Computer Security Enthusiast eBooks Pack | 4.11 GB
101 Spy Gadgets for the Evil Genius.pdf
1337 h4x0r h4ndb00k.chm
19 Deadly Sins of Software Security - Programming Flaws & How to Fix Them.chm
22 Radio & Receiver Projects for the Evil Genius.pdf
50 Awesome Auto Projects for the Evil Genius.pdf
51 High-Tech Practical Jokes for the Evil Genius.pdf
802.11 Security.pdf
A Classical Introduction to Cryptography Exercise Book.pdf
A Technical Guide to IPSec Virtual Private Networks.pdf
A+, Network+, Security+ Exams in a Nutshell - A Desktop Quick Reference.pdf
AAA & Network Security for Mobile Access - Radius, Diameter, EAP, PKI, & IP Mobility.pdf
Absolute OpenBSD - UNIX for the Practical Paranoid.chm
Access Denied - The Practice & Policy of Global Internet Filtering.pdf
Active Defense - A Comprehensive Guide to Network Security.pdf
Administering & Securing the Apache Server.chm
Advanced CISSP Prep Guide - Exam Q&A.chm
Advances in Elliptic Curve Cryptography.pdf
Advances in Enterprise Information Technology Security.pdf
Advances in Network & Distributed Systems Security.pdf
Aggressive Network Self-Defense.pdf
Ajax Security.pdf
Anti-Hacker Tool Kit, 2nd Ed..chm
Anti-Hacker Tool Kit, 3rd Ed..chm
Apache Security.chm
Applied Cryptanalysis - Breaking Ciphers in the Real World.pdf
Applied Cryptography & Network Security - 2nd International Conference, ACNS 2004.pdf
Applied Cryptography - Protocols, Algorithms, & Source COde in C, 2nd Ed..chm
Applied Security Visualization.pdf
Auditor's Guide to Information Systems Auditing.pdf
AVIEN Malware Defense Guide for the Enterprise.pdf
Beginning Cryptography with Java.chm
BigNum Math - Implementing Cryptographic Multiple Precision Arithmetic.pdf
Biometrics & Network Security.chm
Black Hat Physical Device Security - Exploiting Hardware & Software.pdf
Blackjacking - Security Threats to BlackBerry Devices, PDAs, & Cell Phones in the Enterprise.pdf
Bluetooth Security.pdf
Botnet Detection - Countering the Largest Security Threat.pdf
Botnets - The Killer Web App.pdf
Brute Force - Cracking the Data Encryption Standard.pdf
Buffer Overflow Attacks - Detect, Exploit, Prevent.pdf
Building an Effective Information Security Policy Architecture.pdf
Building DMZs for Enterprise Networks.pdf
Building Internet Firewalls, 2nd Ed..pdf
Building Secure Servers with Linux.chm
Building Secure Servers with Linux.pdf
Building Secure Wireless Networks with 802.11.pdf
Bulletproof Wireless Security - GSM, UMTS, 802.11, & Ad Hoc Security.pdf
CCNA Security Official Exam Certification Guide [Exam 640-553].pdf
CCSP Cisco Secure PIX Firewall Advanced Exam Certification Guide.pdf
CD & DVD Forensics.pdf
CD Cracking Uncovered - Protection Against Unsanctioned CD Copying.chm
CEH - Official Certified Ethical Hacker Review Guide [Exam 312-50].pdf
CEH Official Certified Ethical Hacker Review Guide.pdf
Certified Ethical Hacker Exam Prep [Exam 312-50].chm
Certified Ethical Hacking Official Course Material [Exam 312-50].chm
Cisco ASA, PIX, & FWSM Firewall Handbook, 2nd Ed..pdf
Cisco IOS Access Lists.pdf
Cisco NAC Appliance - Enforcing Host Security with Clean Access.pdf
Cisco Network Security Little Black Book.pdf
Cisco Router Firewall Security.chm
Cisco Secure Firewall Services Module (FWSM).pdf
Cisco Secure Internet Security Solutions.pdf
Cisco Security Agent.chm
Cisco Security Professional's Guide to Secure Intrusion Detection Systems.pdf
Cisco Wireless LAN Security.chm
CISSP - Certified Information Systems Security Professional Study Guide, 3rd Ed..pdf
CISSP - Certified Information Systems Security Professional Study Guide, 4th Ed..pdf
CISSP Certification All-in-One Exam Guide, 4th Ed..pdf
CISSP for Dummies, 2nd Ed..chm
Codes & Ciphers - Julius Caesar, the Enigma, & the Internet.pdf
Codes - The Guide to Secrecy from Ancient to Modern Times.pdf
Combating Spyware in the Enterprise.pdf
Complete Guide to CISM Certification.pdf
Complexity & Cryptography - An Introduction.pdf
CompTIA A+ Exam Prep [Exams A+ Essentials, 220-602, 220-603, & 220-604].chm
CompTIA Security+ Study Guide & Practice Exam, 2nd Ed. [Exam JK0-010].pdf
Computer & Intrusion Forensics.pdf
Computer Network Security.pdf
Computer Security & Cryptography.pdf
