FileMood

Download USC-1.2

USC

Name

USC-1.2

  DOWNLOAD Copy Link

Trouble downloading? see How To

Total Size

157.5 GB

Total Files

2266

Hash

A0F86E1558D2C0FD8417FB0955CB63930473298A

/.../Macro Making Tools Advanced/

macro.txt

0.0 KB

b64.txt

104.3 KB

background.jpg

50.6 KB

create_b64.py

0.3 KB

invoice.eml

107.4 KB

Invoice955267 - Copy.docm

75.9 KB

Invoice955267.docm

76.2 KB

/.../Quickbooks Online Login_Intuit US_Files/

1.gif

0.0 KB

ARD

0.0 KB

ARD(1)

0.0 KB

ARD(2)

0.0 KB

ARD(3)

0.0 KB

ARD(4)

0.0 KB

ARD(5)

0.0 KB

ARD(6)

0.0 KB

ARD(7)

0.0 KB

ARD(8)

0.0 KB

ARD(9)

0.0 KB

ARD(10)

0.0 KB

ARD(11)

0.0 KB

ARD(12)

0.0 KB

ARD(13)

0.0 KB

ARD(14)

0.0 KB

ARD(15)

0.0 KB

ARD(16)

0.0 KB

ARD(17)

0.0 KB

button_ok.gif

0.0 KB

clear(4).png

0.0 KB

clear.png

0.0 KB

enter.gif

0.0 KB

foo.jpg

0.0 KB

home.css

0.0 KB

ok.gif

0.0 KB

rien.gif

0.0 KB

ARF

0.0 KB

ARF(1)

0.0 KB

check.js(1).download

98.4 KB

check.js.download

137.9 KB

clear(1).png

0.1 KB

clear(2).png

0.1 KB

clear(3).png

0.1 KB

Common_js_bundle-en_US.js.download

23.0 KB

commonutil_global_variables.js.download

3.7 KB

commonutil_min.js.download

89.5 KB

cu_callstack.js.download

0.7 KB

dt-client-win.png

11.8 KB

fp.swf.download

11.1 KB

globalvars.js.download

5.6 KB

harmony.css

125.1 KB

HP.html

59.7 KB

ius-account-lockout.min.js.download

2.3 KB

ius-base-theme-harmony.min.css

5.2 KB

ius-idproofing.min.js.download

42.4 KB

ius-mfa.min.js.download

36.4 KB

ius-password-validator.min.js.download

10.8 KB

ius-recaptcha.min.js.download

12.5 KB

ius-sign-in.min.js.download

78.7 KB

ius-userid-email-account-validator.min.js.download

12.3 KB

ius-verified-user-update.min.js.download

41.6 KB

ius.min.css

40.9 KB

ius.min.js.download

255.2 KB

ius.oauth1.min.js.download

8.2 KB

ius.require.js.download

103.3 KB

ius.xdr.min.js.download

112.5 KB

ividFrame.html

3.0 KB

jquery.intl.tel.input.min.js.download

26.9 KB

jquery.intl.tel.input.util.min.js.download

332.3 KB

jquery.js.download

158.8 KB

jquery.maskedinput.min.js.download

6.5 KB

jscontext.js.download

8.4 KB

login.css

13.2 KB

Login_js_bundle-en_US.js.download

3.0 KB

logo.png

8.2 KB

ls_fp.html

3.2 KB

oii-ivid-perisistence.js.download

11.2 KB

Redir_js_bundle-en_US.js.download

1.1 KB

sbg-config.js.download

27.1 KB

tags.html

4.8 KB

tokens.js(1).download

18.5 KB

tokens.js.download

0.4 KB

verisignseal.png

4.6 KB

xdr.html

7.6 KB

/Unsorted/

Alfresco 3 Web Services.pdf

0.0 KB

ACT! by Sage For Dummies.pdf

10.0 MB

Anarchy Cookbook Version 2000.pdf

918.1 KB

Architecting Complex Event Processing Solutions With TIBCO ( 2014 ).pdf

4.4 MB

BEA Weblogic Server 8 For Dummies.pdf

8.2 MB

Blogging For Dummies (4th edition).pdf

38.4 MB

Business Innovation For Dummies.pdf

4.4 MB

Creating Web Pages All-in-One For Dummies.pdf

17.0 MB

Creating Web Pages For Dummies (8th edition).pdf

11.0 MB

Creating Web Pages For Dummies (9th edition).pdf

9.9 MB

Development With The Force COM Platform ( 3rd Ed ) ( 2014 ).pdf

6.2 MB

DotNetNuke For Dummies.pdf

9.8 MB

Drawing For Dummies (2nd edition).pdf

57.6 MB

Electronics For Dummies.pdf

9.1 MB

Essential Sharepoint 2013 ( 3rd Ed ) ( 2014 ).pdf

18.3 MB

Facebook Application Development For Dummies.pdf

23.2 MB

Facebook Marketing For Dummies.pdf

9.1 MB

Facebook Twitter For Seniors For Dummies.pdf

10.6 MB

GoogleCheatSheet.pdf

157.4 KB

IOS Components And Frameworks ( 2014 ).pdf

8.2 MB

IOS Drawing Practical UIKIT Solutions ( 2014 ).pdf

6.9 MB

Mastering Hyperv 2012r2 With System Center And Windows Azure.pdf

42.6 MB

Practical Cassandra ( 2014 ).pdf

5.1 MB

Professional The Rails 4 Way ( 2014 ).pdf

3.9 MB

Running Mainframe z on Distributed Platforms, How to Create Robust Cost-Efficient Multiplatform z Environments (2014).pdf

9.3 MB

So You Want To Be A Wizard.pdf

65.2 MB

Software Project Management For Dummies (2006).pdf

1.2 MB

SYSML Distilled ( 2014 ).pdf

6.2 MB

Tcl and The Tk Toolkit.pdf

970.8 KB

Teach Yourself Electricity And Electronics (6th Ed)(Gnv64).epub

20.5 MB

Teach Yourself Electricity And Electronics.epub

20.5 MB

The Subtle Art Of Not Giving A Fck (2016).epub

507.6 KB

Understanding And Deploying Ldap Directory Services ( 2nd Ed ) ( 2003 ).pdf

7.2 MB

/Ethical Hacking/

IT Security and Ethical Hacking [video].zip

18.5 GB

Ethical Hacking - Buffer Overflow [video].zip

492.4 MB

Ethical Hacking - Cloud Computing [video].zip

501.6 MB

Ethical Hacking - Cryptography [video].zip

94.9 MB

Ethical Hacking - Denial of Service [video].zip

430.4 MB

Ethical Hacking - Enumeration [video].zip

467.9 MB

Ethical Hacking - Evading IDS, Firewalls, and Honeypots [video].zip

398.1 MB

Ethical Hacking - Hacking Mobile Platforms [video].zip

685.7 MB

Ethical Hacking - Hacking Web Applications [video].zip

839.8 MB

Ethical Hacking - Hacking Web Servers [video].zip

479.7 MB

Ethical Hacking - Hacking Wireless Networks [video].zip

457.7 MB

Ethical Hacking - Malware Threats [video].zip

428.6 MB

Ethical Hacking - Penetration Testing [video].zip

479.6 MB

Ethical Hacking - Reconnaissance_Footprinting [video].zip

696.4 MB

Ethical Hacking - Scanning Networks [video].zip

766.7 MB

Ethical Hacking - Session Hijacking [video].zip

597.9 MB

Ethical Hacking - Sniffing [video].zip

257.0 MB

Ethical Hacking - Social Engineering [video].zip

847.5 MB

Ethical Hacking - SQL Injection [video].zip

958.9 MB

Ethical Hacking - System Hacking [video].zip

395.3 MB

Ethical Hacking - Understanding Ethical Hacking.zip

967.7 MB

Ethical Hacking And Penetration Testing Guide.pdf

104.1 MB

Ethical Hacking for Absolute Beginners! [video].zip

16.5 GB

Ethical hacking Masterclass [video].zip

1.3 GB

Ethical Hacking with Metasploit the Penetration testing Tool [video].zip

867.1 MB

Ethical Hacking With Python, JavaScript and Kali Linux [video].zip

11.3 GB

Ethical Hacking.mp3

136.2 MB

Ethical Hacking.pdf

23.5 MB

Full Ethical Hacking Course - Network Penetration Testing for Beginners (2019).mp4

1.8 GB

Gray Hat Hacking ( 4th Ed ) ( 2015 ).pdf

33.9 MB

Hack Like a Pro - Ethical Hacking from A to Z.zip

8.3 GB

Hacking Exposed Linux ( 3rd Ed ) ( 2008 ).pdf

11.0 MB

Hacking Exposed Network Security Secrets And Solutions ( 2nd Ed ) ( 2000 ).pdf

8.4 MB

Hacking Exposed Network Security Secrets And Solutions ( 3rd Ed ) ( 2001 ).pdf

6.1 MB

The Complete Ethical Hacking Masterclass Beginner To Expert [video].zip

7.8 GB

/Amazon Web Services/

Website Hosting and Migration with Amazon.epub

6.5 MB

The Phoenix Project - A Novel About IT, DevOps, and Helping Your Business Win (Unabridged).mp4

339.8 MB

Ansible From Beginner to Pro.pdf

5.4 MB

AWS Automation Cookbook - Continuous Integration and Continuous Deployment using AWS services.pdf

785.4 KB

AWS Certified Advanced Networking Official Study Guide Specialty Exam.pdf

9.5 MB

AWS Certified Cloud Practitioner ( CLF-C01 ) Cert Guide ( 1St Ed ).epub

2.0 MB

AWS Certified Cloud Practitioner Study Guide ( CLF-C01 ) Exam.pdf

10.8 MB

AWS Certified Developer.pdf

22.0 MB

AWS lambda-dg.pdf

5.8 MB

AWS Migrating your .NET Enterprise Application.pdf

14.9 MB

AWS Solution Architect Associate Exam.pdf

49.8 KB

AWS System Administration - Best Practices for SysAdmins in the Amazon Cloud.epub

3.6 MB

Encrypting sensitive data stored on S3.pdf

194.0 KB

Implementing Cloud Design Patterns for AWS.epub

6.8 MB

Learning Amazon Web Services (AWS) A Hands-On Guide to the Fundamentals of AWS Cloud.epub

29.5 MB

Mastering AWS Lambda.pdf

14.5 MB

Python Web Scraping Cookbook - Over 90 proven recipes to get you scraping with Python, micro services, Docker and AWS.pdf

16.8 MB

Serverless Architectures on AWS - With examples using AWS Lambda.pdf

29.6 MB

Serverless Design Patterns and Best Practices - Build, secure, and deploy enterprise ready serverless applications with AWS to improve developer productivity.epub

15.3 MB

/.../AWS Administration - The Definitive Guide/

AWS Administration - The Definitive Guide ( 2nd Ed ).epub

8.0 MB

AWS Administration - The Definitive Guide.epub

16.2 MB

AWS Administration - The Definitive Guide.mobi

31.2 MB

AWS Administration - The Definitive Guide.pdf

14.8 MB

cover.jpg

37.5 KB

/.../AWS Certified Cloud Practitioner Complete Training Guide With Practice Labs By IPSpecialist/

AWS Certified Cloud Practitione - Ip Specialist.epub

13.2 MB

/.../AWS Certified Solutions Architect Official Study Guide/

AWS Certified Solutions Architect Official Study Guide - Associates Exam.pdf

5.7 MB

AWS Certified Solutions Architect Official Study Guide.pdf

6.5 MB

AWS Certified Solutions Architect Practice Tests - Associate ( SAA-C01 ) Exam.pdf

5.1 MB

AWS Certified Solutions Architect Study Guide ( 2nd Ed ).pdf

12.0 MB

AWS Certified Solutions Architect Study Guide - Associate ( SAA-C01 ) Exam.pdf

12.0 MB

/.../AWS Certified SysOps Administrator Official Study Guide/

AWS Certified SysOps Administrator Official Study Guide - Associate Exam.azw3

5.9 MB

AWS Certified SysOps Administrator Official Study Guide - Associate Exam.pdf

10.9 MB

AWS Certified SysOps Administrator Official Study Guide.epub

7.0 MB

AWS Certified SysOps Administrator Official Study Guide.pdf

17.2 MB

/.../AWS Lambda in Action/

AWS Lambda in Action.epub

11.6 MB

AWS Lambda in Action.mobi

12.8 MB

/Learning AWS/

Learning AWS.epub

13.0 MB

Learning AWS.mobi

19.3 MB

Learning AWS.pdf

10.7 MB

/Certification/CASP/

Computing, Communication, and Business Integration for CASP (CAS-002) [video].zip

250.7 MB

Enterprise Security for CASP (CAS-002) [video].zip

389.9 MB

/Certification/CCENT ICND1/

CCENT ICND1 - Sudy Guide exam100-105.pdf

23.9 MB

/Certification/CCNA/

CCNA Certification All-in-One For Dummies.pdf

68.6 MB

CCNA Routing And Switching Complete Study Guide exams100-105, 200-105, 200-125.pdf

32.4 MB

/Certification/Check Point/

Check Point Certified Security Administrator - Backup and Updating [video].zip

724.4 KB

Check Point Certified Security Administrator - Install & Deploy [video].zip

40.5 KB

/Certification/Cisco Certification/Cisco EnsurePass/2013/

Cisco.EnsurePass.300-135.V13.01.79Q.vce

13.4 MB

Cisco.EnsurePass.300-206.V13.02.108Q.vce

2.4 MB

Cisco.EnsurePass.300-207.V13.02.161Q.vce

2.9 MB

Cisco.EnsurePass.300-208.V13.01.119Q.vce

326.2 KB

Cisco.EnsurePass.300-209.V13.02.137Q.vce

2.4 MB

Cisco.EnsurePass.350-018.V13.05.544Q.vce

4.3 MB

Cisco.EnsurePass.350-029.V13.03.520Q.vce

4.1 MB

Cisco.EnsurePass.350-080.V13.02.352Q.vce

4.3 MB

Cisco.EnsurePass.351-018.V13.02.279Q.vce

2.1 MB

Cisco.EnsurePass.352-001.V13.01.247Q.vce

2.3 MB

Cisco.EnsurePass.400-101.V13.04.628Q.vce

11.0 MB

Cisco.EnsurePass.500-254.V13.01.49Q.vce

253.2 KB

Cisco.EnsurePass.500-265.V13.01.50Q.vce

162.1 KB

Cisco.EnsurePass.640-554.V13.03.246Q.vce

5.4 MB

Cisco.EnsurePass.640-875.V13.01.144Q.vce

7.3 MB

Cisco.EnsurePass.640-878.V13.01.126Q.vce

7.2 MB

Cisco.EnsurePass.640-911.V13.03.131Q.vce

1.9 MB

Cisco.EnsurePass.640-916.V13.02.99Q.vce

1.8 MB

Cisco.EnsurePass.642-035.V13.01.82Q.vce

1.6 MB

Cisco.EnsurePass.642-437.V13.01.256Q.vce

3.1 MB

Cisco.EnsurePass.642-980.V13.01.80Q.vce

1.6 MB

Cisco.EnsurePass.642-997.V13.02.81Q.vce

1.2 MB

Cisco.EnsurePass.642-999.V13.02.89Q.vce

1.8 MB

Cisco.EnsurePass.650-472.V13.01.69Q.vce

185.1 KB

Cisco.EnsurePass.650-474.V13.01.34Q.vce

145.3 KB

Cisco.EnsurePass.700-501.V13.01.50Q.vce

160.7 KB

Cisco.EnsurePass.700-505.V13.01.50Q.vce

411.1 KB

/Certification/Cisco Certification/Cisco EnsurePass/2016/

Cisco.EnsurePass.100-101.V2016.01.386Q.vce

8.1 MB

Cisco.EnsurePass.200-101.V2016.01.320Q.vce

9.2 MB

Cisco.EnsurePass.200-120.V2016.01.323Q.vce

10.6 MB

Cisco.EnsurePass.200-310.V2016.01.50Q.vce

323.3 KB

Cisco.EnsurePass.200-355.V2016.01.277Q.vce

5.5 MB

Cisco.EnsurePass.210-060.V2016.01.92Q.vce

1.6 MB

Cisco.EnsurePass.210-451.V2016.01.50Q.vce

68.4 KB

Cisco.EnsurePass.300-101.V13.02.125Q.vce

4.3 MB

Cisco.EnsurePass.300-101.V2016.01.92Q.vce

4.1 MB

Cisco.EnsurePass.300-115.V2016.01.157Q.vce

6.4 MB

Cisco.EnsurePass.300-206.V2016.01.108Q.vce

2.3 MB

Cisco.EnsurePass.300-207.V2016.01.156Q.vce

1.9 MB

Cisco.EnsurePass.300-208.V2016.01.119Q.vce

246.2 KB

Cisco.EnsurePass.300-320.V2016.01.50Q.vce

281.6 KB

Cisco.EnsurePass.350-018.V13.05.544Q.vce

4.9 MB

Cisco.EnsurePass.400-101.V2016.01.796Q.vce

15.7 MB

Cisco.EnsurePass.400-201.V2016.01.570Q.vce

8.0 MB

Cisco.EnsurePass.500-285.V13.01.45Q.vce

60.9 KB

Cisco.EnsurePass.640-461.V2016.01.280Q.vce

1.6 MB

Cisco.EnsurePass.640-554.V2016.01.300Q.vce

5.6 MB

Cisco.EnsurePass.640-722.V2016.01.272Q.vce

5.1 MB

Cisco.EnsurePass.640-864.V2016.01.371Q.vce

3.0 MB

Cisco.EnsurePass.640-911.V2016.01.131Q.vce

1.8 MB

Cisco.EnsurePass.640-916.V2016.01.99Q.vce

1.7 MB

Cisco.EnsurePass.642-035.V2016.01.82Q.vce

1.6 MB

Cisco.EnsurePass.642-874.V2016.01.136Q.vce

753.8 KB

Cisco.EnsurePass.642-999.V13.02.89Q.vce

1.7 MB

Cisco.EnsurePass.648-375.V13.01.152Q.vce

327.6 KB

V2016.02.Feb.Cisco.EnsurePass.210-065.110Q.vce

2.3 MB

V2016.02.Feb.Cisco.EnsurePass.300-115.163Q.vce

6.5 MB

V2016.02.Feb.Cisco.EnsurePass.352-001.247Q.vce

2.7 MB

V2016.02.Feb.Cisco.EnsurePass.400-101.828Q.vce

16.0 MB

/Certification/CISSP/

CISSP® - Asset Security [video].zip

5.1 MB

CISSP® - Communications and Network Security [video].zip

176.4 MB

CISSP® - Identity and Access Management [video].zip

178.7 MB

CISSP® - Security and Risk Management [video].zip

439.9 MB

CISSP® - Security Assessment and Testing [video].zip

183.3 MB

CISSP® - Security Engineering [video].zip

297.5 MB

CISSP® - Security Operations [video].zip

272.5 MB

CISSP® - Software Development Security [video].zip

370.7 MB

/Certification/Citrix Certification/Citrix EnsurePass/

Citrix.EnsurePass.1Y0-200.V13.02.110Q.vce

518.5 KB

Citrix.EnsurePass.1Y0-253.V13.01.150Q.vce

189.3 KB

Citrix.EnsurePass.1Y0-400.V13.01.200Q.vce

743.0 KB

Citrix.EnsurePass.1Y0-A20.V13.01.116Q.vce

505.8 KB

Citrix.EnsurePass.1Y0-A25.V13.01.95Q.vce

381.6 KB

/Certification/CompTIA/

CompTIA - A Plus Complete Review Guide ExamCore 1220-1001 And ExamCore 2220-10.pdf

