 MB

Cyberdeterrence and Cyberwar.pdf

14.5 MB

DangerousGoogle-SearchingForSecrets.pdf

2.2 MB

Dhtml Utopia.pdf

1.1 MB

Digital Forensics for Network, Internet, and Cloud Computing.pdf

13.5 MB

Digital Forensics of the Digital Memory.pdf

300.4 KB

Digital.Press.IPv6.Network.Programming.ISBN1555583180.pdf

3.3 MB

Dummies - Hack How To Create Keygens (1).pdf

9.8 KB

EBook - A+ Certification Guide.pdf

23.5 MB

Ebook O'reilly High Performance Mysql.pdf

1.5 MB

eBook.MS.Press.-.Microsoft.Encyclopedia.of.Security.ShareReactor.pdf

11.0 MB

eBook.Windows_2000_Active_Directory_Survival_Guide.ShareReactor.pdf

16.0 MB

eBook_Linux.Administration.Made.Easy.ShareReactor.pdf

351.8 KB

eBook_MySQL-PHP_Database_Applications.ShareReactor.pdf

3.7 MB

eBook_Navy.Seal.Physical.Fitness.Guide.ShareReactor.pdf

16.6 MB

eBook_Protected_Internet_Intranet_&_Virtual_Private_Networks.NoFearLevenT.ShareReactor.pdf

3.6 MB

eBook_Web_Application_Development_With_PHP_4.0_ShareReactor.pdf

6.6 MB

Excel Advanced Report Development (2005).pdf

13.5 MB

EXE File Format.pdf

14.5 KB

Exploring Macromedia Studio 8 (2005).pdf

17.9 MB

For Dummies Firewalls for Dummies.pdf

3.9 KB

For.Dummies.Hacking.Wireless.Networks.For.Dummies.Sep.2005.eBook-DDU.pdf

11.5 MB

For.Dummies.Visual.Basic.2005.Express.Edition.For.Dummies.Dec.2005.pdf

3.9 KB

For.Dummies.Wireless.Network.Hacks.and.Mods.For.Dummies.Sep.2005.eBook-DDU.pdf

3.9 KB

For.Dummies.XML.For.Dummies.The.Fourth.Edition.May.2005.eBook-DDU.pdf

3.8 KB

Forensic Analysis of Microsoft Internet Explorer Cookie Files.pdf

216.8 KB

Forensic Computer Crime Investigation.pdf

2.8 MB

Forensic Disk Imaging Step-by-Step.pdf

22.1 KB

Friendsofed Css Mastery Advanced Web Standards Solutions Feb 2006.pdf

10.3 MB

FTP-HTTP-ERROR-Codes.pdf

3.9 KB

Google Hacking for Penetration Tester (Syngress-2005).pdf

14.1 MB

Gray Hat Hacking~The Ethical Hacker's Handbook, 3e [2011].pdf

12.8 MB

Gray Hat Python.pdf

3.2 MB

Hack Attacks Revealed- A Complete Reference with Custom Security Hacking Toolkit (Wiley-2001).pdf

8.5 MB

Hack IT Security Through Penetration Testing.pdf

12.9 MB

Hack Proofing Linux A Guide to Open Source Security - Stangler, Lane - Syngress - ISBN 1-928994-34-2.pdf

12.4 MB

Hack Proofing Sun Solaris 8.pdf

7.1 MB

Hack Proofing Your E-Commerce Site.pdf

7.7 MB

Hack Proofing Your Identity in the Information Age (Syngress-2002).pdf

9.3 MB

Hack Proofing Your Network - Internet Tradecraft (Syngress-2000).pdf

3.1 MB

Hack Proofing Your Network Second Edition.pdf

9.2 MB

Hacker Crackdown, The.pdf

647.7 KB

Hackers Beware (NewRiders -2002).pdf

4.8 MB

Hacking Exposed Malware AND Rootkits - McGrawHill - 2010.pdf

10.9 MB

Hacking Exposed. Malware and Rootkits (McGraw-Hill, 2010).pdf

10.9 MB

How to Crack CD Protections.pdf

30.7 KB

How to Make a Forensic Copy Through the Network.pdf

24.6 KB

How.To.Install.Microsoft.Exchange.2000.on.Windows.Server.2003.-.LinkoManija.net.pdf

28.5 KB

Html Utopia - Designing Without Tables Using Css.pdf

1.9 MB

Interconeccion de Dispositivos de Red Cisco (eBook spanish espaDol).pdf

4.7 MB

Java 2 Network Security.pdf

5.9 MB

Java 2004- Manning- Tapestry In Action- the definitive guide to web application development with Tapestry.pdf

9.2 MB

Java Programming Language Handbook 1.pdf

3.0 MB

JavaServer.Faces.JSF.in.Action_Manning.pdf

12.8 MB

Jess_Garcia-Web_Forensics.pdf

594.5 KB

John Wiley And Sons - Data Mining-Concepts Models Methods And Algorithms Ebook-Fos.chm

261.7 KB

Kennedy D., O'Gorman J., Kearns D., Aharoni M. - Metasploit. The Penetration Tester's Guide -.pdf

7.2 MB

Learn Windows PowerShell In A Month Of Lunches.pdf

10.8 MB

LPI Linux Certification.doc

1.5 MB

Managing Cisco Network Security Second Edition.pdf

6.5 MB

Manning - JSTL in Action - 2003.pdf

6.2 MB

Manning - Struts In Action - Building web applications with the leading Java framework.pdf

5.1 MB

Manning Art Of Java Web Development - Struts, Tapestry, Commons, Velocity, Junit, Axis, Cocoon, Internetbeans, Webwork (2007).pdf

