BT种子基本信息
- 种子哈希:82ce544fe85192dcd07b595e63712da8243831f9
- 文档大小:10.8 GB
- 文档个数:563个文档
- 下载次数:4813次
- 下载速度:极快
- 收录时间:2020-03-07
- 最近下载:2025-02-05
- DMCA/屏蔽:DMCA/屏蔽
文档列表
specials/SDN and NFV Simplified A Visual Guide to Understanding Software Defined Networks and Network Function Virtualization.pdf 441.1 MB
specials/MCSA Guide to Networking with Windows Server 2016 MCSE MCSA Exam 70-741.pdf 354.1 MB
specials/EC Council Academia CEH Attack Vectors and Countermeasures Volume 2 of 4.pdf 341.7 MB
Identity and Access Management Business Performance Through Connected Intelligence.pdf 173.8 MB
Check Point Next Generation with Application Intelligence Security Administration.pdf 158.9 MB
specials/Computer Networking A Top-Down Approach 7th Edition Global Edition.pdf 137.4 MB
Windows to Linux Migration Toolkit Your Windows to Linux Extreme Makeover.pdf 119.7 MB
Sockets, Shellcode, Porting & Coding - Reverse Engineering Exploits And Tool Coding For Security Professionals.pdf 117.8 MB
Deploying Citrix MetaFrame Presentation Server 3.0 With Windows Server 2003 Terminal Services.pdf 110.9 MB
specials/Gray Hat Hacking The Ethical Hacker's Handbook 5th Edition.pdf 98.9 MB
specials/Networking Essentials A CompTIA Network+ N10-006 Textbook 4th Edition Instructor Edition.pdf 97.9 MB
specials/Networking Essentials A CompTIA Network+ N10-006 Textbook 4th Edition.pdf 97.4 MB
Microsoft Log Parser Toolkit.pdf 90.8 MB
Intrusion Prevention and Active Response.pdf 89.0 MB
InfoSec Career Hacking Sell Your Skillz, Not Your Soul A Technical Guide to Landing (and Keeping) a Job in the Information Security Field.pdf 88.0 MB
Aggressive Network Self-Defense I'm Mad As Hell, and I'm Not Gonna Take It Anymore.pdf 87.1 MB
Configuring and Troubleshooting Windows XP Professional.pdf 86.0 MB
Practical Deployment of Cisco Identity Services Engine (ISE) Real-World Examples of AAA Deployments.pdf 85.5 MB
Black Hat Physical Device Security Exploiting Hardware and Software.pdf 82.4 MB
Data Hiding Techniques in Windows OS A Practical Approach to Investigation and Defense.pdf 78.2 MB
Operating System Forensics.pdf 77.6 MB
Apple I Replica Creation Back to the Garage.pdf 76.4 MB
Building Robots with LEGO Mindstorms NXT The Ultimate Tool for MINDSTORMS Maniacs.pdf 74.6 MB
Cyber Spying Tracking Your Family's (Sometimes) Secret Online LIves.pdf 72.7 MB
How to Cheat at Designing Security for a W2K3 Server Network.pdf 70.5 MB
Microsoft Windows Server 2008 R2 Administrator's Reference The Administrator's Essential Reference.pdf 70.0 MB
How to Cheat at Configuring ISA Server 2004.pdf 69.5 MB
Best Damn Exchange, SQL and IIS Book Period.pdf 68.5 MB
Contemporary Digital Forensic Investigations of Cloud and Mobile Applications.pdf 68.1 MB
Network Performance and Security Testing and Analyzing Using Open Source and Low-Cost Tools.pdf 66.3 MB
specials/A+ Guide to Software Managing, Maintaining, and Troubleshooting 9th Edition.pdf 63.2 MB
Integrating Python with Leading Computer Forensics Platforms.epub 60.8 MB
Malware Forensics Field Guide for Linux Systems Digital Forensics Field Guides.pdf 59.5 MB
IP Addressing Subnetting IPv6.pdf 57.5 MB
Bluetooth Application Developer's Guide The Short Range Interconnect Solution.pdf 56.6 MB
How to Cheat at VoIP Security.pdf 56.1 MB
Techno Security's Guide to Managing Risks For IT Managers, Auditors, and Investigators.pdf 56.0 MB
OS X Incident Response Scripting and Analysis.pdf 54.3 MB
Windows Server 2012 Security from End to Edge and Beyond.pdf 53.4 MB
Rick Gallagher's MPLS Training Guide Building Multi Protocol Label Switching Networks.pdf 53.3 MB
Best Damn Firewall Book Period.chm 53.3 MB
Microsoft Virtualization Master Microsoft Server, Desktop, Application, and Presentation Virtualization.pdf 50.8 MB
Best Damn Firewall Book Period 2nd Edition.pdf 50.0 MB
Building a VoIP Network with Nortel's Multimedia Communication Server 5100.pdf 49.6 MB
Practical VoIP Security.pdf 48.9 MB
Security Controls Evaluation, Testing, and Assessment Handbook.pdf 48.2 MB
Classic Lego Mindstorms Projects and Software Tools Award-Winning Designs from Master Builders.pdf 47.7 MB
Windows Forensic Analysis DVD Toolkit.pdf 47.6 MB
Game Console Hacking Xbox, Playstation, Nintendo, Atari, & Gamepark 32.pdf 47.6 MB
Computer Incident Response and Forensics Team Management Conducting a Successful Incident Response.pdf 45.9 MB
specials/CompTIA A+ Complete Deluxe Study Guide Exam 230-901 220-902 3rd Edition.pdf 45.4 MB
Windows Performance Analysis Field Guide.pdf 45.3 MB
Winternals Defragmentation, Recovery, and Administration Field Guide A Must-Have for Windows Sys Admins.pdf 45.0 MB
Mac OS X, iPod, and iPhone Forensic Analysis DVD Toolkit.pdf 44.5 MB
specials/Network+ Guide to Networks 8th Edition.pdf 44.3 MB
Malware Forensics Field Guide for Windows Systems Digital Forensics Field Guides.pdf 44.3 MB
Applied Network Security Monitoring Collection, Detection, and Analysis.pdf 43.5 MB
Introduction to Social Media Investigation A Hands-on Approach.pdf 41.3 MB
Android Forensics Investigation, Analysis and Mobile Security for Google Android.pdf 40.9 MB
Professional Penetration Testing Creating and Learning in a Hacking Lab 2nd Edition.pdf 39.3 MB
Google Hacking for Penetration Testers 3rd Edition.pdf 39.2 MB
Hacking Web Intelligence Open Source Intelligence and Web Reconnaissance Concepts and Techniques.pdf 38.5 MB
Python Passive Network Mapping P2NMAP.pdf 38.2 MB
Integrating Python with Leading Computer Forensics Platforms.pdf 37.4 MB
Best Damn Server Virtualization Book Period.pdf 36.3 MB
specials/Networking All-In-One for Dummies 7th Edition.pdf 36.3 MB
Citrix XenDesktop Implementation A Practical Guide for IT Professionals.pdf 35.2 MB
specials/CompTIA Pentest+ Study Guide Exam PT0-001.pdf 34.9 MB
Investigating Internet Crimes An Introduction to Solving Crimes in Cyberspace.pdf 34.7 MB
