ICEBREAKER101010 Posted September 18, 2014 Report Posted September 18, 2014 O colectie de carti pentru cei care sunt pasionati de securitatea pe internet si de programare.Colectia contine : Comp-Arch & OS/Computer Architechture.pdf (5.57 MB)Comp-Arch & OS/Computer Hardware Main Components.pdf (608.07 KB)Comp-Arch & OS/Computer Organisation & Fundementals.pdf (2.02 MB)Comp-Arch & OS/Computer Systems - A Programmers Perspective.pdf (6.75 MB)Comp-Arch & OS/Embedded Hardware.pdf (10.30 MB)Comp-Arch & OS/How Computers Work (8th Edition).pdf (39.00 MB)Comp-Arch & OS/Operatin System Internals and Design Principles.pdf (14.49 MB)Comp-Arch & OS/Operating System Concepts.pdf (40.63 MB)Comp-Arch & OS/The Indispensable PC Hardware Book - Third Edition.pdf (29.67 MB)Linux_Unix/Advanced Bash Scripting - Mendel Cooper.pdf (2.60 MB)Linux_Unix/Classic Shell Scripting.pdf (7.67 MB)Linux_Unix/Essential System Administration.pdf (9.96 MB)Linux_Unix/Learning the bash Shell - Unix Shell Programming.pdf (1.63 MB)Linux_Unix/Linux - The Complete Reference.pdf (8.91 MB)Linux_Unix/Linux Bible.pdf (10.73 MB)Linux_Unix/Linux Command line & Shell Scripting Bible.pdf (14.37 MB)Linux_Unix/Sed & Awk.pdf (2.25 MB)Linux_Unix/The Design of Unix Operating System.pdf (103.95 MB)Linux_Unix/The Linux Command Line - A Complete Introduction.pdf (5.93 MB)Linux_Unix/Understanding Linux Kernel.pdf (5.35 MB)Linux_Unix/Understanding Linux Network Internals.pdf (11.49 MB)Linux_Unix/UNIX and Linux System Administration Handbook (4th Edition).pdf (16.07 MB)Linux_Unix/Unix Power Tools.pdf (8.40 MB)Networking/Computer Networking - A Top-Down Approach.pdf (8.30 MB)Networking/Data Communications and Networking By Behrouz A.Forouzan.pdf (10.84 MB)Networking/Internetworking with TCP_IP Vol I.pdf (36.97 MB)Networking/Mobile Communciations by Jochen Schiller.pdf (18.19 MB)Networking/TCP-IP Illustrated Vol.3.pdf (40.02 MB)Programming/64 Bit Intel Assembly Language Programming for Linux.pdf (4.89 MB)Programming/Advanced Programming in the UNIX Environment.pdf (8.51 MB)Programming/Alfred V. Aho - Data Structures and Algorithms.pdf (6.59 MB)Programming/C/21st Century C.pdf (4.59 MB)Programming/C/Advanced C.pdf (4.08 MB)Programming/C/C Primer Plus.pdf (5.37 MB)Programming/C/C Puzzle Book.pdf (2.24 MB)Programming/C/C++ Primer Plus.pdf (6.43 MB)Programming/C/Expert C Programming.pdf (2.15 MB)Programming/C/Memory Management in C.pdf (415.49 KB)Programming/C/Programming in C - Stephen G.Cochan.pdf (4.95 MB)Programming/Linux System Programming Talking Directly to the Kernel and C Library.pdf (8.65 MB)Programming/Network/Java Network Programming.pdf (11.24 MB)Programming/Network/Network Programming in C.pdf (273.51 KB)Programming/Network/Python Network Programming.pdf (5.08 MB)Programming/Network/TCP IP Sockets in C.pdf (1.28 MB)Programming/Network/Unix Network Programming Volume 1.pdf (13.70 MB)Programming/Network/Unix Network Programming Volume 2.pdf (21.13 MB)Programming/Perl/Learning Perl.pdf (8.84 MB)Programming/Perl/Perl Pocket Reference.pdf (2.24 MB)Programming/Perl/Programming Perl.pdf (15.67 MB)Programming/Python/Learning Python.pdf (8.30 MB)Programming/Python/Programming in Python.pdf (7.08 MB)Programming/Python/Python for Unix Sys Admins.pdf (3.42 MB)Programming/The Art of Assembly Language.pdf (22.22 MB)Programming/The Linux Programming Interface.pdf (6.92 MB)Security/Advanced Operating Systems and Kernel Applications Techniques and Technologies.pdf (6.2Security/Backtrack5 Wireless Penetration Testing.pdf (16.59 MB)Security/Big Book of Windows Hacks.pdf (73.78 MB)Security/Build Your Own Security Lab for Network Testing.pdf (8.58 MB)Security/Crypto/Applied Cryptography - Bruce Schenier.pdf (2.77 MB)Security/Crypto/Cryptography and Network Security - William Stallings.pdf (7.98 MB)Security/Crypto/Encryption Solution Design and Deployment Considerations.pdf (1.81 MB)Security/Crypto/Handbook Of Applied Cryptography.pdf (11.72 MB)Security/Crypto/Implementing SSL_TLS Using Cryptography and PKI.pdf (4.51 