FileMood

Download pack2

Pack2

Name

pack2

 DOWNLOAD Copy Link

Total Size

5.5 GB

Total Files

606

Last Seen

2024-10-15 23:31

Hash

8CD7EFDA3BECBE5540F55A22DB98B9214E2A0D5D

/

How Computers Work: The Evoluution of Technology 10th Edition.pdf

192.7 MB

Python Data Analysis - 2nd Edition.pdf

5.9 MB

You: According to them - Uncovering the blind spots that impact your reputation and your career.pdf

129.5 KB

Beginning SUSE Linux - From Novice to Professional.pdf

10.0 MB

6 Steps to Here Someone with Strong Soft Skills.pdf

945.8 KB

THE MANY WAYS CLOUD CAN FACILITATE GROWTH FROM TALENT MANAGEMENT TO GOVERNANCE, RISK AND CONTROL.pdf

2.8 MB

The essentials of mobile app attribution: A guide from start to finish.pdf

902.1 KB

OAuth 2 in Action.chm

3.8 MB

Intelligence-Based Security in Private Industry.pdf

4.8 MB

Scala: Applied Machine Learning.pdf

16.0 MB

CEH Certified Ethical Hacker More Than 100 Success Secrets: Over 100 Professional Security Testers Most Asked Questions and Resources.epub

190.2 KB

Start Your Own Import-Export Business - Your Step-By-Step Guide to Success - 5th Edition (2017).epub

9.5 MB

Controller-Based Wireless LAN Fundamentals.pdf

13.6 MB

An Introduction To Keyloggers, RATS And Malware.pdf

2.3 MB

Securing and Optimizing Linux: The Hacking Solution.pdf

55.6 MB

Python Hacking Essentials.pdf

10.3 MB

Beginning Red Hat Linux 9.pdf

5.1 MB

Mastering Windows Network Forensics and Investigation 2nd Edition.pdf

42.2 MB

Learning Games: The Science and Art of Development.pdf

5.3 MB

7 Completely Free VPN Services to Protect Your Privacy.pdf

1.5 MB

Learning Unreal Engine Android Game Development [Misra 2015-07-31].pdf

20.8 MB

Clojure: High Performance JVM Programming.pdf

6.2 MB

Clear and Present Danger: Securing Identity in an Interconnected World.pdf

297.9 KB

Introducing Linux Distros: Choose the right Linux distribution for your needs.pdf

29.4 MB

Security and Privacy for Mobile Healthcare Networks.pdf

2.2 MB

Take control: Android Rooting Guide.pdf

1.1 MB

Java Data Science Cookbook: Explore the power of MLlib, DL4j, Weka, and more.pdf

5.9 MB

Exploring Raspberry Pi: Interfacing to the Real World with Embedded Linux.pdf

20.3 MB

Guide to Computer Network Security 4th Edition.pdf

8.9 MB

CompTIA Security+ Review Guide Exam SY0-401.pdf

13.9 MB

Hacker Monthly: Issue 45 February 2014 Bitcoin - The Internet of Money.pdf

4.2 MB

C Programming And Unix.pdf

2.9 MB

Lte Security Book.pdf

3.5 MB

Enterprise Level Security: Securing Information Systems in an Uncertain World.pdf

20.0 MB

Maven: The Definitive Guide.pdf

9.7 MB

7 Steps to Developing a Cloud Security Plan for Healthcare.pdf

905.6 KB

A Theory of International Terrorism: Understanding Islamic Militancy.pdf

1.2 MB

Computer Organization and Design: The Hardware-Software Interface ARM Edition.pdf

33.0 MB

Mule in Action 2nd Edition.pdf

14.3 MB

9 Lethal Linux Commands You Should Never Run.pdf

74.2 KB

Why B2B Content Strategies Are Paramount for Generating Quality Leads.pdf

6.8 MB

Splunk Developer's Guide 2nd Edition.epub

4.2 MB

Build your Network Build your Bottom Line.pdf

1.3 MB

Express in Action: Writing , Building, and Testing Node.js Applications.pdf

6.3 MB

Shared Memory Application Programming: Concepts and strategies in multicore application programming.pdf

11.3 MB

Linux The Complete Reference, Sixth Edition.pdf

6.1 MB

SVG Animations: From Common UX Implementations to Complex Responsive Animation.pdf

7.1 MB

Smart Home Automation With Linux.pdf

4.8 MB

Cyberspace and Cybersecurity.pdf

3.2 MB

8 Simple Steps to Fix ‘Insufficient Storage Available’ on Android.pdf

565.3 KB

Troubleshooting and Maintaining Your PC All-in-One For Dummies - 3rd Edition.pdf

8.9 MB

Beginners Guide to Ethical Hacking and Penetration Testing.pdf

4.8 MB

The Recipe Hacker Confidential.epub

9.7 MB

Learning Groovy.pdf

12.4 MB

How to Hack Wifi.pdf

405.6 KB

Hacking Exposed Wireless Security Secrets And Solutions, 2nd Edition.pdf

10.6 MB

The Illustrated Network: How TCP-IP Works in a Modern Network 2nd Edition.pdf

9.4 MB

Oracle 11g Anti Hackers Cookbook.pdf

3.6 MB

How To Be An Asshole That Beautiful Women Love.pdf

752.4 KB

PHP Programming Cookbook.pdf

2.1 MB

Hacking - The Beginner's Complete Guide To Computer Hacking (2017).pdf

554.8 KB

Mapping and Analysing Crime Data: Lessons from Research and Practice.pdf

7.5 MB

AutoCAD 2018 and AutoCAD LT 2018.pdf

98.8 MB

British Computer Hacking.pdf

2.3 MB

D3.js in Action.pdf

13.7 MB

Professional Linux Programming.pdf

2.9 MB

The Perfect Storm: Man in the Middle Phishing Kits, Weak Authentication and Organized Online Criminals.pdf

810.9 KB

CompTIA Cybersecurity Analyst CSA+ Study Guide Exam CS0-001.azw3

10.8 MB

OCA: Oracle Certified Associate Java SE 8 Programmer I Study Guide Exam 1Z0-808.pdf