specials/Practical Binary Analysis Build Your Own Linux Tools for Binary Instrumentation, Analysis, and Disassembly.pdf 34.5 MB
The Real MCTS MCITP Upgrading Your MCSE on Windows Server 2003 to Windows Server 2008 Exam 70-649 Prep Kit.pdf 34.5 MB
Dr. Tom Shinder's Configuring ISA Server 2004.chm 34.2 MB
Google Hacking for Penetration Testers.pdf 33.8 MB
Unified Communications Forensics Anatomy of Common UC Attacks.pdf 33.7 MB
10 Cool LEGO Mindstorms Robotics Invention System 2 Projects Amazing Projects You Can Build Under an Hour.pdf 33.0 MB
Python Forensics A Workbench for Inventing and Sharing Digital Forensic Technology.pdf 32.6 MB
specials/Handbook of Digital Forensics of Multimedia Data and Devices.pdf 32.3 MB
Network Intrusion Analysis Methodologies, Tools, and Techniques for Incident Analysis and Response.pdf 32.2 MB
Penetration Tester's Open Source Toolkit 4th Edition.pdf 31.9 MB
CISSP Study Guide 3rd Edition.pdf 31.9 MB
Windows 2012 Server Network Security Securing your Windows Network Systems and Infrastructure.pdf 31.8 MB
WarDriving Drive, Detect, Defend A Guide to Wireless Security.epub 31.6 MB
Hiding Behind the Keyboard Uncovering Covert Communication Methods with Forensic Analysis.pdf 31.4 MB
Microsoft Windows 7 Administrator's Reference Upgrading, Deploying, Managing, and Securing Windows 7.pdf 30.4 MB
How to Cheat at Administering Office Communications Server 2007.pdf 30.1 MB
Practical Lock Picking A Physical Penetration Tester's Training Guide 2nd Edition.pdf 30.1 MB
specials/Computer Networking for LANS to WANS Hardware, Software and Security 1st Edición - Mansfield, Jr., Kenneth C_.pdf 29.7 MB
The Real MCTS MCITP Configuring Microsoft Windows Vista Client Exam 70-620 Prep Kit.pdf 29.5 MB
How to Cheat at Microsoft Vista Administration.pdf 29.5 MB
Managing Windows 2000 Network Services.pdf 29.2 MB
Juniper Networks Secure Access SSL VPN Configuration Guide Complete Coverage of the Juniper Network Secure Access SSL VPN Line and IVE Software.pdf 29.2 MB
Keys to the Kingdom Impressioning, Bumping, Master Escalation, and Other Key-Based Attacks Against Physical Locks.pdf 28.4 MB
Penetration Tester's Open Source Toolkit Volume 2.pdf 28.4 MB
How to Cheat at Securing Linux.pdf 28.3 MB
The Real MCTS MCITP Upgrading Your MCSA on Windows Server 2003 to Windows Server 2008 Exam 70-648 Prep Kit.pdf 27.8 MB
specials/Kali Linux Revealed Mastering the Penetration Testing Distribution.pdf 27.6 MB
No Tech Hacking A Guide to Social Engineering, Dumpster Diving, and Shoulder Surfing.pdf 27.4 MB
Identity and Access Management Business Performance Through Connected Intelligence.epub 27.3 MB
The Real MCITP Windows Server 2008 Server Administrator Exam 70-646 Prep Kit.pdf 27.2 MB
Thor's OS Xodus Why And How I Left Windows For OS X.pdf 26.9 MB
Cisco Router and Switch Forensics Investigating and Analyzing Malicious Network Activity.pdf 26.8 MB
Data Hiding Exposing Concealed Data in Multimedia, Operating Systems, Mobile Devices and Network Protocols.pdf 26.7 MB
Best Damn IT Security Management Book Period Everything You Need to Know About Security Management.pdf 26.6 MB
The Wireshark Field Guide Analyzing and Troubleshooting Network Traffic.pdf 26.5 MB
Cyber Reconnaissance, Surveillance and Defense.pdf 26.3 MB
Professional Penetration Testing Creating and Learning in a Hacking Lab 2nd Edition.epub 26.3 MB
Information Security Science Measuring the Vulnerability to Data Compromises.pdf 26.3 MB
The Real MCITP Windows Server 2008 Enterprise Administrator Exam 70-647 Prep Kit.pdf 26.1 MB
Microsoft Forefront Security Administration Guide.pdf 25.8 MB
Malware Forensics Investigating and Analyzing Malicious Code.pdf 25.8 MB
DBAs Guide to Databases On Linux Including Oracle & MySQL.pdf 25.7 MB
Windows 2000 Configuration Wizards.pdf 25.7 MB
specials/Computer Forensics Investigating Network Intrusions & Cyber Crime.pdf 25.2 MB
How to Attack and Defend Your Website.pdf 24.7 MB
Hacking with Kali Practical Penetration Testing Techniques.pdf 24.7 MB
GFI Network Security and PCI Compliance Power Tools Learn How to Use GFI's Tools to Search for Vulnerabilities in Your Network.pdf 24.2 MB
CheckPoint NG-AI Next Generation with Application Intelligence Security Administration.chm 23.9 MB
Practical Deployment of Cisco Identity Services Engine (ISE) Real-World Examples of AAA Deployments.epub 23.2 MB
CYA Securing IIS 6.0. Cover Your Ass by Getting It Right the First Time.pdf 23.1 MB
Smart Grid Security Innovative Solutions for a Modernized Grid.pdf 22.8 MB
Placing the Suspect Behind the Keyboard Using Digital Forensics and Investigative Techniques to Identify Cybercrime Suspects.pdf 22.6 MB
The Real MCTS MCITP Windows Server 2008 Configuring Active Directory Exam 70-640 Prep Kit.pdf 22.4 MB
Best Damn Windows Server 2003 Book Period.pdf 22.4 MB
Physical and Logical Security Convergence Powered by Enterprise Security Management.pdf 22.2 MB
Violent Python A Cookbook for Hackers, Forensic Analysts, Penetration Testers, and Security Engineers.pdf 22.1 MB
XBOX 360 Forensics A Digital Forensics Guide to Examining Artifacts.pdf 22.1 MB
Web Application Vulnerabilities Detect, Exploit, Prevent.pdf 21.9 MB
SQL Injection Attacks and Defense 2nd Edition.pdf 21.9 MB
WarDriving & Wireless Pentration Testing.pdf 21.9 MB
Best Damn Firewall Book Period.pdf 21.4 MB
Configuring Symantec AntiVirus Corporate Edition Develop an Effective Enterprise AntiVirus Solution.pdf 21.3 MB
How to Cheat at Configuring Exchange Server 2007 Including Outlook Web, Mobile, and Voice Access.pdf 20.8 MB
The Hacker's Guide to OS X Exploiting OS X from the Root Up.pdf 20.6 MB
Rick Gallagher's MPLS Training Guide Building Multi-Protocol Label Switching Networks.chm 20.6 MB
Digital Triage Forensics Processing the Digital Crime Scene.pdf 20.5 MB