Computer Security Basics, 2nd Ed..chm
Computer Security, Privacy, & Politics - Current Issues, Challenges, & Solutions.pdf
Computer Viruses & Malware.pdf
Computer Viruses - From Theory to Applications.pdf
Computer Viruses for Dummies.pdf
Configuring Juniper Networks NetScreen & SSG Firewalls.pdf
Configuring NetScreen Firewalls.pdf
Configuring SonicWALL Firewalls.pdf
Contemporary Cryptography.pdf
Core Security Patterns - Best Practices & Strategies for J2EE, Web Services, & Identity Management.chm
Covert Java - Techniques for Decompiling, Patching, & Reverse Engineering.pdf
Crackproof Your Software - Protect Your Software Against Crackers.pdf
Crimeware - Understanding New Attacks & Defenses.chm
Critical Incident Management.chm
Cryptography & Network Security, 4th Ed..chm
Cryptography & Security Services - Mechanisms & Applications.pdf
Cryptography - A Very Short Introduction.chm
Cryptography for Developers.pdf
Cryptography for Dummies.chm
Cryptography in C & C++.chm
Cryptology Unlocked.pdf
Cyber Crime Investigator's Field Guide.pdf
Cyber Forensics - A Field Manual for Collecting, Examining, & Preserving Evidence of Computer Crimes.pdf
Cyber Spying - Tracking Your Family's (Sometimes) Secret Online Lives.pdf
Cyber Warfare & Cyber Terrorism.pdf
Decrypted Secrets - Methods & Maxims of Cryptology, 4th, Revised & Extended Ed..pdf
Defend I.T. - Security by Example.chm
Defense & Detection Strategies against Internet Worms.pdf
Deploying Secure 802.11 Wireless Networks with Microsoft Windows.chm
Designing BSD Rootkits - An Introduction to Kernel Hacking.pdf
Developer's Guide to Web Application Security.pdf
Digital Evidence & Computer Crime - Forensic Science, Computers, & the Internet, 2nd Ed..chm
Disassembling Code - IDA Pro & SoftICE.chm
Effective Oracle Database 10g Security by Design.chm
Electronic Gadgets for the Evil Genius - 28 Build-It-Yourself Projects.pdf
EnCase Computer Forensics - The Official EnCE-EnCase Certified Examiner Study Guide, 2nd Ed..pdf
Encyclopedia of Cryptology.chm
End-to-End Network Security - Defense-in-Depth.pdf
Enemy at the Water Cooler - Real-Life Stories of Insider Threats & Enterprise Security Management Countermeasures.pdf
Enterprise Information Systems Assurance & System Security - Managerial & Technical Issues.pdf
Enterprise Java Security - Building Secure J2EE Applications.chm
Essential Computer Security - Everyone's Guide to Email, Internet, & Wireless Security.pdf
Essential PHP Security.chm
Ethereal Packet Sniffing.chm
Expert Web Services Security in the .NET Platform.chm
Exploiting Software - How to Break Code.pdf
Fast Track to Security.pdf
File System Forensic Analysis.chm
Firewall Fundamentals.chm
Firewall Policies & VPN Configurations.pdf
Firewalls & Internet Security - Repelling the Wily Hacker, 2nd Ed..pdf
Firewalls - Jumpstart for Network & Systems Administrators.pdf
Firewalls for Dummies, 2nd Ed..pdf
Forensic Computer Crime Investigation.pdf
Forensic Computing - A Practitioner's Guide, 2nd Ed..pdf
Foundations of Computer Security.pdf
Foundations of Cryptography - A Primer.pdf
Foundations of Cryptography - Vol. 1, Basic Tools.pdf
Foundations of Mac OS X Leopard Security.pdf
Foundations of Security - What Every Programmer Needs to Know.pdf
Fundamentals of Cryptology - A Professional Reference & Interactive Tutorial.pdf
Fuzzing - Brute Force Vulnerability Discovery.pdf
Google Hacking for Penetration Testers, Vol. 2.pdf
Google Hacking for Penetration Testers.pdf
Gray Hat Hacking - The Ethical Hacker's Handbook, 2nd Ed..pdf
Grid Computing Security.pdf
Guide to Elliptic Curve Cryptography.pdf
Hack Attacks Revealed - A Complete Reference with Custom Security Hacking Toolkit.chm
Hack I.T. - Security through Penetration Testing.chm
Hack Proofing ColdFusion - The Only Way to Stop a Hacker Is to Think Like One.pdf
Hack Proofing Linux - Your Guide to Open Source Security.pdf
Hack Proofing Sun Solaris 8 - Protect Your Solaris Network from Attack.pdf
Hack Proofing Windows 2000 Server.pdf
Hack Proofing XML - The Only Way to Stop a Hacker Is to Think Like One.pdf
Hack Proofing Your E-Commerce Site - The Only Way to Stop a Hacker Is to Think Like One.pdf
Hack Proofing Your Identity in the Information Age - Protect Your Family on the Internet!.pdf