3.2 MB

Learning Linux Binary Analysis.pdf

14.4 MB

Continuous Architecture Sustainable Architecture in an Agile and Cloud-Centric World.pdf

12.9 MB

Foundations of Cryptography: Volume II Basic Applications.pdf

2.0 MB

GPU Programming in MATLAB.pdf

33.8 MB

Mastering Java Machine Learning.pdf

25.0 MB

Hacking Exposed Windows Security Secrets And Solutions, 3rd Edition.pdf

6.0 MB

Intrusion Detection Systems with Snort: Advanced IDS Techniques Using Snort, Apache, MySQL, PHP, and ACID.pdf

2.7 MB

Mastering Machine Learning with Python in Six Steps - 1st Edition.epub

5.0 MB

Goddess of Sex - Drive Your Man Crazy.pdf

606.6 KB

Beginning Linux Programming 4th Edition.pdf

4.6 MB

A Comprehensive Guide to Virtual Private Networks, Volume II: IBM Nways Router Solutions.pdf

7.3 MB

Arduino Playground: Geeky Projects for the Experienced Maker.epub

36.3 MB

Managing Enterprise Systems with the Windows Script Host.epub

5.5 MB

Data-Driven Security.pdf

8.4 MB

Whitepaper Adventures in Secure Mobile Email.pdf

807.4 KB

Image and Video Encryption From Digital Rights Management to Secured Personal Communication.pdf

11.2 MB

Python Programming Cookbook.pdf

2.1 MB

Your Secret Weapon for Getting New Clients: It’s about placing marketing automation right in their hands.pdf

1.9 MB

PKI Uncovered: Certificate-Based Security Solutions for Next-Generation Networks.pdf

4.6 MB

Sustainable Wireless Network-on-Chip Architectures.pdf

10.2 MB

Advanced Java EE Development with WildFly.pdf

33.0 MB

CDM Cyber Defense Magazine: Cyber Warnings.pdf

20.7 MB

Data Mining Tools for Malware Detection.pdf

9.4 MB

Honeypots and Routers: Collecting Internet Attacks.pdf

2.5 MB

Pro Visual C++-CLI and the .NET 2.0 Platform.pdf

24.2 MB

Psychosocial Criminology: An Introduction.pdf

1.3 MB

Configuring Cisco Unified Communications Manager and Unity Connection, 2nd Edition.pdf

14.9 MB

PMP Project Management Professional Exam Study Guide 7th Edition.epub

7.9 MB

Ubuntu Linux Bible - Free PDF Books.pdf

29.9 MB

Researching UX: Analytics.pdf

4.6 MB

Java NIO Programming Cookbook: Hot Recipes for the Java NIO Library.pdf

1.4 MB

The Cat Owner's Handbook (2001).epub

39.0 MB

CCNA Security Portable Command Guide.pdf

5.5 MB

Linear Algebra: Gateway to Mathematics.djvu

10.2 MB

Hacked, Attacked and Abused: Digital Crime Exposed.pdf

919.8 KB

Think Different: How to Build your Own Hackintosh.pdf

5.2 MB

Unsupervised Deep Learning in Python: Master Data Science and Machine Learning with Modern Neural Networks written in Python and Theano.epub

179.7 KB

Computer Architecture: A Quantitative Approach.pdf

12.5 MB

jQuery Programming Cookbook.pdf

2.5 MB

Getting Started with Raspberry Pi Zero by Christian Cawley.pdf

1.3 MB

Firewall and Proxy Server HOWTO.pdf

192.3 KB

Programming Linux Games: Early Access.pdf

1.9 MB

OCP Oracle Database 12c Administrator Certified Professional Study Guide.pdf

8.8 MB

Manage Partitions with GParted How-To.epub

6.0 MB

The Art Of Memory Forensics - Detecting Malware And Threats In Windows Linux And Mac Memory.pdf

6.6 MB

UNIX Unleashed 4th Edition.pdf

3.9 MB

A Comprehensive Guide to Virtual Private Networks, Volume I: IBM Firewall, Server and Client Solutions.pdf

6.2 MB

Linux Programming: Building and Debugging.epub

282.4 KB

Qubes OS 3.2: The Most Secure Linux Operating System.pdf

1.7 MB

Mastering RethinkDB.pdf

15.1 MB

Virtual Honeypots: From Botnet Tracking to Intrusion Detection.chm

4.3 MB

Guide to Computer Forensics and Investigations: Processing Digital Evidence.pdf

26.3 MB

CEO FRAUD: Prevention Manual.pdf

2.8 MB

Artificial Intelligence with Python.epub

51.4 MB

Networks of New York: An Illustrated FIeld Guide to Urban Internet Infrastructure.epub

5.8 MB

Python The Complete Manual: The Essential Handbook for Python Users.pdf

14.5 MB

Everything Linux Users Need to Know About Installing a VPN.pdf

796.5 KB

Modern C++ Programming Cookbook.azw3

820.2 KB

Maximize Your Social: A One-Stop Guide To Building a Social Media Strategy.pdf

190.3 KB

Unofficial Guide to Tor: Really Private Browsing.pdf

1.8 MB

Want To Know Who’s Trying To Unlock Your Phone: Catch Them In The Act.pdf

841.3 KB

JavaScript-Interview-Questions.pdf

2.0 MB

CCNA Security 640-554: Official Cert Guide.pdf

26.1 MB

Go Programming Blueprints 2nd Edition.pdf

11.1 MB

D3.js 4.x Data Visualization 3rd Edition.azw3

6.9 MB

National Centre for Cyberstaling Research: A Practical Guide to Coping with Cyberstalking.pdf

1.9 MB

Security Intelligence - A Practitioners Guide to Solving Enterprise Security Challenges.pdf