15.9 MB

Manning,.IntelliJ.IDEA.in.Action.(2006).BBL.pdf

12.0 MB

Manning.Ajax.in.Action.Oct.2005.pdf

9.7 MB

Mathematics For Game Developers (2004).pdf

15.5 MB

MCAD MCSD Visual Basic .NET Windows and Web Applications Study Guide.chm

21.7 MB

McGraw Hill - Cisco TCP-IP Routing Professional Reference.pdf

18.0 MB

mcgraw hill cisco security architectures [found via www.filedonkey.com].pdf

10.1 MB

McGraw.Hill.-.Oracle.Database.10g..High.Availablity.with.RAC.Flashback.&.Data.Guard.chm

9.8 MB

McGrawHill-Oracle_Database_10g_New_Features.chm

1.7 MB

MCSE - Deploying Virtual Private Networks with Microsoft Windows Server 2003 [MS Press 2004].chm

6.5 MB

Mcse - Microsoft Windows Xp Professional Training Kit (Exam 70-270).chm

8.8 MB

MCSE Microsoft Training Kit - 70-216 - Windows 2000 Network Infrastructure Administration.CHM

7.1 MB

MCSE Training Kit - M$ Win2000 Server 70-215 (CHM-11,302,984).pdf

108.8 MB

MCSE.Training.Kit.Microsoft.SQL.Server.2000.Database.Desing.and.Implementation.Exam.70-229.eBook.eng.chm

4.3 MB

Microsoft Office Access 2003 Step By Step (2004).pdf

10.6 MB

Microsoft Office Excel 2003 Bible (2003).pdf

20.6 MB

Microsoft Office Excel 2003 Programming Inside Out (2004).pdf

8.5 MB

Microsoft Press Mcse Self Paced Training Kit Exam 70-298 Designing Security For A Microsoft Windows Server 2003 Network Ebook-Lib.chm

11.7 MB

Microsoft.Press.MCSE.Self.Paced.Training.Kit.Exam.70-294.Planning.Implementing.and.Maintaining.a.Microsoft.Windows.Server.2003.Active.Directory.Infras.chm

24.5 MB

Microsoft.Press.MCSE.Self.Paced.Training.Kit.Exam.70-298.Designing.Security.for.a.Microsoft.Windows.Server.2003.Network.eBook-LiB.chm

11.7 MB

Microsoft.Press.MCSE.Self.Paced.Training.Kit.Exam.70.293.Planning.and.Maintaining.a.Microsoft.Windows.Server.2003.Network.Infrastructure.eBook-LiB.chm

12.5 MB

Microsoft.Press.Microsoft.ASP.Dot.NET.Coding.Strategies.with.the.Microsoft.ASP.Dot.NET.Team.eBook-LiB.chm

5.9 MB

MS Press - MCAD MCSD 70-306 70-316 - Developing .NET (2002).chm

1.9 MB

MS Press - MCAD.MCSE.MCDBA.Self-Paced.Training.Kit-Microsoft.SQL.Server.2000.Database.Design.and.Implementation.Second.Edition.Exam.70-229.chm

7.0 MB

MS Press - MCDBA Training Kit - SQL 7.0 Data Warehousing.chm

7.0 MB

MS Press - MCDBA Training Kit - SQL 7.0 Database Implementation.chm

5.1 MB

MS Press - MCDBA Training Kit - SQL 7.0 System Administration.chm

5.1 MB

MS Press - MCSD Training Kit - Desktop Applications with MS Visual C++ 6.0.CHM

1.7 MB

Nessus Network Auditing 2ed [AAVV] Syngress.pdf

11.3 MB

nessus_4.2_user_guideplus.pdf

1.9 MB

New Riders - Web Application Development With PHP4.chm

1.5 MB

Nmap network security scanner man page.doc

164.4 KB

No.Starch.Press.Wicked.Cool.Shell.Scripts-101.Scripts.for.Linux.Mac.OS.X.and.Unix.Systems.eBook-LiB.chm

1.5 MB

Novell.Press.Linux.Firewalls.3rd.Edition.Sep.2005.chm

1.7 MB

O'Reilly - Apache Cookbook - 2003 ! - (By Laxxuss).chm

859.4 KB

O'Reilly - JavaServer Pages, 3rd Edition.pdf

4.4 MB

O'Reilly - Windows XP Annoyances.chm

2.5 MB

O'Reilly, Version Control with Subversion (2004) DDU.chm

698.8 KB

O'Reilly,.Learning.Red.Hat.Enterprise.Linux.and.Fedora.(2004).4Ed.DDU.ShareConnector.chm

4.6 MB

OReilly - Python Pocket Reference, 2nd Ed 2001.chm

179.7 KB

OReilly - Sed & Awk 2nd Edition.pdf

2.2 MB

OReilly _LPI-Linux Certification in a nutshell.pdf

3.9 KB

OReilly,.Managing.Projects.with.GNU.make.(2004),.3Ed.DDU.chm

527.6 KB

OReilly.-.Unix.Backup.and.Recovery.pdf

5.9 MB

OReilly.Essential.PHP.Security.Oct.2005.chm

377.8 KB

OReilly.Fedora.Linux.Oct.2006.chm

8.4 MB

OReilly.Java.Cookbook.2nd.Edition.Jun.30.2004.eBook-DDU.chm

3.5 MB

Oreilly.linux.device.drivers.3rd.edition.feb.2005.ebook-ddu.chm

458.1 KB

OReilly.Mac.OS.X.Tiger.for.Unix.Geeks.Jun.2005.eBook-DDU.chm

6.9 MB

OReilly.Oracle.PL.SQL.for.DBAs.Oct.2005.chm

951.3 KB

OReilly.PHP.Cookbook.2nd.Edition.Aug.2006.chm

1.5 MB

OReilly.Producing.Open.Source.Software.Oct.2005.eBook-DDU.chm

643.2 KB

OReilly.SELinux.NSAs.Open.Source.Security.Enhanced.Linux.Oct.2004.eBook-DDU.chm

1.1 MB

OReilly.SSH.The.Secure.Shell.The.Definitive.Guide.2nd.Edition.May.2005.eBook-DDU.chm