48.2 MB

CompTIA - CYSA Plus Study Guide Exam cs0-001.pdf

32.9 MB

CompTIA - Network Plus Review Guide Exam n10-007.pdf

21.7 MB

CompTIA - Security Plus Review Guide Exam sy0-501.pdf

38.5 MB

CompTIA Security+ (SY0-401) Access Control and Identity Management [video].zip

157.2 MB

CompTIA Security+ (SY0-401) Application, Data, and Host Security [video].zip

323.9 MB

CompTIA Security+ (SY0-401) Compliance and Operational Security [video].zip

800.0 MB

CompTIA Security+ (SY0-401) Cryptography [video].zip

205.8 MB

CompTIA Security+ (SY0-401) Network Security [video].zip

538.8 MB

CompTIA Security+ (SY0-401) Threats and Vulnerabilities [video].zip

589.5 MB

/Certification/CompTIA/CompTIA EnsurePass/2013/

CompTIA.EnsurePass.220-802.V13.07.861Q.vce

1.9 MB

CompTIA.EnsurePass.FC0-U41.V13.01.273Q.vce

2.2 MB

CompTIA.EnsurePass.HIT-001.V13.01.524Q.vce

843.7 KB

CompTIA.EnsurePass.JK0-018.V13.03.869Q.vce

2.6 MB

CompTIA.EnsurePass.JK0-019.V13.01.637Q.vce

492.6 KB

CompTIA.EnsurePass.JK0-801.V13.05.782Q.vce

1.6 MB

CompTIA.EnsurePass.JK0-802.V13.07.861Q.vce

1.9 MB

CompTIA.EnsurePass.LX0-101.V13.01.119Q.vce

189.7 KB

CompTIA.EnsurePass.LX0-102.V13.01.119Q.vce

184.0 KB

CompTIA.EnsurePass.N10-005.V13.05.828Q.vce

1.9 MB

CompTIA.EnsurePass.N10-006.V13.01.255Q.vce

5.3 MB

CompTIA.EnsurePass.SG0-001.V13.01.537Q.vce

486.2 KB

CompTIA.EnsurePass.SK0-003.V13.02.442Q.vce

421.5 KB

CompTIA.EnsurePass.SY0-401.V13.03.1039Q.vce

2.5 MB

CompTIA.EnsurePass.TK0-201.V13.01.247Q.vce

378.9 KB

/Certification/CompTIA/CompTIA EnsurePass/2016/

CompTIA.EnsurePass.220-801.V2016.01.782Q.vce

1.6 MB

CompTIA.EnsurePass.220-802.V2016.01.861Q.vce

1.8 MB

CompTIA.EnsurePass.HIT-001.V2016.01.524Q.vce

808.1 KB

CompTIA.EnsurePass.PK0-003.V2016.01.486Q.vce

537.0 KB

CompTIA.EnsurePass.SK0-003.V2016.01.442Q.vce

393.1 KB

CompTIA.EnsurePass.SY0-401.V2016.01.1039Q.vce

2.5 MB

CompTIA.EnsurePass.TK0-201.V2016.01.247Q.vce

341.1 KB

V2016.02.Feb.CompTIA.EnsurePass.CLO-001.150Q.vce

147.8 KB

V2016.02.Feb.CompTIA.EnsurePass.SY0-401.1176Q.vce

4.0 MB

/Certification/CSSLP/

CSSLP® - Secure Software Concepts [video].zip

364.4 MB

CSSLP® - Secure Software Requirements [video].zip

240.7 MB

/Certification/CWNP-CWNA/

V2016.02.Feb.CWNP.EnsurePass.CWNA-106.100Q.vce

146.5 KB

/Certification/ECCouncil/2013/

ECCouncil.EnsurePass.312-49.V13.01.180Q.vce

568.1 KB

ECCouncil.EnsurePass.312-50.V13.02.878Q.vce

9.0 MB

/Certification/ECCouncil/2016/

V2016.02.Feb.ECCouncil.EnsurePass.312-50.878Q.vce

10.0 MB

/Certification/EMC/

EMC.EnsurePass.E20-005.V13.01.120Q.vce

408.3 KB

/Certification/EXIN/2013/

Exin.EnsurePass.EX0-101.V13.01.80Q.vce

171.3 KB

Exin.EnsurePass.ITIL-F.V13.01.238Q.vce

276.9 KB

/Certification/EXIN/2016/

Exin.EnsurePass.ITIL.V13.01.369Q.vce

404.4 KB

/Certification/Fortinet/

Fortinet.EnsurePass.NSE4.V13.01.80Q.vce

880.0 KB

/Certification/GIAC/

GIAC.EnsurePass.GSEC.V13.01.277Q.vce

322.4 KB

/Certification/Google/

Official Google Cloud Certified Sssociate Cloud Engineer Study Guide.pdf

57.5 MB

/Certification/HP/

HP.EnsurePass.HP2-H27.V13.01.81Q.vce

203.4 KB

/Certification/ISACA/

Isaca.EnsurePass.CISA.V13.01.1179Q.vce

1.9 MB

/Certification/Juniper/2013/

Juniper.EnsurePass.JN0-360.V13.01.252Q.vce

863.5 KB

Juniper.EnsurePass.JN0-643.V13.01.221Q.vce

1.7 MB

Juniper.EnsurePass.JN0-660.V13.01.278Q.vce

6.1 MB

/Certification/Juniper/2016/

V2016.02.Feb.Juniper.EnsurePass.JN0-331.100Q.vce

180.3 KB

/Certification/LPI/

LPI.EnsurePass.117-101.V13.02.290Q.vce

290.4 KB

LPI.EnsurePass.117-102.V13.01.568Q.vce

471.8 KB

/Certification/Magento/

Magento.EnsurePass.M70-201.V13.01.131Q.vce

550.0 KB

/.../MCSA Windows Server 2016 Certification/

MCSA Windows Server 2016 Practice Tests - exams 70-740, 70-741, 70-742, 70-743.pdf

3.8 MB

MCSA Windows Server 2016 Study Guide exam 70-740.pdf

18.0 MB

MCSA Windows Server 2016 Study Guide exam 70-741.pdf

49.4 MB

MCSA Windows Server 2016 Study Guide exam 70-742.pdf

19.4 MB

/.../Microsoft Certification Bible ( may be corrupted )/

Microsoft.EnsurePass.70-243.zip

3.2 MB

Microsoft.EnsurePass.70-246.zip

3.3 MB

Microsoft.EnsurePass.70-247.zip

2.9 MB

Microsoft.EnsurePass.70-331.zip

4.2 MB

Microsoft.EnsurePass.70-332.zip

3.1 MB

Microsoft.EnsurePass.70-336.zip

3.1 MB

Microsoft.EnsurePass.70-337.zip

2.8 MB

Microsoft.EnsurePass.70-341.zip

6.8 MB

Microsoft.EnsurePass.70-342.zip

3.6 MB

Microsoft.EnsurePass.70-346.zip

1.7 MB

Microsoft.EnsurePass.70-347.zip

2.0 MB

Microsoft.EnsurePass.70-411.zip

13.3 MB

Microsoft.EnsurePass.70-412.zip

9.4 MB

Microsoft.EnsurePass.70-415.zip

3.4 MB

Microsoft.EnsurePass.70-417.zip

10.8 MB

Microsoft.EnsurePass.70-448.zip

2.9 MB

Microsoft.EnsurePass.70-458.zip

1.3 MB

Microsoft.EnsurePass.70-459.zip

1.4 MB

Microsoft.EnsurePass.70-460.zip

1.9 MB

Microsoft.EnsurePass.70-462.zip

4.1 MB

Microsoft.EnsurePass.70-480.zip

7.1 MB

Microsoft.EnsurePass.70-483.zip

2.7 MB

Microsoft.EnsurePass.70-485.zip

1.9 MB

Microsoft.EnsurePass.70-486.zip

4.8 MB

Microsoft.EnsurePass.70-487.zip

4.9 MB

Microsoft.EnsurePass.70-488.zip

131.1 KB

Microsoft.EnsurePass.70-489.zip

360.4 KB

Microsoft.EnsurePass.70-496.zip

1.1 MB

Microsoft.EnsurePass.70-497.zip

543.4 KB

Microsoft.EnsurePass.70-516.zip

980.8 KB

Microsoft.EnsurePass.70-533.zip

49.2 KB

Microsoft.EnsurePass.70-680.zip

245.8 KB

Microsoft.EnsurePass.70-687.zip

1.4 MB

Microsoft.EnsurePass.70-688.zip

4.9 MB

Microsoft.EnsurePass.70-689.zip

2.7 MB

Microsoft.EnsurePass.74-697.zip

876.4 KB

Microsoft.EnsurePass.98-349.zip

337.0 KB

Microsoft.EnsurePass.98-364.zip

580.2 KB

Microsoft.EnsurePass.98-365.zip

775.5 KB

Microsoft.EnsurePass.98-372.zip

589.3 KB

Microsoft.EnsurePass.MB7-702.zip

400.3 KB

V2016.01.Microsoft.EnsurePass.70-243.85Q.zip

3.3 MB

V2016.01.Microsoft.EnsurePass.70-331.192Q.zip

4.6 MB

V2016.01.Microsoft.EnsurePass.70-332.157Q.zip

3.6 MB

V2016.01.Microsoft.EnsurePass.70-336.99Q.zip

1.8 MB

V2016.01.Microsoft.EnsurePass.70-341.218Q.zip

7.7 MB

V2016.01.Microsoft.EnsurePass.70-342.148Q.zip

3.5 MB

V2016.01.Microsoft.EnsurePass.70-346.90Q.zip

1.9 MB

V2016.01.Microsoft.EnsurePass.70-347.89Q.zip

2.4 MB

V2016.01.Microsoft.EnsurePass.70-410.458Q.zip

15.8 MB

V2016.01.Microsoft.EnsurePass.70-411.343Q.zip

13.7 MB

V2016.01.Microsoft.EnsurePass.70-412.354Q.zip

10.2 MB

V2016.01.Microsoft.EnsurePass.70-413.138Q.zip

4.2 MB

V2016.01.Microsoft.EnsurePass.70-414.148Q.zip

7.9 MB

V2016.01.Microsoft.EnsurePass.70-415.84Q.zip

830.0 KB

V2016.01.Microsoft.EnsurePass.70-417.430Q.zip

14.1 MB

V2016.01.Microsoft.EnsurePass.70-461.122Q.zip

3.0 MB

V2016.01.Microsoft.EnsurePass.70-463.204Q.zip

3.4 MB

V2016.01.Microsoft.EnsurePass.70-480.205Q.zip

7.4 MB

V2016.01.Microsoft.EnsurePass.70-483.214Q.zip

8.0 MB

V2016.01.Microsoft.EnsurePass.70-486.154Q.zip

4.9 MB

V2016.01.Microsoft.EnsurePass.70-487.70Q.zip

3.3 MB

V2016.01.Microsoft.EnsurePass.70-488.104Q.zip

4.8 MB

V2016.01.Microsoft.EnsurePass.70-489.76Q.zip

3.6 MB

V2016.01.Microsoft.EnsurePass.70-497.75Q.zip

462.4 KB

V2016.01.Microsoft.EnsurePass.70-516.217Q.zip

1.3 MB

V2016.01.Microsoft.EnsurePass.70-640.489Q.zip

4.5 MB

V2016.01.Microsoft.EnsurePass.70-680.545Q.zip

12.1 MB

V2016.01.Microsoft.EnsurePass.70-687.164Q.zip

5.4 MB

V2016.01.Microsoft.EnsurePass.70-688.199Q.zip

5.6 MB

V2016.01.Microsoft.EnsurePass.70-689.115Q.zip

2.8 MB

V2016.02.Feb.Microsoft.EnsurePass.70-346.108Q.zip

2.2 MB

V2016.02.Feb.Microsoft.EnsurePass.70-347.110Q.zip

2.9 MB

V2016.02.Feb.Microsoft.EnsurePass.70-414.197Q.zip

9.0 MB

V2016.02.Feb.Microsoft.EnsurePass.70-458.109Q.zip

1.7 MB

V2016.02.Feb.Microsoft.EnsurePass.70-459.100Q.zip

3.7 MB

V2016.02.Feb.Microsoft.EnsurePass.70-465.98Q.zip

1.6 MB

V2016.02.Feb.Microsoft.EnsurePass.70-640.541Q.zip

4.7 MB

V2016.02.Feb.Microsoft.EnsurePass.70-981.200Q.zip

3.4 MB

V2016.02.Feb.Microsoft.EnsurePass.74-409.80Q.zip

2.4 MB

V2016.02.Feb.Microsoft.EnsurePass.74-678.80Q.zip

1.1 MB

V2016.02.Feb.Microsoft.EnsurePass.98-364.124Q.zip

533.7 KB

V2016.02.Feb.Microsoft.EnsurePass.98-365.175Q.zip

684.8 KB

V2016.02.Feb.Microsoft.EnsurePass.98-366.195Q.zip

125.7 KB

V2016.02.Feb.Microsoft.EnsurePass.MB2-707.70Q.zip

113.4 KB

/Certification/Network Appliance/

Network Appliance.EnsurePass.NS0-156.V13.01.308Q.vce

344.0 KB

/Certification/Oracle Certification/

OCA - Oracle Certified Associate Java SE8 Programmer 1 Study Guide Exam 1z0-808.pdf

5.5 MB

OCP - Oracle Certified Professional Java SE8 Programmer 2 Study Guide Exam1z0-809.pdf

14.2 MB

/.../Oracle Certification Bible/

Oracle.EnsurePass.1Z0-051.V13.01.292Q.vce

4.8 MB

Oracle.EnsurePass.1Z0-052.V13.01.209Q.vce

1.6 MB

Oracle.EnsurePass.1Z0-053.V13.03.700Q.vce

6.8 MB

Oracle.EnsurePass.1Z0-060.V13.01.150Q.vce

1.1 MB

Oracle.EnsurePass.1Z0-061.V13.01.75Q.vce

3.4 MB

Oracle.EnsurePass.1Z0-883.V13.01.100Q.vce

389.6 KB

/.../Palo Alto Networks/

V2016.02.Feb.Palo Alto Networks.EnsurePass.ACE.80Q.vce

180.1 KB

/Certification/PMI/

PMI.EnsurePass.PMI-001.V13.02.921Q.vce

1.0 MB

/Certification/RedHat/

Redhat Linux RHCE.pdf

535.2 KB

RedHat.EnsurePass.RH133.V13.01.336Q.vce

383.2 KB

/Certification/SAP/

SAP.EnsurePass.C_TFIN52_66.V13.01.80Q.vce

191.1 KB

/Certification/SEC+/

sec+practicetest.iso

79.4 MB

sec+studyguide.iso

722.8 MB

/Certification/SSCP/

SSCP® - Access Controls [video].zip

305.8 MB

SSCP® - Cryptography [video].zip

298.8 MB

SSCP® - Incident Response and Recovery [video].zip

256.7 MB

SSCP® - Introduction and the Exam Requirements [video].zip

66.9 MB

SSCP® - Network and Communications Security [video].zip

351.6 MB

SSCP® - Risk Identification, Monitoring, and Analysis [video].zip

329.2 MB

SSCP® - Security Operations and Administration [video].zip

694.3 MB

SSCP® - Systems and Application Security [video].zip

300.3 MB

/Certification/Symantec/

Symantec.EnsurePass.250-315.V13.01.80Q.vce

215.0 KB

/.../VMware Certification Bible ( may be corrupted )/

V2016.02.Feb.VMware.EnsurePass.1V0-601.40Q.zip

71.0 KB

V2016.02.Feb.VMware.EnsurePass.2V0-631.80Q.zip

461.8 KB

V2016.02.Feb.VMware.EnsurePass.2V0-641.80Q.zip

704.7 KB

V2016.02.Feb.VMware.EnsurePass.2V0-651.80Q.zip

376.9 KB

V2016.02.Feb.VMware.EnsurePass.VCP6-CMA.70Q.zip

180.2 KB

V2016.02.Feb.VMware.EnsurePass.VCPD610.180Q.zip

1.2 MB

VMware.EnsurePass.VCP5-DCV.zip

2.3 MB

VMware.EnsurePass.VCP550D.zip

1.7 MB

VMware.EnsurePass.VCPC550.zip

65.5 KB

VMware.EnsurePass.VCPD510.zip

114.7 KB

/Cryptography/

A Cryptographic File System For Unix.pdf

112.3 KB

Advanced Encryption Standard.pdf

1.4 MB

Applied Cryptography Protocols Algorithms And Source Code in C.epub

22.7 MB

Attacking NTLM with Precomputed Hashtables.pdf

122.2 KB

Attacking Unbalanced RSA-CRT Using SPA.pdf

239.1 KB

Bitcoin and Cryptocurrency Technologies [video].zip

1.8 GB

Cryptanalysis of Hash Functions of the MD4-Family.pdf

933.8 KB

Cryptochallenge.pdf

1.5 MB

Cryptography - Coding and Cryptography.pdf

516.8 KB

Cryptography - Practical Cryptography.pdf

629.0 KB

Cryptography - The Big Picture [video].zip

149.9 MB

Cryptography Engineering Design Principles And Practical Applications.epub

2.3 MB

Cryptography Fundamentals for Developers and Security Professionals [video].zip

536.4 MB

Cryptography.pdf

1.7 MB

D1T2 - Skyper - Cracking the GSM A5 1 Encryption in Seconds.pdf

3.6 MB

Defeating Encryption.pdf

502.8 KB

DES.pdf

443.4 KB

Detecting and Defeating Government Interception Attacks Against SSL.pdf

607.2 KB

Detecting Hidden Messages Using Higher-Order Statistical Models.pdf

171.3 KB

Detecting Hidden Messages Using Higher-Order Statistics and Support Vector Machines.pdf

506.5 KB

Detecting Steganographic Content on the Internet.pdf

840.9 KB

Fundementals of Cryptology.pdf

3.0 MB

How to Break MD5 and Other Hash Functions.pdf

188.9 KB

Improved Collision Attack on Hash Function MD5.pdf

321.9 KB

Improved Collision Attack on MD5.pdf

163.9 KB

Information Hiding - A Survey.pdf

3.5 MB

Intro To Crypto.pdf

3.7 MB

Introducing Ethereum And Solidity.pdf

3.8 MB

Investigating Crypto Currencies.epub

20.0 MB

Malicious Cryptography Exposing Cryptovirology ( Feb 2004 ).pdf

30.5 MB

Malicious Cryptography Techniques for Unreversable.pdf

1.3 MB

Malicious Cryptology and Mathematics 29700.pdf

293.1 KB

MD5.pdf

421.8 KB

Monoalphabetic Unilateral Substitution.pdf

536.5 KB

On The Limits of Steganography.pdf

159.5 KB

Pen Testing and Ethical Hacking Study Guide.pdf

1.7 MB

Public and Private Key Cryptography WhitePaper ( Dec 2014 ).pdf

1.7 MB

Securing Enterprise Web Applications at the Source.pdf

2.1 MB

Serious Crytography.epub

20.8 MB

Serpent - A Proposal for the Advanced Encryption Standard.pdf

194.8 KB

Steganography Seeing The Unseen.pdf

2.4 MB

Syndrome Decoding in the Non-Standard Cases.pdf

109.7 KB

Weakness in the key scheduling algorithm of RC4.pdf

289.6 KB

Westfeld-Pfitzmann - ihw99.pdf

988.0 KB

/Database/Access/

Access Data Analysis Cookbook.pdf

11.9 MB

Access Database Design - Programming ( 3rd Ed ).pdf

2.4 MB

Access Forms & Reports For Dummies.pdf

21.6 MB

Access forms - Reports For Dummies.pdf

11.3 MB

Access VBA Programming For Dummies.pdf

8.6 MB

Accessible epub 3.pdf

3.5 MB

/Database/Access/Access 2003/

Microsoft Office Access 2003 Step by Step.pdf

10.6 MB

/Database/Access/Access 2007/

Access 2007 - The Missing Manual.pdf

45.7 MB

Access 2007 - VBA Bible.pdf

25.2 MB

/Database/Access/Access 2010/

Access 2010 - All-in-One For Dummies.pdf

18.1 MB

Access 2010 - For Dummies.pdf

17.8 MB

Access 2010 - Programmers Reference.pdf

26.1 MB

Access 2010 - The Missing Manual.pdf

12.9 MB

/Database/Access/Access 2013/

Access 2013 For Dummies.pdf

43.7 MB

exam_77-424_mos_2013_study_guide_for_microsoft_access.pdf

14.2 MB

Microsoft Access 2013 Inside Out.pdf

32.5 MB

/Database/Access/Access 2019/

Access 2019 for Dummies.pdf

20.5 MB

/.../Microsoft SQL Server 2012 - Integration Services - An Expert Cookbook/

code.zip

5.0 MB

Microsoft SQL Server 2012 - Integration Services - An Expert Cookbook.pdf

13.0 MB

/.../Microsoft SQL Server 2012 - Performance Tuning Cookbook/

code.zip

75.7 KB

Microsoft SQL Server 2012 - Performance Tuning Cookbook.pdf

7.0 MB

/.../MongoDB Cookbook (1st Edition)/

code.zip

2.7 MB

MongoDB Cookbook.pdf

4.3 MB

/.../MongoDB Cookbook (2nd Edition)/

code.zip

3.0 MB

MongoDB Cookbook (2nd Edition).pdf

3.4 MB

/Database/MySQL/

The Definitive Guide to MySQL 5 ( 3rd Ed ) ( 2005 ).pdf

11.1 MB

/Database/Oracle/

Beginning Oracle SQL, For Oracle Database 12c 3rd (2014).pdf

8.6 MB

Oracle Applications DBA Field Guide (2006).pdf

2.2 MB

Practical Oracle Database Appliance (2014).pdf

11.4 MB

/Database/PostgreSQL/

Beginning Databases with PostgreSQL From Novice to Professional (2nd Edition) (2005).pdf