Securing VoIP Keeping Your VoIP Network Safe.pdf 20.4 MB
The Real MCTS MCITP Windows Server 2008 Configuring Applications Infrastructure Exam 70-643 Prep Kit.pdf 20.4 MB
Best Damn Windows Server 2008 Book Period 2nd Edition.pdf 20.2 MB
Industrial Network Security Securing Critical Infrastructure Network for Smart Grid, SCADA, and Other Industrial Control Systems 2nd Edition.pdf 20.2 MB
specials/CEH Certified Ethical Hacker All In One Exam Guide 4th Edition.pdf 20.1 MB
specials/Guide to Networking Essentials 7th Edition.pdf 19.8 MB
LEGO Mindstorms Masterpieces Building and Programming Advanced Robots Learn from the Lego Masters.pdf 19.6 MB
Wireless Hacking Projects for Wi-Fi Enthusiasts.pdf 19.2 MB
Microsoft Vista for IT Security Professionals.pdf 18.5 MB
Virtualization and Forensics A Digital Forensic Investigator's Guide to Virtual Environments.pdf 18.0 MB
Ethereal Packet Sniffing.chm 17.9 MB
specials/Ethical Hacking and Countermeasures Attack Phases.pdf 17.9 MB
Penetration Tester's Open Source Toolkit 3rd Edition.pdf 17.8 MB
Moving to the Cloud Developing Apps in the New World of Cloud Computing.pdf 17.7 MB
Best Damn Cisco Internetworking Book Period.pdf 17.3 MB
The Mezonic Agenda Hacking the Presidency.pdf 17.1 MB
Dissecting the Hack - The F0rb1dd3n Network (2010) Revised Edition.pdf 16.9 MB
Dr. Tom Shinder's ISA 2006 Migration Guide Your Clear, Concise, and Thorough Path to Migrate from Previous Versions of ISA Server to ISA Server 2006.pdf 16.9 MB
How to Cheat at Configuring VMware ESX Server.pdf 16.8 MB
Microsoft Exchange Server 2007 with SP1 Tony Redmond's Guide to Successful Implementation.pdf 16.8 MB
Risk Management Framework A Lab-Based Approach to Securing Information Systems.epub 16.6 MB
Linksys WRT54G Ultimate Hacking.pdf 16.6 MB
10 Cool LEGO Mindstorms Dark Side Robots, Transports, and Creatures Amazing Projects You Can Build in Under an Hour.pdf 16.5 MB
Firewall Policies and VPN Configurations.pdf 16.5 MB
UTM Security with Fortinet Mastering FortiOS.pdf 16.3 MB
Augmented Reality An Emerging Technologies Guide to AR.pdf 16.3 MB
Securing Citrix XenApp Server in the Enterprise.pdf 16.2 MB
Social Engineering Penetration Testing Executing Social Engineering Pen Tests, Assessments and Defense.pdf 16.2 MB
Dr. Tom Shinder's ISA Server and Beyond Real World Security Solutions for Microsoft Enterprise Networks.pdf 16.1 MB
OS X for Hackers at Heart The Apple of Every Hacker's Eye.pdf 16.0 MB
Cisco CCNA CCENT Exam 640-802, 640-822, 640-816 Preparation Kit.pdf 16.0 MB
specials/Ethical Hacking & Countermeasures Threats & Defense Mechanisms.pdf 16.0 MB
Securing Citrix Presentation Server in the Enterprise Learn How to Use XenApp Server to Keep Attackers from Penetrating Your Network.pdf 16.0 MB
specials/Computer Forensics Investigating Data & Image Files.pdf 16.0 MB
How to Cheat at IIS 7 Server Administration.pdf 15.9 MB
Securing Windows Server 2008 Prevent Attacks from Outside and Inside Your Organization.pdf 15.9 MB
The Real MCTS SQL Server 2008 Exam 70-433 Database Design Prep Kit.pdf 15.8 MB
Client-Side Attacks and Defense.pdf 15.8 MB
The IT Regulatory and Standards Compliance Handbook How to Survive Information Systems Audit and Assessments.pdf 15.8 MB
Digital Forensics Processing and Procedures Meeting the Requirements of ISO 17020, ISO17025, ISO 27001 and Best Practice Requirements.pdf 15.7 MB
Linux Malware Incident Response A Practitioner's Guide to Forensic Collection and Examination of Volatile Data An Excerpt from Malware Forensics Field Guide for Linux Systems.pdf 15.7 MB
Hardware Hacking Have Fun While Voiding Your Warranty.pdf 15.7 MB
LEGO Software Power Tools.pdf 15.6 MB
Dissecting the Hack - The F0rb1dd3n Network (2010).pdf 15.6 MB
Wireshark & Ethereal Network Protocol Analyzer Toolkit.pdf 15.5 MB
Thor's Microsoft Security Bible A Collection of Practical Security Techniques.pdf 15.4 MB
Hacking Web Apps Detecting and Preventing Web Application Security Problems.pdf 15.4 MB
The Real MCTS MCITP Windows Server 2008 Configuring Network Infrastructure Exam 70-642 Prep Kit.pdf 15.3 MB
Cybercrime and Espionage An Analysis of Subversive Multi-vector Threats.pdf 15.0 MB
Building Robots with LEGO Mindstorms The Ultimate Tool for Mindstorms Maniacs.pdf 14.9 MB
Configuring SonicWALL Firewalls The Only Book on the Market's Fastest-Growing Firewall Product.pdf 14.6 MB
Collaboration with Cloud Computing Security, Social Media, and Unified Communications.pdf 14.6 MB
Handbook of System Safety and Security.pdf 14.6 MB
Configuring Juniper Networks Netscreen & SSG Firewalls.pdf 14.3 MB
Managing Information Security 2nd Edition.pdf 14.2 MB
specials/Picture Yourself Networking Your Home or Small Office.pdf 14.0 MB
SonicWALL Secure Wireless Network Integrated Solutions Guide.pdf 13.9 MB
Executing Windows Command Line Investigations While Ensuring Evidentiary Integrity.pdf 13.8 MB
Cisco Security Professional's Guide to Secure Intrusion Detection Systems.pdf 13.7 MB
specials/Networking The Complete Reference 3rd Edition.pdf 13.7 MB
CompTIA Security+ Exam JK0-010 Study Guide and Practice Exam 2nd Edition.pdf 13.7 MB
CompTIA Security+ Certification Study Guide 3rd Edition.pdf 13.6 MB
Augmented Reality Law, Privacy, and Ethics Law, Society, and Emerging AR Technologies.pdf 13.6 MB
Data Breach Preparation and Response Breaches are Certain, Impact is Not.pdf 13.6 MB
Windows Forensic Analysis Toolkit Advanced Analysis Techniques for Windows 8 4th Edition.pdf 13.5 MB
Designing and Building Enterprise DMZs Build Network DMZs.pdf 13.5 MB
Digital Forensics for Network, Internet, and Cloud Computing A Forensic Evidence Guide for Moving Targets and Data.pdf 13.5 MB
specials/(ISC)2 CISSP Certified Information Systems Security Professional Official Practice Tests 2nd Edition.pdf 13.4 MB
Snort 2.1 Intrusion Detection 2nd Edition.pdf 13.3 MB