3.7 MB

OReilly.Unix.in.a.Nutshell.4th.Edition.Oct.2005.eBook-DDU.chm

1.4 MB

OReilly_ Java Programming On Linux.pdf

3.8 KB

Password_Policy.pdf

3.8 KB

Peachpit.Press.JavaScript.and.Ajax.for.the.Web.6th.Edition.Aug.2006.chm

13.4 MB

Penetration_Tester__s_Open_Source_Toolkitplus.pdf

17.8 MB

Practical-Reverse-Engineering-x86-x64-ARM-Windows-Kernel-Reversing-Tools-and-Obfuscation.epub

3.3 MB

Premier - PHP Fast And Easy Web Development 2nd Edition.chm

3.5 MB

Premier.Press.Game.Programming.with.Python.Lua.and.Ruby.ebook-LiB.chm

2.4 MB

Prentice.Hall.Java.How.to.Program.6th.Edition.Aug.2004.INTERNAL.chm

16.6 MB

Prentice.Hall.Network.Forensics.Jun.2012.pdf

20.8 MB

Prentice.Hall.PTR.Embedded.Linux.Primer.A.Practical.Real.World.Approach.Sep.2006.chm

3.5 MB

Prentice.Hall.PTR.Linux.Quick.Fix.Notebook.Mar.2005.chm

2.9 MB

Prentice.Hall.PTR.PHP.5.Power.Programming.Oct.2004.eBook-LiB.chm

8.1 MB

Prentice.Hall.PTR.Samba.3.by.Example.Practical.Exercises.to.Successful.Deployment.2nd.Edition.Aug.2005.chm

3.6 MB

Prentice.Hall.PTR.SELinux.by.Example.Using.Security.Enhanced.Linux.Jul.2006.chm

4.1 MB

Prentice.Hall.PTR.Solaris.Performance.and.Tools.Jul.2006.chm

1.6 MB

Prentice.Hall.PTR.The.Official.Samba.3.HOWTO.and.Reference.Guide.2nd.Edition.Aug.2005.chm

4.6 MB

Prentice.Hall.PTR.Understanding.AJAX.Using.JavaScript.to.Create.Rich.Internet.Applications.Aug.2006.chm

6.5 MB

Prentice.Oracle.DBA.Guide.To.Data.Warehousing.And.Star.Schemas.eBook-LiB.chm

1.6 MB

Prentice.Oracle.PL.SQL.By.Example.3rd.Edition-LiB.chm

1.1 MB

Prentice.Programming.Oracle.Triggers.And.Stored.Procedures.3rd.Edition.eBook-LiB.chm

1.3 MB

Prentice.Technical.Java.Developing.Scientific.And.Engineering.Applications.eBook-LiB.chm

1.4 MB

Princess_Activity_Kit.pdf

4.8 MB

Pro Jakarta Velocity.pdf

575.6 KB

Programming Spiders, Bots, and Aggregators in Java [Sybex, 2.pdf

3.1 MB

Que - MCSE 070-294 Win Server 2003 Active Directory Infrastructure Exam Cram 2.chm

4.1 MB

Que MCAD MCSD Developing XML Web.Services And Server Components With Visual C Sharp .NET And the .NET Framework Exam Cram 2 Kalani (Exam 70-320)(2003).chm

1.7 MB

Que,.MCAD.MCSE.MCDBA.(Exam.70-229).Designing.and.Implementing.Databases.with.SQL.Server.2000.(2005).BBL.LotB.chm

3.4 MB

Que.CCNA.Practice.Questions.Exam.Cram.2.2nd.Edition.Dec.2005.eBook-DDU.chm

830.9 KB

Que.MCSA.MCSE.Implementing.and.Managing.Exchange.Server.2003.Exam.Cram.2.Exam.Cram.70-284.chm

7.5 MB

Que.MCSA.MCSE.Managing.And.Maintaining.A.Microsoft.Windows.Server.2003.Environment.Exam.Cram.2.Exam.70-290.eBook-LiB.chm

5.3 MB

Red Hat Linux Bible - Fedora and Enterprise Edition.chm

14.4 MB

Risk Analysis and Security Countermeasure selection.pdf

15.5 MB

rootkit- Rootkits.for.Dummies 2007.pdf

7.2 MB

S C Enterprise Hackers Secrets Revealed.pdf

3.9 KB

S C Enterprises Hacking Secrets Revealed Information and.pdf

3.8 KB

Sams - C++ Primer Plus, Fourth Edition.chm

4.6 MB

Sams - MySQL and JSP Web Applications Data Driven Programming Using Tomcat And MySQL.chm

5.3 MB

Sams - PostgreSQL Developers Handbook.chm

2.3 MB

Sams - Teach Yourself BEA WebLogic Server 7.0 in 21 Days - 2002 - (By Laxxuss).chm