10.9 MB

CSS Programming Cookbook.pdf

7.4 MB

Pro SQL Database for Windows Azure 2nd Edition - FreePdfBook.pdf

10.1 MB

Quick and Dirty Guide to Subnetting.pdf

435.8 KB

Quantum Inspired Computational Intelligence.pdf

41.8 MB

Hibernate Recipes: A Problem-Solution Approach.pdf

2.7 MB

Elementary Linear Algebra, First Canadian Edition.pdf

166.5 MB

Intel Edison Projects.pdf

11.0 MB

Wireless Safety Certification Wireless 5.pdf

3.5 MB

Cybersecurity Illustrated: Just Essentials in 2 Hours.pdf

1.8 MB

Computer Networking Concepts.pdf

731.7 KB

Applied Computing in Medicine and Health.pdf

15.9 MB

Building web apps with Node.js: Build scalable server-side and networking applications.pdf

3.7 MB

CCNA Data Center Introducing Cisco Data Center Technologies Study Guide.epub

6.5 MB

Mastering Enterprise JavaBeans And the Java TM 2 Platform, Enterprise Edition.pdf

5.4 MB

BackTrack 4: Assuring Security by Penetration Testing.pdf

6.2 MB

The Definitive Guide to How Computers Do Math Featuring the Virtual DIY Calculator.pdf

4.2 MB

Foundations of C++-CLI: The Visual C++ Language for .NET 3.5.pdf

3.0 MB

VMware vSphere PowerCLI Reference: Automating vSphere Administration 2nd Edition.pdf

25.4 MB

Virtualization Security: Protecting Virtualized Environments.pdf

19.9 MB

Boost.Asio C++ Network Programming Cookbook.epub

522.8 KB

Web Performance in Action: Building Fast Web Pages.pdf

32.2 MB

The API Obsession and why it matters.pdf

473.7 KB

A Short History of Data Storage.pdf

2.1 MB

Foundations of Logic and Mathematics Applications to Computer Science and Cryptography.pdf

12.1 MB

MAC Protocols for Cyber Physical Systems.pdf

3.3 MB

Linux & Open Source: The Essential Guide to Mastering Open Source Software and Operating Systems.pdf

45.4 MB

Instant Kali Linux - A Quick Guide To Learn The Most Widely Used Operating System By Network Security Professionals.pdf

3.6 MB

Computer Architecture: Pipelined and Parallel Processor Design.epub

12.4 MB

Introduction to Data Science: A Python Approach to Concepts, Techniques and Applications.pdf

7.2 MB

Guide to Convolutional Neural Networks: A Practical Application to Traffic-Sign Detection and Classification.pdf

14.3 MB

10 Things You Must Do With a Brand New Router.pdf

1.1 MB

Network Tutorial 5th Edition.epub

6.2 MB

Negotiating Success: Tips and Tools for Building Rapport and Dissolving Conflict While Still Getting What You Want.pdf

2.2 MB

HTML5 Programming Cookbook.pdf

3.3 MB

Why IT Struggles with Mobility.pdf

2.0 MB

Network And Computer Systems Administrators: Occupational Outlook.pdf

1.7 MB

Multiscreen UX Design: Developing for a Multitude of Devices.pdf

45.1 MB

Enterprise Readiness of Consumer Mobile Platforms.pdf

1.2 MB

Guide to Computer Network Security, 3rd edition.pdf

7.4 MB

Umts Security Book.pdf

2.4 MB

Advances in Network and Distribuded Systems Security.pdf

2.2 MB

CCNA Security Course Booklet 1.0.pdf

17.7 MB

Introduction to Statistical Machine Learning.pdf

18.6 MB

VDI in Financial Services White Paper: Maximizing VDI User Experience in Financial Services - The importance of testing in your desktop virtualization environment.pdf

783.1 KB

How to become a Web Developer.pdf

2.2 MB

Cisco Network Security Little Black Book.pdf

3.2 MB

CCNA Exploration Routing Protocols and Concepts: Course Booklet.pdf

13.0 MB

Sams TeachYourself HTML, CSS & JavaScript Web Publishing in One Hour a Day 7th Edition.pdf

47.1 MB

Beginning Android Games For Android 7.0 3rd Edition.pdf

12.5 MB

Communication Hacking: 5 Actionable Keys for Cultivating Powerful Conversational Change.pdf

24.6 MB

Internet of Things Principles and Paradigms.pdf

22.6 MB

R in Action: Data Analysis and Graphics with R 2nd Edition.epub

13.9 MB

Foundations of Quantum Programming.pdf

2.9 MB

Computational Network Science An Algorithmic Approach.pdf

8.5 MB

Web Developer Interview Questions and Answers.pdf

2.1 MB

The Cyber Pirates: A Comprehensive Guide to the Internet from a Hacker's Eye.pdf

4.6 MB

Cyber Threat- How to Manage the Growing Risk of Cyber Attacks.pdf

1.7 MB

The Python Book: The Ultimate Guide to Coding with Python 2017.pdf

28.2 MB

Advanced Linux 3D Graphics Programming.pdf

15.6 MB

Mastering Bitcoin - Programming the Open Blockchain - 2nd Edition.epub

9.1 MB

Programming a Game with Unity: A Beginner's Guide.pdf

868.7 KB

Hyper-V Security: Secure your Hyper-V hosts and services from intruders and malware.pdf

4.5 MB

Computer Organization Design and Architecture.pdf

13.1 MB

Create Mobile Games with Corona: Build on iOS and Android.pdf

5.4 MB

Linux Tips, Tricks, Apps & Hacks.pdf

40.1 MB

The Software Developer’s Guide to Getting a Job.pdf

389.6 KB

HTML 5 Modern Day Attack And Defence Vectors.pdf

1.8 MB

Modern Programming Made Easy: Using Java, Scala, Groovy, and JavaScript.pdf

2.9 MB

Systems Analysis and Design - 11th Edition.pdf

40.4 MB

Getting Started with IntelliJ IDEA: Exploit IntelliJ IDEA’s unique features to rapidly develop web and Java Enterprise applications.pdf

1.9 MB

Bulletproof Java Code: A Practical Strategy for Developing Functional, Reliable, and Secure Java Code.pdf