X-Ways Forensics Practitioner's Guide.pdf 13.2 MB
The Basics of Web Hacking Tools and Techniques to Attack the Web.pdf 13.1 MB
specials/CEH v10 EC-COUNCIL Certified Ethical Hacker Most Demanding Complete Hacking Guide Exam 312-50.pdf 13.0 MB
specials/Penetration Testing Communication Media Testing.pdf 13.0 MB
MCSE Exam 70-294 Planning, Implementing, and Maintaining a Windows Server 2003 Active Directory Infrastructure Study Guide & DVD Training System.pdf 12.9 MB
Meeting People via WiFi and Bluetooth.pdf 12.7 MB
The Cloud Security Ecosystem Technical, Legal, Business and Management Issues.pdf 12.5 MB
Security for Microsoft Windows Systems Administrators Introduction to Key Information Security Concepts.pdf 12.4 MB
MCSE Exam 70-296 Planning, Implementing and Maintaining a Windows Server 2003 Environment for an MCSE Certified on Windows 2000 Study Guide & DVD Training System.pdf 12.4 MB
Logging And Log Management The Authoritative Guide to understanding the Concepts Surrounding Loggin and Log Management.pdf 12.4 MB
Hack the Stack Using Snort and Ethereal to Master the 8 Layers of an Insecure Network.pdf 12.4 MB
Network and System Security 2nd Edition.pdf 12.4 MB
Windows Registry Forensics Advanced Digital Forensic Analysis of the Windows Registry 2nd Edition.pdf 12.3 MB
Essential Computer Security Everyone's Guide to E-mail, Internet, and Wireless Security.pdf 12.3 MB
How to Cheat at Securing a Wireless Network.pdf 12.3 MB
Integrating ISA Server 2006 with Microsoft Exchange 2007 Protect your E-Mail Environment with ISA Server 2006 and Microsoft Forefront Security Suite.pdf 12.2 MB
Dissecting the Hack - The V3rb0t3n Network.pdf 12.2 MB
Special Ops Host and Network Security for Microsoft UNIX, and Oracle.pdf 12.2 MB
specials/Python Basics A Self-Teaching Introduction.pdf 12.2 MB
InfoSecurity 2008 Threat Analysis A One-Stop Refrence Containing The Most Read Topics in the Infosecurity Library.pdf 12.1 MB
Hack Proofing Linux Your Guide to Open Source Security.pdf 12.0 MB
Information Hiding in Speech Signals for Secure Communication.pdf 12.0 MB
MCSA MCSE Exam 70-291 Implementing, Managing, and Maintaining a Windows Server 2003 Network Infrastructure Study Guide & DVD Training System.pdf 11.9 MB
Mobile Security and Privacy Advances, Challenges and Future Research Directions.pdf 11.9 MB
How to Cheat at Managing Microsoft Operations Manager 2005 In the Land of the Blind, the One-Eyed Man is King.pdf 11.8 MB
Configuring NetScreen Firewalls Your Complete Guide to Juniper's NetScreen Firewall Appliances.pdf 11.8 MB
MCSE MCSA Implementing & Administering Security in a Windows 2000 Network (Exam 70-214) Study Guide & DVD Training System.pdf 11.6 MB
Cyber Security and IT Infrastructure Protection.pdf 11.5 MB
Digital Forensics for Legal Professionals Understanding Digital Evidence from the Warrant to the Courtroom.pdf 11.5 MB
Configuring Check Point NGX VPN-1 FireWall-1 Secure Your Network and Build a Bulletproof Network VPN.pdf 11.5 MB
Developer's Guide to Web Application Security Can You Recognize Web Application Security Threats.pdf 11.4 MB
Social Media Security Leveraging Social Networking While Mitigating Risk.pdf 11.4 MB
Information Security Risk Assessment Toolkit Practical Assessments through Data Collection and Data Analysis.epub 11.4 MB
Stealing The Network The Complete Series Collector's Book.pdf 11.4 MB
Cisco Security Specialist's Guide to PIX Firewalls.pdf 11.3 MB
Configuring Windows 2000 WITHOUT Active Directory.pdf 11.3 MB
Research Methods for Cyber Security.pdf 11.2 MB
Check Point NGX R65 Security Administration.pdf 11.1 MB
MCSA MCSE Exam 70-290 Managing and Maintaining a Windows Server 2003 Environment Study Guide & DVD Training System.pdf 11.1 MB
A Study of Black Hole Attack Solutions On AODV Routing Protocl in MANET.pdf 11.1 MB
Nokia Firewall, VPN, and IPSO Configuration Guide.pdf 11.0 MB
Best Damn Cybercrime and Digital Forensics Book Period Your Guide to Digital Information Seizure, Incident Response, and Computer Forensics.pdf 11.0 MB
Nessus Network Auditing 2nd Edition.pdf 10.9 MB
Netcat Power Tools.pdf 10.9 MB
Configuring Citrix MetaFrame XP for Windows Including Feature Release 1 Everything You Need to Install and Configure Citrix MetaFrame XP.pdf 10.8 MB
The Basics of Digital Privacy Simple Tools to Protect Your Personal Information and Your Identity Online.pdf 10.8 MB
specials/Computer Forensics Investigating Hard Disks, File & Operating Systems.pdf 10.8 MB
Programming LEGO Mindstorms NXT Teach Your Robot New Tricks.pdf 10.8 MB
Asterisk Hacking Turn your Phone System into a Samurai Sword-for Attack or Defense.pdf 10.7 MB
Virtualization with VMware ESX Server.pdf 10.7 MB
Network Security Assessment From Vulnerability to Patch.pdf 10.6 MB
Virtualization with Microsoft Virtual Server 2005 Free Your Infrastructure from Physical Limitations.pdf 10.6 MB
The Basics of Information Security Understanding the Fundamentals of Infosec in Theory and Practice 2nd Edition.pdf 10.6 MB
Video Conferencing Over IP Configure, Secure, and Troubleshoot Simple and Cost-Effective Solutions That Work.pdf 10.6 MB
Implementing Digital Forensic Readiness From Reactive to Proactive Process.pdf 10.5 MB
How to Cheat at Managing Windows Server Update Services Automate Patch Management Across Your Network.pdf 10.5 MB
Mobile Malware Attacks and Defense.pdf 10.4 MB
Coding for Penetration Testers Building Better Tools.pdf 10.4 MB
Ninja Hacking Unconventional Penetration Testing Tactics and Techniques.pdf 10.3 MB
Building DMZs For Enterprise Networks Design, Deploy, and Maintain a Secure DMZ on Your Network.pdf 10.3 MB
Sarbanes-Oxley IT Compliance Using Open Source Tools A Toolkit for IT Professionals 2nd Edition.pdf 10.3 MB
FISMA and the Risk Management Framework The New Practice of Federal Cyber Security.pdf 10.2 MB