6.6 MB

Sams, Mysql Tutorial (2004).chm

653.8 KB

Sams.Advanced.PHP.Programming.Feb.2004.INTERNAL.chm

3.3 MB

Sams.FreeBSD.6.Unleashed.Jun.2006.chm

6.7 MB

Sams.MySQL.Phrasebook.Essential.Code.and.Commands.Mar.2006.chm

628.5 KB

Sams.PHP.5.Unleashed.Dec.2004.eBook-LiB.chm

5.1 MB

Sams.PostgreSQL.2nd.Edition.Jul.2005.chm

7.0 MB

Sams.SUSE.Linux.10.Unleashed.Nov.2005.eBook-DDU.chm

20.4 MB

SANS Incident Handling Step by step.pdf

504.6 KB

SANS Intrusion Dectection.pdf

343.9 KB

Scambray - Hacking Exposed - Windows 3E (Mcgraw, 2008)plus-.pdf

8.4 MB

Scene of the Cybercrime - Computer Forensics Handbook (Syngress).pdf

6.1 MB

SCJP Exam - 310-055.Exam.Q.and.A.12.06.05-BBL.pdf

9.4 MB

SCJP Sun Certified Programmer for Java 5 Study Guide (Exam 310-055).pdf

12.2 MB

SitePoint.The.CSS.Anthology.101.Essential.Tips.Tricks.and.Hacks.pdf

9.2 MB

SkillSoft.Press.Migrating.from.Exchange.Server.to.qmail.eBook-LiB.chm

9.6 MB

Stealing the Network - How to Own an Identity.pdf

8.1 MB

Stealing the Network How to Own the Box.pdf

3.8 KB

stealing-the-network-how-to-own-a-shadow.pdf

9.6 MB

Steve'S Rhce Study Guide.doc

768.5 KB

Steven Levy - Hackers Heroes of the Computer Revolution - 2010.pdf

13.2 MB

Struts Recipes Chp2.pdf

1.3 MB

Stylin' with CSS - A Designer's Guide.pdf

839.0 KB

Sun - Core JSTL Mastering the JSP Standard Tag Library.pdf

6.3 MB

Sybex - .NET Development Security Solutions.chm

9.4 MB

Sybex - Mcad Mcsd Visual Basic Net Xml Web Services And Server Components Study Guide(2003).chm

9.1 MB

Sybex - MCSE Training Guide - Exam 70-220_web.pdf

5.0 MB

Sybex - MCSE.Windows.Server.2003.Network.Security.Design.Study.Guide.70.298.May.2004.chm

14.7 MB

Sybex - Pc.Disaster.And.Recovery.Ebook.chm

26.3 MB

Sybex.Effective.Software.Test.Automation.Developing.an.Automated.Software.Testing.Tool.eBook-LiB.chm

7.7 MB

Sybex.EnCase.Computer.Forensics.Study.Guide.2nd.Edition.Dec.2007.pdf

24.0 MB

Sybex.Linux.Network.Servers.eBook-EEn.pdf

7.0 MB

Sybex.Mastering.Active.Directory.for.Windows.Server.2003.eBook-KB.pdf

13.1 MB

Sybex.MCSE.Windows.Server.2003.Network.Security.Design.Study.Guide.70.298.May.2004.eBook-DDU(1).chm

14.7 MB

Sybex.MCSE.Windows.Server.2003.Network.Security.Design.Study.Guide.70.298.May.2004.eBook-DDU.chm

14.7 MB

Sybex.TCP.IP.Foundations.Aug.2004.eBook-DDU.pdf

7.1 MB

Syngress - Exam 70-297 MCSE Designing a Windows Server 2003 Active Directory and Network Infrastructure.chm

13.6 MB

Syngress - Mcse Designing Security For A Windows Server 2003 Network Exam 70-298 Study Guide - 2004 - (By Laxxuss).chm

15.8 MB

Syngress - Secure Your Network for Free Using NMAP, WIRESHARK, SNORT, NESSUS, and MRTG - 2007.pdf

7.6 MB

Syngress,.Nessus.Snort.and.Ethereal.Power.Tools.Customizing.Open.Source.Security.Applications.(2005).DDU.pdf

7.5 MB

Syngress,.Writing.Security.Tools.and.Exploits.(2006).DDU.pdf

11.7 MB

Syngress-Hack Proofing Linux (2001).pdf

12.4 MB

Syngress.Force.Emerging.Threat.Analysis.From.Mischief.to.Malicious.Oct.2006.pdf

8.3 MB

Syngress.Hacking.a.Terror.Network.Nov.2004.ISBN1928994989.pdf

8.6 MB

Syngress.InfoSecurity.2008.Threat.Analysis.Nov.2007plus.pdf

12.0 MB

Syngress.Nessus.Network.Auditing.Second.Edition.May.2008.eBook-DDU.pdf

10.9 MB

Syngress.Nmap.in.the.Enterprise.Your.Guide.to.Network.Scanning.Jan.2008plus.pdf

6.0 MB

Syslog Notes.pdf

75.3 KB

Teach Yourself Visual C++ 6 in 21 days.pdf

7.3 MB

The Dark Visitor - The Dark Visitor- Inside the World of Chinese Hackers.zip

6.4 MB

The Internet and Crime.pdf

1.3 MB

The Javascript Anthology 101 Essential Tips, Tricks & Hacks-Sample (2006 - Sitepoint).pdf

2.0 MB

The Little Black Book of Computer Virus.pdf

1.5 MB

The-Art-of-Exploitation_2nd-Ed.pdf

4.6 MB

the.pragmatic.programmers_pragmatic.ajax.pdf

6.3 MB

The.Shellcoder_s.Handbook.Discovering.and.Exploiting.Security.Holes.2nd.Edition 2007plus.pdf

9.2 MB

The_Art_of_Deception.pdf

1.6 MB

Tutorial For Building j2Ee Applications Using Jboss And Eclipse.chm

4.6 MB

UNIX and Linux Forensic Analysis DVD Toolkit.2008.pdf

5.1 MB

Value-Range Analysis of C Programs.pdf

2.5 MB

Visual Basic C++ 6.doc

1.0 MB

VoIP.Cisco.Introduction to IP Telephony.pdf

10.5 MB

VoIP.Syngress.Cisco AVVID and IP Telephony Design And Implementation.pdf

7.8 MB

VoIP.Syngress.Configuring Cisco Voice Over IP Second Edition.pdf

9.1 MB

WebWork In Action.pdf

7.0 MB

Wiley - Java Open Source Programming With Xdoclet, Junit, Webwork, Hibernate.pdf

6.2 MB

Wiley Publishing, Inc - Hacking Video Game Consoles. Turn Your Old Video Game Systems into Awesom.pdf