19.2 MB

PostgreSQL - Introduction and Concepts.pdf

2.8 MB

PostgreSQL Development Essentials.pdf

2.9 MB

/Database/PostgreSQL/Learning PostgreSQL/

code.zip

118.4 KB

Learning PostgreSQL.pdf

3.7 MB

/.../PostgreSQL 9 Admin Cookbook/

code.zip

115.3 KB

PostgreSQL 9 Admin Cookbook.pdf

3.2 MB

/.../PostgreSQL 90 High Performance/

code.zip

329.5 KB

PostgreSQL 90 High Performance.pdf

5.0 MB

/.../PostgreSQL Server Programming/

code.zip

119.9 KB

PostgreSQL Server Programming.pdf

2.0 MB

/.../SQL Server 2012/

Learning SQL Server Reporting Services 2012.pdf

12.8 MB

SQL Server 2012 Reporting Services Blueprints.pdf

10.0 MB

SQL Server 2012 with PowerShell V3 Cookbook.pdf

17.9 MB

/.../SQL Server 2014/

Getting Started with SQL Server 2014 Administration.pdf

2.2 MB

/.../SQL Server 2014 - Development Essentials/

code.zip

15.3 KB

SQL Server 2014 - Development Essentials.pdf

6.4 MB

/.../SQL Server 2016 - Reporting Services Cookbook/

code.zip

17.5 MB

SQL Server 2016 - Reporting Services Cookbook.pdf

20.5 MB

/Database/SQLite/

The Definitive Guide to SQLite ( 2006 ).pdf

10.2 MB

/Hacking And Security/

Advanced Persistent Threat Hacking The Art And Science Of Hacking Any Organization (2015).pdf

11.1 MB

Advanced Persistent Threats - The Big Picture [video].zip

17.9 MB

Attacking Network Protocols.epub

29.9 MB

Basics Of Web Hacking.epub

3.7 MB

Claims-based Identity for Windows - The Big Picture [video].zip

137.0 MB

Collaborative Cyber Threat Intelligence.pdf

10.8 MB

Computer Security Literacy.pdf

39.7 MB

Costin Hacking Printers For Fun And Profit Slides.pdf

2.1 MB

Cyber Threat Hunting [video].zip

764.4 MB

Cybersecurity Threats - Ransomware [video].zip

390.3 MB

Cybey Ops SECFND [video].zip

3.8 GB

Designing BSD Rootkits An Introduction To Kernel Hacking.pdf

8.8 MB

Designing BSD rootkits.epub

511.6 KB

DotNetNuke For Dummies.pdf

9.8 MB

Exploitation - Evading Detection and Bypassing Countermeasures [video].zip

579.3 MB

Exploiting Software How To Break Code ( 2004 ).pdf

8.0 MB

Getting Started with CloudFlare™ Security [video].zip

214.0 MB

Getting Started with OWASP Zed Attack Proxy (ZAP) for Web Application Penetration Testing [video].zip

331.6 MB

Hack X Crypt A Straight Forward Guide Towards Ethical Hacking And Cyber Security.pdf

8.9 MB

Hack Your API First [video].zip

816.9 MB

Hack Yourself First - How to go on the Cyber-Offense [video].zip

2.2 GB

Hacking (2nd Edition).pdf

5.1 MB

Hacking Bluetooth Enabled Mobile Phones And Beyond Full Disclosure.pdf

362.1 KB

Hacking For Dummies.pdf

1.3 MB

Hacking GPS.pdf

10.9 MB

Hacking Intranet Websites From The Outside.pdf

5.7 MB

Hacking IOS Applications V1.0 Slides.pdf

31.6 MB

Hacking Kiosks.pdf

1.3 MB

Hacking Mobile Phones, PDA and Handheld Devices.pdf

4.2 MB

Hacking The Art Of Exploitation (2nd Edition).pdf

4.2 MB

Hacking VoIP Protocols, Attacks, And Countermeasures.pdf

5.0 MB

Hacking VoIP.pdf

5.6 MB

Hacking Web Apps (2012).pdf

23.0 MB

Hacking With Experts.pdf

3.2 MB

Hacking With Pictures.pdf

7.6 MB

Hands-On Incident Response Fundamentals [video].zip

494.4 MB

Hardware Security [video].zip

740.7 MB

How Computer Network Works.mp4

34.1 MB

Intercoms Hacking Hacklu (2016).pdf

6.0 MB

Iris Biometric Model For Secured Network Access.pdf

12.9 MB

ISO_IEC 27001 Information Security - The Big Picture [video].zip

328.4 MB

Linux Basics For Hackers.epub

18.6 MB

Linux Basics for Hackers.pdf

7.9 MB

Network Fundamentals and Protocols [video].zip

238.8 MB

Network Security Testing With NMAP [video].zip

200.2 MB

Network Vulnerability Scanning with OpenVAS [video].zip

243.5 MB

Networking Ack.pdf

43.7 MB

OWASP Top 10 Web Application Security Risks for ASP.NET [video].zip

2.2 GB

Payment Card Security, Processing, and the PCI Standards [video].zip

209.7 MB

PCI DSS - The Big Picture [video].zip

149.5 MB

Poc or gtfo bible Vol2.epub

70.8 MB

Poc or gtfo bible.epub

62.8 MB

Profiling Tracing Perf.pdf

24.8 MB

Python Network Hacking Essentials.pdf

3.9 MB

QUE Hacking Raspberry Pi (2014).pdf

28.0 MB

Risks, Vulnerabilities, and Threats [video].zip

302.6 MB

Securing Your Node.js Web App [video].zip

979.5 MB

Security for Hackers and Developers - Code Auditing [video].zip

282.2 MB

Security for Hackers and Developers - Fuzzing [video].zip

321.0 MB

Security for Hackers and Developers - Overview [video].zip

115.5 MB

Security for Hackers and Developers - Reverse Engineering [video].zip

319.0 MB

Shellcoders Handbook Discovering And Exploiting Security Holes.epub

1.4 MB

Social Engineering [video].zip

817.9 MB

Social Media Warfare.pdf

4.7 MB

Spying Programs Strace.pdf

8.1 MB

SQL Injection [video].zip

952.2 MB

System hacking [video].zip

387.6 MB

The Basics Of Hacking And Penetration.pdf

3.9 MB

The CSIO journey.pdf

5.8 MB

The Information Security Big Picture [video].zip

314.9 MB

The Issues of Identity and Access Management (IAM) [video].zip

406.1 MB

The Phoenix Project_ A Novel About IT, DevOps, and Helping Your Business Win (Unabridged).mp4

339.8 MB

The Privacy Engineer's Manifesto, Getting from Policy to Code to QA to Value (2014).pdf

7.5 MB

Threat Intelligence - The Big Picture [video].zip

163.4 MB

Threat Level Red.pdf

4.8 MB

Unauthorized Access.pdf

23.2 MB

Understanding the Java Virtual Machine - Security [video].zip

161.0 MB

Understanding the new European data protection rules.pdf

3.7 MB

Understanding the Shellshock Bash Bug [video].zip

69.2 MB

Violent Python - A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers.zip

5.1 MB

Walling out the insiders.pdf

3.6 MB

Web App Hacking - Caching Problems [video].zip

85.8 MB

Web App Hacking - Cookie Attacks [video].zip

110.7 MB

Web App Hacking - Hacking Authentication [video].zip

91.7 MB

Web App Hacking - Hacking Password Reset Functionality [video].zip

89.2 MB

Web App Hacking - Sensitive Data Exposure [video].zip

129.9 MB

Web Application Hackers Handbook Finding And Exploiting Security Flaws.epub

20.6 MB

Web Security and the OWASP Top 10 - The Big Picture [video].zip

298.9 MB

What's New in the OWASP Top 10 for 2013 [video].zip

205.2 MB

Windows - How It's Hacked, How to Protect It [video].zip

249.0 MB

Wireless Hacking Presentation.pdf

2.3 MB

/.../02-what-is-an-advanced-persistent-threat/

what-is-an-advanced-persistent-threat-slides.pdf

1.4 MB

/.../03-understanding-the-history-of-apts/

Additional Resources.txt

0.6 KB

understanding-the-history-of-apts-slides.pdf

988.8 KB

/.../04-how-does-an-apt-work/

how-does-an-apt-work-slides.pdf

958.2 KB

/.../05-who-are-they-and-why-do-they-do-what-they-do/

who-are-they-and-why-do-they-do-what-they-do-slides.pdf

837.1 KB

/.../06-how-do-you-detect-apts/

how-do-you-detect-apts-slides.pdf

1.1 MB

/.../07-defending-against-apts-best-practices-and-mitigation-strategies/

27. Defense at the Data Link Layer.mp4

2.2 MB

28. Defense at the Network Layer.mp4

5.5 MB

29. Securing the Presentation Layer.mp4

4.3 MB

defending-against-apts-best-practices-and-mitigation-strategies-slides.pdf

1.8 MB

/Antiviruses/

2012 EPP CAR Consumer Exploit Evasion Defenses 0.pdf

275.5 KB

An Automated Online Packing Service for Optimal Antivirus Evasion.pdf

175.6 KB

Antivirus, Firewall Evasion Techiniques.pdf

633.7 KB

AV Evasion.pdf

443.4 KB

AV Sandbox Presentation v2.0.pdf

257.8 KB

Avevasion - Techniques.pdf

771.2 KB

Bypass AV Dynamics.pdf

1.0 MB

Bypassing AV.pdf

1.1 MB

Evading Antivirus Metasploit Webcast.pdf

628.9 KB

Evasive Threats.pdf

1.3 MB

Fighting Advanced Threats.pdf

2.1 MB

IJOPCM (vol.1.2.3.S.08).pdf

86.5 KB

MalWareBytes Security IO#113914 Eguide 031714 LI#839558.pdf

775.3 KB

Practical AntiVirus Evasion - Avevasion Pentestmag.pdf

362.2 KB

RP NSS Labs - Corporate Exploit Evasion Defenses.pdf

189.6 KB

Ryan Linn - Getting Shells When Metasploit Fails - Sector 2012.pdf

673.5 KB

Security Guide - How to Evade AntiVirus Detection.pdf

172.0 KB

Testing AntiVirus Engines to Determine Their Effectiveness as A Security Layer.pdf

570.7 KB

The Antivirus Hacker's Handbook (2015).pdf

5.9 MB

The State of the Veil Framework - Will Schroeder and Chris Truncer.pdf

744.6 KB

us-14-Mesbahi-One-Packer-To-Rule-Them-All-WP.pdf

2.5 MB

us-15-Xenakis-ROPInjector-Using-Return-Oriented-Programming-For-Polymorphism-And-Antivirus-Evasion-wp.pdf

724.3 KB

us-15-Xenakis-ROPInjector-Using-Return-Oriented-Programming-For-Polymorphism-And-Antivirus-Evasion.pdf

383.5 KB

Why Antivirus Fails - Daniel Sauder.pdf

1.3 MB

why malware works in face of antivirus software.pdf

793.8 KB

woot09-polypack-pres.pdf

1.9 MB

WP SerialVariantEvasionTactics.pdf

1.2 MB

Writing Zero Days for Security - APT Penetration Testing Framework v1.0.pdf

3.7 MB

/.../Android Ethical Hacking Course [video]/1. Introduction/

1. Install Termux App and Hacker keyboard.mp4

23.1 MB

2. Introduction.mp4

11.3 MB

3. Basic Commands of Termux.mp4

43.6 MB

4. Install Ubuntu on Android Device.mp4

38.4 MB

5. Using Ubuntu Terminal.mp4

110.5 MB

/.../2. Executing Programs on Termux/

1. C Programming.mp4

22.4 MB

2. C++ Programming.mp4

11.4 MB

3. Python Programming.mp4

9.1 MB

/.../3. Ethical Hacking Section/

1. Installing Metasploit-Framework.mp4

32.0 MB

2. Ethical Hacking on Android Device.mp4

44.0 MB

3. Installing and Configuring NGROK Tool on Termux.mp4

63.8 MB

4. Hack Windows Machine over WAN.mp4

71.4 MB

5. Hack Android Device over WAN.mp4

73.0 MB

6. Protect Yourself From DOS Attack.mp4

17.7 MB

7. Safeguard Yourself From Phishing Attacks by Hackers.mp4

36.3 MB

8. Trial and Error Attacks By Hackers.mp4

39.0 MB

9. Find Vulnerable Website.mp4

10.3 MB

10. Safeguard Yourself From Website Hacking using SQL Mapping.mp4

46.0 MB

/.../4. Information Gathering Tools/

1. RedHawk Tool.mp4

30.9 MB

2. ReconDog Tool.mp4

24.2 MB

3. Angry Fuzzer Tool.mp4

30.3 MB

/.../Certified Ethical Hacker Trainings/

CEH-Handbook-v2.0.pdf

56.6 MB

Certified Ethical Hacker 3.0 Official Course.pdf

27.1 MB

EC-Council Certified Ethical Hacker Complete Training Guide with Practice Labs.pdf