Securing SQL Server Protecting Your Database from Attackers 3rd Edition.pdf 10.2 MB
How to Cheat at Securing Your Network The Perfect Reference for the Multitasked Administrator.pdf 10.1 MB
specials/CEH v10 Certified Ethical Hacker Study Guide.pdf 10.0 MB
The Real MCTS SQL Server 2008 Exam 70-432 Database Implementation and Maintenance Prep Kit.pdf 10.0 MB
Managing and Securing A Cisco SWAN Structured Wireless-Aware Network.pdf 9.9 MB
Wireless Reconnaissance in Penetration Testing.pdf 9.9 MB
Security SAGE's Guide to Hardening the Network Infrastructure.pdf 9.8 MB
Introduction to Cyber-Warfare A Multidisciplinary Approach.pdf 9.8 MB
Network and System Security 2nd Edition.mobi 9.7 MB
Network+ Exam N10-003 Study Guide & Practice Exams.pdf 9.7 MB
Applied Cyber Security and the Smart Grid Implementing Security Controls into the Modern Power Infrastructure.pdf 9.7 MB
Check Point NG VPN-1 FireWall-1 Advanced Configuration and Troubleshooting.pdf 9.6 MB
MCSE Exam 70-293 Planning and Maintaining a Windows Server 2003 Network Infrastructure Study Guide & DVD Training System.pdf 9.6 MB
How to Cheat at Securing SQL Server 2005 The Perfect Book for Multitasked IT Managers Responsible for Securing SQL Server.pdf 9.6 MB
Cyber Crime Investigations Bridging the Gaps Between Security Professional, Law Enforcement, and Prosecutors.pdf 9.6 MB
Stealing The Network How to Own a Shadow.pdf 9.6 MB
Coding for Penetration Testers Building Better Tools 2nd Edition.epub 9.6 MB
CYA Securing Exchange Server 2003 and Outlook Web Access Cover Your Ass by Getting It Right the First Time.pdf 9.6 MB
specials/Disaster Recovery.pdf 9.5 MB
specials/The Illustrated Network How TCP-IP Works in a Modern Network 2nd Edition.pdf 9.4 MB
specials/Wireless Communications & Networks by William Stallings 2nd International Edition.pdf 9.4 MB
Hack Proofing Windows 2000 Server.pdf 9.3 MB
MCSA MCSE Managing and Maintaining a Windows Server 2003 Environment for an MCSA Certified on Windows 2000 (70-292) Study Guide & DVD Training System.pdf 9.3 MB
Professional Penetration Testing Creating And Operating A Formal Hacking Lab.pdf 9.3 MB
iPhone and iOS Forensics Investigation, Analysis and Mobile Security for Apple iPhone, iPad and iOS Devices.pdf 9.2 MB
FISMA Compliance Handbook 2nd Edition.pdf 9.2 MB
Configuring CISCO Voice Over IP 2nd Edition.pdf 9.1 MB
Risk Management Framework A Lab-Based Approach to Securing Information Systems.pdf 9.1 MB
Cyber Warfare Techniques, Tactics and Tools for Security Practitioners 2nd Edition.pdf 9.0 MB
OSSEC HIDS Host-Based Intrusion Detection Guide.pdf 9.0 MB
Securing the Smart Grid Next Generation Power Grid Security.pdf 9.0 MB
specials/Guide to Computer Network Security 4th Edition.pdf 8.9 MB
Information Security Analytics Finding Security Insights, Patterns, and Anomalies in Big Data.pdf 8.9 MB
Snort IDS and IPS Toolkit.pdf 8.8 MB
Detecting and Combating Malicious Email.pdf 8.8 MB
Windows Forensic Analysis Toolkit Advanced Analysis Techniques for Windows 7 3rd Edition.pdf 8.7 MB
Hacking and Penetration Testing with Low Power Devices.pdf 8.7 MB
Google Talking An Easy-to-Read Guide Packed with Tips and Tricks on Google Talk.pdf 8.7 MB
Phishing Exposed Uncover Secrets from the Dark Side.pdf 8.7 MB
The Basics of Cloud Computing Understanding the Fundamentals of Cloud Computing in Theory and Practice.pdf 8.5 MB
Security+ Study Guide & DVD Training System.pdf 8.4 MB
Migrating to the Cloud Oracle Client Server Modernization.pdf 8.4 MB
Combating Spyware in the Enterprise Discover, Detect, and Eradicate the Internet's Greatest Threat.pdf 8.4 MB
specials/Penetration Testing Procedures & Methodologies.pdf 8.3 MB
Syngress Force Emerging Threat Analysis From Mischief to Malicious.pdf 8.3 MB
Practical Lock Picking A Physical Penetration Tester's Training Guide.pdf 8.3 MB
specials/Ethical Hacking & Countermeasures Secure Network Infrastructures.pdf 8.3 MB
How to Cheat at Managing Windows Small Business Server 2003 In the Land of the Blind, the One-Eyed Man is King.pdf 8.3 MB
Writing Security Tools and Exploits.pdf 8.2 MB
Alternate Data Storage Forensics Raise Digital Fingerprints from Alternate Data Storage ADS Devices.pdf 8.2 MB
Hack Proofing ColdFusion The Only Way to Stop a Hacker Is to Think Like One.pdf 8.2 MB
Syngress IT Security Project Management Handbook.pdf 8.2 MB
Digital Forensics Threatscape and Best Practices.pdf 8.1 MB
How to Cheat at Designing a Windows Server 2003 Active Directory Infrastructure.pdf 8.1 MB
Scene of the Cybercrime 2nd Edition.pdf 8.1 MB
Low Tech Hacking Street Smarts for Security Professionals.pdf 8.0 MB
How to Cheat at Configuring Open Source Security Tools The Perfect Reference for the Multitasked SysAdmin.pdf 8.0 MB
Skype Me From Single User to Small Enterprise and Beyond.pdf 8.0 MB
specials/Virtualization Security.pdf 8.0 MB
Federal Cloud Computing The Definitive Guide for Cloud Service Providers 2nd Edition.pdf 8.0 MB
The Official CHFI Exam 312-49 Study Guide for Computer Hacking Forensics Investigators.pdf 8.0 MB
Nokia Network Security Solution Handbook.pdf 8.0 MB
Virtualization with VMware ESX Server.chm 7.9 MB
CompTIA Network+ Certification Study Guide Exam N10-004 2nd Edition.pdf 7.9 MB
OS X Exploits and Defense Own it Just like Windows or Linux.pdf 7.9 MB
Hack Proofing Your Web Applications The Only Way to Stop a Hacker is to Think Like One.pdf 7.8 MB
Cisco AVVID and IP Telephony Design & Implementation Design and Deploy IP Telephony Solutions.pdf 7.8 MB
Configuring Exchange 2000 Server.pdf 7.8 MB
Applied Network Security Monitoring Collection, Detection, and Analysis.epub 7.8 MB
Information Security Risk Assessment Toolkit Practical Assessments through Data Collection and Data Analysis.pdf 7.7 MB
Hack Proofing Your E-Commerce Site.pdf 7.7 MB
XSS Attacks Cross Site Scripting Exploits and Defense.pdf 7.7 MB
