FileMood

Download Study

Study

Name

Study

  DOWNLOAD Copy Link

Trouble downloading? see How To

Total Size

1.9 GB

Total Files

118

Hash

A51A22D525D48AB736849ED930FC344131F1A52B

/Comp-Arch & OS/

Computer Architechture.pdf

5.8 MB

Computer Hardware Main Components.pdf

622.7 KB

Computer Organisation & Fundementals.pdf

2.1 MB

Computer Systems - A Programmers Perspective.pdf

7.1 MB

Embedded Hardware.pdf

10.8 MB

How Computers Work (8th Edition).pdf

40.9 MB

Operatin System Internals and Design Principles.pdf

15.2 MB

Operating System Concepts.pdf

42.6 MB

The Indispensable PC Hardware Book - Third Edition.pdf

31.1 MB

/Linux_Unix/

Advanced Bash Scripting - Mendel Cooper.pdf

2.7 MB

Classic Shell Scripting.pdf

8.0 MB

Essential System Administration.pdf

10.4 MB

Learning the bash Shell - Unix Shell Programming.pdf

1.7 MB

Linux - The Complete Reference.pdf

9.3 MB

Linux Bible.pdf

11.3 MB

Linux Command line & Shell Scripting Bible.pdf

15.1 MB

Sed & Awk.pdf

2.4 MB

The Design of Unix Operating System.pdf

109.0 MB

The Linux Command Line - A Complete Introduction.pdf

6.2 MB

UNIX and Linux System Administration Handbook (4th Edition).pdf

16.9 MB

Understanding Linux Kernel.pdf

5.6 MB

Understanding Linux Network Internals.pdf

12.0 MB

Unix Power Tools.pdf

8.8 MB

/Networking/

Computer Networking - A Top-Down Approach.pdf

8.7 MB

Data Communications and Networking By Behrouz A.Forouzan.pdf

11.4 MB

Internetworking with TCP_IP Vol I.pdf

38.8 MB

Mobile Communciations by Jochen Schiller.pdf

19.1 MB

TCP-IP Illustrated Vol.3.pdf

42.0 MB

/Programming/

64 Bit Intel Assembly Language Programming for Linux.pdf

5.1 MB

Advanced Programming in the UNIX Environment.pdf

8.9 MB

Alfred V. Aho - Data Structures and Algorithms.pdf

6.9 MB

Linux System Programming Talking Directly to the Kernel and C Library.pdf

9.1 MB

The Art of Assembly Language.pdf

23.3 MB

The Linux Programming Interface.pdf

7.3 MB

/Programming/C/

21st Century C.pdf

4.8 MB

Advanced C.pdf

4.3 MB

C Primer Plus.pdf

5.6 MB

C Puzzle Book.pdf

2.3 MB

C++ Primer Plus.pdf

6.7 MB

Expert C Programming.pdf

2.3 MB

Memory Management in C.pdf

425.5 KB

Programming in C - Stephen G.Cochan.pdf

5.2 MB

/Programming/Network/

Java Network Programming.pdf

11.8 MB

Network Programming in C.pdf

280.1 KB

Python Network Programming.pdf

5.3 MB

TCP IP Sockets in C.pdf

1.3 MB

Unix Network Programming Volume 1.pdf

14.4 MB

Unix Network Programming Volume 2.pdf

22.2 MB

/Programming/Perl/

Learning Perl.pdf

9.3 MB

Perl Pocket Reference.pdf

2.4 MB

Programming Perl.pdf

16.4 MB

/Programming/Python/

Learning Python.pdf

8.7 MB

Programming in Python.pdf

7.4 MB

Python for Unix Sys Admins.pdf

3.6 MB

/Security/

Advanced Operating Systems and Kernel Applications Techniques and Technologies.pdf