MB)Security/Crypto/Malicious Cryptography - Exposing Cryptovirology.pdf (29.06 MB)Security/Hack Attacks Revealed.pdf (8.21 MB)Security/Hackers Delight.pdf (24.49 MB)Security/Hacking - The Art of Explotation.pdf (4.02 MB)Security/Hacking Exposed.pdf (33.03 MB)Security/Hacking Secret Ciphers with Python.pdf (6.61 MB)Security/Hacking the Xbox.pdf (17.76 MB)Security/Hacking Windows.pdf (9.66 MB)Security/Hands-On Ethical Hacking and Network Defense.pdf (83.36 MB)Security/Hardening Linux.pdf (6.30 MB)Security/Hardening the Operating System.pdf (1.41 MB)Security/Kevin Mitnick - The Art of Deception.pdf (5.19 MB)Security/Kevin Mitnick - The Art of Intrusion.pdf (3.07 MB)Security/Letter & Word Frequencies - Major Languages.docx (13.23 KB)Security/Linux Firewalls.pdf (6.51 MB)Security/Linux Server Hacks.pdf (34.20 MB)Security/Malware & Forensics/File System Forensic Analysis.pdf (4.03 MB)Security/Malware & Forensics/Malware Analysts Cookbook.pdf (8.92 MB)Security/Malware & Forensics/Practical Malware Analysis.pdf (9.45 MB)Security/Malware & Forensics/Secrets of Reverse Engineering.pdf (8.56 MB)Security/Malware & Forensics/The Giant Black Book of Computer Viruses.pdf (5.71 MB)Security/Malware & Forensics/X86 Disassemblypdf (2.10 MB)Security/Network Intrusion Detection.pdf (2.46 MB)Security/P.Languages for Information Security.pdf (1.00 MB)Security/Papers/Chip & Pin Broken_Smart Card Authentication.pdf (1.41 MB)Security/Papers/DFA of Secret Key Cryptosystems.pdf (699.23 KB)Security/Papers/Differential Cryptanalysis Of DES Like Cryptosystems.pdf (634.49 KB)Security/Papers/Malicious Cryptography - Kleptographic Aspects (Academic Paper).pdf (167.57 KB)Security/Papers/Modern Game Console Exploitation.pdf (221.06 KB)Security/Papers/RSA Timing Attacks.pdf (79.51 KB)Security/Papers/RSA Timing Attacks_Boneh.pdf (144.22 KB)Security/Papers/Securing & Hardening Linux v1.0.pdf (118.88 KB)Security/Papers/Timins Attacks on Public Key Crypto.pdf (206.71 KB)Security/Papers/Wireless Hacking Tools.pdf (125.85 KB)Security/Pen Testing/Advanced Penetration Testing For Highly Secured Environments.pdf (15.39 MB)Security/Pen Testing/Basics of Penetration Testing.pdf (3.74 MB)Security/Pen Testing/Counter Hack Reloaded.pdf (12.88 MB)Security/Pen Testing/Using Google in Penetration Testing.pdf (14.91 MB)Security/Pen Testing/Web Penetration Testing with Kali Linux.pdf (20.21 MB)Security/Rootkits/A Guide to Kernel Exploitation.pdf (5.26 MB)Security/Rootkits/BootRoot.pdf (437.03 KB)Security/Rootkits/Designing BSD Rootkits.pdf (8.38 MB)Security/Rootkits/Malware & Rootkits.pdf (10.98 MB)Security/Rootkits/ManagedCodeRootkits.pdf (5.56 MB)Security/Rootkits/Rootkit Arsenal.pdf (81.33 MB)Security/Rootkits/Rootkits - Subverting the Windows Kernel.pdf (2.29 MB)Security/The Shellcoder's Handbook.pdf (8.74 MB)Security/Tools/Metasploit - The Penetration Testers Guide.pdf (6.90 MB)Security/Tools/Nmap Network Scanning.pdf (423.84 MB)Security/Tools/Practical Packet Analysis.pdf (16.47 MB)Security/Trusted Computer System Evaluation Criteria_DoD.pdf (423.11 KB)Security/Trusted Computing for Military Applications.pdf (764.54 KB)Security/Violent Python.pdf (6.89 MB)Security/Wi Foo - The Secrets of Wireless Hacking.pdf (7.73 MB)Security/Windows Internals.pdf (21.69 MB) Linkurile de download sunt : E-Book Collection for Aspir…rar (236,00 MB) - uploaded.netE-Book Collection for Aspir…rar (236,00 MB) - uploaded.netE-Book Collection for Aspir…rar (236,00 MB) - uploaded.netE-Book Collection for Aspir…rar (236,00 MB) - uploaded.netE-Book Collection for Aspir…rar (236,00 MB) - uploaded.netE-Book Collection for Aspir…rar (236,00 MB) - uploaded.netE-Book Collection for Aspir…rar (236,00 MB) - uploaded.netE-Book Collection for Aspir…rar (134,52 MB) - uploaded.netHave Funk! 1 1
waqasjunaid Posted June 22, 2018 Report Posted June 22, 2018 // Removed is a book used for learning Shell, Moving Around the Filesystem, Managing Running Processes, System Administration, Server Administration, and Starting and Stopping Services. 1