Joe Grand's Best Of Hardware, Wireless & Game Console Hacking Includes DVD with 20 Hacks in High-Res Color.pdf 7.7 MB
Lossless Information Hiding in Images.pdf 7.7 MB
Network Security Evaluation Using the NSA IEM Learn How the NSA Conducts Network Security Evaluations.pdf 7.7 MB
Business Continuity and Disaster Recovery Planning for IT Professionals 2nd Edition.pdf 7.6 MB
PCI Compliance Understand and Implement Effective PCI Data Security Standard Compliance 4th Edition.pdf 7.6 MB
Inside the SPAM Cartel Trade Secrets from the Dark Side.pdf 7.5 MB
Sniffer Pro Network Optimization & Troubleshooting Handbook Everything You Need to Perform Vital Network Analysis.pdf 7.5 MB
Next Generation SSH2 Implementation Securing Data in Motion.pdf 7.5 MB
Programming LEGO Mindstorms with Java The Ultimate Tool for Mindstorms Maniacs.pdf 7.5 MB
Configuring ISA Server 2000 Building Firewalls for Windows 2000 Everything You Need to Deploy ISA Server in the Enterprise.pdf 7.5 MB
Advanced Persistent Threat Understanding the Danger and How to Protect Your Organization.pdf 7.5 MB
How to Cheat at Deploying and Securing RFID.pdf 7.4 MB
A Machine Learning Approach to Phishing Detection and Defense.pdf 7.4 MB
Virtualization for Security Including Sandboxing, Disaster Recovery, High Availability, Forensic Analysis, and Honeypotting.pdf 7.4 MB
Building a Cisco Wireless LAN.pdf 7.4 MB
Securing the Internet of Things.pdf 7.4 MB
Secure your Network for Free Using Nmap, Wireshark, Snort, Nessus, and MRTG.pdf 7.3 MB
ASP.NET Web Developer's Guide.pdf 7.3 MB
Botnets The Killer Web App.pdf 7.3 MB
Seven Deadliest Network Attacks.pdf 7.3 MB
BizTalk Server 2000 Developer's Guide for ,NET.pdf 7.2 MB
Scripting VMware Power Tools Automating Virtual Intrastructure Administration.pdf 7.2 MB
The Basics of Digital Forensics The Primer for Getting Started in DIgital Forensics 2nd Edition.pdf 7.2 MB
C# .NET Web Developer's Guide Develop and Deliver Enterprise-Critical Desktop and Web Applications with C# .NET.pdf 7.1 MB
Cyber Security Awareness for CEOs and Management.pdf 7.1 MB
Hack Proofing Sun Solaris 8.pdf 7.1 MB
Automating Open Source Intelligence Algorithms for OSINT.pdf 7.1 MB
Insider Threat Protecting the Enterprise from Sabotage, Spying, and Theft Prevent Employees and Contractors from Stealing Corporate Data.pdf 7.0 MB
The Basics of Digital Forensics The Primer for Getting Started in DIgital Forensics.pdf 7.0 MB
Security Log Management Identifying Patterns in the Chaos.pdf 7.0 MB
Google Earth Forensics Using Google Earth Geo-Location in Digital Forensic Investigations.pdf 6.9 MB
specials/Computer Networks 5th Edition.pdf 6.9 MB
Cybersecurity and Applied Mathematics.pdf 6.9 MB
Simple Steps to Data Encryption A Practical Guide to Secure Encryption.pdf 6.9 MB
MCSE Designing a Windows Server 2003 Active Directory and Network Infrastructure Exam 70-297 Study Guide & DVD Training System.pdf 6.9 MB
SQL Injection Attacks and Defense.pdf 6.9 MB
E-discovery Creating and Managing and Enterpriswide Program A Technical Guide to Digital Investigation and Litigation Support.pdf 6.9 MB
Securing Social Media in the Enterprise.pdf 6.8 MB
Windows 2000 Active Directory 2nd Edition.pdf 6.8 MB
Hacking a Terror Network The Silent Threat of Covert Channels.pdf 6.8 MB
specials/Ethical Hacking & Countermeasures Linux, Macintosh & Mobile Systems.pdf 6.7 MB
Blackhatonomics An Inside Look at the Economics of Cybercrime.pdf 6.7 MB
PCI Compliance Understand and Implement Effective PCI Data Security Standard Compliance.pdf 6.7 MB
Enemy at The Water Cooler Real-Life Stories of Insider Threats and Enterprise Security Management Countermeasures.pdf 6.6 MB
Building an Intelligence-Led Security Program.pdf 6.6 MB
The Basics of Cyber Safety Computer and Mobile Device Safety Made Easy.pdf 6.6 MB
SSCP Systems Security Certification Practicioner Study Guide & DVD Training System.pdf 6.6 MB
Software Piracy Exposed Secrets from the Dark Side Revealed.pdf 6.5 MB
Cybercrime Investigative Case Management Using Digital Forensics and Investigative Techniques to Identify Cybercrime Suspects.epub 6.5 MB
Essential Skills for Hackers.pdf 6.5 MB
Metrics and Methods for Security Risk Management.pdf 6.5 MB
Securing IM and P2P Applications for the Enterprise.pdf 6.4 MB
Developing .NET Web Services with XML.pdf 6.4 MB
Cybercrime Case Presentation Using Digital Forensics and Investigative Techniques to Identify Cybercrime Suspects.epub 6.4 MB
HCISPP Study Guide.pdf 6.3 MB
The Manager's Handbook for Business Security 2nd Edition.pdf 6.3 MB
Managing Information Security.pdf 6.3 MB
DNS Security Defending the Domain Name System.pdf 6.3 MB
Introduction to US Cybersecurity Careers.pdf 6.3 MB
Inside the SPAM Cartel Trade Secrets from the Dark Side.chm 6.3 MB
The Real Citrix CCA Exam Preparation Kit Prepare for XenApp 5.0.pdf 6.3 MB
CD and DVD Forensics Handle, Examine, and Process CD and DVD Evidence for Computer Forensics.pdf 6.3 MB
Managing Cisco Network Security 2nd Edition.pdf 6.2 MB
Windows Forensic Analysis DVD Toolkit 2nd Edition.pdf 6.2 MB
E-mail Virus Protection Handbook.pdf 6.1 MB
MCSE Designing Security for a Windows Server 2003 Network Exam 70-298 Study Guide & DVD Training System.pdf 6.1 MB
Cyber Crime and Cyber Terrorism Investigator's Handbook.pdf 6.1 MB
XML .NET Developer’s Guide Develop and Deliver Enterprise-Critical Applications with XML .NET.pdf 6.1 MB
Virtualization with Xen Including XenEnterprise, XenServer, and XenExpress The Book That Demystifies Xen.pdf 6.1 MB
Seven Deadliest Unified Communications Attacks.pdf 6.0 MB
Business Continuity & Disaster Recovery for IT Professionals Increase Your Company's Odds of Surviving a Major Disaster.pdf 6.0 MB
specials/Network Defense Perimeter Defense Mechanisms.pdf 6.0 MB
Hack Proofing XML.pdf 6.0 MB
Targeted Cyber Attacks Multi-staged Attacks Driven by Exploits and Malware.pdf 6.0 MB