236.1 KB

Cross-Platform Game Development: Making PC Games for Windows, Linux, And Mac.pdf

14.7 MB

Cisco ACI Cookbook.pdf

28.0 MB

Groovy 2 Cookbook.pdf

26.3 MB

7 Principles to Upgrade Your Work and Life.pdf

480.2 KB

Procedural Content Generation for Unity Game Development.pdf

6.0 MB

CompTIA Server+ Study Guide.pdf

64.8 MB

Vector Calculus, Linear Algebra, And Differential Forms: A Unified Approach.djvu

9.7 MB

Honeypots: A New Paradigm to Information Security.pdf

3.8 MB

Wimax Security And Quality Of Service Book.pdf

4.3 MB

Modern Web Application Firewalls Fingerprinting and Bypassing XSS Filters.pdf

1.2 MB

Microsoft Excel Your Way to a Better Job.pdf

7.2 MB

Introducing Maven.epub

1.9 MB

Linux Administration: A Beginner’s Guide 7th Edition.pdf

8.2 MB

VirtualMin Tips & Hacks: How to Setup VirtualMin with PHP-FPM and NGinx Reverse Proxy.epub

2.2 MB

WiFi Hacking for Beginners Learn Hacking by Hacking WiFi networks (2017).pdf

617.8 KB

Fiber Optics Installer (FOI) Certification Exam Guide.pdf

10.1 MB

How to Start a Blog with Wordpress.pdf

2.8 MB

PCI Compliance & Security in a Franchise Model: Protecting Your Brand Identity.pdf

901.5 KB

Bootstrap Programming Cookbook.pdf

4.3 MB

Top 100 Tips for Windows 8: Discover the Secrets of Windows 8.epub

1.4 MB

The Growth Hacker Wake Up Call: How Growth Hacking Rewrote Marketing's Best Practices.pdf

159.4 KB

Linux From Scratch.pdf

963.8 KB

Video And Multimedia Transmissions Over Cellular Networks.pdf

8.2 MB

Just Spring Data Access: Covers JDBC, Hibernate, JPA, and JDO.pdf

6.8 MB

How to Install a VPN on Any Raspberry Pi.pdf

901.7 KB

Beginner's Guide to Android App Development: A Practical Approach for Beginner's.pdf

14.1 MB

Griffon in Action.pdf

17.6 MB

Spring Framework Tutorial.pdf

919.6 KB

The Encyclopedia of High-Tech Crime and Crime-Fighting.pdf

2.3 MB

The Essentials of Computer Organization and Architecture.pdf

15.4 MB

Encyclopedia of Gangs.pdf

2.9 MB

Official ISC2 Guide To The CISSP ISSMP CBK - Information Systems Security Management Professional, Second Edition.pdf

7.3 MB

Programming Kotlin Familiarize yourself with all of Kotlin’s features with this in-depth guide.pdf

2.5 MB

Computer Work Stations: A Manager's Guide to Office Automation and Multi-User Systems.pdf

16.8 MB

The Demands of Humanity: Army Medical Disaster Relief.pdf

27.5 MB

Rapid Android Development Build Rich, Sensor-Based Applications with Processing.pdf

3.2 MB

CompTIA Security+ Exam Guide.pdf

21.5 MB

Mastering Microsoft Azure Infrastructure Services.pdf

36.7 MB

CCNA Routing and Switching Review Guide.pdf

11.2 MB

Honeypots for Windows by Roger A. Grimes.chm

16.8 MB

An Information Technology Surrogate for Religion: The Veneration of Deceased Family in Online Games.pdf

1.0 MB

The Best Web Programming Languages to Learn.pdf

1.8 MB

Cyberdeterrence and Cyberwar.pdf

14.5 MB

Power and Security In The Information Age.pdf

793.1 KB

5 Ways to Maximize the Value of Security & Monitoring Tools.pdf

395.5 KB

Smartphone Viruses Are Real: How To Stay Protected.pdf

949.0 KB

Finance at a Crossroads: The Risks of Standing Still.pdf

1.2 MB

Master the Art of Unreal Engine 4 - Blueprints: Creating a 3D Point ‘n Click Adventure.pdf

10.6 MB

Red Hat Linux Security and Optimization.pdf

4.5 MB

Sams Teach Yourself C++ in One Hour a Day 8th Edition.pdf

11.0 MB

Agile Systems Engineering.pdf

92.5 MB

The Salvation Army: How do They Help.pdf

8.9 MB

Linux Bible, 9th Edition.pdf

11.4 MB

Minimizing the Impact of EMV & Churn on Your Subscription Business.pdf

707.8 KB

Ultimate Guide to Raspberry Pi OpenELEC Media Center.pdf

1.5 MB

The Network Security Test Lab.pdf

19.4 MB

The Book of Webmin...or How I Learned to Stop Worrying and Love UNIX.epub

6.0 MB

Linux System Administration.pdf

2.8 MB

6 Modern Security Tools For Windows 8!.pdf

490.3 KB

MongoDB Cookbook 2nd Edition.pdf

3.4 MB

gnuplot in Action 2nd Edition: Understanding Data with Graphs.pdf

23.8 MB

PCI DSS Compliance for Restaurants: The Road to Becoming Hack-Proof.pdf

1.1 MB

Ethical Hacking & Countermeasures: Web Applications & Data Servers.pdf

14.1 MB

A Quick Guide on Building a GPU Mining Rig 3rd Edition.pdf

18.7 MB

Bash Command Line Pro Tips.pdf

243.8 KB

Hacking into Thinking Machines: Get Ready to Learn to Burst The BUbble of Protection that Your Device Has.pdf

4.3 MB

Discovering Vulnerable Web Applications.pdf

623.6 KB

Linux Essentials 2nd Edition.epub

1.4 MB

CWNA Certified Wireless Network Administrator Official Study Guide 4th Edition.pdf

18.2 MB

Cybersecurity Fundamentals: Risks, Procedures, & Integration.pdf

3.0 MB

The Thought Leader Manifesto: Strategies for Building & Leverage Your Influence.pdf