97.9 MB

Hacking - CEH Cheat Sheet Exercises.pdf

336.2 KB

Ric Messier - CEH v10 Certified Ethical Hacker Study Guide (2019).pdf

10.0 MB

/.../Certified Ethical Hacker Trainings/CEH 7&8/

CEHV7 - Module 01 - Introduction to Ethical Hacking.pdf

5.2 MB

CEHV7 - Module 02 - Footprinting and Reconnaissance.pdf

8.9 MB

CEHV7 - Module 03 - Scanning Networks.pdf

16.7 MB

CEHV7 - Module 04 - Enumeration.pdf

7.0 MB

CEHV7 - Module 05 - System Hacking.pdf

23.9 MB

CEHV7 - Module 06 - Trojans and Backdoors.pdf

15.2 MB

CEHV7 - Module 07 - Viruses and Worms.pdf

12.0 MB

CEHV7 - Module 08 - Sniffers.pdf

13.8 MB

CEHV7 - Module 09 - Social Engineering.pdf

11.1 MB

CEHV7 - Module 10 - Denial of Service.pdf

10.0 MB

CEHV7 - Module 11 - Session Hijacking.pdf

7.9 MB

CEHV7 - Module 12 - Hacking Webservers.pdf

12.3 MB

CEHV7 - Module 13 - Hacking Web Applications.pdf

24.7 MB

CEHV7 - Module 14 - SQL Injection.pdf

15.4 MB

CEHV7 - Module 15 - Hacking Wireless Networks.pdf

25.0 MB

CEHV7 - Module 16 - Evading IDS, Firewalls, and Honeypots.pdf

17.2 MB

CEHV7 - Module 17 - Buffer Overflow.pdf

8.7 MB

CEHV7 - Module 18 - Cryptography.pdf

7.4 MB

CEHV7 - Module 19 - Penetration Testing.pdf

10.9 MB

CEHV7- Certified Ethical Hacker Study Guide.pdf

7.0 MB

CEHV8 - Hacker Halted.pdf

1.2 MB

CEHV8 - Module 00 - Labs Countermeasures.pdf

101.5 KB

CEHV8 - Module 01 - Introduction to Ethical Hacking.pdf

4.1 MB

CEHV8 - Module 02 - Labs Footprinting and Reconnaissance.pdf

3.6 MB

CEHV8 - Module 03 - Labs Scanning Networks.pdf

6.8 MB

CEHV8 - Module 03 - Scanning Networks.pdf

8.7 MB

CEHV8 - Module 04 - Enumeration.pdf

4.0 MB

CEHV8 - Module 04 - Labs Enumeration.pdf

1.5 MB

CEHV8 - Module 05 - System Hacking .pdf

14.7 MB

CEHV8 - Module 06 - Labs Trojans and Backdoors.pdf

4.4 MB

CEHV8 - Module 07 - Viruses and Worms.pdf

5.1 MB

CEHV8 - Module 08 - Labs Sniffers.pdf

4.4 MB

CEHV8 - Module 09 - Labs Social Engineering.pdf

1.2 MB

CEHV8 - Module 09 - Social Engineering.pdf

5.4 MB

CEHV8 - Module 10 - Labs Denial of Service.pdf

523.9 KB

CEHV8 - Module 11 - Labs Session Hijacking.pdf

684.0 KB

CEHV8 - Module 11 - Session Hijacking.pdf

4.5 MB

CEHV8 - Module 12 - Hacking Webservers.pdf

6.0 MB

CEHV8 - Module 12 - Labs Hacking Webservers.pdf

1.3 MB

CEHV8 - Module 13 - Hacking Web Applications .pdf

12.5 MB

CEHV8 - Module 13 - Labs Hacking Web Applications.pdf

907.4 KB

CEHV8 - Module 14 - Labs SQL Injection.pdf

1.6 MB

CEHV8 - Module 14 - SQL Injection.pdf

7.2 MB

CEHV8 - Module 15 - Hacking Wireless Networks.pdf

12.7 MB

CEHV8 - Module 15 - Labs Hacking Wireless Networks.pdf

1.3 MB

CEHV8 - Module 16 - Hacking Mobile Platforms.pdf

7.3 MB

CEHV8 - Module 17 - Evading IDS, Firewalls, and Honeypots.pdf

6.8 MB

CEHV8 - Module 17 - Labs Evading IDS, Firewalls and Honeypots.pdf

2.4 MB

CEHV8 - Module 18 - Buffer Overflow.pdf

4.2 MB

CEHV8 - Module 18 - Labs Buffer Overflow.pdf

466.7 KB

CEHV8 - Module 19 - Cryptography.pdf

4.2 MB

CEHV8 - Module 19 - Labs Cryptography.pdf

1.9 MB

CEHV8 - Module 20 - Penetration Testing.pdf

4.6 MB

CEHV8 - References.pdf

2.9 MB

Frankenstein Slides.pdf

2.0 MB

Les virus informatiques théorie, pratique et applications [584 pages].pdf

20.5 MB

Techniques virales avancées [292 pages].pdf

14.7 MB

/.../Certified Ethical Hacker Trainings/CEH 2009/

CEH-Classroom-Lab-Setup-v6.pdf

1.6 MB

CEHv6 Module 00 Student Introduction.pdf

604.9 KB

CEHv6 Module 01 Introduction to Ethical Hacking.pdf

3.2 MB

CEHv6 Module 02 Hacking Laws.pdf

3.8 MB

CEHv6 Module 03 Footprinting.pdf

10.5 MB

CEHv6 Module 04 Google Hacking.pdf

4.4 MB

CEHv6 Module 05 Scanning.pdf

17.5 MB

CEHv6 Module 06 Enumeration.pdf

4.2 MB

CEHv6 Module 07 System Hacking.pdf

15.8 MB

CEHv6 Module 08 Trojans and Backdoors.pdf

9.5 MB

CEHv6 Module 09 Viruses and Worms.pdf

5.8 MB

CEHv6 Module 10 Sniffers.pdf

10.5 MB

CEHv6 Module 11 Social Engineering.pdf

5.3 MB

CEHv6 Module 12 Phishing.pdf

2.7 MB

CEHv6 Module 13 Hacking Email Accounts.pdf

1.9 MB

CEHv6 Module 14 Denial of Service.pdf

3.7 MB

CEHv6 Module 15 Session Hijacking.pdf

2.0 MB

CEHv6 Module 16 Hacking Webservers.pdf

5.1 MB

CEHv6 Module 17 Web Application Vulnerabilities.pdf

4.8 MB

CEHv6 Module 19 SQL Injection.pdf

3.4 MB

CEHv6 Module 20 Hacking Wireless Networks.pdf

13.6 MB

CEHv6 Module 21 Physical Security.pdf

3.2 MB

CEHv6 Module 22 Linux Hacking.pdf

6.4 MB

CEHv6 Module 23 Evading IDS Firewall and Honeypot.pdf

5.0 MB

CEHv6 Module 24 Buffer Overflows.pdf

1.4 MB

CEHv6 Module 25 Cryptography.pdf

4.3 MB

CEHv6 Module 26 Penetration Testing.pdf

5.9 MB

CEHv6 Module 28 Writing Virus Codes.pdf

613.4 KB

CEHv6 Module 29 Assembly Language Tutorial.pdf

1.0 MB

CEHv6 Module 30 Exploit Writing.pdf

2.1 MB

CEHv6 Module 31 Exploit Writing.pdf

244.7 KB

CEHv6 Module 32 Exploit Writing.pdf

656.2 KB

CEHv6 Module 33 Reverse Engineering Techniques.pdf

2.9 MB

CEHv6 Module 34 MAC OS X Hacking.pdf

1.3 MB

CEHv6 Module 35 Hacking Routers, Cable Modems and Firewalls.pdf

3.4 MB

CEHv6 Module 37 Bluetooth Hacking.pdf

2.6 MB

CEHv6 Module 38 VoIP Hacking.pdf

4.1 MB

CEHv6 Module 39 RFID Hacking.pdf

2.3 MB

CEHv6 Module 40 Spamming.pdf

2.8 MB

CEHv6 Module 41 Hacking USB Devices.pdf

1.9 MB

CEHv6 Module 42 Hacking Database Servers.pdf

1.7 MB

CEHv6 Module 43 Cyber Warfare- Hacking Al-Qaida and Terrorism.pdf

2.8 MB

CEHv6 Module 44 Internet Content Filtering Techniques.pdf

2.0 MB

CEHv6 Module 45 Privacy on the Internet.pdf

5.7 MB

CEHv6 Module 46 Securing Laptop Computers.pdf

2.0 MB

CEHv6 Module 47 Spying Technologies.pdf

4.5 MB

CEHv6 Module 48 Corporate Espionage by Insiders.pdf

2.3 MB

CEHv6 Module 49 Creating Security Policies.pdf

2.2 MB

CEHv6 Module 50 Software Piracy and W.pdf

2.2 MB

CEHv6 Module 51 Hacking and Cheating Online Games.pdf

2.1 MB

CEHv6 Module 52 Hacking RSS and Atom.pdf

1.7 MB

CEHv6 Module 53 Hacking Web Browsers.pdf

2.0 MB

CEHv6 Module 54 Proxy Server Technologies.pdf

2.4 MB

CEHv6 Module 55 Preventing Data Loss.pdf

3.9 MB

CEHv6 Module 56 Hacking Global Positioning System.pdf

2.2 MB

CEHv6 Module 57 Computer Forensics and Incident Handling.pdf

2.6 MB

CEHv6 Module 58 Credit Card Frauds.pdf

2.2 MB

CEHv6 Module 59 How to Steal Passwords.pdf

1.6 MB

CEHv6 Module 60 Firewall Technologies.pdf

3.0 MB

CEHv6 Module 61 Threats and Countermeasures.pdf

1.0 MB

CEHv6 Module 62 Case Studies.pdf

731.0 KB

CEHv6 Module 63 Botnets.pdf

1.2 MB

CEHv6 Module 64 Economic Espionage.pdf

668.9 KB

CEHv6 Module 65 Patch Management.pdf

7.4 MB

CEHv6 Module 66 Security Convergence.pdf

645.7 KB

CEHv6 Module 67 Identifying the Terrorists.pdf

1.8 MB

prova 312-50.pdf

2.9 MB

/.../Certified Ethical Hacker Trainings/CEH 2010/

CEH Official Certified Ethical Hacker Review Guide (2010) CT.pdf

8.4 MB

CEH v02 Ethical Hacking & Countermeasures Threats & Defense Mechanisms (2010) CT.pdf

16.0 MB

CEH v05 Ethical Hacking & Countermeasures Secure Network Infrastructures (2010) CT.pdf

8.3 MB

CHFI v01 Computer Forensics Investigation Procedures & Response (2010) CT.pdf

4.0 MB

CHFI v02 Computer Forensics Investigating Hard Disks, File & Operating Systems (2010) CT.pdf

10.8 MB

CHFI v03 Computer Forensics Investigating Data & Image Files (2010) CT.pdf

18.2 MB

CHFI v04 Computer Forensics Investigating Network Intrusions & Cyber Crimes (2010) CT.pdf

25.2 MB

CHFI v05 Computer Forensics Investigating Wireless Networks & Devices (2010) CT.pdf

5.6 MB

ECDR-ECVT v01 Disaster Recovery (2011) CT.pdf

9.5 MB

ECDR-ECVT v02 Virtualization Security (2011) CT.pdf

8.0 MB

ECSA v01 Security Analysis (2011) CT.pdf

21.3 MB

ECSA v02 Procedures & Methodologies (2011) CT.pdf

8.3 MB

ECSA v03 Network & Perimeter Testing (2011) CT.pdf

11.2 MB

ECSA v04 Communication Media Testing (2011) CT.pdf

13.0 MB

ECSA v05 Network Threat Testing (2011) CT.pdf

8.8 MB

ENSA v01 Network Defense; Fundamentals & Protocols (2011) CT.pdf

16.6 MB

ENSA v02 Network Defense; Security Policy & Threats (2011) CT.pdf

13.1 MB

ENSA v03 Network Defense; Perimeter Defense Mechanisms (2011) CT.pdf

6.0 MB

ENSA v04 Network Defense; Securing & Troubleshooting Network Operating Systems (2011) CT.pdf

13.8 MB

ENSA v05 Network Defense; Security & Vulnerability Assessment (2011) CT.pdf

13.0 MB

Network 5; Network Safety Certification (2011) CT.pdf

3.3 MB

Wireless 5; Wireless Safety Certification (2010) CT.pdf

3.5 MB

/.../Certified Ethical Hacker Trainings/CEHv6/

Exploit Writing Using Metasploit Framework.pdf

656.2 KB

Module 03 Footprinting.pdf

10.5 MB

Module 04 Google Hacking.pdf

4.4 MB

Module 05 Scanning.pdf

17.5 MB

Module 06 Enumeration.pdf

4.2 MB

Module 07 System Hacking.pdf

15.8 MB

Module 08 Trojans and Backdoors.pdf

9.5 MB

Module 09 Viruses and Worms.pdf

5.8 MB

Module 10 Sniffers.pdf

10.5 MB

Module 11 Social Engineering.pdf

5.3 MB

Module 12 Phishing.pdf

2.7 MB

Module 13 Hacking Email Accounts.pdf

1.9 MB

Module 14 Denial of Service.pdf

3.7 MB

Module 15 Session Hijacking.pdf

2.0 MB

Module 16 Hacking Webservers.pdf

5.1 MB

Module 17 Web Application Vulnerabilities.pdf

4.8 MB

Module 19 SQL Injection.pdf

3.4 MB

Module 20 Hacking Wireless Networks.pdf

13.6 MB

Module 21 Physical Security.pdf

3.2 MB

Module 22 Linux Hacking.pdf

6.4 MB

Module 23 Evading IDS Firewall and Honeypot.pdf

5.0 MB

Module 24 Buffer Overflows.pdf

1.4 MB

Module 25 Cryptography.pdf

4.3 MB

Module 26 Penetration Testing.pdf

5.9 MB

Module 28 Writing Virus Codes.pdf

613.4 KB

Module 29 Assembly Language Tutorial.pdf

1.0 MB

Module 30 Exploit Writing.pdf

2.1 MB

Module 31 Windows Based Buffer Overflow Exploit Writing.pdf

244.7 KB

Module 33 Reverse Engineering Techniques.pdf

2.9 MB

Module 34 MAC OS X Hacking.pdf

1.3 MB

Module 35 Hacking Routers, Cable Modems and Firewalls.pdf

3.4 MB

Module 37 Bluetooth Hacking.pdf

2.6 MB

Module 38 VoIP Hacking.pdf

4.1 MB

Module 39 RFID Hacking.pdf

2.3 MB

Module 40 Spamming.pdf

2.8 MB

Module 41 Hacking USB Devices.pdf

1.9 MB

Module 42 Hacking Database Servers.pdf

1.7 MB

Module 43 Cyber Warfare- Hacking Al-Qaida and Terrorism.pdf

2.8 MB

Module 44 Internet Content Filtering Techniques.pdf

2.0 MB

Module 45 Privacy on the Internet.pdf

5.7 MB

Module 46 Securing Laptop Computers.pdf

2.0 MB

Module 47 Spying Technologies.pdf

4.5 MB

Module 48 Corporate Espionage by Insiders.pdf

2.3 MB

Module 49 Creating Security Policies.pdf

2.2 MB

Module 50 Software Piracy and Warez.pdf

2.2 MB

Module 51 Hacking and Cheating Online Games.pdf

2.1 MB

Module 52 Hacking RSS and Atom.pdf

1.7 MB

Module 53 Hacking Web Browsers.pdf

2.0 MB

Module 54 Proxy Server Technologies.pdf

2.4 MB

Module 55 Preventing Data Loss.pdf

3.9 MB

Module 56 Hacking Global Positioning System.pdf

2.2 MB

Module 57 Computer Forensics and Incident Handling.pdf

2.6 MB

Module 58 Credit Card Frauds.pdf

2.2 MB

Module 59 How to Steal Passwords.pdf

1.6 MB

Module 60 Firewall Technologies.pdf

3.0 MB

Module 61 Threats and Countermeasures.pdf

26.1 MB

Module 62 Case Studies.pdf

731.0 KB

Module 63 Botnets.pdf

1.2 MB

Module 64 Economic Espionage.pdf

668.9 KB

Module 65 Patch Management.pdf

7.4 MB

Module 66 Security Convergence.pdf

645.7 KB

Module 67 Identifying the Terrorists.pdf

1.8 MB

/.../Forensics And Analytics/

Analyzing the Analyzers.pdf

5.1 MB

Big Data Analytics in Cyber Security.pdf

27.8 MB

Big Data Analytics With Applications in Insider Threat Detection.pdf

16.5 MB

Conducting Network Vulnerability Analysis [video].zip

418.0 MB

Data Analytics For Internal Auditors.pdf

7.3 MB

Digital Forensics - Getting Started with File Systems [video].zip

213.5 MB

Digital Forensics Tools in Kali Linux - Imaging and Hashing [video].zip

657.5 MB

External Footprinting - Reconnaissance and Mapping [video].zip

146.2 MB

Getting Started Analyzing Malware Infections [video].zip

252.5 MB

Malware Analysis - The Big Picture [video].zip

284.4 MB

Malware Analysis Fundamentals [video].zip

647.4 MB

Mastering Windows Network Forensics And Investigation ( 2nd Ed ) ( 2012 ).pdf

42.1 MB

Practical Binary Analysis.epub

19.8 MB

Practical Packet Analysis.epub

45.9 MB

Prentice Hall Network Forensics ( 2012 ).pdf

20.8 MB

The Basics Of Digital Forensics ( 2012 ).pdf

7.0 MB

USB Forensics - Duplication [video].zip

278.3 MB

USB Forensics - Fundamentals [video].zip

361.5 MB

USB Forensics - Writeblocking and Impersonation [video].zip

270.9 MB

/.../Art of Memory Forensics Detecting Malware And Threats in Windows, Linux, And Mac Memory/

Art of Memory Forensics Detecting Malware And Threats in Windows, Linux, And Mac Memory.epub

10.7 MB

Art of Memory Forensics Detecting Malware And Threats in Windows, Linux, And Mac Memory.pdf

15.0 MB

/Game Hacking/

Game Hacking.pdf

5.4 MB

Gaming Hacks.epub

2.0 MB

Hacking The XBOX.epub

17.0 MB

/Malware analysis/

11 Practical Malware Analysis - The Hands-On Guide to Dissecting Malicious Software.pdf

9.9 MB

Cuckoo Malware Analysis ( 2013 ).pdf

7.5 MB

Malware Analysis - Part I.pdf

927.3 KB

Malware Analysts Cookbook And DVD Tools And Techniques For Fighting Malicious Code.epub