Building Cisco Networks for Windows 2000.pdf 6.0 MB
AVIEN Malware Defense Guide for the Enterprise Stop the Stalkers on Your Desktop.pdf 6.0 MB
Building Cisco Remote Access Networks.pdf 6.0 MB
Introduction to Information Security A Strategic-based Approach.pdf 5.9 MB
Cloud Storage Forensics.pdf 5.9 MB
BigNum Math Implementing Cryptographic Multiple Precision Arithmetic Learn How to Implement Efficient Multiple Precision Algorithms.pdf 5.9 MB
Managed Code Rootkits Hooking into Runtime Environments.pdf 5.8 MB
Building an Information Security Awareness Program.pdf 5.8 MB
Eleventh 11th Hour CISSP Study Guide 3rd Edition.pdf 5.8 MB
Hacking Wireless Access Points Cracking, Tracking, and Signal Jacking.pdf 5.8 MB
Perl Scripting for Windows Security Live Response, Forensic Analysis, and Monitoring Master Perl for Digital Forensic Analysis and Application Monitoring.pdf 5.8 MB
Coding for Penetration Testers Building Better Tools 2nd Edition.pdf 5.8 MB
Hack Proofing Your Network 2nd Edition.pdf 5.8 MB
specials/Linux Command Line and Shell Scripting Bible The Comprehensive, Tutorial Resource.pdf 5.7 MB
C# for Java Programmers.pdf 5.7 MB
Kismet Hacking The Only Book on the Industry Standard for Examining Wireless Network Traffic.pdf 5.7 MB
FISMA Compliance Handbook 2nd Edition.epub 5.7 MB
Automated Security Analysis of Android and iOS Applications with Mobile Security Framework.pdf 5.7 MB
Buffer Overflow Attacks Detect, Exploit, Prevent.pdf 5.7 MB
CSA Guide to Cloud Computing Implementing Cloud Privacy and Security.pdf 5.6 MB
Seven Deadliest Social Network Attacks.pdf 5.6 MB
specials/Computer Forensics Investigating Wireless Networks and Devices.pdf 5.6 MB
Mission Critical Windows 2000 Server Administration.pdf 5.6 MB
NET Mobile Web Developer's Guide Develop and Deliver Enterprise-Critical Mobile Web Applications.pdf 5.6 MB
Theoretical and Experimental Methods for Defending Against DDoS Attacks.pdf 5.5 MB
A Guide to Kernel Exploitation Attacking the Core.pdf 5.5 MB
Seven Deadliest USB Attacks.pdf 5.4 MB
RFID Security Protect to Supply Chain.pdf 5.4 MB
Webmaster's Guide to the Wireless Internet Everything You Need to Develop E-Commerce Enabled Wireless Web Sites.pdf 5.4 MB
FISMA Certification & Accreditation Handbook.pdf 5.3 MB
Cryptography for Developers The Only Cryptography Guide Written for Software Developers.pdf 5.3 MB
Troubleshooting Windows 2000 TCP-IP.pdf 5.2 MB
UNIX and Linux Forensic Analysis DVD Toolkit.pdf 5.2 MB
ASP Configuration Handbook Application Service Provider A Guide for ISPs.pdf 5.2 MB
Security Assessment Case Studies for Implementing the NSA IAM.pdf 5.2 MB
Designing SQL Server 2000 Databases for .NET Enterprise Servers.pdf 5.2 MB
Metasploit Toolkit for Penetration Testing, Exploit Development, and Vulnerability Research.pdf 5.1 MB
Reverse Engineering Code with IDA Pro.pdf 5.1 MB
Configuring Citrix Metaframe for Windows 2000 Terminal Services.pdf 5.1 MB
Windows 2000 Server System Administration Handbook.pdf 5.1 MB
Hacking the Code ASP.NET Web Application Security.chm 5.1 MB
Snort 2.0 Intrusion Detection.pdf 5.0 MB
Developing Web Services with Java APIs for XML Using WSDP Integrate XML Into Your Java Platform.pdf 4.9 MB
Nmap in the Enterprise Your Guide to Network Scanning.pdf 4.9 MB
Nessus Network Auditing.pdf 4.8 MB
Deploying Secure Containers for Training and Development.pdf 4.8 MB
Practical Oracle Security Your Unauthorized Guide to Relational Database Security.pdf 4.8 MB
The Basics of Hacking and Penetration Testing Ethical Hacking and Penetration Testing Made Easy 2nd Edition.pdf 4.7 MB
X-Ways Forensics Practitioner's Guide.epub 4.7 MB
Programmer's Ultimate Security DeskRef.pdf 4.7 MB
SAP Security Configuration and Deployment The IT Administrator's Guide to Best Practices.pdf 4.7 MB
Digital Forensics with Open Source Tools.pdf 4.6 MB
Techno Security's Guide to E-Discovery and Digital Forensics A Comprehensive Handbook for Investigators, Examiners, IT Security Managers, Lawyers, and Academia.pdf 4.5 MB
Ruby Developer's Guide Everything You Need to Develop and Deliver Ruby Applications.pdf 4.5 MB
The IT Digital Legal Companion A Comprehensive Business Guide to Software, IT, Internet, Media and IP Law.pdf 4.4 MB
Augmented Reality An Emerging Technologies Guide to AR.epub 4.4 MB
Eleventh 11th Hour Network+ Study Guide Exam N10-004.pdf 4.4 MB
Open Source Fuzzing Tools Check Your Software for Vulnerabilities and Eliminate Them.pdf 4.4 MB
CompTIA Linux+ Certification Study Guide.pdf 4.4 MB
Consumer's Guide to Cell Phones & Wireless Service Plans Everything You Need to Choose the Right Brand, With the Right Feature Sets, for Your Needs.pdf 4.4 MB
Stealing The Network How To Own The Box.pdf 4.3 MB
The Ruby Developer's Guide.pdf 4.3 MB
specials/Computer Networks and Internets 6th Edition.pdf 4.3 MB
Linux Malware Incident Response A Practitioner's Guide to Forensic Collection and Examination of Volatile Data.epub 4.3 MB
Palm OS Web Application Developer's Guide Developing and Delivering PQAs with Web Clipping.pdf 4.2 MB
Designing A Wireless Network Understand How Wireless Communication Works.pdf 4.1 MB
How to Defeat Advanced Malware New Tools for Protection and Forensics.pdf 4.1 MB
Stealing The Network How to Own an Identity.pdf 4.1 MB
Configuring Cisco AVVID Architecture for Voice, Video, and Integrated Data.pdf 4.1 MB
Nagios 3 Enterprise Network Monitoring Including Plug-Ins and Hardware Devices.pdf 4.0 MB
Job Reconnaissance Using Hacking Skills to Win the Job Hunt Game.pdf 3.9 MB
The Basics of Hacking and Penetration Testing.pdf 3.9 MB
Techno Security's Guide to Securing SCADA A Comprehensive Handbook On Protecting the Critical Infrastructure.pdf 3.9 MB
Administering Cisco QoS in IP Networks.pdf 3.9 MB
Designing and Building a Security Operations Center.pdf 3.9 MB