332.1 KB

Unity Animation Essentials.pdf

9.4 MB

Structured Search for Big Data From Keywords to Key-objects.pdf

6.8 MB

Growth gets complicated: Prepare to scale your business with cloud-based, single-source financial and commerce management.pdf

827.3 KB

Linux - The Complete Manual: Easy Step-by-Step Workshops.pdf

17.4 MB

Guide to Flow-Aware Networking: Quality-of-Service Architectures and Techniques for Traffic Management.pdf

11.6 MB

Advanced Penetration Testing: Hacking the World's Most Secure Networks.epub

3.4 MB

The Training Employee Plan Playbook.pdf

200.7 KB

Google Analytics Integrations.pdf

6.1 MB

MMOs from the Outside In: The Massively Multiplayer Online Role-Playing Games of Psychology, Law, Government, and Real Life.pdf

4.9 MB

Pro Unity Game Development with Csharp - PDF Books.pdf

10.6 MB

Your Complete Guide to Windows Customization.pdf

2.4 MB

Developing Online Games: An Insider's Guide.chm

2.8 MB

Introductory College Mathematics with Linear Algebra and Finite Mathematics.pdf

19.6 MB

Apache Maven Dependency Management.epub

3.5 MB

AWS Certified Solutions Architect: Official Study Guide.pdf

11.3 MB

A Practical Guide To Fedora And Red Hat Enterprise Linux 6th Edition.pdf

11.9 MB

PMP Project Management Professional Exam Study Guide 8th Edition.epub

2.0 MB

How to Fix 5 Common iPhone & iPad Security Threats.pdf

953.6 KB

CCNA Routing and Switching Complete Study Guide 2nd Edition.epub

18.3 MB

Data Science & Complex Networks.pdf

3.4 MB

The Managers Guide to Web Application Security.pdf

2.1 MB

Beginning Hibernate: Effectively Learn Hibernate, Including Coverage of Latest Hibernate 4.pdf

2.6 MB

Predicting Malicious Behavior: Tools and Techniques for Ensuring Global Security.epub

9.7 MB

Railway Infrastructure Security.pdf

6.9 MB

Juniper Networks Warrior.epub

8.4 MB

JSP Java Server Pages.pdf

793.5 KB

Spring Data: Modern Data Access for Enterprise Java.epub

6.5 MB

Bash It Out - Strengthen Your Bash knowledge with 17 Scripting Challenges.pdf

1.8 MB

CoreOS in Action: Running Applications on Container Linux.pdf

5.5 MB

Web Server Administration: Web Warrior Series.pdf

14.7 MB

Unity in Action: Covers Unity 5.0 Multiplatform Game Development in C#.epub

10.4 MB

CCNP TSHOOT 6.0 Student Lab Manual.pdf

46.2 MB

Geometry Essentials For Dummies.epub

10.2 MB

Linux Developers: Jumpstart Your Linux Programming Skills.pdf

6.0 MB

A Course in Linear Algebra.pdf

24.4 MB

Virtualization Essentials 2nd Edition.pdf

11.6 MB

Understanding the Linux Virtual Memory Manager.pdf

8.7 MB

Effective DevOps: Building a Culture of Collaboration, Affinity, and Tooling at Scale.epub

6.5 MB

Untangle Network Security.pdf

8.7 MB

Cyber Security Policy Guidebook.pdf

3.4 MB

Malware Diffusion Models for Modern Complex Networks: Theory and Applications.pdf

8.8 MB

Linear Algebra, Geodesy, and GPS.djvu

4.6 MB

Cybersecurity 101: What You Absolutely Must Know Vol.1 Learn How not to be Pwned, Thwart Spear Phishing and Zero Day Exploits, Cloud Security Basics and Much More.pdf

628.8 KB

Expert C++-CLI: .NET for Visual C++ Programmers.pdf

2.7 MB

Thse Are the Droids you are looking for: An Android Guide.pdf

2.1 MB

Roaming In Wireless Networks Book.pdf

2.5 MB

Linux Networking Clearly Explained.pdf

1.4 MB

Apache Maven Cookbook: Over 90 hands-on recipes to succesfully build and automate development life cycle tasks following Maven conventions and best practices.epub

17.2 MB

How to Become a DATA GOVERNANCE EXPERT.pdf

4.3 MB

Unity Character Animation With Mecanim.pdf

6.2 MB

Android and iOS Apps Testing at a Glance.pdf

1.6 MB

Opensuse Linux Unleashed.pdf

12.5 MB

31 Days Before Your CCENT Certification.pdf

1.8 MB

Open Networks: When Users Create a Network.pdf

2.9 MB

OCP Oracle Certified Professional Programmer II Study Guide Exam 1Z0-809.pdf

14.1 MB

The Essential Work-Life Balance Cheat Sheet.pdf

2.0 MB

5 Lightweight Linux Distros Ideal for an Intel Atom Processor PC.pdf

3.7 MB

Java Application Development on Linux.pdf

3.4 MB

Self- and Co- regulation in Cybercrime, Cybersecurity and National Security.pdf

1.7 MB

Computer Security ESORICS 2013 - 18th European Symposium on Research in Computer Security.pdf

8.4 MB

Alternatives to Prison: Options for and Insecure Society.pdf

2.7 MB

Intrusion Detection in Wireless Ad-Hoc Networks.pdf

4.7 MB

Signals and Communication Technology.pdf

13.4 MB

Guide to Computing Fundamentals in Cyber-Physical Systems: Concepts, Design Methods, and Applications.pdf