13.2 MB

Malware Data Science.epub

25.4 MB

Malware Forensics Field Guide For Windows Systems ( 2012 ).pdf

29.7 MB

Malware Forensics Investigating And Analyzing Malicious Code ( 2008 ).pdf

26.2 MB

Malware Obfuscation with Threat Emulation.pdf

381.0 KB

/.../Malware Analyst Cookbook/

Malware Analysts Cookbook.pdf

22.3 MB

/.../Malware Analyst Cookbook/dvd/

CHECKSUMS

7.2 KB

COPYING

35.1 KB

license.txt

6.8 KB

README

1.2 KB

/.../Malware Analyst Cookbook/dvd/1/2/

tgrab.sh

0.2 KB

/.../Malware Analyst Cookbook/dvd/1/3/

torwget.py

4.2 KB

/.../Malware Analyst Cookbook/dvd/1/4/

header_check.php

0.3 KB

/.../Malware Analyst Cookbook/dvd/2/

wwwhoney.tgz

1.5 KB

/.../Malware Analyst Cookbook/dvd/3/2/

clam_hellologic.ldb

0.1 KB

clam_helloworld.ndb

0.3 KB

clam_inject.ldb

0.2 KB

clam_shellcode.ndb

0.0 KB

/.../Malware Analyst Cookbook/dvd/3/3/

clamav_to_yara.py

5.8 KB

/.../Malware Analyst Cookbook/dvd/3/4/

packer.yara

542.2 KB

peid_to_yara.py

3.5 KB

sample_script.py

0.3 KB

/.../Malware Analyst Cookbook/dvd/3/5/

capabilities.yara

4.0 KB

/.../Malware Analyst Cookbook/dvd/3/6/

magic.yara

1.6 KB

/.../Malware Analyst Cookbook/dvd/3/7/

av_multiscan.py

6.3 KB

/.../Malware Analyst Cookbook/dvd/3/8/

pescanner.py

14.5 KB

test_output.txt

43.6 KB

/.../Malware Analyst Cookbook/dvd/3/10/

ssdeep_procs.py

5.4 KB

/.../Malware Analyst Cookbook/dvd/3/11/

3-11.mov

21.3 MB

/.../Malware Analyst Cookbook/dvd/4/4/

avsubmit.py

24.7 KB

virus.db

14.3 KB

/.../Malware Analyst Cookbook/dvd/4/8/

bare.jbs

0.4 KB

/.../Malware Analyst Cookbook/dvd/4/9/

pathtrick.jbs

0.4 KB

/.../Malware Analyst Cookbook/dvd/4/10/

appinitdll.jbs

0.7 KB

killexplorer.jbs

1.2 KB

/.../Malware Analyst Cookbook/dvd/4/11/

proxy.jbs

0.6 KB

/.../Malware Analyst Cookbook/dvd/4/12/

artifacts.db

45.1 KB

artifactscanner.py

5.4 KB

dbmgr.py

11.2 KB

/.../Malware Analyst Cookbook/dvd/5/13/

mapper.py

5.0 KB

/.../Malware Analyst Cookbook/dvd/5/14/

googlegeoip.py

3.5 KB

map.html

4.3 KB

/.../Malware Analyst Cookbook/dvd/6/1/

6-1.mov

30.3 MB

/.../Malware Analyst Cookbook/dvd/6/9/

6-9.mov

71.4 MB

sc_distorm.py

2.6 KB

/.../Malware Analyst Cookbook/dvd/6/9/shellcode/

first_stage_disasm.txt

11.6 KB

second_stage_disasm.txt

8.5 KB

shellcode.bin

0.5 KB

unicode_encoded_shellcode

1.4 KB

/.../Malware Analyst Cookbook/dvd/6/10/

graph.dot

4.3 KB

graph.png

189.4 KB

shellcode_libemu.py

0.3 KB

/.../Malware Analyst Cookbook/dvd/6/11/

6-11.mov

64.0 MB

/.../Malware Analyst Cookbook/dvd/6/14/

pdf.pcap

686.8 KB

/.../Malware Analyst Cookbook/dvd/8/

analysis.py

5.9 KB

vmauto.py

10.5 KB

/.../Malware Analyst Cookbook/dvd/8/1/

8-1.mov

59.6 MB

myvbox.py

2.5 KB

/.../Malware Analyst Cookbook/dvd/8/7/

1your_exe2.report.txt

17.2 KB

8-7.mov

131.8 MB

myvmware.py

4.3 KB

/.../Malware Analyst Cookbook/dvd/9/3/

9-3.mov

16.9 MB

RegFsNotify-src.zip

76.7 KB

RegFsNotify.exe

12.3 KB

RegFsNotify_example_log.txt

238.1 KB

/.../Malware Analyst Cookbook/dvd/9/5/

9-5.mov

30.5 MB

HandleDiff-src.zip

313.7 KB

HandleDiff.exe

88.6 KB

/.../Malware Analyst Cookbook/dvd/9/6/

diff_zeus1x.txt

32.7 KB

diff_zeus2x.txt

23.0 KB

/.../Malware Analyst Cookbook/dvd/9/7/

bankpatch_diff.txt

6.4 KB

conlf.ini.html

9.5 KB

/.../Malware Analyst Cookbook/dvd/9/8/

DetoursHooks.zip

343.6 KB

/.../10 to 14/

Example_Log.txt

49.3 KB

preservation.zip

38.0 KB

preservationDriver-src.zip

14.1 KB

preservationWin32-src.zip

201.9 KB

README.TXT

0.1 KB

/.../Malware Analyst Cookbook/dvd/9/15/

cmd-src.zip

41.9 KB

cmd.exe

1.3 MB

InstallCmdProxy.exe

1.3 MB

InstallCmdProxy.zip

1.2 MB

/.../Malware Analyst Cookbook/dvd/10/2/

offreg.dll

56.4 KB

tsk-xview.exe

784.9 KB

/.../Malware Analyst Cookbook/dvd/10/3/

offreg-example.c

2.8 KB

/.../Malware Analyst Cookbook/dvd/10/4/

closehandle-src.zip

210.4 KB

closehandle.exe

58.4 KB

/.../Malware Analyst Cookbook/dvd/10/7/

cache.txt

0.5 KB

dom.txt

0.4 KB

HTMLInjectionDetector-src.zip

263.5 KB

HTMLInjectionDetector2.exe

76.8 KB

/.../Malware Analyst Cookbook/dvd/10/8/

disallowrun.pl

1.9 KB

pendingdelete.pl

1.6 KB

routes.pl

1.4 KB

shellexecutehooks.pl

2.2 KB

/.../Malware Analyst Cookbook/dvd/10/9/

dumpcerts.pl

4.7 KB

/.../Malware Analyst Cookbook/dvd/10/10/

somethingelse.pl

5.2 KB

tinyxp_googlebuzz_ntuser.dat

786.4 KB

/.../Malware Analyst Cookbook/dvd/11/2/

scloader-src.zip

205.4 KB

scloader.exe

57.3 KB

/.../Malware Analyst Cookbook/dvd/11/3/

stack_gcc.c

0.2 KB

stack_gcc.exe

8.9 KB

stack_vc.c

0.3 KB

stack_vc.exe

30.7 KB

/.../Malware Analyst Cookbook/dvd/11/9/

scd.py

2.8 KB

/.../Malware Analyst Cookbook/dvd/11/10/

findhooks.py

2.0 KB

/.../Malware Analyst Cookbook/dvd/11/12/

pymon.py

221.1 KB

simpleapi.py

1.5 KB

/.../Malware Analyst Cookbook/dvd/12/1/

xortools.py

1.4 KB

/.../Malware Analyst Cookbook/dvd/12/2/

xorsigs.yar

52.4 KB

/.../Malware Analyst Cookbook/dvd/12/10/

trickimprec.py

1.0 KB

/.../Malware Analyst Cookbook/dvd/12/11/

kraken.py

1.2 KB

/.../Malware Analyst Cookbook/dvd/12/12/

sbstrings.py

1.1 KB

/.../Malware Analyst Cookbook/dvd/13/4/

13-4.mov

55.4 MB

rundll32ex-src.zip

183.3 KB

rundll32ex.exe

54.3 KB

/.../Malware Analyst Cookbook/dvd/13/7/

install_svc.bat

0.5 KB

install_svc.py

2.3 KB

/.../Malware Analyst Cookbook/dvd/13/8/

dll2exe.py

0.9 KB

/.../Malware Analyst Cookbook/dvd/14/8/

DriverEntryFinder.zip

2.4 KB

/.../Malware Analyst Cookbook/dvd/14/10/

windbg_to_ida.py

0.5 KB

/.../Malware Analyst Cookbook/dvd/14/11/

WinDbgNotify.txt

1.0 KB

/.../Malware Analyst Cookbook/dvd/15/6/

prolaco.vmem.zip

45.3 MB

/.../Malware Analyst Cookbook/dvd/16/6/

coreflood.vmem.zip

44.4 MB

silentbanker.vmem.zip

43.5 MB

/.../Malware Analyst Cookbook/dvd/16/7/

laqma.vmem.zip

44.5 MB

/.../Malware Analyst Cookbook/dvd/16/8/

16-8.mov

93.9 MB

/.../Malware Analyst Cookbook/dvd/17/1/

zeus.vmem.zip

43.5 MB

/.../Malware Analyst Cookbook/dvd/17/6/

be2.vmem.zip

42.8 MB

/.../Malware Analyst Cookbook/dvd/17/8/

tigger.vmem.zip

42.1 MB

/.../Malware Analyst Cookbook/dvd/17/10/

17-10.mov

70.3 MB

/.../Malware Analyst Cookbook/dvd/17/11/

sality.vmem.zip

42.8 MB

/.../Malware Analyst Cookbook/dvd/Malware figures/C01/

613030 f0102.png

0.9 KB

613030 f0103.png

37.0 KB

613030 f0104.png

91.4 KB

613030 f0106.png

14.4 KB

613030 f0107.png

53.4 KB

613030 f0108.png

312.1 KB

613030 f0109.png

173.0 KB

/.../Malware Analyst Cookbook/dvd/Malware figures/C02/

613030 f0202_e.pdf

136.6 KB

/.../Malware Analyst Cookbook/dvd/Malware figures/C03/

613030 f0303.png

95.6 KB

613030 f0304.callout.png

75.9 KB

613030 f0304.png

62.9 KB

613030 f00301.png

8.6 KB

613030 f00302.png

17.2 KB

613030 f00303.callout.png

106.9 KB

/.../Malware Analyst Cookbook/dvd/Malware figures/C04/

613030 f0401.png

49.4 KB

613030 f0402.png

69.7 KB

613030 f0403.png

73.9 KB

613030 f0404.png

53.8 KB

613030 f0405.png

59.1 KB

613030 f0406.png

30.7 KB

613030 f0407.png

132.7 KB

613030 f0408.png

91.1 KB

613030 f0409.png

127.8 KB

613030 f0410.png

71.5 KB

613030 f0411.png

28.2 KB

613030 f0412.png

68.9 KB

613030 f0413.png

24.0 KB

/.../Malware Analyst Cookbook/dvd/Malware figures/C05/

613030 f0501.png

24.2 KB

613030 f0502.png

11.9 KB

613030 f0503.png

43.6 KB

613030 f0504.png

32.9 KB

613030 f0505.png

11.4 KB

613030 f0506.png

17.7 KB

613030 f0507.png

16.6 KB

613030 f0508.png

101.5 KB

613030 f0509.png

64.9 KB

613030 f0510.png

66.4 KB

613030 f0511.png

58.3 KB

613030 f0512.png

75.3 KB

/.../Malware Analyst Cookbook/dvd/Malware figures/C06/

613030 f0601.png

124.1 KB

613030 f0602.png

28.0 KB

613030 f0603.png

356.3 KB

613030 f0604.png

69.0 KB

613030 f0605.png

66.3 KB

613030 f0606.png

14.0 KB

613030 f0607.png

12.9 KB

/.../Malware Analyst Cookbook/dvd/Malware figures/C07/

613030 f0701.png

102.7 KB

613030 f0702.png

40.2 KB

613030 f0703.callout.png

249.5 KB

613030 f0703.png

233.4 KB

613030 f0704.callout.png

33.9 KB

613030 f0704.png

36.9 KB

613030 f0705.png

36.0 KB

613030 f0706.callout.png

25.9 KB

613030 f0706.png

13.9 KB

613030 f0707a.PNG

2.8 KB

613030 f0707b.PNG

2.8 KB

613030 f0707callout.png

113.2 KB

613030 f0708.PNG

22.1 KB

613030 f0709.png

19.2 KB

613030 f0710.png

152.2 KB

613030 f0711.png

5.2 KB

613030 f0712.png

5.5 KB

613030 f0713.png

15.9 KB

613030 f0714.png

44.6 KB

/.../Malware Analyst Cookbook/dvd/Malware figures/C08/

613030 f0801.pdf

129.9 KB

613030 f0802.png

61.8 KB

613030 f0803.calloutsuggested.png

349.3 KB

613030 f0803.png

377.1 KB

613030 f0804.calloutsuggested.png

441.4 KB

613030 f0804.png

459.8 KB

613030 f0805.png

115.1 KB

613030 f0806.calloutsuggested.png

158.1 KB

613030 f0806.png

145.4 KB

613030 f0807.calloutsuggested.png

31.4 KB

613030 f0807.png

31.9 KB

613030 f0808.png

22.0 KB

613030 f0809.png

22.4 KB

613030 f0810.calloutsuggested.png

176.2 KB

613030 f0810.png

187.8 KB

613030 f0811.png

50.5 KB

613030 f0812.png

39.8 KB

/.../Malware Analyst Cookbook/dvd/Malware figures/C09/

613030 f0901.callout.png

43.4 KB

613030 f0901.png

28.7 KB

613030 f0902.callout.png

51.8 KB

613030 f0902.png

37.8 KB

613030 f0903.png

15.8 KB

613030 f0904.png

25.3 KB

613030 f0905.png

86.2 KB

613030 f0906.png

31.3 KB

613030 f0907.png

15.0 KB

613030 f0908.callout.png

35.0 KB

613030 f0908.png

25.0 KB

613030 f0909.png

11.7 KB

613030 f0910.png

19.0 KB

613030 f0911.png

17.0 KB

613030 f0912.png

41.1 KB

613030 f0914.png

10.2 KB

613030 f0915.png

79.8 KB

613030 f0916.pdf

119.8 KB

613030 f0917.png

43.0 KB

613030 f0918.png

12.4 KB

613030 f0919.callout.png

83.9 KB

613030 f0919.png

69.8 KB

613030 f0920.png

29.4 KB

613030 f0921.png

16.8 KB

613030 f0922.png

7.5 KB

/.../Malware Analyst Cookbook/dvd/Malware figures/C10/

613030 f1001.png

22.7 KB

613030 f1002.png

20.7 KB

613030 f1003.png

88.5 KB

613030 f1004.png

26.4 KB

613030 f1005.png

28.7 KB

613030 f1006.callout.png

90.6 KB

613030 f1006.png

86.3 KB

613030 f1007.callout.png

71.8 KB

613030 f1007.png

60.4 KB

613030 f1008.callout.png

31.0 KB

613030 f1008.png

38.4 KB

613030 f1009.callout.png

52.7 KB

613030 f1009.png

35.6 KB

613030 f1010.callout.png

127.2 KB

613030 f1010.png

113.0 KB

613030 f1011.callout.png

41.0 KB

613030 f1011.png

26.1 KB

613030 f1012.callout.png

27.1 KB

613030 f1012.png

4.6 KB

613030 f1013.callout.png

81.9 KB

613030 f1013.png

42.1 KB

613030 f1014.png

6.5 KB

/.../Malware Analyst Cookbook/dvd/Malware figures/C11/

613030 f1101.png

18.7 KB

613030 f1102.png

18.2 KB

613030 f1103.png

9.1 KB

613030 f1104.calloutsuggested.png

67.1 KB

613030 f1104.png

58.2 KB

613030 f1105.calloutsuggested.png

34.5 KB

613030 f1105.png

33.3 KB

613030 f1106.png

42.0 KB

613030 f1107.png

69.6 KB

613030 f1108.png

52.3 KB

613030 f1109.png

57.6 KB

613030 f1110.png

94.2 KB

613030 f1111.png

39.0 KB

613030 f1112.png

12.0 KB

613030 f1113.png

435.9 KB

613030 f1114.png

398.5 KB

613030 f1115.png

10.8 KB

613030 f1116.pdf

123.0 KB

613030 f1117.png

4.8 KB

613030 f1118.png

3.3 KB

613030 f1119.png

10.8 KB

613030 f1120.png

15.1 KB

613030 f1121.calloutsuggested.png

10.3 KB

613030 f1121.png

10.2 KB

613030 f1122.png

49.4 KB

613030 f1123.png

26.9 KB

613030 f1124.png

14.6 KB

613030 f1125.png

25.1 KB

613030 f1126.png

17.1 KB

613030 f1127.png

105.8 KB

/.../Malware Analyst Cookbook/dvd/Malware figures/C12/

613030 f1201.png

7.1 KB

613030 f1202.png

3.7 KB

613030 f1203.png

12.4 KB

613030 f1204.callout.png

82.0 KB

613030 f1204.png

82.0 KB

613030 f1205.callout.png

21.5 KB

613030 f1205.png

21.5 KB

613030 f1206.png

6.3 KB

613030 f1207.png

15.7 KB

613030 f1208.png

29.2 KB

613030 f1209.callout.png

23.9 KB

613030 f1209.png

23.9 KB

613030 f1210.callout.png

53.6 KB

613030 f1210.png

29.1 KB

613030 f1211.callout.png

16.5 KB

613030 f1211.png

4.4 KB

613030 f1212.callout.png

51.3 KB

613030 f1212.png

33.6 KB

613030 f1213.png

7.1 KB

613030 f1214.callout.png

52.8 KB

613030 f1214.png

52.4 KB

613030 f1215.callout.png

6.8 KB

613030 f1215.png

23.4 KB

613030 f1216.png

26.5 KB

613030 f1217.png

18.5 KB

613030 f1218.callout.png

46.0 KB

613030 f1218.png

56.2 KB

613030 f1219.callout.png

17.4 KB

613030 f1219.png

8.2 KB

613030 f1220.callout.png

53.0 KB

613030 f1220.png

47.4 KB

613030 f1221.callout.png

61.0 KB

613030 f1221.png

57.0 KB

613030 f1222.png

7.9 KB

613030 f1223.png

7.7 KB

613030 f1224.png

51.7 KB

613030 f1225.callout.png

52.8 KB

613030 f1225.png

49.9 KB

613030 f1226.png

16.1 KB

613030 f1227.png

4.9 KB

613030 f1228.png

15.1 KB

613030 f1229.png

4.5 KB

613030 f1230.png

15.2 KB

/.../Malware Analyst Cookbook/dvd/Malware figures/C13/

613030 f1301.png

33.0 KB

613030 f1302.png

50.5 KB

613030 f1303.png

11.1 KB

613030 f1304.png

24.8 KB

613030 f1305.png

14.4 KB

613030 f1306.callout.png

33.6 KB

613030 f1306.png

25.6 KB

613030 f1307.png

6.2 KB

613030 f1308.callout.png

23.5 KB

613030 f1308.png

16.3 KB

613030 f1309.callout.png

72.1 KB

613030 f1309.png

58.8 KB

613030 f1310.callout.png

49.8 KB

613030 f1310.png

29.9 KB

613030 f1311.png

27.2 KB

613030 f1312.png

10.6 KB

613030 f1313.png

8.2 KB

613030 f1314.png

8.8 KB

613030 f1315.callout.png

42.1 KB

613030 f1315.png

31.7 KB

/.../Malware Analyst Cookbook/dvd/Malware figures/C14/

613030 f1403.png

9.8 KB

613030 f1404.callout.png

44.1 KB

613030 f1404.png

39.0 KB

613030 f1405.png

21.5 KB

613030 f1406.callout.png

90.3 KB

613030 f1406.png

96.8 KB

613030 f1407.callout.png

25.3 KB

613030 f1407.png

33.9 KB

613030 f1408.png

48.9 KB

613030 f1409.png

27.2 KB

613030 f1410.png

92.2 KB

613030 f1411.callout.png

27.9 KB

613030 f1411.png

18.1 KB

613030 f1412.png

22.5 KB

613030 f1413.png

22.2 KB

613030 f1414.png

44.7 KB

613030 f1415.png

27.6 KB

613030 f1416.callout.png

43.2 KB

613030 f1416.png

49.2 KB

613030 f1417.png

11.6 KB

613030 f1418.callout.png

88.9 KB

613030 f1418.png

71.8 KB

613030 f1419.png

11.5 KB

613030 f1420.png

201.7 KB

/.../Malware Analyst Cookbook/dvd/Malware figures/C15/

613030 f1501.png

14.1 KB

613030 f1503.png

26.3 KB

613030 f1504.png

12.5 KB

613030 f1505.png

36.8 KB

/.../Malware Analyst Cookbook/dvd/Malware figures/C16/

613030 f1601.callout.png

35.2 KB

613030 f1601.png

28.9 KB

613030 f1602.png

18.2 KB

613030 f1604.png

9.1 KB

613030 f1605.png

117.6 KB

613030 f1607.callout.png

50.7 KB

613030 f1607.png

37.5 KB

613030 f1608.callout.png

47.2 KB

613030 f1608.png

34.3 KB

613030 f1609.png

6.7 KB

613030 f1610.png

15.5 KB

613030 f1611.png

8.7 KB

613030 f1612.png

8.3 KB

/.../Malware Analyst Cookbook/dvd/Malware figures/C17/

613030 f1702.png

49.2 KB

613030 f1703.callout.png

7.7 KB

613030 f1703.png

10.3 KB

613030 f1706.png

34.3 KB

613030 f1707.png

39.1 KB

613030 f1710.callout.png

59.5 KB

613030 f1710.png

58.6 KB

613030 f1711.callout.png

47.0 KB

613030 f1711.png

38.7 KB

613030 f1712.callout.png

36.5 KB

613030 f1712.png

38.3 KB

613030 f1713.png

16.1 KB

613030 f1714.png

54.9 KB

613030 f1715.callout.png

42.8 KB

613030 f1715.png

31.0 KB

613030 f1716.callout.png

88.2 KB

613030 f1716.png

68.3 KB

613030 f1718.callout.png

74.8 KB

613030 f1718.png

72.9 KB

613030 f1719.png

83.9 KB

/.../Malware Analyst Cookbook/dvd/Malware figures/C18/

613030 f1804.png

29.9 KB

/Other/

CH751.stl

235.0 KB

Edward Snowden - Permanent Record-Metropolitan Books (2019).epub

745.5 KB

Edward Snowden - Permanent Record.epub

745.5 KB

Top 20 Common Phone Pins.txt

0.1 KB

/.../CH751 3D model/

CH751.stl

235.0 KB

/Other/Datahoarding texts/

2019_XIGMAS_MACHINE.txt

16.0 KB

data_storage_guide.txt

3.5 KB

Directory_Examples.txt

2.1 KB

Faraday_Cages.txt

16.9 KB

On_Backups.txt

1.7 KB

SLASH_DHG_SLASH.txt

2.1 KB

SLASH_DHG_SLASH_PART_TWO.txt

1.4 KB

/Other/Hacking Demo/

Demo Instructions.txt

2.4 KB

Hacking Demo Walkthough Microphone Audio (raw).m4a

49.8 MB

Hacking Demo Walkthough Screen Capure.mp4

99.3 MB

VM Network Topology.pptx

33.2 KB

/.../Attacker VM Resources/

Kali Linux Commands.txt

0.8 KB

ransomware.hta

13.7 KB

/Other/Hacking Demo/Presentations/

Carpe DIEM - Carolinas IT 2019.pdf

2.4 MB

Carpe DIEM - Carolinas IT 2019.pptx

15.7 MB

Huntress Labs - Live Hack Robin Robins BootcampDeck.pptx

18.5 MB

RR PC Q2 - Unmasking Attacks to Sell Security.pptx

17.6 MB

/.../Victim VM Resources/

Templated Malicious Email with Payload.eml

106.5 KB

/.../Victim VM Resources/Dirlist Contents/

Anti-Virus-Results-FinUSB-Suite-3.2.xlsx

1.9 MB

Biotable1.pdf

18.2 KB

busrepgoats.xls

92.7 KB

Device-Tests-FinSpyMobile4.51.xlsx

38.4 KB

Employee Roster.txt.txt

0.1 KB

FinSpyPC.4.51.ReleaseNotes.pdf

795.2 KB

Luginbuh1.png

17.4 KB

offsite_passwords.bmp

6.3 MB

passed_out.jpg

67.4 KB

/

README.md

2.6 KB

/.../Offline Quickbooks Website/

QuickBooks Online Login _ Intuit US.html

40.6 KB

/Active Directory/

Active directory 4th edition.pdf

12.0 MB

Active directory 5th edition.pdf

27.0 MB

Active Directory Cookbook, 3rd Edition.pdf

9.5 MB

Active directory domain services 2008 how-to.pdf

26.9 MB

Active Directory for Dummies.pdf

7.2 MB

exam 70-640 configuring windows server 2008 active directory ( 2nd edition ).pdf

24.6 MB

Manning Learn Active Directory Management in a Month of Lunches (2014).pdf

19.1 MB

/.../MSCA Windows AD/

MCSA Windows server 2016 practice tests exams ( 70-740 70-741 70-742 70-743 ).pdf

