FileMood

Download Utica Books

Utica Books

Name

Utica Books

 DOWNLOAD Copy Link

Total Size

585.4 MB

Total Files

21

Hash

6BF6089CC89919AA1834B32C5BBA641A5DDDB1BD

/

(Protecting Our Future 2) Mowbray, Thomas J_ LeClair, Jane-Cybersecurity in Our Digital Lives-John Wiley & Sons, Inc. (2013).epub

5.5 MB

-EC-Council. Ethical Hacking and Countermeasures (CEH v. 8).rar

131.5 MB

Aditya Sood and Richard Enbody Auth. Targeted Cyber Attacks. Multi-staged Attacks Driven by Exploits and Malware.pdf

5.8 MB

American Psychological Association-Publication Manual of the American Psychological Association-American Psychological Association (APA) (2009).pdf

9.9 MB

Charles P. Pfleeger, Shari Lawrence Pfleeger-Analyzing Computer Security_ A Threat _ Vulnerability _ Countermeasure Approach-Prentice Hall (2011).pdf

250.8 MB

Donovan, Martin-Hacking_ Learn the Basics of Ethical Hacking and Penetration Testing (2016).epub

1.6 MB

EC-Council Computer Forensics Investigating Data and Image Files .pdf

16.0 MB

Jason Andress and Steve Winterfeld Auth. Cyber Warfare. Techniques, Tactics and Tools for Security Practitioners.pdf

9.5 MB

Jeffrey Carr Inside cyber warfare mapping the cyber underworld.epub

6.1 MB

Joel Scambray, Neil Bergman, Mike Stanfield, Jason Rouse Hacking Exposed Mobile Security Secrets & Solutions.epub

13.5 MB

Maness, Ryan C._ Valeriano, Brandon-Cyber war versus cyber realities _ cyber conflict in the international system-Oxford University Press (2015).pdf

2.8 MB

Michael E. Whitman, Herbert J. Mattord Principles of Information Security.pdf

15.6 MB

Michael Sikorski, Andrew Honig Practical Malware Analysis The Hands-On Guide to Dissecting Malicious Software.epub

11.5 MB

Michael T. Raggo, Chet Hosmer Data hiding Exposing concealed data in multimedia, operating systems, mobile devices and network protocols.pdf

26.7 MB

P.W. Singer, Allan Friedman Cybersecurity and Cyberwar What Everyone Needs to Know.epub

2.5 MB

Patrick Engebretson The basics of hacking and penetration testing ethical hacking and penetration testing made easy.pdf

4.7 MB

Sean Bodmer, Dr. Max Kilger, Gregory Carpenter, Jade Jones Reverse Deception Organized Cyber Threat Counter-Exploitation.epub

3.8 MB

Sherri Davidoff, Jonathan Ham Network Forensics Tracking Hackers through Cyberspace.epub

48.1 MB

The Experts_ EC-Council.-Ethical Hacking and Countermeasures_ Attack Phases.pdf

17.9 MB

Thomas A. Johnson Cybersecurity Protecting Critical Infrastructures from Cyber Attack and Cyber Warfare.pdf

1.8 MB

Torrent_downloaded_from_Demonoid_-_www.demonoid.pw_.txt

0.1 KB

 

Total files 21


Copyright © 2024 FileMood.com