8.3 MB

Make - Making Things Smart.pdf

40.2 MB

Groovy in Action: Covers Groovy 2.4 2nd Edition.pdf

21.2 MB

Groovy and Grails Recipes.pdf

3.3 MB

Can You Run It On Linux: 10 Vital Apps You’ll Want When You Switch.pdf

533.3 KB

A Comprehensive Mobile Threat Assessment of 7 Million iOS and Android Apps.pdf

3.2 MB

Geometry For Dummies.epub

11.5 MB

DDoS Attacks Evolution, Detection, Prevention, Reaction, and Tolerance.pdf

10.5 MB

Blogs: 21st Century Skills Innovation in Entertainment.pdf

1.5 MB

Cybersecurity for Executives A Practical Guide.pdf

2.7 MB

Simple CISSP.pdf

1.4 MB

Programming In C Unix System Calls And Subroutines Using C.pdf

3.0 MB

Introduction to Computer Networks and Cybersecurity.pdf

41.4 MB

The Essential Cyber Security Handbook.pdf

926.7 KB

Python Web Scraping - 2nd Edition.pdf

15.5 MB

Clojure for Finance: Leverage the power and flexibility of the Clojure language for finance.pdf

1.7 MB

BAE Systems Business Defense 2017.pdf

1.1 MB

PKI Implementing and Managing E-Security.pdf

10.4 MB

wxPython Application Development Cookbook: Over 80 step-by-step recipes to get you up to speed with building your own wxPython applications.pdf

2.6 MB

Hacking Secret Ciphers with Python.pdf

6.9 MB

Unreal Engine Physics Essentials.pdf

11.0 MB

MMOs from the Inside Out: The History, Design, Fun, and Art of Massively-Multiplayer Online Role-Playing Games.pdf

10.1 MB

Android TV Apps Development: Building for Media and Games.pdf

2.2 MB

Cisco ISE for BYOD and Secure Unified Access.pdf

23.2 MB

Transnational Security.pdf

3.7 MB

Battle of Botcraft: Fighting Bots in Online Games with Human Observational Proofs.pdf

1.6 MB

CompTIA Cybersecurity Analyst (CSA+) Study Guide: Exam CS0-001.epub

6.0 MB

Multiplayer Game Development with HTML5: Build fully-featured, highly interactive multiplayer games with HTML5.pdf

2.1 MB

OpenCV By Example: Enhance your understanding of Computer Vision and image processing by developing real-world projects in OpenCV 3.pdf

15.3 MB

Linux Recipes For Oracle Dbas.pdf

8.0 MB

Nmap: Network Exploration and Security Auditing Cookbook 2nd Edition.azw3

1.4 MB

Simulation Technologies In Networking And Communications.pdf

14.0 MB

The Best Tweaks You Can Make To Your Android Without Rooting.pdf

267.8 KB

Oracle Database Gateway Installation And Configuration Guidefor Linux.pdf

1.1 MB

Guide to Wireless Mesh Networks.pdf

14.0 MB

Concurrent Programming on Windows - Free Pdf Book.pdf

9.2 MB

Hacking Exposed Mobile Security Secrets And Solutions.pdf

6.0 MB

Upgrading and Repairing Networks.chm

17.3 MB

8 Instances You Weren’t Using a VPN, but Should’ve Been; The VPN Checklist: Should You Be Using One.pdf

1.9 MB

Understanding IPv6 Covers Windows 8 and Windows Server 2012.pdf

28.0 MB

Sentiment Analysis in Social Networks.pdf

10.9 MB

Head First Agile: A Brain-Friendly Guide.pdf

55.1 MB

PCI DSS v3-2: Requirements and Security Assessment Procedures.pdf

1.8 MB

Hacking Raspberry Pi.pdf

20.1 MB

IntelliJ IDEA Essentials: Develop better software fast with IntelliJ IDEA.pdf

7.4 MB

Data Mining Practical Machine Learning Tools and Techniques 4th Edition.pdf

4.2 MB

Ajax Hacks.epub

3.1 MB

GNU-Linux Rapid Embedded Programming: Your one-stop solution to embedded programming on GNU-Linux.pdf

34.7 MB

Everyday Data Structures.epub

580.4 KB

Computer security: a 5-minute talk to owners of small businesses, home businesses, and to home users.pdf

423.6 KB

Getting Started with Java EE Security.pdf

2.7 MB

SDN and NFV Simplified: A Visual Guide to Understanding Software Defined Networks and Network Function Virtualization.epub

15.8 MB

How to Install Android on Your PC With Remix OS 3.0.pdf

1.8 MB

WHITEPAPER: How to Transform Employee Worst Practices Into Enterprise Best Practices.pdf

3.0 MB

Continuous Delivery: Reliable Software Releases Through Build, Test, and Deployment Automation.pdf

14.5 MB

Digital Security- Cyber Terror and Cyber Security.pdf

12.6 MB

How to Use Android without Google.pdf

2.4 MB

A Guide to Assessing the Network Benefits and Requirements of Cloud VoIP.pdf

1.8 MB

Homicide Investigation: An Introduction.pdf

15.4 MB

Network+ Guide to Networks 7th Edition.pdf

49.8 MB

A Comprehensive Guide to Virtual Private Networks, Volume III: Cross-Platform Key and Policy Management.pdf

9.1 MB

The Complete Visual Guide to Good Dog Training (2012).epub

149.5 MB

Big Data: Principles and Paradigms.pdf

37.4 MB

Mathematical Foundations of Public Key Cryptography.pdf

5.5 MB

Unity iOS Game Development.pdf

12.6 MB

Cracking, Patching - Secugenius Security Solutions Reverse Engineering.pdf

2.9 MB

Geometry for Dummies: 1001 Practice Problems.pdf

6.7 MB

Linux All In One For Dummies 5th Edition Book.pdf

11.4 MB

Target Detection and Tracking by Bionanosensor Networks.pdf

2.8 MB

Safe and productive browsing in a dangerous web world: The Challenge for business.pdf

125.8 KB

2017 Email Deliverability Guide.pdf

517.7 KB

The Data Protection Officer: Profession, Rules, and Role.pdf

9.1 MB

Game Development and Simulation with Unreal Technology.pdf

13.4 MB

Computer Organization and Architecture: Designing for Performance 9th Edition.pdf

6.4 MB

Guide to Wireless Ad Hoc Networks.pdf

10.8 MB

Network Security A Beginners Guide Third Edition.pdf

14.9 MB

From Social Data Mining and Analysis to Prediction and Community Detection.pdf

6.5 MB

3D Online Multimedia & Games: Processing, Transmission and Visualization.pdf

4.9 MB

3D Game Engine Architecture: Engineering Real-Time Applications with Wild Magic.pdf