70.2 MB

Wiley Publishing, Inc - The CISSP Prep Guide. Gold Edition.pdf

9.7 MB

Wiley Publishing, Inc - Wireless Network Hacks AND Mods for Dummies.pdf

7.5 MB

Windows 2000 - TCPIP Implementation.doc

865.8 KB

Windows Forensic Analysis.pdf

6.2 MB

Wordware Publishing - DirectX9 Audio Exposed Interactive Audio Development.chm

7.1 MB

Wrox - Professional Javascript For Web Developers - 2005 - (By Laxxuss).pdf

9.7 MB

Wrox Press - Professional Apache Tomcat 5.pdf

11.1 MB

WVS Manual.pdf

4.3 MB

WVS Mmanual+.pdf

2.7 MB

/Security-Hacking_Ebooks1/

Advanced Penetration Testing for Highly-Secured Environments- The Ultimate Security Guide [eBook].pdf

13.4 MB

An Introduction to the Analysis of Algorithms, 2nd Edition.pdf

5.8 MB

Apress - Pro Bash Programming Scripting the GNULinux Shell (10-2009) (ATTiCA).pdf

1.5 MB

Bash Guide for Beginners.pdf

1.2 MB

Buffer Overflow Attacks - Detect, Exploit, Prevent (Syngress, 2005) BBS.pdf

5.6 MB

CCENT-CCNA ICND1 640-822 Official Cert Guide, 3rd Edition.pdf

16.4 MB

command-line.pdf

1.8 MB

CompTIA Linux Plus Study Guide 2013 for Exams LX0-101 and LX0-102 2nd Ed.pdf

11.1 MB

CompTIA_Security_SY0-301.pdf

233.4 KB

Dos Attacked.pdf

18.7 KB

Fadia, Ankit - Encryption Algorithms Explained.pdf

345.8 KB

firewalls(2).doc

45.1 KB

Fundamentals of Computer Programming with C#.pdf

11.5 MB

Getting geographical Information using an IP Address (1).doc

52.2 KB

GNU-Linux Command-Line Tools Summary Gareth Anderson.pdf

698.8 KB

Hack The Net.pdf

584.0 KB

Hacking a Coke Machine.pdf

119.8 KB

Hacking and Network Defense.pdf

156.2 KB

Hacking Exposed Computer Forensics Secrets & Solutions.pdf

12.2 MB

Hacking Exposed Wireless (ntwk security) 2nd ed - J. Cache, et al., (McGraw-Hill, 2010) BBS.pdf

11.6 MB

Hacking for Dummies 2.pdf

151.9 KB

Hacking into Linux.doc

127.5 KB

Hacking The Art Of Exploitation 2nd Edition V413HAV.pdf

4.2 MB

Hacking The Linux.pdf

88.4 KB

Hacking.Into.Computer.Systems-A.Beginners.Guide---420ebooks.pdf

629.9 KB

Hardcore Windows XP - The Step by Step Guide To Ultimate Performance.pdf

8.1 MB

hashcat_user_manual.pdf

2.3 MB

How to Master Subnetting.pdf

2.6 MB

HTTP_methods attacks.pdf

1.1 MB

Inside Cyber Warfar by Jeffrey Carr.pdf

3.0 MB

Introduction to Software Development.pdf

23.8 MB

Kevin Mitnick - The Art of Intrusion.pdf

3.2 MB

Kevin_Mitnick_-_Art_Of_Deception.pdf

5.4 MB

Linux Kernel Development, 3rd Edition.pdf

4.5 MB

Linux Shell Scripting Cookbook, Second Edition [eBook].pdf

3.2 MB

Linux-101-Hacks.pdf

1.6 MB

Machine Learning for hackers.pdf

25.1 MB

Mastering Metasploit- RAW [eBook].pdf

8.2 MB

Metasploit Toolkit for Penetration Testing, Exploit Development, and Vulnerability Research.pdf

5.1 MB

Metasploit.pdf

7.2 MB

More Password Cracking Decrypted.doc

130.0 KB

Nessus-Network-Auditing.pdf

4.8 MB

Nmap 6 Network Exploration and Security Auditing Cookbook.pdf

2.0 MB

Offensive Security - BackTrack to the Max Cracking the Perimeter V 1.0.pdf

3.7 MB

Offensive.Security.WiFu.v2.0.pdf

15.2 MB

Own-The-Box.pdf

4.8 MB

Packt.Metasploit.Penetration.Testing.Cookbook.Jun.2012.RETAIL.eBook-ELOHiM.pdf

3.8 MB

Programming in Objective-C, 6th Edition.pdf

6.6 MB

RTFM - Red Team Field Manual v2.pdf

3.1 MB

Scene of the Cybercrime - Computer Forensics Handbook.pdf

2.3 MB

Sendmail and Beyond.doc

63.5 KB

SET_User_Manual.pdf

1.7 MB

SSH_Tectia.pdf

73.8 KB

SSL Torn Apart.doc

79.4 KB

SSL VPN - Understanding, evaluating and planning secure, web-based remote access [eBook].pdf

