Jump to content
ICEBREAKER101010

Colectie de carti pentru pasionatii de securitatea pe internet

Recommended Posts

Posted

O colectie de carti pentru cei care sunt pasionati de securitatea pe internet si de programare.Colectia contine :

Comp-Arch & OS/Computer Architechture.pdf (5.57 MB)

Comp-Arch & OS/Computer Hardware Main Components.pdf (608.07 KB)

Comp-Arch & OS/Computer Organisation & Fundementals.pdf (2.02 MB)

Comp-Arch & OS/Computer Systems - A Programmers Perspective.pdf (6.75 MB)

Comp-Arch & OS/Embedded Hardware.pdf (10.30 MB)

Comp-Arch & OS/How Computers Work (8th Edition).pdf (39.00 MB)

Comp-Arch & OS/Operatin System Internals and Design Principles.pdf (14.49 MB)

Comp-Arch & OS/Operating System Concepts.pdf (40.63 MB)

Comp-Arch & OS/The Indispensable PC Hardware Book - Third Edition.pdf (29.67 MB)

Linux_Unix/Advanced Bash Scripting - Mendel Cooper.pdf (2.60 MB)

Linux_Unix/Classic Shell Scripting.pdf (7.67 MB)

Linux_Unix/Essential System Administration.pdf (9.96 MB)

Linux_Unix/Learning the bash Shell - Unix Shell Programming.pdf (1.63 MB)

Linux_Unix/Linux - The Complete Reference.pdf (8.91 MB)

Linux_Unix/Linux Bible.pdf (10.73 MB)

Linux_Unix/Linux Command line & Shell Scripting Bible.pdf (14.37 MB)

Linux_Unix/Sed & Awk.pdf (2.25 MB)

Linux_Unix/The Design of Unix Operating System.pdf (103.95 MB)

Linux_Unix/The Linux Command Line - A Complete Introduction.pdf (5.93 MB)

Linux_Unix/Understanding Linux Kernel.pdf (5.35 MB)

Linux_Unix/Understanding Linux Network Internals.pdf (11.49 MB)

Linux_Unix/UNIX and Linux System Administration Handbook (4th Edition).pdf (16.07 MB)

Linux_Unix/Unix Power Tools.pdf (8.40 MB)

Networking/Computer Networking - A Top-Down Approach.pdf (8.30 MB)

Networking/Data Communications and Networking By Behrouz A.Forouzan.pdf (10.84 MB)

Networking/Internetworking with TCP_IP Vol I.pdf (36.97 MB)

Networking/Mobile Communciations by Jochen Schiller.pdf (18.19 MB)

Networking/TCP-IP Illustrated Vol.3.pdf (40.02 MB)

Programming/64 Bit Intel Assembly Language Programming for Linux.pdf (4.89 MB)

Programming/Advanced Programming in the UNIX Environment.pdf (8.51 MB)

Programming/Alfred V. Aho - Data Structures and Algorithms.pdf (6.59 MB)

Programming/C/21st Century C.pdf (4.59 MB)

Programming/C/Advanced C.pdf (4.08 MB)

Programming/C/C Primer Plus.pdf (5.37 MB)

Programming/C/C Puzzle Book.pdf (2.24 MB)

Programming/C/C++ Primer Plus.pdf (6.43 MB)

Programming/C/Expert C Programming.pdf (2.15 MB)

Programming/C/Memory Management in C.pdf (415.49 KB)

Programming/C/Programming in C - Stephen G.Cochan.pdf (4.95 MB)

Programming/Linux System Programming Talking Directly to the Kernel and C Library.pdf (8.65 MB)

Programming/Network/Java Network Programming.pdf (11.24 MB)

Programming/Network/Network Programming in C.pdf (273.51 KB)

Programming/Network/Python Network Programming.pdf (5.08 MB)

Programming/Network/TCP IP Sockets in C.pdf (1.28 MB)

Programming/Network/Unix Network Programming Volume 1.pdf (13.70 MB)

Programming/Network/Unix Network Programming Volume 2.pdf (21.13 MB)

Programming/Perl/Learning Perl.pdf (8.84 MB)

Programming/Perl/Perl Pocket Reference.pdf (2.24 MB)

Programming/Perl/Programming Perl.pdf (15.67 MB)

Programming/Python/Learning Python.pdf (8.30 MB)

Programming/Python/Programming in Python.pdf (7.08 MB)

Programming/Python/Python for Unix Sys Admins.pdf (3.42 MB)

Programming/The Art of Assembly Language.pdf (22.22 MB)

Programming/The Linux Programming Interface.pdf (6.92 MB)

Security/Advanced Operating Systems and Kernel Applications Techniques and Technologies.pdf (6.2

Security/Backtrack5 Wireless Penetration Testing.pdf (16.59 MB)

Security/Big Book of Windows Hacks.pdf (73.78 MB)

Security/Build Your Own Security Lab for Network Testing.pdf (8.58 MB)

Security/Crypto/Applied Cryptography - Bruce Schenier.pdf (2.77 MB)

Security/Crypto/Cryptography and Network Security - William Stallings.pdf (7.98 MB)

Security/Crypto/Encryption Solution Design and Deployment Considerations.pdf (1.81 MB)

Security/Crypto/Handbook Of Applied Cryptography.pdf (11.72 MB)

Security/Crypto/Implementing SSL_TLS Using Cryptography and PKI.pdf (4.51 MB)