6.5 MB

Backtrack5 Wireless Penetration Testing.pdf

17.4 MB

Big Book of Windows Hacks.pdf

77.4 MB

Build Your Own Security Lab for Network Testing.pdf

9.0 MB

Hack Attacks Revealed.pdf

8.6 MB

Hackers Delight.pdf

25.7 MB

Hacking - The Art of Explotation.pdf

4.2 MB

Hacking Exposed.pdf

34.6 MB

Hacking Secret Ciphers with Python.pdf

6.9 MB

Hacking Windows.pdf

10.1 MB

Hacking the Xbox.pdf

18.6 MB

Hands-On Ethical Hacking and Network Defense.pdf

87.4 MB

Hardening Linux.pdf

6.6 MB

Hardening the Operating System.pdf

1.5 MB

Kevin Mitnick - The Art of Deception.pdf

5.4 MB

Kevin Mitnick - The Art of Intrusion.pdf

3.2 MB

Letter & Word Frequencies - Major Languages.docx

13.6 KB

Linux Firewalls.pdf

6.8 MB

Linux Server Hacks.pdf

35.9 MB

Network Intrusion Detection.pdf

2.6 MB

P.Languages for Information Security.pdf

1.1 MB

The Shellcoder’s Handbook.pdf

9.2 MB

Trusted Computer System Evaluation Criteria_DoD.pdf

433.3 KB

Trusted Computing for Military Applications.pdf

782.9 KB

Violent Python.pdf

7.2 MB

Wi Foo - The Secrets of Wireless Hacking.pdf

8.1 MB

Windows Internals.pdf

22.7 MB

/Security/Crypto/

Applied Cryptography - Bruce Schenier.pdf

2.9 MB

Cryptography and Network Security - William Stallings.pdf

8.4 MB

Encryption Solution Design and Deployment Considerations.pdf

1.9 MB

Handbook Of Applied Cryptography.pdf

12.3 MB

Implementing SSL_TLS Using Cryptography and PKI.pdf

4.7 MB

Malicious Cryptography - Exposing Cryptovirology.pdf

30.5 MB

/Security/Malware & Forensics/

File System Forensic Analysis.pdf

4.2 MB

Malware Analysts Cookbook.pdf

9.4 MB

Practical Malware Analysis.pdf

9.9 MB

Secrets of Reverse Engineering.pdf

9.0 MB

The Giant Black Book of Computer Viruses.pdf

6.0 MB

X86 Disassemblypdf

2.2 MB

/Security/Papers/

Chip & Pin Broken_Smart Card Authentication.pdf

1.5 MB

DFA of Secret Key Cryptosystems.pdf

716.0 KB

Differential Cryptanalysis Of DES Like Cryptosystems.pdf

649.7 KB

Malicious Cryptography - Kleptographic Aspects (Academic Paper).pdf

171.6 KB

Modern Game Console Exploitation.pdf

226.4 KB

RSA Timing Attacks.pdf

81.4 KB

RSA Timing Attacks_Boneh.pdf

147.7 KB

Securing & Hardening Linux v1.0.pdf

121.7 KB

Timins Attacks on Public Key Crypto.pdf

211.7 KB

Wireless Hacking Tools.pdf

128.9 KB

/Security/Pen Testing/

Advanced Penetration Testing For Highly Secured Environments.pdf

16.1 MB

Basics of Penetration Testing.pdf

3.9 MB

Counter Hack Reloaded.pdf

13.5 MB

Using Google in Penetration Testing.pdf

15.6 MB

Web Penetration Testing with Kali Linux.pdf

21.2 MB

/Security/Rootkits/

A Guide to Kernel Exploitation.pdf

5.5 MB

BootRoot.pdf

447.5 KB

Designing BSD Rootkits.pdf

8.8 MB

Malware & Rootkits.pdf

11.5 MB

ManagedCodeRootkits.pdf

5.8 MB

Rootkit Arsenal.pdf

85.3 MB

Rootkits - Subverting the Windows Kernel.pdf

2.4 MB

/Security/Tools/

Metasploit - The Penetration Testers Guide.pdf

7.2 MB

Nmap Network Scanning.pdf

444.4 MB

Practical Packet Analysis.pdf

17.3 MB

 

Total files 118


Copyright © 2025 FileMood.com