4.0 MB

The Art of Readable Code.pdf

26.1 MB

The Basics of Web Hacking.epub

3.7 MB

The Linux Command Line by William Shotts.pdf

2.1 MB

The Web Application Hackers Handbook.pdf

11.7 MB

Transparent Proxies in Squid.doc

30.2 KB

Truths!!!--What they Dont teach in Manuals!!!.pdf

23.2 KB

User_Manual.pdf

1.7 MB

we-are-anon.pdf

1.6 MB

web_for_pentester.pdf

2.5 MB

Windows Password Files Torn Apart.doc

36.9 KB

Wireshark Network Analysis_ The Official Wireshark Certified Network Analyst Study Guide - Laura Chappell.pdf

37.0 MB

WordPress.3.Ultimate.Security.pdf

8.7 MB

/Python/

A Byte of Python, v1.20 (for Python 2.x) (2005).pdf

345.2 KB

A Byte of Python, v1.92 (for Python 3.0) (2009).pdf

623.2 KB

A Learner's Guide to Programming Using the Python Language (2009).pdf

17.6 MB

A Primer on Scientific Programming with Python (2009).pdf

7.2 MB

A Primer on Scientific Programming with Python, 3rd Edition.pdf

5.5 MB

Apress.Foundations.of.Python.3.Network.Programming.2nd.Edition.Dec.2010.pdf

5.0 MB

Beginning Game Development with Python and Pygame - From Novice to Professional (2007).pdf

8.0 MB

Beginning Python (2005).pdf

18.3 MB

Beginning Python - From Novice to Professional (2005) - BBL.pdf

14.0 MB

Beginning Python - From Novice to Professional, Second Edition (2008).pdf

2.8 MB

Beginning Python - Using Python 2.6 and Python 3.1 (2010).pdf

4.6 MB

Beginning Python Visualization - Crafting Visual Transformation Scripts (2009).pdf

2.3 MB

Bioinformatics Programming Using Python, First Edition (2009).pdf

4.3 MB

CherryPy Essentials - Rapid Python Web Application Development (2007).pdf

5.7 MB

Core Python Applns. Pgmg. 3rd ed. - W. Chun (Pearson, 2012) BBS.pdf

9.8 MB

Core Python Programming, Second Edition (2006).chm

3.6 MB

Data Structures and Algorithms with Object-Oriented Design Patterns in Python (2003).chm

3.5 MB

Dive Into Python 3, r867 (2010).pdf

2.6 MB

Dive Into Python 3, r870 (2010).pdf

2.6 MB

diveintopython.pdf

1.3 MB

Expert Python Programming (2008).pdf

10.7 MB

Foundations of Agile Python Development (2008).pdf

7.2 MB

Game Programming with Python, Lua, and Ruby (2003).chm

2.4 MB

Game Programming with Python, Lua, and Ruby (2003).pdf

2.9 MB

Getting Started with Pyparsing (2007).pdf

639.0 KB

Gray Hat Python - Python Programming for Hackers and Reverse Engineers (2009).pdf

3.2 MB

GUI Programming with Python - QT Edition (2002).chm

16.7 MB

Guide to NumPy (for Python) (2006).pdf

2.1 MB

Hello World - Computer Programming for Kids and Other Beginners, Fourth printing (2009).pdf

31.3 MB

Invent Your Own Computer Games with Python (2008).pdf

2.8 MB

IronPython in Action (2009).pdf

14.9 MB

Jython For Java Programmers, First Edition (2001).chm

730.1 KB

Learning Python, Fourth Edition (2009).pdf

16.3 MB

Learning to Program - Python (2006).pdf

1.2 MB

Making Use of Python (2002).pdf

7.2 MB

Matplotlib for Python Developers (2009).pdf

11.9 MB

Mobile Python - Rapid Prototyping of Applications on the Mobile Platform (2007).pdf

3.1 MB

Natural Language Processing with Python (2009).pdf

3.2 MB

Next-Generation Web Frameworks in Python (2007).chm

489.6 KB

Numerical Methods in Engineering with Python (2005).pdf

7.4 MB

Perl To Python Migration (2001).chm

436.5 KB

Practical Programming - An Introduction to Computer Science Using Python, v.2009-5-6 (2009).pdf

9.6 MB

Pro IronPython (2009).pdf

3.2 MB

Professional Python Frameworks - Web 2.0 Programming with Django and TurboGears (2007).pdf

10.8 MB

Programming Computer Vision with Python.pdf

72.6 MB

Programming in Python 3 - A Complete Introduction to the Python Language, Second Edition (2010).pdf

2.7 MB

Programming Python, 3rd Edition (2006).chm

10.1 MB

Python & XML - XML Processing with Python, First Edition (2002).pdf

3.7 MB

Python - Create-Modify-Reuse (2008).pdf

6.6 MB

Python - How to Program, 1e (2002).pdf

26.2 MB

Python - Visual QuickStart Guide (2001).chm

11.6 MB

Python 2.1 Bible (2001).pdf

6.8 MB

Python 2.6 Quick Reference (Letter) (2009).pdf

915.4 KB

Python 3 for Absolute Beginners (2009).pdf

8.0 MB

Python Cookbook, 2nd Edition (2005).chm

1.5 MB

Python Cookbook, 2nd Edition (2005).pdf

3.3 MB

Python Developer's Handbook, First Edition (2000).pdf

15.7 MB

Python Essential Reference, Fourth Edition (2009).pdf

2.6 MB

Python for Dummies (2006).pdf

1.8 MB

Python for Software Design - How to Think Like a Computer Scientist (2009).pdf

802.7 KB

Python for Unix and Linux System Administration (2008).pdf

3.6 MB

Python in a Nutshell, 2nd Edition (2006).chm

1.2 MB

Python Phrasebook - Essential Code and Commands (2006).chm

785.5 KB

Python Pocket Reference, 4th Edition (2009).pdf

2.4 MB

Python Power - The Comprehensive Guide (2008).pdf

6.4 MB

Python Programming - An Introduction to Computer Science - v1.0rc2 (2002).pdf

1.3 MB

Python Programming for the Absolute Beginner (2003).chm

5.7 MB

Python Programming on Win32, First Edition (2000).chm

2.2 MB

Python Programming with the Java Class Libraries - A Tutorial for Building Web and Enterprise Applications with Jython (2002).chm

