BT种子基本信息
- 种子哈希:1b10f51a0e5e97a2b322ffc185aa7d0dbf2a8b70
- 文档大小:1.8 GB
- 文档个数:108个文档
- 下载次数:2264次
- 下载速度:极快
- 收录时间:2020-02-06
- 最近下载:2024-12-24
- DMCA/屏蔽:DMCA/屏蔽
文档列表
- Ransomware: Practical Reverse Engineering.zip 199.8 MB
- Applied Cryptography: Protocols, Algorithms, and Source Code in C 20th Anniversary Edition.pdf 164.8 MB
- Secret History: The Story of Cryptology.pdf 144.4 MB
- Foundations of Coding: Theory and Applications of Error-Correcting Codes with an Introduction to Cryptography and Information Theory.pdf 64.4 MB
- Guide to Pairing-Based Cryptograpy.pdf 60.1 MB
- Cryptographic Hardware and Embedded Systems - CHES 2015.pdf 58.7 MB
- Making, Breaking Codes: An Introduction to Cryptology.pdf 45.9 MB
- Introduction to Modern Cryptography.pdf 39.6 MB
- CEHv9 Certified Ethical Hacker Version 9 Study Guide Exam 312-50.pdf 38.9 MB
- Cryptographic Hardware and Embedded Systems CHES 2017.pdf 38.5 MB
- CryptoSchool.pdf 37.1 MB
- Fundamentals of Cryptology: A Professional Reference and Interactive Tutorial.pdf 31.2 MB
- Malicious Cryptography - Exposing Cryptovirology.pdf 30.5 MB
- Cryptographic Hardware and Embedded Systems -- CHES 2014.pdf 27.7 MB
- Introduction to Cryptography with Coding Theory.pdf 27.7 MB
- Unauthorised Access: Physical Penetration Testing for IT Security Teams.pdf 27.2 MB
- Practical Cryptology and Web Security.pdf 26.4 MB
- Applied Cryptography and Network Security 2015.pdf 24.2 MB
- Practical Reverse Engineering: x86, x64, ARM, Windows Kernel, Reversing Tools, and Obfuscation.pdf 23.5 MB
- Advances in Cryptology EUROCRYPT 2016 Part I.pdf 23.5 MB
- Threat Modeling: Designing for Security.pdf 22.8 MB
- Windows Malware Analysis Essentials: Master the fundamentals of malware analysis for the Windows platform and enhance your anti-malware skill set.pdf 21.6 MB
- Cryptography: An Introduction.pdf 21.3 MB
- Advances in Cryptology EUROCRYPT 2016 Part II.pdf 20.3 MB
- New Directions of Modern Cryptography.epub 19.7 MB
- Cryptography and Data Security.pdf 19.5 MB
- Hack in the Box: Volume 1, Issue 2, April 2010.pdf 19.4 MB
- Global Security Solutions and Applied Cryptography in Smart Grid Communications.pdf 19.0 MB
- Cracking Codes and Cryptograms for Dummies (ISBN - 0470591005).pdf 18.9 MB
- Prentice, Modern Cryptography Theory And Practice (2003) Kb.pdf 18.7 MB
- The Web Application Hacker's Handbook Finding and Exploiting Security Flaws 2nd Edition.pdf 17.1 MB
- Hack in the Box: Volume 1, Issue 3, July 2010.pdf 17.0 MB
- Hack in the Box: Stepping into a Malicious PDF Document Volume 1 Issue 4 October 2010.pdf 16.5 MB
- Applied Cryptography and Network Security 2016.pdf 16.3 MB
- Security Automation with Ansible 2: Leverage Ansible 2 to automate complex security tasks like application security, network security, and malware analysis.epub 15.3 MB
- Security and Cryptography for Networks 10th International Conference.pdf 15.2 MB
- The Art Of Memory Forensics - Detecting Malware And Threats In Windows Linux And Mac Memory.pdf 15.0 MB
- User's Guide To Cryptography And Standards.pdf 14.9 MB
- Paradigms in Cryptology - Mycrypt 2016: Malicious and Exploratory Cryptology.pdf 14.8 MB
- Modern Cryptography: Applied Mathematics for Encryption and Information Security.pdf 14.3 MB
- Cryptography: Cracking Codes.pdf 13.5 MB
- Visual Cryptography and Its Applications.pdf 12.7 MB
- Cryptographic Hardware and Embedded Systems - CHES 2009.pdf 11.6 MB
- Security, Privacy, and Applied Cryptography Engineering.pdf 11.2 MB
- Public-Key Cryptography PKC 2017.pdf 10.4 MB
- Visual Cryptography and Secret Image Sharing.pdf 10.2 MB
- Practical Malware Analysis - The Hands-On Guide to Dissecting Malicious Software.pdf 9.7 MB
- Theory of Cryptography 2007.pdf 9.6 MB