Hack Proofing Your Network, 2nd Ed. - The Only Way to Stop a Hacker Is to Think Like One.pdf
Hack Proofing Your Network.pdf
Hack Proofing Your Web Applications - The Only Way to Stop a Hacker Is to Think Like One.pdf
Hack Proofing Your Wireless Network - Protect Your Wireless Network from Attack.pdf
Hack the Stack - Using Snort & Ethereal to Master the 8 Layers of an Insecure Network.pdf
Hacker Debugging Uncovered.chm
Hacker Disassembling Uncovered.chm
Hacker Linux Uncovered.chm
Hacker Web Exploitation Uncovered.chm
Hacker's Challenge - Test Your Incident Response Skills Using 20 Scenarios.pdf
Hacker's Delight.chm
Hackers - Heroes of the Computer Revolution.pdf
Hackers Beware - Defending Your Network from the Wiley Hacker.pdf
Hacking - The Art of Exploitation, 2nd Ed..chm
Hacking - The Art of Exploitation.chm
Hacking a Terror Network - The Silent Threat of Covert Channels.pdf
Hacking Exposed, 2nd Ed. - Network Security Secrets & Solutions.pdf
Hacking Exposed-Cisco Networks - Cisco Security Secrets & Solutions.chm
Hacking Exposed-Linux - Linux Security Secrets & Solutions, 3rd Ed..pdf
Hacking Exposed-Linux - Linux Security Secrets & Solutions.pdf
Hacking Exposed-Network Security - Secrets & Solutions, 2nd Ed..pdf
Hacking Exposed-Network Security - Secrets & Solutions, 3rd Ed..pdf
Hacking Exposed-VoIP - Voice Over IP Security Secrets & Solutions.chm
Hacking Exposed-Web 2.0 - Web 2.0 Security Secrets & Solutions.pdf
Hacking Exposed-Web Applications - Web Application Security Secrets & Solutions.pdf
Hacking Exposed-Windows - Windows Security Secrets & Solutions, 3rd Ed..pdf
Hacking Exposed-Wireless - Wireless Security Secrets & Solutions.chm
Hacking for Dummies, 2nd Ed..pdf
Hacking for Dummies.pdf
Hacking the Cable Modem - What Cable Companies Don't Want You to Know.pdf
Hacking Wireless Networks for Dummies.pdf
HackNotes - Linux & Unix Security Portable Reference.pdf
HackNotes - Network Security Portable Reference.pdf
HackNotes - Web Security Portable Reference.pdf
HackNotes - Windows Security Portable Reference.pdf
Halting the Hacker - A Practical Guide to Computer Security, 2nd Ed..chm
Handbook of Database Security - Applications & Trends.pdf
Handbook of Digital & Multimedia Forensic Evidence.pdf
Handbook of Research on Wireless Security.pdf
Hardening Apache.chm
Hardening Linux.chm
Hardening Linux.pdf
Hardening Network Infrastructure.chm
Hardening Windows Systems.chm
Hardening Windows, 2nd Ed..pdf
Hardening Windows.chm
High-Assurance Design - Architecting Secure & Reliable Enterprise Applications.chm
Home Network Security Simplified.chm
Honeypots - Tracking Hackers.chm
Honeypots for Windows.chm
....
- Code:
-
http://www.filesonic.com/file/1292531544/[FS] Computer Security Enthusiast.part01.rar
http://www.filesonic.com/file/1292531394/[FS] Computer Security Enthusiast.part02.rar
http://www.filesonic.com/file/1292531374/[FS] Computer Security Enthusiast.part03.rar
http://www.filesonic.com/file/1292531404/[FS] Computer Security Enthusiast.part04.rar
http://www.filesonic.com/file/1292531364/[FS] Computer Security Enthusiast.part05.rar
http://www.filesonic.com/file/1292542094/[FS] Computer Security Enthusiast.part06.rar
http://www.filesonic.com/file/1292542204/[FS] Computer Security Enthusiast.part07.rar
http://www.filesonic.com/file/1292542234/[FS] Computer Security Enthusiast.part08.rar
http://www.filesonic.com/file/1292541074/[FS] Computer Security Enthusiast.part09.rar
- Code:
-
http://www.wupload.com/file/33928951/[FS] Computer Security Enthusiast.part01.rar
http://www.wupload.com/file/33928065/[FS] Computer Security Enthusiast.part02.rar
http://www.wupload.com/file/33928069/[FS] Computer Security Enthusiast.part03.rar
http://www.wupload.com/file/33928547/[FS] Computer Security Enthusiast.part04.rar
http://www.wupload.com/file/33927764/[FS] Computer Security Enthusiast.part05.rar
http://www.wupload.com/file/33928526/[FS] Computer Security Enthusiast.part06.rar
http://www.wupload.com/file/33928097/[FS] Computer Security Enthusiast.part07.rar
http://www.wupload.com/file/33927759/[FS] Computer Security Enthusiast.part08.rar
http://www.wupload.com/file/33927629/[FS] Computer Security Enthusiast.part09.rar