1.9 MB

Python Scripting for Computational Science, Third Edition (2008).pdf

5.3 MB

Python Testing - Beginner's Guide (2010).pdf

4.8 MB

Rapid GUI Programming with Python and Qt - The Definitive Guide to PyQt Programming (2008).pdf

7.3 MB

Rapid Web Applications with TurboGears - Using Python to Create Ajax-Powered Sites (2006).chm

6.5 MB

Snake Wrangling for Kids - Learning to Program with Python 2, linux-v0.7.2 (2007).pdf

1.3 MB

Snake Wrangling for Kids - Learning to Program with Python 2, mac-v0.7.2 (2007).pdf

1.3 MB

Snake Wrangling for Kids - Learning to Program with Python 2, win-v0.7.2 (2007).pdf

1.3 MB

Snake Wrangling for Kids - Learning to Program with Python 3, linux-v0.7.7 (2007).pdf

1.4 MB

Snake Wrangling for Kids - Learning to Program with Python 3, mac-v0.7.7 (2007).pdf

1.4 MB

Snake Wrangling for Kids - Learning to Program with Python 3, win-v0.7.7 (2007).pdf

1.4 MB

Starting Out with Python (2009).pdf

35.5 MB

Teach Yourself Python in 24 Hours (2000).chm

2.6 MB

Text Processing in Python (2003).chm

875.8 KB

The Definitive Guide to Jython - Python for the Java Platform (2010).pdf

8.1 MB

The Quick Python Book, Second Edition (2010).pdf

4.6 MB

Thinking in Tkinter (2005).pdf

289.0 KB

Tkinter 8.4 reference - a GUI for Python (2010).pdf

1.5 MB

Twisted Network Programming Essentials - Event-driven Network Programming with Python (2005).chm

1.3 MB

wxPython in Action (2006).pdf

13.2 MB

XML Processing with Perl, Python, and PHP (2002).pdf

2.2 MB

/.../Offensive Security - Advanced Windows Exploitation (AWE) v 1.1/

AWE-1.pdf

11.1 MB

AWE-2.pdf

11.2 MB

AWE-3.pdf

13.0 MB

AWE-4.pdf

7.9 MB

/Phrack/

phrack1.tar.gz

10.7 KB

phrack2.tar.gz

18.7 KB

phrack3.tar.gz

21.5 KB

phrack4.tar.gz

35.4 KB

phrack5.tar.gz

45.9 KB

phrack6.tar.gz

81.2 KB

phrack7.tar.gz

35.7 KB

phrack8.tar.gz

40.2 KB

phrack9.tar.gz

35.2 KB

phrack10.tar.gz

31.2 KB

phrack11.tar.gz

44.8 KB

phrack12.tar.gz

42.7 KB

phrack13.tar.gz

37.1 KB

phrack14.tar.gz

36.4 KB

phrack15.tar.gz

25.4 KB

phrack16.tar.gz

26.3 KB

phrack17.tar.gz

46.2 KB

phrack18.tar.gz

50.9 KB

phrack19.tar.gz

25.7 KB

phrack20.tar.gz

126.0 KB

phrack21.tar.gz

82.3 KB

phrack22.tar.gz

93.1 KB

phrack23.tar.gz

59.4 KB

phrack24.tar.gz

73.0 KB

phrack25.tar.gz

69.2 KB

phrack26.tar.gz

70.0 KB

phrack27.tar.gz

91.9 KB

phrack28.tar.gz

85.1 KB

phrack29.tar.gz

86.2 KB

/Python/

A Byte of Python, v1.20 (for Python 2.x) (2005).pdf

345.2 KB

A Byte of Python, v1.92 (for Python 3.0) (2009).pdf

623.2 KB

A Learner's Guide to Programming Using the Python Language (2009).pdf

17.6 MB

A Primer on Scientific Programming with Python (2009).pdf

7.2 MB

A Primer on Scientific Programming with Python, 3rd Edition.pdf

5.5 MB

Apress.Foundations.of.Python.3.Network.Programming.2nd.Edition.Dec.2010.pdf

5.0 MB

Beginning Game Development with Python and Pygame - From Novice to Professional (2007).pdf

8.0 MB

Beginning Python (2005).pdf

18.3 MB

Beginning Python - From Novice to Professional (2005) - BBL.pdf

14.0 MB

Beginning Python - From Novice to Professional, Second Edition (2008).pdf

2.8 MB

Beginning Python - Using Python 2.6 and Python 3.1 (2010).pdf

4.6 MB

Beginning Python Visualization - Crafting Visual Transformation Scripts (2009).pdf

2.3 MB

Bioinformatics Programming Using Python, First Edition (2009).pdf

4.3 MB

CherryPy Essentials - Rapid Python Web Application Development (2007).pdf

5.7 MB

Core Python Applns. Pgmg. 3rd ed. - W. Chun (Pearson, 2012) BBS.pdf

9.8 MB

Core Python Programming, Second Edition (2006).chm

3.6 MB

Data Structures and Algorithms with Object-Oriented Design Patterns in Python (2003).chm