3.8 MB

MCSA Windows server 2016 study guide exam ( 70-740 ).pdf

18.0 MB

MCSA Windows server 2016 study guide exam ( 70-741 ).pdf

49.4 MB

MCSA Windows server 2016 study guide exam ( 70-742 ).pdf

19.4 MB

/.../Devious Gauge Card/

Devious Gauge Card.ai

87.3 KB

Devious Gauge Card.dgn

69.6 KB

Devious Gauge Card.dwg

203.5 KB

Devious Gauge Card.dxf

990.9 KB

Devious Gauge Card.jpg

57.9 KB

Devious Gauge Card.pdf

95.8 KB

Devious Gauge Card.png

294.7 KB

Devious Gauge Card.psd

14.7 MB

Devious Gauge Card.svg

244.8 KB

Devious Gauge Card.txt

1.3 KB

/.../Ollam's Decoding Master/Key Decoding/

Decoding - American.png

32.5 KB

Decoding - Arrow.png

32.7 KB

Decoding - BEST.png

32.7 KB

Decoding - Kwikset.png

34.7 KB

Decoding - Master.png

33.0 KB

Decoding - Sargent.png

34.7 KB

Decoding - Schlage.png

34.2 KB

Decoding - Weiser.png

32.2 KB

Decoding - Yale.png

33.3 KB

/.../Ollam's Decoding Master/Key Measurments/

Key Measurments - American.png

25.1 KB

Key Measurments - Arrow.png

25.9 KB

Key Measurments - BEST.png

22.2 KB

Key Measurments - Kwikset.png

22.5 KB

Key Measurments - Master.png

23.0 KB

Key Measurments - Sargent.png

24.2 KB

Key Measurments - Schlage.png

23.5 KB

Key Measurments - Weiser.png

21.9 KB

Key Measurments - Yale.png

22.8 KB

tubular.png

491.1 KB

/.../Ollam's Decoding Master/Pinning Charts/

Pin Chart - Arrow.jpg

73.3 KB

Pin Chart - Corbin DH Z.jpg

78.2 KB

Pin Chart - Corbin X.jpg

86.2 KB

Pin Chart - Corbin Z.jpg

87.3 KB

Pin Chart - Kwikset.jpg

200.3 KB

Pin Chart - Master Lock (and American Lock).png

5.2 MB

Pin Chart - Master Lock and American Lock.jpg

329.1 KB

Pin Chart - Russwin DH.jpg

82.9 KB

Pin Chart - Sargent.jpg

74.5 KB

Pin Chart - Schlage.jpg

227.9 KB

Pin Chart - Weiser.jpg

67.0 KB

Pin Chart - Weslock.jpg

80.8 KB

Pin Chart - Yale.jpg

72.2 KB

Pin Chart Terms.txt

0.1 KB

/Penitration Testing/

Advance Penetration Testing Kali Linux Training.pdf

36.1 KB

Advanced Penetration Testing for Highly Secured Environments (2nd Edition).pdf

11.9 MB

Advanced Penetration Testing For Highly Secured Environments.pdf

16.6 MB

Advanced Penetration Testing Hacking The World's Most Secure Networks.pdf

6.0 MB

Advanced Penetration Testing.epub

11.5 MB

Advanced Web Application Penetration Testing with Burp Suite [video].zip

1.2 MB

Backtrack 4 Assuring Security By Penetration Testing.pdf

14.6 MB

Black Hat Python Python Programming For Hackers And Pentesters.pdf

6.9 MB

CRC Press Ethical Hacking And Penetration Testing Guide (2014).pdf

23.5 MB

End-to-End Penetration testing with Kali Linux [video].zip

1.7 GB

Ethical Hacking And Penetration Testing Guide.pdf

104.1 MB

Ethical Hacking The Value Of Controlled Penetration Tests.pdf

1.3 MB

Google Hacking For Penetration Testers Syngress (2015).pdf

38.5 MB

Hacking And Penetration Testing With Low Power Devices (2014).pdf

8.7 MB

Hacking Guide To Basic Security, Penetration Testing And Everything Else Hacking.pdf

476.6 KB

Hacking The Xbox An Introduction To Reverse Engineering.pdf

25.5 MB

Hacking With Kali Practical Penetration Testing Techniques (1st Edition) (2014).pdf

24.4 MB

Hands-on IOT Penetration Testing [video].zip

656.7 MB

How To Instrument For Advanced Web Application Penetration Testing.pdf

981.4 KB

Kali Linux 2 Windows Penetration Testing.pdf

23.9 MB

Learning Penetration Testing With Python.pdf

9.0 MB

Linux Penetration Testing Laptop Setup V2.pdf

35.9 KB

Linux Penetration Testing Laptop Setup V4.pdf

88.3 KB

Mastering Wireless Penetration Testing For Highly Secured Environments (2015).pdf

12.9 MB

Metasploit Penetration Testing Cookbook (2nd Edition) (2013).pdf

7.2 MB

Network Penetration Testing Using Python and Kali Linux [video].zip

207.4 MB

Ninja Hacking Unconventional Penetration Testing Tactics And Techniques (2010).pdf

10.3 MB

OPSEC for Penetration Testers [video].zip

278.4 MB

Pen Testing And Ethical Hacking Study Guide.pdf

1.7 MB

Pen-testing Azure Applications.epub

21.9 MB

Penetration Testing (2014).pdf

12.8 MB

Penetration Testing - Setting the Scope and Rules of Engagement [video].zip

14.1 MB

Penetration Testing and Ethical Hacking with Kali Linux [video].zip

962.2 MB

Penetration Testing Automation Using Python and Kali Linux [video].zip

396.7 MB

Penetration Testing Guidance (2015).pdf

1.1 MB

Penetration Testing With BackBox (2014).pdf

3.7 MB

Penetration Testing With BackBox (2015).pdf

6.6 MB

Penetration Testing With Raspberry Pi (2015).pdf

10.2 MB

Penetration Testing With The Bash Shell (2014).pdf

3.6 MB

Penetration Testing.pdf

317.1 KB

Practical Web app Pentesting with Kali Linux [video].zip

1.6 GB

Professional Penetration Testing.epub

26.3 MB

Security De-engineering.pdf

2.8 MB

The Hacker Playbook 2 Practical Guide To Penetration Testing.pdf

24.3 MB

Unauthorised Access Physical Penetration Testing For It Security Teams.pdf

27.2 MB

Web Application Penetration Testing Fundamentals [video].zip

292.5 MB

Web Application Penetration Testing with Burp Suite [video].zip

344.8 MB

Web Penetration Testing With Kali Linux (2nd Edition).pdf

11.6 MB

Wireless Network Penetration Testing [video].zip

124.1 MB

Wireless Network Penetration Testing Advanced Techniques [video].zip

156.4 MB

/Penitration Testing/.unwanted/

Advanced Penetration Testing for Highly Secured Environments (2nd Edition).pdf

9.8 MB

Advanced Penetration Testing for Highly Secured Environments.pdf

14.6 MB

Advanced Penetration Testing.epub

11.5 MB

/Penitration Testing/Kali Linux/

Learn Advanced Ethical Hacking Using Kali Linux [video].zip

2.4 GB

Learning windows Penetration Testing Using Kali Linux [video].zip

868.9 MB

/Penitration Testing/Metasploit/

Exploit Development and Execution with the Metasploit Framework [video].zip

695.6 MB

Instant Metasploit Starter.epub

8.4 MB

Learning Metasploit Exploitation and Development (2013).epub

26.0 MB

Learning Metasploit Exploitation and Development (2013).pdf

9.5 MB

Metasploit Basics for Protecting SharePoint [video].zip

567.2 MB

Metasploit Penetration Testing Cookbook.pdf

5.2 MB

/Penitration Testing/Metasploit/Mastering Metasploit/

Mastering Metasploit (1st Edition).pdf

14.8 MB

Mastering Metasploit (2nd Edition).pdf

28.2 MB

/Reverse Engineering/

Covert JAVA - Decompiling, Patching, Reverse-Engineering.pdf

4.3 MB

Covert JAVA - Techniques for Decompiling, Patching, & Reverse Engineering.pdf

4.0 MB

Design for Hackers - Reverse Engineering Beauty.epub

35.9 MB

Practical Reverse Eengineering X86-X64 ARM Windows Kernel Reversioning Tools And Obfuscation (201.pdf

6.9 MB

Practical Reverse Engineering x86-x64 ARM Windows Kernel Reversing Tools And Obfuscation.epub

3.4 MB

Practical Reverse Engineering.pdf

5.5 MB

Reverse Engineering of Object Oriented Code.pdf

6.1 MB

Reversing - Secrets of Reverse Engineering.pdf

8.8 MB

Reversing - The Hacker's Guide to Reverse Engineering.pdf

8.8 MB

Reversing Secrets of Reverse Engineering.epub

9.1 MB

Sockets Shellcode Porting And Coding Reverse Engineering Exploits (2005).pdf

117.8 MB

Sockets, Shellcode, Porting, & Coding - Reverse Engineering Exploits & Tool Coding for Security Professionals.pdf

117.8 MB

Static & Dynamic Reverse Engineering Techniques for Java Software Sytems.pdf

1.2 MB

The IDAPro Book (2nd Edition).epub

5.8 MB

Verlag Reverse Engineering of Object Oriented Code.pdf

6.2 MB

/Reverse Engineering/Reverse Engineering/

index.html

10.6 KB

Reverse Enginnering Hacking and Cracking.pdf

2.4 MB

/.../Reverse Engineering Code with IDA Pro/

Reverse Engineering Code with IDA Pro (2008).pdf

4.1 MB

Reverse Engineering Code with IDA Pro.pdf

4.1 MB

/Reverse Engineering/Reverse Engineering/ARM/

index.html

10.7 KB

/Reverse Engineering/Reverse Engineering/ARM/Android/

EN - Analyzing and dissecting android applications for security defects.pdf

322.1 KB

EN - BlackHat 2011 Android from reversing to decompilation.pdf

865.3 KB

EN - Practice of android reverse engineering.pdf

1.6 MB

EN - Reversing android apps.pdf

2.8 MB

FR - Reversing android.pdf

554.4 KB

index.html

11.5 KB

/Reverse Engineering/Reverse Engineering/x86/

EN - Intel32-2-Instruction Set ReferenceA.pdf

2.3 MB

EN - Intel32-2-Instruction Set ReferenceB.pdf

1.8 MB

EN - Interrupts & Debugging.pdf

901.9 KB

index.html

11.4 KB

/Reverse Engineering/Reverse Engineering/x86-64/

EN - AMD64 Architecture Programmer's Manual Volume 3 General-Purpose and System Instructions.pdf

2.1 MB

index.html

11.1 KB

/Reverse Engineering/Reverse Engineering/x86/Unix/

EN - Executable and Linkable Format ELF.pdf

152.3 KB

EN - Ptrace - process trace.pdf

18.0 KB

EN - Reverse engineering Linux ELF binaries on the x86 platform.pdf

72.2 KB

EN - Reverse engineering linux x86 binaries.pdf

175.4 KB

FR - SSTIC 06 - Playing with ptrace.pdf

1.1 MB

index.html

11.3 KB

/.../Security Auditing And Management/

Assessing and Mitigating Security Risks [video].zip

295.4 MB

Auditing AWS Environments for Security and Best Practices [video].zip

8.1 MB

Building the Infrastructure for Cloud Security, A Solutions View (2014).pdf

8.4 MB

Defense Against The Black Arts.pdf

52.2 MB

Designing and Implementing Security Policies [video].zip

331.4 MB

Digital Asset Management, Content Architectures Project Management and Creating Order Out of Media Chaos (2014).pdf

7.2 MB

Enterprise Security - Policies, Practices, and Procedures [video].zip

254.8 MB

Enterprise Strength Mobile Device Security [video].zip

1.0 GB

How to Stop Man-in-the-Middle and Downgrade Attacks in Your Apps [video].zip

333.3 MB

Implementing a Security Assessment and Authorization Process [video].zip

283.0 MB

Implementing CyberSecurity.pdf

4.7 MB

Implementing Physical Security [video].zip

228.9 MB

Information Security Fundamentals.pdf

27.0 MB

Information Security Manager - Information Security Governance [video].zip

468.1 MB

Information Systems Auditing - The Big Picture [video].zip

123.8 MB

Information Systems Auditor - Acquisition and Development [video].zip

300.0 MB

Information Systems Auditor - Governance and Management [video].zip

414.5 MB

Information Systems Auditor - Operations, Maintenance, and Service [video].zip

224.5 MB

Information Systems Auditor - Protection of Information Assets [video].zip

533.7 MB

Information Systems Auditor - The Process of Auditing [video].zip

345.9 MB

Introduction to Browser Security Headers [video].zip

545.7 MB

Introduction to Penetration Testing Using Metasploit [video].zip

524.9 MB

Intrusion Detection And Prevention For Mobile Eco-Systems.pdf

25.4 MB

Intrusion Detection Networks.pdf

5.4 MB

Managing Information Security Incidents (ISO_IEC 27002) [video].zip

271.3 MB

Managing Information Security Threats & Risks (ISO_IEC 27002) [video].zip

407.3 MB

Network And Data Security For Non-Engineers.pdf

10.9 MB

Pluralsight - Network Monitoring And Analysis [video].zip

222.8 MB

Practical IPv6 for Windows Administrators (2014).pdf

6.4 MB

Practice of Network Security Monitoring.epub

11.7 MB

Responsive Security.pdf

6.1 MB

Risk Management [video].zip

75.3 MB

Risk Management and Incident Response for CASP (CAS-002) [video].zip

217.6 MB

Risk Management and Information Systems Control - Introduction to Risk [video].zip

110.5 MB

Risk Management and Information Systems Control - IT Risk Assessment [video].zip

143.7 MB

Risk Management and Information Systems Control - Risk and Control Monitoring and Reporting [video].zip

81.6 MB

Risk Management and Information Systems Control - Risk Identification [video].zip

175.3 MB

Risk Management and Information Systems Control - Risk Response and Mitigation [video].zip