7.0 MB

Learning Web Development with React and Bootstrap.pdf

10.4 MB

10 Easy Ways to Restore Your Linux System.pdf

2.2 MB

Foundations of Cryptography Volume I Basic Tools.pdf

1.9 MB

The Five Step Guide to Better Social Media Security: A Hootsuite White Paper.pdf

386.5 KB

Software Defined Networks: A Comprehensive Approach 2nd Edition.pdf

27.1 MB

Spring Persistence with Hibernate 2nd Edition.pdf

7.2 MB

Game Engine Architecture 2nd Edition.pdf

73.4 MB

Just Hibernate: A Lightweight Introduction to the Hibernate Framework Covers 2.0.pdf

5.8 MB

Protecting Mobile Networks and Devices: Challenges and Solutions.pdf

16.2 MB

The Practice of Network Security Monitoring.pdf

19.0 MB

Mastering AutoCAD and AutoCAD LT.pdf

183.7 MB

Improving Code Quality: A Survey of Tools, Trends, and Habits Across Software Organizations.pdf

5.8 MB

MCSA Windows 10 Study Guide Exam 70-698.epub

7.7 MB

Six Essential Elements of Web Application Security: Cost Effective Strategies for Defending Your Business.pdf

1.6 MB

Fast Breach Mitigation Without Network Disruption.pdf

640.0 KB

Groovy for Domain-Specific Languages.pdf

11.7 MB

Security for Small Business: Key Website Security Facts to Know.pdf

934.8 KB

The Four Faces of Nuclear Terrorism.pdf

2.1 MB

150 Recipes in a 13x9 Pan.epub

33.1 MB

Practical Machine Learning Cookbook: Resolving and Offering Solutions to Your Machine Learning Problems with R.pdf

38.2 MB

Principles of Data Structures Using C and C++.pdf

2.5 MB

Hackers - Heroes Of The Computer Revolution.pdf

2.8 MB

Python for Graph and Network Analysis.pdf

6.8 MB

CCNA Routing and Switching 200-125 5th Edition.epub

15.5 MB

MOBILE MARKETING COOKBOOK: Whip up the best push notification strategy.pdf

19.3 MB

Think Like a Hacker: A Sysadmin's Guide to Cybersecurity.epub

301.5 KB

Canning Spam: You;ve Got Mail That You Don't Want.pdf

1.0 MB

fu9nX8pX.pdf

665.1 KB

UMTS Radio Network Planning, Optimization and QoS Management.pdf

5.4 MB

The Aging Networks A Guide to Programs and Services 7th Edition.pdf

1.3 MB

Jump Start PHP Environment.pdf

12.2 MB

Java 9 with JShell.epub

4.4 MB

Computer Network Architects: Occupational Outlook.pdf

1.7 MB

Linear Algebra - Georgi E. Shilov.epub

14.7 MB

Python Deep Learning: Next generation techniques to revolutionize computer vision, AI, speech and data analysis.pdf

5.1 MB

WordPress Security Checklist.pdf

106.6 KB

Statistics For Big Data For Dummies.epub

3.5 MB

What to Eat and How to Eat It - 99 Super Ingredients for a Healthy Life (2017).epub

80.4 MB

IntelliJ IDEA in Action.pdf

11.7 MB

Linux Bible 2010 Edition.pdf

10.1 MB

100 Time, Energy, And Attention Hacks to Be More Productive.pdf

2.1 MB

Mastering the SEO Battlefield: WInning Strategies for Search Marketing Programs.pdf

2.9 MB

Linux Mint System Administrators.pdf

5.5 MB

Chemical and Biomedical Engineering Calculations Using Python.pdf

3.8 MB

DevOps Troubleshooting Linux Server Best Practices.pdf

3.9 MB

Network Forensics for Attack Mitigation: Expert Reference Series of White Papers.pdf

260.7 KB

Best Android Browser: Chrome vs Firefox vs Opera vs Dolphin.pdf

3.5 MB

Maven: The Complete Reference.pdf

6.7 MB

Rights for Victims of Crime.pdf

1.4 MB

Smart Devices, Smart Security.pdf

561.9 KB

The Arduino Inventor's Guide (2017).pdf

16.1 MB

Linux Security.pdf

3.3 MB

Mastering Solaris 8.pdf

15.1 MB

What Is The Most Secure Mobile Operating System.pdf

4.3 MB

Linux In A Nutshell 6th Edition.pdf

5.8 MB

Learning Aurelia.pdf

6.9 MB

DNS Security Management.pdf

6.1 MB

Radio Network Planning and Optimisation for UMTS 2nd Edition.pdf

13.6 MB

Software Architecture with Python.epub

4.3 MB

Programming Linux Games.pdf

3.6 MB

TensorFlow Machine Learning Cookbook.pdf

4.2 MB

Computer Architecture: Software Aspects, Coding, and Hardware.pdf

18.5 MB

Beginning Hibernate: For Hibernate 5 4th Edition.pdf

10.6 MB

Kali Linux Network Scanning Cookbook - 2nd Edition.pdf

77.1 MB

Programming Groovy 2: Dynamic Productivity for the Java Developer.epub

3.2 MB

How to Hack Whats App Account.pdf

1.2 MB

Mastering Red Hat Enterprise Linux 3.pdf

29.9 MB

Data Analysis For Network Cyber-Security.pdf

5.6 MB

The Web as History - Using Web Archives to Understand the Past and the Present (2017).pdf

19.9 MB

Advanced Cybercrime-terrorism Report: Threats to Network Connected Infrastructure and Drug Trafficking through Autonomously flying Drones.pdf

182.4 KB

EJB 3 Developer Guide: A Practical Guide for developers and architects to the Enterprise Java Beans Standard.pdf