3.5 MB

Dive Into Python 3, r867 (2010).pdf

2.6 MB

Dive Into Python 3, r870 (2010).pdf

2.6 MB

diveintopython.pdf

1.3 MB

Expert Python Programming (2008).pdf

10.7 MB

Foundations of Agile Python Development (2008).pdf

7.2 MB

Game Programming with Python, Lua, and Ruby (2003).chm

2.4 MB

Game Programming with Python, Lua, and Ruby (2003).pdf

2.9 MB

Getting Started with Pyparsing (2007).pdf

639.0 KB

Gray Hat Python - Python Programming for Hackers and Reverse Engineers (2009).pdf

3.2 MB

GUI Programming with Python - QT Edition (2002).chm

16.7 MB

Guide to NumPy (for Python) (2006).pdf

2.1 MB

Hello World - Computer Programming for Kids and Other Beginners, Fourth printing (2009).pdf

31.3 MB

Invent Your Own Computer Games with Python (2008).pdf

2.8 MB

IronPython in Action (2009).pdf

14.9 MB

Jython For Java Programmers, First Edition (2001).chm

730.1 KB

Learning Python, Fourth Edition (2009).pdf

16.3 MB

Learning to Program - Python (2006).pdf

1.2 MB

Making Use of Python (2002).pdf

7.2 MB

Matplotlib for Python Developers (2009).pdf

11.9 MB

Mobile Python - Rapid Prototyping of Applications on the Mobile Platform (2007).pdf

3.1 MB

Natural Language Processing with Python (2009).pdf

3.2 MB

Next-Generation Web Frameworks in Python (2007).chm

489.6 KB

Numerical Methods in Engineering with Python (2005).pdf

7.4 MB

Perl To Python Migration (2001).chm

436.5 KB

Practical Programming - An Introduction to Computer Science Using Python, v.2009-5-6 (2009).pdf

9.6 MB

Pro IronPython (2009).pdf

3.2 MB

Professional Python Frameworks - Web 2.0 Programming with Django and TurboGears (2007).pdf

10.8 MB

Programming Computer Vision with Python.pdf

72.6 MB

Programming in Python 3 - A Complete Introduction to the Python Language, Second Edition (2010).pdf

2.7 MB

Programming Python, 3rd Edition (2006).chm

10.1 MB

Python & XML - XML Processing with Python, First Edition (2002).pdf

3.7 MB

Python - Create-Modify-Reuse (2008).pdf

6.6 MB

Python - How to Program, 1e (2002).pdf

26.2 MB

Python - Visual QuickStart Guide (2001).chm

11.6 MB

Python 2.1 Bible (2001).pdf

6.8 MB

Python 2.6 Quick Reference (Letter) (2009).pdf

915.4 KB

Python 3 for Absolute Beginners (2009).pdf

8.0 MB

Python Cookbook, 2nd Edition (2005).chm

1.5 MB

Python Cookbook, 2nd Edition (2005).pdf

3.3 MB

Python Developer's Handbook, First Edition (2000).pdf

15.7 MB

Python Essential Reference, Fourth Edition (2009).pdf

2.6 MB

Python for Dummies (2006).pdf

1.8 MB

Python for Software Design - How to Think Like a Computer Scientist (2009).pdf

802.7 KB

Python for Unix and Linux System Administration (2008).pdf

3.6 MB

Python in a Nutshell, 2nd Edition (2006).chm

1.2 MB

Python Phrasebook - Essential Code and Commands (2006).chm

785.5 KB

Python Pocket Reference, 4th Edition (2009).pdf

2.4 MB

Python Power - The Comprehensive Guide (2008).pdf

6.4 MB

Python Programming - An Introduction to Computer Science - v1.0rc2 (2002).pdf

1.3 MB

Python Programming for the Absolute Beginner (2003).chm

5.7 MB

Python Programming on Win32, First Edition (2000).chm

2.2 MB

Python Programming with the Java Class Libraries - A Tutorial for Building Web and Enterprise Applications with Jython (2002).chm

1.9 MB

Python Scripting for Computational Science, Third Edition (2008).pdf

5.3 MB

Python Testing - Beginner's Guide (2010).pdf

4.8 MB

Rapid GUI Programming with Python and Qt - The Definitive Guide to PyQt Programming (2008).pdf

7.3 MB

Rapid Web Applications with TurboGears - Using Python to Create Ajax-Powered Sites (2006).chm

6.5 MB

Snake Wrangling for Kids - Learning to Program with Python 2, linux-v0.7.2 (2007).pdf

1.3 MB

Snake Wrangling for Kids - Learning to Program with Python 2, mac-v0.7.2 (2007).pdf

1.3 MB

Snake Wrangling for Kids - Learning to Program with Python 2, win-v0.7.2 (2007).pdf

1.3 MB

Snake Wrangling for Kids - Learning to Program with Python 3, linux-v0.7.7 (2007).pdf

1.4 MB

Snake Wrangling for Kids - Learning to Program with Python 3, mac-v0.7.7 (2007).pdf

1.4 MB

Snake Wrangling for Kids - Learning to Program with Python 3, win-v0.7.7 (2007).pdf

1.4 MB

Starting Out with Python (2009).pdf

35.5 MB

Teach Yourself Python in 24 Hours (2000).chm

2.6 MB

Text Processing in Python (2003).chm

875.8 KB

The Definitive Guide to Jython - Python for the Java Platform (2010).pdf

8.1 MB

The Quick Python Book, Second Edition (2010).pdf

4.6 MB

Thinking in Tkinter (2005).pdf

289.0 KB

Tkinter 8.4 reference - a GUI for Python (2010).pdf

1.5 MB

Twisted Network Programming Essentials - Event-driven Network Programming with Python (2005).chm

1.3 MB

wxPython in Action (2006).pdf

13.2 MB

XML Processing with Perl, Python, and PHP (2002).pdf

2.2 MB

 

Total files 2720


Copyright © 2025 FileMood.com