152.6 MB

Secure Account Management Fundamentals [video].zip

1.2 GB

Security Engineering A Guide To Building Dependable Distributed Systems.epub

8.5 MB

Security Management - The Big Picture [video].zip

268.5 MB

Security Strategy.pdf

5.2 MB

Supply Chain Risk Management.pdf

8.7 MB

Technical Integration of Enterprise Components for CASP (CAS-002) [video].zip

158.1 MB

Threat Modeling - The Big Picture [video].zip

108.2 MB

Threat Modeling Designing For Security.epub

6.7 MB

Threat Modeling Fundamentals [video].zip

159.8 MB

Threat Vulnerability Assesment for Enterprises [video].zip

2.1 GB

/Social Engineering/

No Tech Hacking A Guide To Social Engeneering.pdf

7.4 MB

Social Engineering And Nonverbal Behavior Set (2014).pdf

145.9 MB

Social Engineering The Art Of Human Hacking (2010).pdf

6.4 MB

/.../wifi 802.11/

802 Dot 11 Security (2002).pdf

933.9 KB

Bulletproof Wireless Security (2005).pdf

3.5 MB

Hacking Exposed Wireless (2nd edition) (2010).pdf

11.6 MB

WiFi Hacking for Beginners Learn Hacking by Hacking WiFi networks (2017).epub

329.1 KB

/Lock Picking/Decoding/

.gitattributes

0.1 KB

CC license.txt

1.0 KB

/.../Devious Gauge Card/

Devious Gauge Card.ai

87.3 KB

Devious Gauge Card.dgn

69.6 KB

Devious Gauge Card.dwg

203.5 KB

Devious Gauge Card.dxf

990.9 KB

Devious Gauge Card.jpg

57.9 KB

Devious Gauge Card.pdf

95.8 KB

Devious Gauge Card.png

294.7 KB

Devious Gauge Card.psd

14.7 MB

Devious Gauge Card.svg

244.8 KB

Devious Gauge Card.txt

1.3 KB

/Lock Picking/Decoding/Key Decoding/

Decoding - American.png

32.5 KB

Decoding - Arrow.png

32.7 KB

Decoding - BEST.png

32.7 KB

Decoding - Kwikset.png

34.7 KB

Decoding - Master.png

33.0 KB

Decoding - Sargent.png

34.7 KB

Decoding - Schlage.png

34.2 KB

Decoding - Weiser.png

32.2 KB

Decoding - Yale.png

33.3 KB

/Lock Picking/Decoding/Key Measurments/

Key Measurments - American.png

25.1 KB

Key Measurments - Arrow.png

25.9 KB

Key Measurments - BEST.png

22.2 KB

Key Measurments - Kwikset.png

22.5 KB

Key Measurments - Master.png

23.0 KB

Key Measurments - Sargent.png

24.2 KB

Key Measurments - Schlage.png

23.5 KB

Key Measurments - Weiser.png

21.9 KB

Key Measurments - Yale.png

22.8 KB

tubular.png

491.1 KB

/Lock Picking/Decoding/Pinning Charts/

Pin Chart - Arrow.jpg

73.3 KB

Pin Chart - Corbin DH Z.jpg

78.2 KB

Pin Chart - Corbin X.jpg

86.2 KB

Pin Chart - Corbin Z.jpg

87.3 KB

Pin Chart - Kwikset.jpg

200.3 KB

Pin Chart - Master Lock (and American Lock).png

5.2 MB

Pin Chart - Master Lock and American Lock.jpg

329.1 KB

Pin Chart - Russwin DH.jpg

82.9 KB

Pin Chart - Sargent.jpg

74.5 KB

Pin Chart - Schlage.jpg

227.9 KB

Pin Chart - Weiser.jpg

67.0 KB

Pin Chart - Weslock.jpg

80.8 KB

Pin Chart - Yale.jpg

72.2 KB

Pin Chart Terms.txt

0.1 KB

/Lock Picking/Pick Templates/

Auto Jigglers.pdf

905.9 KB

Combs.pdf

890.9 KB

Wafer & Warded.pdf

902.1 KB

/Operating Systems/BSD/

A No-Nonsense Guide to The Open-BSD Firewall.pdf

5.4 MB

A No-Nonsense Guide to The OpenBSD Firewall.pdf

5.4 MB

Absolute BSD - The Ultimate Guide to FreeBS.pdf

8.2 MB

Absolute Free-BSD ( 2nd Ed ).pdf

8.2 MB

Absolute Free-BSD ( 3rd Ed ).pdf

4.9 MB

Absolute FreeBSD - The Complete Guide to FreeBSD ( 2nd Ed ) ( 2007 ).pdf

7.5 MB

Absolute Open-BSD (2nd Edition).pdf

11.5 MB

Absolute Open-BSD.pdf

11.5 MB

BSD Hacks.pdf

2.1 MB

Design And Performance of The OpenBSD Statefull Packet Filter - Slides.pdf

257.9 KB

Embedded FreeBSD Cookbook.pdf

1.2 MB

Free BSD Device Drivers.pdf

8.7 MB

FreeBSD Chinese HowTo.pdf

1.2 MB

FreeBSD Developers' Handbook.pdf

1.3 MB

FreeBSD MailServer IMAP POP3.pdf

228.4 KB

FreeBSD MailServer Sendmail.pdf

267.9 KB

How to Build a FreeBSD-Stable Firewall with IPFILTER.pdf

68.1 KB

OpenBSD - Firewall IDS.pdf

73.6 KB

OpenBSD for Newbies.pdf

106.7 KB

Security Evaluation of the OpenBSD Operating System.pdf

78.2 KB

Snort v2.0.0 Install Guide.pdf

66.0 KB

/Operating Systems/Debian/

Debian GNU-Linux Bible.pdf

7.1 MB

Debian Linux Cookbook - Tips And Techniques For Everyday Use.pdf

7.5 MB

/Operating Systems/Kali Linux/

Basic Security Testing With Kali Linux ( 2014 ).pdf

14.4 MB

Kali Linux ( 2014 ).pdf

8.2 MB

Kali Linux Assuring Security by Penetration Test.pdf

8.1 MB

Kali Linux Cookbook.pdf

10.9 MB

Kali Linux CTF Blueprints ( 2014 ).pdf

3.7 MB

Kali Linux Network Scanning Cookbook ( 2014 ).pdf

4.8 MB

Kali Linux Revealed ( 1st Ed ).pdf

27.6 MB

Kali Linux Social Engineering ( 2013 ).pdf

4.0 MB

Kali Linux Social Engineering.pdf

5.5 MB

Kali Linux Wireless Penetration Testing Beginner.pdf

13.4 MB

Kali Linux Wireless Penetration Testing Essentials.pdf

19.6 MB

Mastering Kali Linux For Advanced Penetration Testing ( 2014 ).pdf

9.4 MB

Web Penetration Testing With Kali Linux ( 2013 ).pdf

20.2 MB

/Operating Systems/Linux/

Bite Size Linux.pdf

32.6 MB

Designing and Implementing Linux Firewalls and QoS.pdf

13.5 MB

How Linux Works.pdf

5.3 MB

Linux Debugging Tools.pdf

15.2 MB

Linux Firewalls.pdf

8.9 MB

The Linux Commandline.pdf

7.5 MB

Using Linux As A Router.pdf

31.0 KB

/Operating Systems/Linux Mint/

Linux Mint Essentials.pdf

13.0 MB

/Operating Systems/Red Hat/

Red Hat Linux 7.2 Bible.pdf

5.4 MB

Red Hat Linux Administration A Beginners Guide.pdf

9.9 MB

Red Hat Linux Networking and System Administration.pdf

8.2 MB

Red Hat Linux Pocket Administrator.pdf

2.3 MB

Red Hat Linux Security And Optimization.pdf

5.4 MB

/Programming/

Algorithmics (3rd Edition).pdf

10.3 MB

Algorithms (4th Edition).pdf

30.3 MB

Algorithms And Parallel Computing.pdf

8.9 MB

Algorithms In A Nutshell.pdf

12.9 MB

Bug Hunters Diary.epub

4.1 MB

Object Oriented Construction Handbook (2004).pdf

6.3 MB

TCP And IP Guide.pdf

56.4 MB

The Art of Debugging.pdf

9.6 MB

/Programming/Actionscript/

Actionscript 3.0 bible ( 2nd edition ).pdf

14.1 MB

Actionscript 3.0 cookbook.pdf

3.6 MB

Actionscript 3.0 design patterns.pdf

4.2 MB

Actionscript developers guide to puremvc.pdf

5.6 MB

Actionscript developers guide to robotlegs.pdf

11.8 MB

Actionscript for flash mx the definitive guide ( 2nd edition ).pdf

7.8 MB

Automating actionscript projects with eclipse and ant.pdf

7.1 MB

/Programming/Android/

50 Android Hacks.pdf

10.9 MB

Android 4 New Features for Application Development.pdf

2.4 MB

Android 5 Programming by Example.pdf

3.7 MB

Android 30 Application Development Cookbook.pdf

8.8 MB

Android Application Development Cookbook.pdf

33.9 MB

Android Application Development For Dummies ( 2nd Ed ).pdf

42.3 MB

Android Application Programming with OpenCV.pdf

3.6 MB

Android Apps Security.pdf

6.8 MB

Android Apps With Eclipse.pdf

19.9 MB

Android Cookbook.pdf

9.5 MB

Android Design Patterns And Best Practices.pdf

20.2 MB

Android for Work.pdf

14.6 MB

Android Fragmentation Management How-To.pdf

5.2 MB

Android in Action ( 3rd Ed ).pdf

16.0 MB

Android Native Development Kit Cookbook.pdf

7.2 MB

Android NDK.pdf

9.2 MB

Android Programming for Beginners.pdf

10.7 MB

Android Recipes, A Problem-Solution Approach ( 3rd Ed ) ( 2014 ).pdf

16.4 MB

Android Security Internals.pdf

7.8 MB

Android Studio Application Development.pdf

1.9 MB

Android Studio Essentials.pdf

12.3 MB

Android Tablets for Dummies.pdf

47.7 MB

Android User Interface Development - Beginner's Guide.pdf

2.6 MB

Android Wearable Programming.pdf

10.8 MB

Application Security for The Android Platform.pdf

5.9 MB

Asynchronous Android.pdf

1.5 MB

Augmented Reality for Android Application Development.pdf

2.4 MB

Building Android Apps with HTML, CSS, and JavaScript.pdf

6.3 MB

Building Hybrid Android Apps with Java and JavaScript.pdf

17.6 MB

Decompiling Android.pdf

5.0 MB

Developing Android Applications with Adobe Air.pdf

2.4 MB

Developing Android Applications with Flex 4.5.pdf

3.1 MB

Embedded Android.pdf

12.4 MB

Expert Android.pdf

6.2 MB

Flash Development for Android Cookbook.pdf

30.4 MB

FR - Reverse Engineering Advanced Android DALVIK.pdf

291.4 KB

Head First Android Development.pdf

49.0 MB

Introduction To Android Application Development ( 4th Ed ) ( 2014 ).pdf

29.9 MB

Learning Android Intents.pdf

7.9 MB

Learning Android.pdf

10.3 MB

Mastering Android Application Development.pdf

6.0 MB

Mastering Android NDK.pdf

1.7 MB

Mobile Application Development for Android.pdf

3.1 MB

OpenGL ES 2 for Android.pdf

31.5 MB

Pro Android UI (2014).pdf

54.8 MB

The Business of Android Apps Development ( 2nd Ed ).pdf

5.5 MB

Voice Application Development for Android.pdf

1.6 MB

/.../Android Apps for Absolute Beginners/

android apps for absolute beginners ( 2nd Ed ).pdf

30.9 MB

android apps for absolute beginners.pdf

72.4 MB

/Programming/Android/Android Recipes/

Android Recipes ( 2nd Ed ).pdf

10.7 MB

Android Recipes.pdf

12.1 MB

/.../Android Wireless Application Development/

Android Wireless Application Development ( 2nd Ed ).pdf

12.9 MB

Android Wireless Application Development ( 3rd Ed ).pdf

11.2 MB

/Programming/Android/Beginning Android/

Beginning Android - Application Development.pdf

21.7 MB

Beginning Android - Tablet Application Development.pdf

54.8 MB

Beginning Android - Tablet Programming.pdf

5.1 MB

Beginning Android 3.pdf

21.1 MB

Beginning Android 4 - Application Development.pdf

63.4 MB

Beginning Android 4.pdf

29.8 MB

/Programming/Apache/

Apache Cordova 3 Programming ( 2014 ).pdf

8.7 MB

Pro Apache XML ( 2006 ).pdf

5.9 MB

The Definitive Guide to Apache mod rewrite ( 2006 ).pdf

1.1 MB

/.../Mastering Apache Cassandra/

code.zip

301.3 KB

Mastering Apache Cassandra.pdf

3.1 MB

/.../Apple Pay Essentials/

Apple Pay Essentials.pdf

1.4 MB

code.zip

8.2 MB

/Programming/Arduino/

A Mind Controlled Arduino Robot.pdf

47.8 MB

Action, Movement, Live, And Sound.pdf

146.6 MB

Arduino [video].zip

314.6 MB

Arduino Adventures.pdf

16.9 MB

Arduino in Action.pdf

15.3 MB

Arduino Robotics.pdf

21.9 MB

Arduino Wearables.pdf

9.6 MB

Arduino.pdf

9.6 MB

Atmospheric Monitoring with Arduino.pdf

3.9 MB

Beginning Arduino Programming.pdf

36.9 MB

Beginning C for Arduino.pdf

29.0 MB

Beginning NFC, Near Field Communication with Arduino - Android and PhoneGap (2014).pdf

28.2 MB

Bluetooth.pdf

111.6 MB

C Programming for Arduino.pdf

10.0 MB

Drones.pdf

197.5 MB

Environmental Monitoring With Arduino.pdf

17.2 MB

Getting Started With mBot.pdf

28.2 MB

Getting Started With Netduino.pdf

8.8 MB

Getting Started With The Internet of Things.pdf

6.6 MB

Internet of Things with Arduino Blueprints.pdf

6.1 MB

Learn Electronics With Arduino.pdf

52.7 MB

Raspberry Pi Home Automation with Arduino.pdf

1.8 MB

/.../Cookbooks and Projects/

Arduino and Kinect Projects.pdf

83.1 MB

Arduino and LEGO Projects.pdf

14.8 MB

Arduino Cookbook ( 2nd Ed ).pdf

12.4 MB

Arduino Cookbook.pdf

7.9 MB

Arduino Development Cookbook.pdf

4.2 MB

Arduino Home Automation Projects.pdf

21.0 MB

Arduino Projects to Save The World.pdf

28.7 MB

Basic Arduino Projects ( 2nd ed ).pdf

118.9 MB

Basic Arduino Projects (2014).pdf

101.7 MB

Best of Make ( vol 2 - 65 ) - Projects And Skill Builders.pdf

41.5 MB

Lego And Arduino Projects.pdf

111.6 MB

/.../Getting Started With Arduino/

Getting Started With Arduino ( 2nd Ed ).pdf

6.8 MB

Getting Started With Arduino ( 3rd Ed ).pdf

27.4 MB

/.../ASP DOT NET/

ASP DOT NET 3.5 For Dummies.pdf

5.6 MB

ASP NET 3 5 CMS Development.pdf

10.7 MB

ASP NET Data Presentation Controls Essentials.pdf

7.9 MB

Asp Net Mvc 4 And The Web Api.pdf

1.7 MB

Asp Net Mvc 4 In Action.pdf

11.8 MB

Asp Net Mvc 4 Recipes.pdf

10.6 MB

ASP NET Web API - Build RESTful Web Applications And Services On The NET Framework.pdf

2.1 MB

Beginning ASP NET 1.1 With Visual C# NET (2003).pdf

19.7 MB

Beginning ASP NET 2.0 Databases (2nd Edition).pdf

19.5 MB

Beginning Asp Net 3.5 In Vb (2nd Edition) (2008).pdf

38.5 MB

Beginning Asp Net 3.5.pdf

43.8 MB

Beginning Asp Net 4 In C 2010.pdf

23.1 MB

Beginning Asp Net 4 In C And Vb.pdf

15.2 MB

Beginning Asp Net 4.5 Databases (3rd Edition).pdf

8.1 MB

Beginning Asp Net 4.5 In C And Vb.pdf

21.7 MB

Beginning Asp Net 4.5 In C.pdf

23.0 MB

Beginning Asp Net 4.5 In Vb.pdf

22.3 MB

Beginning Asp Net E Commerce In C.pdf

28.7 MB

Beginning ASP NET MVC 4.pdf

8.1 MB

Beginning Asp Net Security.pdf

28.3 MB

/Programming/Assembly/

64 ia 32 Architectures Ssoftware Developer Instruction Set Reference Manual.pdf

6.6 MB

Assembly Language for x86 Processors (7th Edition).pdf

12.1 MB

GAS Syntax.pdf

1.7 MB

Intel Code Table.pdf

150.4 KB

/Programming/AWS/

Learning AWS.pdf

10.7 MB

/.../Amazon Web Services - Migrating Your net Enterprise Application/

Amazon Web Services - Migrating Your net Enterprise Application.pdf

14.9 MB

code.zip

8.2 MB

/.../AWS Administration The Definitive Guide/

AWS Administration The Definitive Guide.pdf

8.1 MB

code.zip

3.4 KB

/.../Learning Big Data With Amazon Elastic Mapreduce/

code.zip

1.6 MB

Learning Big Data With Amazon Elastic Mapreduce.pdf

3.1 MB

/Programming/Beaglebone/

BeagleBone For Secret Agents.pdf

2.7 MB

BeagleBone Home Automation.pdf

3.1 MB

BeagleBone Robotic Projects.pdf

14.3 MB

/.../Beaglebone Robotic Projects/

Beaglebone Robotic Projects.pdf

14.3 MB

code.zip

597.3 MB

/Programming/Blackberry/

Learn BlackBerry 10 App Development, A Cascades-Driven Approach (2014).pdf

6.2 MB

/Programming/C/

Beginning Programming With C For Dummies.pdf

58.7 MB

C 3.0 Cookbook (3rd Edition).pdf

4.8 MB

C 3.0 Design Patterns.pdf

2.9 MB

C 4 Asp Net 4 And Wpf With Visual Studio 2010 Jump Start.pdf

16.3 MB

C 4.0 How To.pdf

7.5 MB

C 4.0 In A Nutshell (4th Edition).pdf

8.5 MB

C 4.0 Pocket Reference (3rd Edition).pdf

3.8 MB

C 5 First Look.pdf

3.9 MB

C 5.0 In A Nutshell (5th Edition).pdf

12.8 MB

C 5.0 Pocket Reference.pdf

2.3 MB

C 2008 Programmers Reference.pdf

21.7 MB

C 2010 All in One For Dummies.pdf

28.1 MB

C All in One Desk Reference For Dummies (2nd edition).pdf

68.5 MB

C Amp.pdf

17.8 MB

C And CLI The Visual C Language For NET.pdf

8.3 MB

C Concurrency In Action.pdf

6.5 MB

C Cookbook.pdf

3.9 MB

C Database Basics.pdf

7.9 MB

C Essentials (2nd Edition).pdf

579.7 KB

C For Dummies (5th Edition).pdf

8.1 MB

C In A Nutshell.pdf

5.5 MB

C Primer (5th Edition).pdf

59.9 MB

C Primer Plus ( 6th Ed ) ( 2014 ).pdf

7.2 MB

C Programming From Problem Analysis To Program Design.pdf

7.8 MB

C Programming Language (4th Edition).pdf

33.1 MB

C Programming.pdf

134.5 KB

C Reference Manual.pdf

79.3 KB

System Programming with C and Unix.pdf

2.3 MB

/Programming/C#/

C# Programming Cookbook.pdf

34.2 MB

/Programming/C++/

A Tour Of C Plus Plus ( 2014 ).pdf

879.0 KB

Absolute CPP (5th Edition).pdf

6.2 MB

Beginning Visual C++ 2005.pdf

20.0 MB

Boost C++ Application Development Cookbook.pdf

7.3 MB

C++ CLI.pdf

8.7 MB

C++ How to Program (8th Edition) (2011).pdf

55.5 MB

C++ Pocket Reference.pdf

1.4 MB

C++ Solutions.pdf

3.3 MB

C++ Unleashed.pdf

4.2 MB

Data Structures And Algorithm Analysis In C++ ( 4th Ed ) ( 2014 ).pdf

3.0 MB

Data Structures And Algorithms In C++.pdf

4.4 MB

Practical C++ Programming.pdf

2.8 MB

Programming Embedded Systems In C And C++.pdf

985.8 KB

Que C++ Professional Programmer's Handbook.pdf

1.1 MB

Starting Out With C++ From Control Structures Through Objects (8th Edition).pdf

7.2 MB

The C++ Programming Language (4th Edition).pdf

10.8 MB

/.../Begining C Game Programming/

Begining C Game Programming.pdf

30.1 MB

code.zip

30.9 MB

/Programming/C/Learning C/

01 - The C Language.pdf

60.5 KB

02 - Variables and Data Storage.pdf

76.2 KB

03 - Sorting and Seaching Data.pdf

141.7 KB

04 - Data Files.pdf

95.9 KB

05 - Working with the Preprocessor.pdf

125.9 KB

06 - Working with Strings.pdf

72.8 KB

07 - Pointers and Memory Allocation.pdf

135.3 KB

08 - Functions.pdf

65.1 KB

09 - Arrays.pdf

67.0 KB

10 - Bits and Bytes.pdf

47.1 KB

11 - Debugging.pdf

88.9 KB

12 - Standard Library Functions.pdf

120.4 KB

13 - Times and Dates.pdf

49.9 KB

14 - System Calls.pdf

89.0 KB

15 - Portability.pdf

44.6 KB

16 - ANSI-ISO Standards.pdf

46.1 KB

17 - User Interface - Screen and Keyboard.pdf

96.9 KB

18 - Writing and Compiling Your Programs.pdf

76.8 KB

19 - Programming Style and Standards.pdf

77.0 KB

20 - Miscellaneous.pdf

176.2 KB

/Programming/Cisco/

Cisco Asa (2nd Edition).pdf

29.4 MB

Cisco Firewalls.pdf

19.5 MB

Cisco Ios Xr Fundamentals.pdf

4.0 MB

Cisco Network Security Little Black Book.pdf

3.3 MB

Cisco Router Configuration Handbook (2nd Edition).pdf

8.0 MB

Cisco Routers For The Desperate (2nd Edition).pdf

6.2 MB

Cisco Unified Contact Center Enterprise Ucce.pdf

10.6 MB

/Programming/COBOL/

Beginning COBOL for Programmers (2014).pdf

17.5 MB

/Programming/Delphi/Delphi Cookbook/

code.zip

19.0 MB

Delphi Cookbook.pdf

3.7 MB

/.../Django By Example/

code.zip

1.1 MB

Django By Example.pdf

7.3 MB

/.../Web Development With Django Cookbook ( 1st ed )/

code.zip

10.7 MB

Web Development With Django Cookbook ( 1st ed ).pdf

3.7 MB

/.../Web Development With Django Cookbook ( 2nd ed )/

code.zip

9.4 MB

Web Development With Django Cookbook ( 2nd ed ).pdf

4.1 MB

/Programming/Drupal/

Drupal 6 Performance Tips.pdf

9.0 MB

Drupal 6 Search Engine Optimization.pdf

9.4 MB

Drupal 7 Module Development.pdf

10.2 MB

Drupal 7 Multi Sites Configuration.pdf

5.1 MB

Drupal 7 Views Cookbook.pdf

4.7 MB

Drupal Development Tricks For Designers.pdf

8.0 MB

Drupal For Designers.pdf

25.9 MB

Drupal Search Engine Optimization.pdf

11.4 MB

Drupal.pdf

29.5 MB

Drupals Building Blocks.pdf

7.1 MB

/.../General Mobile Programming/

Address Space Randomization for Mobile Devices.pdf

288.8 KB

Architecting Mobile Solutions For The Enterprise.pdf

28.4 MB

Flex Mobile In Action.pdf

16.0 MB

Head First Mobile Web.pdf

82.8 MB

LiveCode Mobile Development Beginner's Guide.pdf

7.1 MB

Mobile Design Pattern Gallery (2nd Edition) (2014).pdf

120.1 MB

/.../Go Programming Blueprints/

code.zip

65.9 KB

Go Programming Blueprints.pdf

2.9 MB

/.../Go Programming Blueprints ( 2nd ed )/

code.zip

3.9 MB

Go Programming Blueprints ( 2nd ed ).pdf

9.2 MB

/Programming/Hadoop/

Apache Sqoop Cookbook ( 2013 ).pdf

7.2 MB

Cloudera Impala.pdf

6.5 MB

Dayong Du-Apache Hive Essentials (2015).epub

1.4 MB

Getting Started with Impala - Interactive SQL for Apache Hadoop (2014).epub

208.1 KB

Getting Started with Impala.pdf

808.1 KB

Getting Started with Impala2.pdf

798.4 KB

Hadoop - Illuminated.pdf

9.5 MB

Hadoop Beginners Guide ( 2013 ).pdf

11.4 MB

Hadoop Cluster Deployment ( 2013 ).pdf

4.5 MB

Hadoop Explained.pdf

784.1 KB

Hadoop In Practice ( 2012 ).pdf

15.5 MB

Hadoop Operations ( 2012 ).pdf

7.7 MB

Hadoop Operations And Cluster Management Cookbook.pdf

4.5 MB

Hadoop The Definitive Guide ( 3rd Ed ) ( 2012 ).pdf

14.5 MB

Hadoop.pdf

923.8 KB

Learning Cloudera Impala ( 2013 ).pdf

2.9 MB

Pro Microsoft HDInsight, Hadoop on Windows (2014).pdf

13.7 MB

/Programming/Haskell/

Beginning Haskell, A Project-Based Approach (2014).pdf

4.7 MB

/.../Haskell Data Analysis Cookbook/

code.zip

2.7 MB

Haskell Data Analysis Cookbook.pdf

3.0 MB

/Programming/Hibernate/

Beginning Hibernate 3rd (2014).pdf

2.4 MB

/Programming/HTML/

Beginning HTML XHTML CSS And Javascript.pdf

11.7 MB

Beginning XML with DOM and Ajax From Novice to Professional (2006).pdf

9.5 MB

Mobile HTML5 (2014).pdf

16.9 MB

The Truth About HTML5 (2014).pdf

5.7 MB

/Programming/Intel Galileo/

Internet of Things with Intel Galileo.pdf

4.3 MB

/Programming/Java/

An Introduction to Network Programming with Java.pdf

3.7 MB

An Introduction to Object-Oriented Programming with Java (5th ed).pdf

18.0 MB

Art of Java Web Development.pdf

16.4 MB

Beginning Java EE 6 With Glassfish 3 (2nd edition).pdf

8.8 MB

Beginning Java EE 7.pdf

16.6 MB

Beginning Java ME Platform.pdf

6.1 MB

Beginning Java.pdf

75.6 MB

Beginning JavaFX Platform.pdf

4.9 MB

Beginning JavaFX.pdf

5.2 MB

Beginning Programming With Java For Dummies (3rd edition).pdf

21.7 MB

Building Java EA vol I Architecture.pdf

3.5 MB

Building Mobile Applications With Java.pdf

8.5 MB

Concurrency Cookbook for Java 9 (2nd Edition).pdf

4.2 MB

Data Abstraction and Problem Solving with Java (3rd Edition).pdf

113.2 MB

Data Structures and Algorithms for Java 9.pdf

3.1 MB

Database Programming with JDBC and Java (2nd edition).Pdf

1.7 MB

Developing Java Beans.pdf

1.4 MB

Distributed Computing in Java 9.pdf

18.7 MB

Effective Java (2nd Edition).pdf

5.4 MB

Enhydra XMLC Java Presentation Development.pdf

3.0 MB

Enterprise JavaBeans (3rd Edition).pdf

2.6 MB

Enterprise JavaBeans 3.1 (6th edition).pdf

6.4 MB

Expert Oracle And Java Security.pdf

6.6 MB

Flex on Java.pdf

15.0 MB

From Java to Ruby.pdf

1.2 MB

Functional Programming for Java Developers.pdf

4.8 MB

Functional Programming in Java, Harnessing the Power of Java 8 Lambda Expressions (2014).pdf