- Cryptography and Network Security: Principles and Practice 7th Global Edition.pdf 9.5 MB
- Decrypted Secrets: Methods and Maxims of Cryptology.djvu 9.1 MB
- Topics in Cryptology CT-RSA 2014.pdf 8.9 MB
- A Classical Introduction to Cryptography Exercise Book.pdf 8.8 MB
- Contemporary Cryptography.pdf 8.0 MB
- Cuckoo Malware Analysis: Analyze malware using Cuckoo Sandbox.pdf 7.9 MB
- Introduction to Modern Cryptography 2nd Edition.pdf 7.9 MB
- Accelerated Windows Malware Analysis with Memory Dumps: Training Course Transcript and Windbg Practice Exercises.pdf 7.4 MB
- Understanding Cryptography.pdf 7.1 MB
- Innovative Cryptography 2nd Edition.pdf 6.9 MB
- Introduction to Certificateless Cryptography.pdf 6.5 MB
- Social Engineering: The Art of Human Hacking.pdf 6.3 MB
- Selected Areas in Cryptography SAC 2009.pdf 6.2 MB
- Introduction to Cryptography with Maple.pdf 6.1 MB
- AVIEN Malware Defense Guide.pdf 6.0 MB
- BigNum Math Implementing Cryptographic Multiple Precision Arithmetic 2006.pdf 5.9 MB
- Selected Areas in Cryptography SAC 2008.pdf 5.7 MB
- To Be A Machine: Adventures Among Cyborgs, Utopians, Hackers, and the Futurists Solving modest Problem of Death.epub 5.4 MB
- Cryptography for Developers: The Only Cryptography Guide Written for Software Developers.pdf 5.3 MB
- Applied Quantum Cryptography.pdf 5.2 MB
- The Code Book: The Science of Secrecy From Ancient Egypt to Quantum Cryptography.epub 5.1 MB
- Cryptology Unlocked.pdf 4.9 MB
- Handbook Of Applied Cryptography.pdf 4.9 MB
- Cryptography and Security in Computing.pdf 4.8 MB
- Mathematics of Public Key Cryptography.pdf 4.8 MB
- Everyday Cryptography: Fundamental Principles & Applications.azw3 4.7 MB
- Computational Number Theory and Modern Cryptography.pdf 4.7 MB
- Serious Cryptography: A Practical Introduction to Modern Encryption.azw3 4.3 MB
- Cryptography For Dummies 2004.chm 4.2 MB
- The Design of Rijndael AES - The Advanced Encryption Standard (Information Security and Cryptography).pdf 4.0 MB
- A Brief History of Cryptology and Cryptography Algorithms.pdf 4.0 MB
- Coding Theory and Cryptology.pdf 3.9 MB
- Group Theoretic Cryptography.pdf 3.9 MB
- Introduction to Cryptography.pdf 3.9 MB
- Cryptography for Dummies (ISBN - 0764541889).pdf 3.7 MB
- Cryptography In C And C++ (2001).chm 3.7 MB
- An Introduction to Cryptography, Second Edition.pdf 3.6 MB
- Selected Areas in Cryptography SAC 2004.djvu 3.5 MB
- Complexity and Cryptography An Introduction (2006)-J Talbot.pdf 3.4 MB
- An Introduction to Mathematical Cryptography.pdf 3.3 MB
- Elementary Number Theory, Cryptography and Codes.pdf 3.3 MB
- Coding and Cryptology.pdf 3.2 MB
- Implementing Cryptographic Multiple Precision Arithmetics.pdf 3.1 MB
- Hack in the Box: Volume 1, Issue 1, January 2010.pdf 3.1 MB
- Cryptography: Theory and Practice 3rd Edition.djvu 3.0 MB
- The Art of Deception: Controlling the Human Element of Security.pdf 3.0 MB
- Applied Cryptography: Protocols, Algorithms, and Source Code in C 2nd Edition.pdf 3.0 MB
- Cryptography Engineering: Design Principles and Practical Applications.pdf 2.9 MB
- Cryptography InfoSec Pro Guide.epub 2.4 MB
- Post-Quantum Cryptography.pdf 2.3 MB
- Cryptography: An Introduction 3rd Edition.pdf 2.2 MB
- Introduction to Cryptography with Open-Source Software.pdf 1.9 MB
- A Cryptography Primer.pdf 1.8 MB
- Java Cryptography.pdf 1.6 MB
- Malware and Computer Security Incidents: Handling Guides.pdf 1.4 MB
- Protecting Information: From Classical Error Correction to Quantum Cryptography.pdf 1.4 MB
- Hardware Malware.pdf 1.2 MB
- Practical Cryptography.pdf 632.9 kB
- Cryptocurrency 2017: Top 50 Cryptocurrencies.azw3 314.0 kB
- WiFuzz: detecting and exploiting logical flaws in the Wi-Fi cryptographic handshake.pdf 251.5 kB
==查看完整文档列表==