4.3 MB

Fundamentals of Wearable Computers and Augmented Reality 2nd Edition.pdf

22.3 MB

7 Password Mistakes That Will Likely Get You Hacked.pdf

1.5 MB

Fedora 11 And Red Hat Enterprise Linux Bible.pdf

12.0 MB

Information Security The Complete Reference 2nd Edition.pdf

13.0 MB

AngularJS Programming Cookbook.pdf

2.0 MB

The Hacker’s Diet: How to lose weight and hair through stress and poor nutrition.pdf

2.0 MB

/.../0298_02_Code/src/

SockShutdownServer.cpp

1.3 KB

ReadingFromTCPSockAsyncEnhanced.cpp

2.1 KB

FixedLengthBufferOutput.cpp

0.5 KB

CancellingAsyncOperations.cpp

2.3 KB

ReadingFromTCPSockSync.cpp

1.7 KB

ExtensibleStreamOrientedBuffer.cpp

0.6 KB

WritingToTCPSockAsync.cpp

2.3 KB

SockShutdownClient.cpp

1.4 KB

WritingToTCPSockAsyncEnhanced.cpp

1.9 KB

WritingToTCPSockSync.cpp

1.2 KB

ReadingFromTCPSockAsync.cpp

2.3 KB

FixedLengthBufferInput.cpp

0.7 KB

/Boost.Asio C++ Network Programming Cookbook Source Code/

B00298_Software and hardware list.docx

29.4 KB

/.../0298_03_Code/src/

AsyncTCPClientMT.cpp

8.0 KB

SyncTCPClient.cpp

1.8 KB

AsyncTCPClient.cpp

7.8 KB

SyncUDPClient.cpp

2.1 KB

/.../0298_01_Code/src/

Creating_an_active_socket_TCP_IPv4_open_in_constructor.cpp

0.6 KB

Creating_endpoint_Server.cpp

0.8 KB

Creating_endpoint_Client.cpp

1.1 KB

Connecting_a_socket.cpp

1.0 KB

Resolving_a_DNS_name_TCP.cpp

1.2 KB

Creating_a_passive_socket.cpp

0.9 KB

Resolving_a_DNS_name_UDP.cpp

1.3 KB

Accepting_a_connection.cpp

1.4 KB

Creating_an_active_socket_TCP_IPv4.cpp

0.9 KB

Connecting_a_socket_DNS_name.cpp

1.4 KB

Binding_a_socket_UDP_active.cpp

0.9 KB

Binding_a_socket_TCP_passive.cpp

0.9 KB

/.../0298_06_Code/src/

StreamBasedIO.cpp

0.4 KB

CompositeBuffersScatterInput.cpp

0.7 KB

CompositeBuffersGatherOutput.cpp

0.8 KB

Timers.cpp

1.1 KB

SocketOptions.cpp

1.1 KB

/.../0298_05_Code/src/

SyncSSLServer.cpp

3.1 KB

SyncSSLClient.cpp

3.0 KB

HTTPServer.cpp

9.5 KB

HTTPClient.cpp

13.2 KB

/.../0298_04_Code/src/

AsyncParallel.cpp

5.0 KB

SyncIterative.cpp

2.0 KB

SyncParallel.cpp

2.3 KB

/samples/

meh.data

915.3 KB

meh_forum.data

7.3 MB

meh_details.data

67.6 KB

/default/

setup.xml

0.3 KB

eventgen.conf

2.1 KB

sdgsetup.conf

0.0 KB

datamodels.conf

0.0 KB

indexes.conf

0.2 KB

alert_actions.conf

0.1 KB

eventtypes.conf

0.6 KB

tags.conf

0.1 KB

restmap.conf

0.1 KB

macros.conf

4.2 KB

props.conf

0.3 KB

transforms.conf

0.4 KB

workflow_actions.conf

0.4 KB

inputs.conf

0.1 KB

app.conf

0.2 KB

savedsearches.conf

2.2 KB

collections.conf

0.0 KB

/default/data/models/

Meh.json

12.8 KB

/default/data/ui/views/

poll_results.xml

6.8 KB

search.xml

0.1 KB

key_value_stores.xml

0.1 KB

overview.xml

5.2 KB

/default/data/ui/html/

key_value_stores.html

8.8 KB

overview.html

23.5 KB

/default/data/ui/nav/

default.xml

0.3 KB

/default/data/ui/alerts/

file_write.html

0.4 KB

/lookups/

meh_products.csv

743.3 KB

/README/

alert_actions.conf.spec

0.1 KB

inputs.conf.spec

0.2 KB

/Splunk Developer's Guide Source Code/

README.md

0.9 KB

/appserver/static/build/

bower.json

0.4 KB

gulpfile.js

0.5 KB

package.json

0.3 KB

/appserver/static/js/

d3.min.js

151.1 KB

d3boxPlot.js

8.7 KB

jquery.sidr.min.js

3.7 KB

d3boxplotModule.js

2.3 KB

/appserver/static/css/

jquery.sidr.dark.css

3.5 KB

/appserver/static/

dashboard.css

0.4 KB

dashboard.js

1.0 KB

/lib/

eventgenconfig.py

32.0 KB

python_dateutil-1.4.1-py2.7.egg

230.4 KB

timeparser.py

10.3 KB

eventgensamples.py

66.6 KB

eventgenoutput.py

22.4 KB

/bin/

eventgenprof.py

5.6 KB

get_speed.sh

0.2 KB

eventgen_rest_handler.py

0.9 KB

package.py

2.5 KB

test.sh

0.2 KB

eventgen.py

6.6 KB

meh_details.py

5.2 KB

sdgHandler.py

0.8 KB

eventgen.bat

0.1 KB

meh_forum.py

5.2 KB

meh.py

5.2 KB

sdgAPI.py

7.8 KB

caa_file_write.py

0.3 KB

/metadata/

local.meta

3.2 KB

default.meta

0.1 KB

/Chapter 13/

nyc-sat-scores.Rmd

4.3 KB

nyc-sat-scores.R

4.2 KB

/Chapter 10/

music-recommendations.R

4.7 KB

/Chapter 12/

our_cpp_functions.cpp

1.7 KB

chapter12.R

6.0 KB

 

Total files 606


Copyright © 2024 FileMood.com