Managing Information Security 2nd Edition.epub 3.8 MB
Windows Registry Forensics Advanced Digital Forensic Analysis of the Windows Registry.pdf 3.8 MB
Threat Forecasting Leveraging Big Data for Predictive Analysis.pdf 3.8 MB
Protecting Patient Information A Decision-Maker's Guide to RIsk, Prevention, and Damage Control.pdf 3.8 MB
Breaking into Information Security Crafting a Custom Career Path to Get the Job You Really Want.pdf 3.7 MB
Hack-Proofing your Wireless Network.pdf 3.7 MB
Applied Cyber Security and the Smart Grid Implementing Security Controls into the Modern Power Infrastructure.epub 3.7 MB
specials/The Handbook of Information and Computer Ethics.pdf 3.7 MB
How to Define and Build an Effective Cyber Threat Intelligence Capability.pdf 3.6 MB
How to Cheat at IT Project Management.pdf 3.6 MB
Practical Anonymity Hiding in Plain Sight Online.pdf 3.6 MB
Infosec Management Fundamentals.pdf 3.6 MB
specials/Wireless Safety.pdf 3.5 MB
CompTIA RFID+ Exam RF0-001 Study Guide and Practice Exam.pdf 3.4 MB
Securing the Cloud Cloud Computer Security Techniques and Tactics.pdf 3.4 MB
Security Risk Management Building an Information Security Risk Management Program from the Ground Up.pdf 3.4 MB
Scene of the Cybercrime Computer Forensics Handbook Bring Cybercriminals to Justice.pdf 3.4 MB
specials/Network Safety.pdf 3.3 MB
Federated Identity Primer.pdf 3.3 MB
You For Sale, Protecting Your Personal Data and Privacy Online.pdf 3.3 MB
Eleventh 11th Hour Linux+ Study Guide Exam XK0-003.pdf 3.2 MB
Cyber Adversary Characterization Auditing the Hacker Mind.pdf 3.2 MB
Web Application Obfuscation.pdf 3.2 MB
Nessus, Snort & Ethereal Power Tools Customizing Open Source Security Applications.pdf 3.2 MB
Building SANs with Brocade Fabric Switches How to Design, Implement, and Maintain Storage Are Networks SANs with Brocade Fabric Switches.pdf 3.2 MB
Host Integrity Monitoring Using Osiris and Samhain.pdf 3.1 MB
Hack Proofing Your Network Internet Tradecraft.pdf 3.1 MB
Seven Deadliest Web Application Attacks.pdf 3.0 MB
The Basics of IT Audit Purposes, Processes, and Practical Information.pdf 3.0 MB
The Basics of Cloud Computing Understanding the Fundamentals of Cloud Computing in Theory and Practice.epub 3.0 MB
Optimizing IEEE 802.11i Resource and Security Essentials For Mobile and Stationary Devices.pdf 2.9 MB
The Basics of Cyber Warfare Understanding the Fundamentals of Cyber Warfare in Theory and Practice.pdf 2.9 MB
Stealing The Network How to Own a Continent.chm 2.9 MB
Cybercrime Investigative Case Management Using Digital Forensics and Investigative Techniques to Identify Cybercrime Suspects.pdf 2.8 MB
Building a Practical Information Security Prgram.pdf 2.8 MB
Next Generation Red Teaming.pdf 2.7 MB
Hack Proofing Your Wireless Network Protect Your Wireless Network From Attack.pdf 2.7 MB
Mobile Data Loss Threats and Countermeasures.pdf 2.6 MB
VoIP Security.pdf 2.6 MB
Hack Proofing your Identity in the Information Age.pdf 2.6 MB
How to Cheat at Managing Information Security.pdf 2.6 MB
Sarbanes-Oxley IT Compliance Using COBIT and Open Source Tools A Toolkit for IT Professionals.pdf 2.6 MB
Job Reconnaissance Using Hacking Skills to Win the Job Hunt Game.epub 2.5 MB
Eleventh 11th Hour CISSP Study Guide 2nd Edition.pdf 2.5 MB
Cyber Security Awareness for Lawyers.pdf 2.4 MB
Cyber Security Awareness for Lawyers.azw3 2.4 MB
Assessing Vendors A Hands-On Guide to Assessing Infosec and IT Vendors.epub 2.4 MB
Audio Content Security Attack Analysis on Audio Watermarking.pdf 2.4 MB
Secrets Stolen, Fortunes Lost Preventing Intellectual Property Theft and Economic Espionage in the 21st Century.pdf 2.4 MB
Advanced Persistent Security A Cyberwarfare Approach to Implementing Adaptive Enterprise Protection, Detection, and Reaction Strategies.pdf 2.4 MB
Cybercrime Case Presentation Using Digital Forensics and Investigative Techniques to Identify Cybercrime Suspects.pdf 2.3 MB
Seven Deadliest Microsoft Attacks.pdf 2.3 MB
Palm OS web application developer's guide (Files).zip 2.3 MB
How to Cheat at Windows System Administration Using Command Line Scripts.pdf 2.2 MB
Cyber Guerilla.pdf 2.1 MB
Configuring IPv6 for Cisco IOS.pdf 2.1 MB
Eleventh 11th Hour Security+ Study Guide Exam SY0-201.pdf 1.9 MB
Perfect Passwords Selection, Protection, Authentication Create Password Policies That Baffle the Bad Guys, Not Your Users.pdf 1.9 MB
Zero-Day Exploit Countdown to Darkness.pdf 1.8 MB
Cyber Security Awareness for Accountants and CPAs.azw3 1.8 MB
Seven Deadliest Wireless Technologies Attacks.pdf 1.8 MB
Cyber Security Awareness for Accountants and CPAs.pdf 1.8 MB
Ira Winkler's Zen and the Art of Information Security.pdf 1.8 MB
Preserving Electronic Evidence for Trial A Team Approach to the Litigation Hold, Data Collection, and Evidence Preservation.pdf 1.7 MB
Islands in the Clickstream Reflections on Life in a Virtual World.pdf 1.7 MB
Cybercrime Investigation Case Studies An Excerpt from Placing the Suspect Behind the Keyboard.pdf 1.5 MB
Cyber Security Awareness for Corporate Directors and Board Members.azw3 1.5 MB
Cyber Security Awareness for Corporate Directors and Board Members.pdf 1.5 MB
Assessing Vendors A Hands-On Guide to Assessing Infosec and IT Vendors.pdf 1.4 MB
Building a Digital Forensic Laboratory Establishing and Managing a Successful Facility.pdf 1.2 MB
Managing Catastrophic Loss of Sensitive Data A Guide for IT and Security Professionals.pdf 1.1 MB
MCSA MCSE Exam 70-291 Study Guide and Training System Implementing, Managing, and Maintaining a Windows Server 2003 Network Infrastructure Guide.ppt 1.0 MB
Dictionary of Information Security.pdf 992.1 kB
PCI DSS 3.1 The Standard That Killed SSL.pdf 683.3 kB
How to Cheat at Deploying Exchange Server 2000 with Active Directory.pdf 610.6 kB
XML .NET Developer’s Guide (Files).rar 547.7 kB
==查看完整文档列表==