Security/Crypto/Malicious Cryptography - Exposing Cryptovirology.pdf (29.06 MB)

Security/Hack Attacks Revealed.pdf (8.21 MB)

Security/Hackers Delight.pdf (24.49 MB)

Security/Hacking - The Art of Explotation.pdf (4.02 MB)

Security/Hacking Exposed.pdf (33.03 MB)

Security/Hacking Secret Ciphers with Python.pdf (6.61 MB)

Security/Hacking the Xbox.pdf (17.76 MB)

Security/Hacking Windows.pdf (9.66 MB)

Security/Hands-On Ethical Hacking and Network Defense.pdf (83.36 MB)

Security/Hardening Linux.pdf (6.30 MB)

Security/Hardening the Operating System.pdf (1.41 MB)

Security/Kevin Mitnick - The Art of Deception.pdf (5.19 MB)

Security/Kevin Mitnick - The Art of Intrusion.pdf (3.07 MB)

Security/Letter & Word Frequencies - Major Languages.docx (13.23 KB)

Security/Linux Firewalls.pdf (6.51 MB)

Security/Linux Server Hacks.pdf (34.20 MB)

Security/Malware & Forensics/File System Forensic Analysis.pdf (4.03 MB)

Security/Malware & Forensics/Malware Analysts Cookbook.pdf (8.92 MB)

Security/Malware & Forensics/Practical Malware Analysis.pdf (9.45 MB)

Security/Malware & Forensics/Secrets of Reverse Engineering.pdf (8.56 MB)

Security/Malware & Forensics/The Giant Black Book of Computer Viruses.pdf (5.71 MB)

Security/Malware & Forensics/X86 Disassemblypdf (2.10 MB)

Security/Network Intrusion Detection.pdf (2.46 MB)

Security/P.Languages for Information Security.pdf (1.00 MB)

Security/Papers/Chip & Pin Broken_Smart Card Authentication.pdf (1.41 MB)

Security/Papers/DFA of Secret Key Cryptosystems.pdf (699.23 KB)

Security/Papers/Differential Cryptanalysis Of DES Like Cryptosystems.pdf (634.49 KB)

Security/Papers/Malicious Cryptography - Kleptographic Aspects (Academic Paper).pdf (167.57 KB)

Security/Papers/Modern Game Console Exploitation.pdf (221.06 KB)

Security/Papers/RSA Timing Attacks.pdf (79.51 KB)

Security/Papers/RSA Timing Attacks_Boneh.pdf (144.22 KB)

Security/Papers/Securing & Hardening Linux v1.0.pdf (118.88 KB)

Security/Papers/Timins Attacks on Public Key Crypto.pdf (206.71 KB)

Security/Papers/Wireless Hacking Tools.pdf (125.85 KB)

Security/Pen Testing/Advanced Penetration Testing For Highly Secured Environments.pdf (15.39 MB)

Security/Pen Testing/Basics of Penetration Testing.pdf (3.74 MB)

Security/Pen Testing/Counter Hack Reloaded.pdf (12.88 MB)

Security/Pen Testing/Using Google in Penetration Testing.pdf (14.91 MB)

Security/Pen Testing/Web Penetration Testing with Kali Linux.pdf (20.21 MB)

Security/Rootkits/A Guide to Kernel Exploitation.pdf (5.26 MB)

Security/Rootkits/BootRoot.pdf (437.03 KB)

Security/Rootkits/Designing BSD Rootkits.pdf (8.38 MB)

Security/Rootkits/Malware & Rootkits.pdf (10.98 MB)

Security/Rootkits/ManagedCodeRootkits.pdf (5.56 MB)

Security/Rootkits/Rootkit Arsenal.pdf (81.33 MB)

Security/Rootkits/Rootkits - Subverting the Windows Kernel.pdf (2.29 MB)

Security/The Shellcoder's Handbook.pdf (8.74 MB)

Security/Tools/Metasploit - The Penetration Testers Guide.pdf (6.90 MB)

Security/Tools/Nmap Network Scanning.pdf (423.84 MB)

Security/Tools/Practical Packet Analysis.pdf (16.47 MB)

Security/Trusted Computer System Evaluation Criteria_DoD.pdf (423.11 KB)

Security/Trusted Computing for Military Applications.pdf (764.54 KB)

Security/Violent Python.pdf (6.89 MB)

Security/Wi Foo - The Secrets of Wireless Hacking.pdf (7.73 MB)

Security/Windows Internals.pdf (21.69 MB)

Linkurile de download sunt :

E-Book Collection for Aspir…rar (236,00 MB) - uploaded.net

E-Book Collection for Aspir…rar (236,00 MB) - uploaded.net

E-Book Collection for Aspir…rar (236,00 MB) - uploaded.net

E-Book Collection for Aspir…rar (236,00 MB) - uploaded.net

E-Book Collection for Aspir…rar (236,00 MB) - uploaded.net

E-Book Collection for Aspir…rar (236,00 MB) - uploaded.net

E-Book Collection for Aspir…rar (236,00 MB) - uploaded.net

E-Book Collection for Aspir…rar (134,52 MB) - uploaded.net

Have Funk!

  • Thanks 1
  • Upvote 1
Posted

// Removed is a book used for learning Shell, Moving Around the Filesystem, Managing Running Processes, System Administration, Server Administration, and Starting and Stopping Services.

  • Downvote 1
Guest
This topic is now closed to further replies.


×
×
  • Create New...