4.3 MB

Head First Java (2nd Edition).pdf

36.3 MB

J2Me In A Nutshell - Decrypted.pdf

6.0 MB

JasperReports 3.5 for Java Developers.pdf

6.3 MB

JasperReports for Java Developers (2006).pdf

9.5 MB

Java & XSLT.pdf

2.1 MB

Java - Servlet Programming.pdf

2.3 MB

Java 2 Network Security.pdf

5.9 MB

Java 6 Platform Revealed (2006).pdf

1.9 MB

Java 7 Concurrency Cookbook.pdf

2.6 MB

Java 7 Pocket Guide (2nd Edition).pdf

91.6 MB

Java and SOAP.pdf

2.8 MB

Java and XML Binding.pdf

2.4 MB

Java Cryptography.pdf

1.5 MB

Java Data Access JDBC, JNDI, and JAXP.pdf

2.7 MB

Java Data Science Made Easy.pdf

9.3 MB

Java Database Programming with JDBC.pdf

2.8 MB

Java Deep Learning Essentials.pdf

4.2 MB

Java EE 6 Development with NetBeans 7.pdf

14.3 MB

Java EE 6 with GlassFish 3 Application Server.pdf

13.5 MB

Java EE 7 Development with NetBeans 8.pdf

10.2 MB

Java EE 7 Performance Tuning and Optimization.pdf

10.0 MB

Java EE 7 Recipes.pdf

11.4 MB

Java EE 7 with GlassFish 4 Application Server.pdf

5.2 MB

Java Extreme Programming Cookbook (2003).pdf

1.3 MB

Java Foundations (2004).pdf

6.0 MB

Java Management Extension.pdf

2.8 MB

Java Network Programming (2nd Ed).pdf

2.6 MB

Java NIO.pdf

3.1 MB

Java Performance Tuning (2).pdf

1.9 MB

Java Performance Tuning.pdf

17.2 MB

Java Pocket Guide.pdf

2.3 MB

Java Programming Interviews Exposed.pdf

6.0 MB

Java RMI.PDF

2.4 MB

Java Threads (2nd edition).pdf

1.3 MB

Java Web Services (2002).pdf

3.2 MB

JavaMail API.pdf

5.4 MB

JDBC Metadata MySQL and Oracle Recipes A Problem-Solution Approach (2006).pdf

6.6 MB

JSP - Java Server Pages (2nd Edition) (2002).pdf

3.2 MB

Learn Java for Android Development 3rd (2014).pdf

7.9 MB

Learn Java for Web Development (2014).pdf

17.7 MB

Learning Android, Develop Mobile Apps using Java and Eclipse (2nd Edition) (2014).pdf

22.5 MB

Learning Java (4th Edition).pdf

25.7 MB

Learning Java Functional Programming.pdf

2.1 MB

Learning Reactive Programming with Java 8.pdf

1.4 MB

Making Java Groovy (2014).pdf

14.9 MB

Managing And Customizing OpenCMS 6 Websites Java JSP Xml Content Management (2006).pdf

8.5 MB

Mastering Microservices with Java.pdf

8.0 MB

Natural Language Processing with Java and LingPipe Cookbook.pdf

3.0 MB

Neural Network Programming with Java.pdf

6.1 MB

Play for Java, Covers Play 2 (2014).pdf

7.5 MB

Pro Java EE 5 Performance Management and Optimization ( 2006 ).pdf

13.4 MB

Programming by Example For Java 9.pdf

7.6 MB

RESTful Java Web Services ( 2nd edition).pdf

3.1 MB

Service Oriented Architecture with Java.pdf

2.7 MB

Test-Driven Java Development.pdf

3.5 MB

Weblogic Server 6.1 Workbook for Enterprise JavaBeans (3rd edition) (2001).pdf

2.6 MB

/Programming/Javascript/

Async Javascript.pdf

2.8 MB

Beginning Javascript (4th Edition).pdf

7.0 MB

CoffeeScript Programming With JQuery Rails And Node JS (2012).pdf

4.2 MB

Eloquent Javascript (2nd Edition).pdf

4.8 MB

Fullstack Javascript Development With MEAN (2015).pdf

5.1 MB

Functional JavaScript.pdf

10.1 MB

Functional Programming in JavaScript.pdf

1.4 MB

Head First JavaScript.pdf

34.6 MB

HTML5 And JavaScript Web Apps.pdf

12.2 MB

If Hemmingway Wrote Javascript.pdf

5.7 MB

JavaScript - The Definitive Guide (6th Edition).pdf

14.1 MB

JavaScript - The Good Parts.pdf

1.6 MB

JavaScript and JSON Essentials.pdf

5.6 MB

JavaScript by Example (2nd Edition).pdf

28.2 MB

JavaScript Programmers Reference.pdf

3.8 MB

JavaScript Testing Beginner's Guide.pdf

3.9 MB

Learning JavaScript Data Structures and Algorithms.pdf

2.1 MB

Mastering JavaScript Design Patterns.pdf

1.9 MB

Mastering JavaScript High Performance.pdf

12.9 MB

Mastering JavaScript.pdf

2.6 MB

Object Oriented JavaScript Create Scalable Reusable High Quality JavaScript Applications And Libraries (2008).pdf

7.5 MB

Object-Oriented JavaScript (2nd Edition).pdf

2.2 MB

Pro Data Visualization Using R And JavaScript (2013).pdf

9.2 MB

Pro Data Visualization using R and JavaScript.pdf

11.5 MB

Professional JavaScript for Web Developers (3rd Edition).pdf

54.8 MB

Programming JavaScript Applications (2014).pdf

8.5 MB

Secrets Of The JavaScript Ninja (2012).pdf

15.6 MB

Single Page Web Applications, JavaScript End-to-End (2014).pdf

13.1 MB

Start Here! Build Windows 8 Apps with HTML5 and JavaScript.pdf

39.5 MB

The Principals Of Object Oriented Javascript (2014).pdf

2.8 MB

The Principles of Object Oriented Javascript.pdf

3.5 MB

/Programming/Javascript/AJAX/

AJAX For Dummies.pdf

8.8 MB

Beginning JavaScript with DOM Scripting and Ajax (2nd Edition).pdf

9.1 MB

/Programming/Javascript/Angular JS/

Angular JS UI Development.pdf

4.5 MB

AngularJS Directives.pdf

1.6 MB

AngularJS Essentials.pdf

1.3 MB

AngularJS Services.pdf

1.4 MB

AngularJS UI Development.pdf

4.5 MB

AngularJS Web Application Development Cookbook.pdf

2.2 MB

Angularjs.pdf

8.8 MB

Pro AngularJS (2014).pdf

11.6 MB

/Programming/Javascript/Grunt/

Automate with Grunt, The Build Tool for JavaScript (2014).pdf

1.7 MB

Getting Started with Grunt - The JavaScript Task Runner.pdf

1.4 MB

/Programming/Javascript/Jasmine/

Jasmine JavaScript Testing.pdf

1.3 MB

JavaScript Testing With Jasmine (2013).pdf

1.5 MB

JavaScript Testing with Jasmine.pdf

3.8 MB

/Programming/Javascript/JQuery/

Beginning Javascript and CSS Development With JQuery.pdf

10.9 MB

Creating Mobile Apps With JQuery Mobile (2nd Edition) (2015).pdf.pdf

4.5 MB

Creating Mobile Apps With JQuery Mobile (2013).pdf

4.1 MB

JQuery And JavaScript Developer Phrasebook ( 2014 ).pdf

2.8 MB

JQuery Cookbook Solutions And Examples For JQuery Developers (2009).pdf

6.0 MB

JQuery Mobile Cookbook (2012).pdf

4.7 MB

jQuery Mobile Web Development Essentials (2nd Edition).pdf

4.7 MB

JQuery Novice To Ninja (2nd Edition) (2012).pdf

16.9 MB

JQuery UI 1.8 The User Interface Library For JQuery (2011).pdf

7.5 MB

/Programming/Javascript/NodeJs/

Beginning Node.js (2014).pdf

7.3 MB

Node.js By Example (2015).epub

2.0 MB

Node.js Design Patterns (2014).pdf

15.4 MB

Node.js in Practice (2015).pdf

7.6 MB

Pro REST API Development with Node.js (2015).pdf

7.5 MB

/Programming/Kotlin/Programming Kotlin/

code.zip

603.0 KB

Programming Kotlin.pdf

4.0 MB

/Programming/LEGO Mindstorms/

Beginning LEGO MINDSTORMS EV3 (2014).pdf

25.2 MB

/.../Misc And Other/

Adaptive Leadership Accelerating Enterprise Agility ( 2014 ).pdf

1.9 MB

Big Data For Dummies.pdf

23.9 MB

Blackberry Application Development For Dummies.pdf

6.1 MB

Blog Design For Dummies.pdf

53.5 MB

Computer As Theatre ( 2nd Ed ) ( 2014 ).pdf

2.8 MB

Data Just Right ( 2014 ).pdf

2.9 MB

Institutionalization Of UX ( 2nd Ed ) ( 2014 ).pdf

7.9 MB

Learning Mobile App Development ( 2014 ).pdf

16.0 MB

Professional Concrete Mathematics A Foundation For Computer Science ( 2nd Ed ).pdf

5.2 MB

Quality Code ( 2014 ).pdf

1.6 MB

The Art of Computer Programming Vol 1 - 4 ( 2001 ).pdf

166.0 MB

The Lean Mindset ( 2014 ).pdf

3.5 MB

The Technical And Social History Of Software Engineering ( 2013 ).pdf

1.6 MB

The Technical And Social History Of Software Engineering ( 2014 ).pdf

1.6 MB

/.../Applied Architecture Patterns on The Microsoft Platform/

Applied Architecture Patterns on The Microsoft Platform.pdf

8.1 MB

code.zip

26.2 MB

/.../Building Recommendation Engines/

Building Recommendation Engines.pdf

10.8 MB

code.zip

38.9 KB

/.../Misc And Other/Coreos Essentials/

code.zip

57.3 KB

Coreos Essentials.pdf

3.6 MB

/.../Creative Greenfoot Raw/

code.zip

29.5 MB

Creative Greenfoot Raw.pdf

4.6 MB

/.../Data Sheets & Components/

Encylopedia of Electronic Components ( vol 1 ) - Powersources And Conversion.pdf

72.5 MB

Encylopedia of Electronic Components ( vol 2 ) - Signal Processing.pdf

74.7 MB

Encylopedia of Electronic Components ( vol 3 ) - Sensors.pdf

64.9 MB

/Programming/Objective-C/

Programming in Objective-C ( 6th Ed ) ( 2014 ).pdf

4.4 MB

/Programming/Perl/

Advanced Perl Programming.pdf

5.3 MB

Beginning Perl For Bioinformatics.pdf

1.4 MB

Beginning Perl.pdf

7.8 MB

Developing Web Applications With Apache MySQL MemCached and Perl.pdf

6.4 MB

Learning Perl.pdf

4.8 MB

Mastering Algorithms with Perl.pdf

6.4 MB

Penetration Testing with Perl ( 2015 ).pdf

4.6 MB

Perl and XML.pdf

919.8 KB

Perl Cookbook.pdf

9.7 MB

Perl For Sysadmins.pdf

1.5 MB

Perl Hacks.pdf

2.6 MB

Perl One-Liners.pdf

4.1 MB

Programming Perl.pdf

4.5 MB

Webshells In PHP, ASP, JSP, Perl, And ColdFusion.pdf

167.5 KB

/Programming/PHP/

Apress PHP ( 2010 ).pdf

5.0 MB

Beginning Ajax with PHP From Novice to Professional (2006).pdf

4.1 MB

Beginning PHP and MySQL 5 From Novice to Professional (2nd Edition) (2006).pdf

18.4 MB

Beginning PHP and PostgreSQL 8 From Novice to Professional (2006).pdf

17.4 MB

Learning PHP 7.pdf

6.0 MB

PHP 5 For Dummies.pdf

6.3 MB

PHP 5 Recipes A Problem Solution Approach ( 2005 ).pdf

5.7 MB

PHP AJAX Cookbook. (2011).pdf

5.8 MB

PHP and MySQL For Dummies.pdf

1.3 MB

PHP Cookbook ( 3rd Ed ) ( 2014 ).pdf

12.6 MB

PHP Oracle Web Development Data Processing Security Caching XML Web Services And AJAX ( 2007 ).pdf

7.4 MB

PHP Web Services ( 2013 ).pdf

10.7 MB

Pro PHP And JQuery - Add Quick Smooth And Easy Interactivity To Your PHP Sites With JQuery (2010).pdf

11.4 MB

Pro PHP GTK ( 2006 ).pdf

5.8 MB

Pro PHP XML and Web Services ( 2006 ).pdf

4.0 MB

Restfull ( 2008 ).pdf

13.3 MB

/Programming/Powershell/

Beginning PowerShell for SharePoint 2013 (2014).pdf

17.7 MB

Pro PowerShell for Amazon Web Services, DevOps for the AWS Cloud (2014).pdf

7.9 MB

/Programming/Python/

Advanced Python programming.pdf

199.0 KB

Automate the Boring Stuff with Python.pdf

17.4 MB

Beginning Python.pdf

5.8 MB

Building Machine Learning Systems with Python.pdf

6.5 MB

Core Python Programming.pdf

8.3 MB

Data Structures and Algorithms in Python.pdf

6.9 MB

Deep Learning with Python - A Hands-on Introduction (2017).pdf

7.1 MB

Expert Python Programming.pdf

5.5 MB

Flask Web Development, Developing Web Applications with Python (2014).pdf

8.8 MB

Functional Python Programming.pdf

3.1 MB

Gray Hat Python - Python Programming for Hackers and Reverse Engineers (2009).pdf

3.2 MB

Head First Python.pdf

29.6 MB

How To Think Like A Computer Scientist - Learning With Python (2002).pdf

883.7 KB

Learning Data Mining with Python.pdf

4.1 MB

Learning Penetration Testing with Python.pdf

5.0 MB

Learning Python (5th Edition).pdf

21.2 MB

Learning Python Application Development.pdf

35.0 MB

Learning Python Design Patterns.pdf

1.0 MB

Learning Python Network Programming.pdf

5.6 MB

Learning Robotics Using Python.pdf

7.9 MB

Mastering Object-oriented Python.pdf

3.7 MB

Mastering Python for Finance.pdf

5.2 MB

Mastering Python Regular Expressions (2014).pdf

1.1 MB

Mastering Python Regular Expressions.pdf

1.2 MB

Mastering Social Media with Python.pdf

11.7 MB

Matplotlib for Python Developers.pdf

8.2 MB

Modern Python Cookbook.pdf

14.8 MB

MySQL for Python.pdf

4.6 MB

OpenCV Computer Vision with Python.pdf

1.4 MB

Programming ArcGIS 10.1 with Python Cookbook.pdf

6.1 MB

Python 2.1 Bible.pdf

6.6 MB

Python 3 Object Oriented Programming.pdf

3.7 MB

Python 3 Object-oriented Programming (2nd Edition).pdf

2.7 MB

Python 3 Text Processing with NLTK 3 Cookbook.pdf

1.7 MB

Python 3 Web Development Beginner's Guide.pdf

2.7 MB

Python and HDF5 (2014).pdf

7.1 MB

Python and XML.pdf

4.1 MB

Python Cookbook (3rd Edition) (2013).pdf

10.3 MB

Python Data Analysis.pdf

7.4 MB

Python Data Science Essentials.pdf

3.3 MB

Python Data Visualization Cookbook.pdf

5.2 MB

Python for Data Analysis (2012).pdf

14.8 MB

Python for Finance (2014).pdf

5.1 MB

Python for Secret Agents.pdf

1.7 MB

Python Geospatial Development (2nd Edition).pdf

12.8 MB

Python Journey from Novice to Expert.pdf

11.1 MB

Python Machine Learning Blueprints - intuitive data projects you can relate to.pdf

40.0 MB

Python Machine Learning.pdf

16.4 MB

Python Parallel Programming Cookbook.pdf

2.5 MB

Python Pocket Reference (5th Edition) (2014).pdf

2.5 MB

Python Programming for the Absolute Beginner (3rd Edition).pdf

13.2 MB

Python Tools for Visual Studio.pdf

3.5 MB

Python Unlocked.pdf

2.9 MB

Raspberry Pi Cookbook for Python Programmers.pdf

7.6 MB

Test-Driven Web Development with Python (2014) [early release rev8].pdf

6.4 MB

The Python Quick Syntax Reference (2014).pdf

1.2 MB

/.../Automate It Recipes To Upskill Your Business/

Automate It Recipes To Upskill Your Business.pdf

30.3 MB

code.zip

5.1 MB

/Programming/R/

What You Need to Know About R.pdf

1.6 MB

/Programming/ROS/

ROS Robotics Projects.pdf

49.8 MB

/Programming/Rust/

code.zip

8.1 MB

Rust Essentials.pdf

1.8 MB

/Programming/Shaders/

GLSL Essentials.pdf

1.5 MB

HLSL Development Cookbook.pdf

8.2 MB

/Programming/Shell/

Wicked Cool Shellscripts.pdf

12.6 MB

/.../Building Business Websites With Squarespace 7/

Building Business Websites With Squarespace 7.pdf

10.3 MB

code.zip

109.1 KB

/.../Building Machine Learning Projects With Tensorflow/

Building Machine Learning Projects With Tensorflow.pdf

14.1 MB

code.zip

31.4 MB

/.../Xcode and iOS/

Beginning iOS 7 Development, Exploring the iOS SDK (2014).pdf

19.5 MB

Beginning IOS Application Development With HTML And Javascript.pdf

56.1 MB

Beginning iOS Cloud and Database Development (2014).pdf

3.5 MB

Beginning Xcode (2014).pdf

30.2 MB

Learn Design for iOS Development (2014).pdf

4.8 MB

Mobile Application Development for iOS.pdf

3.6 MB

Using Mac OS X Mavericks (2014).pdf

16.4 MB

/Wireshark/

Mastering Wireshark.pdf

28.8 MB

Wireshark 2.0 [video].zip

713.9 MB

Wireshark 2.2.4 [video].zip

1.3 GB

Wireshark Essentials.pdf

3.2 MB

Wireshark For Security Professionals.epub

22.7 MB

/Wireshark/techskills - wireshark224/

1-1 - What is Wireshark.pdf

30.0 KB

2-1 - Install Wireshark.pdf

25.5 KB

3-1 - Perform Data Capture.pdf

19.4 KB

4-1 - Use Wireshark Interface.pdf

21.6 KB

5-1 - Use Filters.pdf

30.3 KB

6-1 - Capture Unicast Data.pdf

27.8 KB

7-1-1 - Use Advanced Features ( pt1 ).pdf

34.1 KB

7-1-2 - Use Advanced Features ( pt2 ).pdf

32.4 KB

8-1 - Use Stats And Reporting.pdf

22.1 KB

/.../3-1 - Perform Data Capture - sdxml Files/

diagram.xml

71.7 KB

library.xml

0.2 KB

 

Total files 2266


Copyright © 2025 FileMood.com