BT种子基本信息
- 种子哈希:fa681d8eada1752081224957f2224c011d537716
- 文档大小:2.7 GB
- 文档个数:180个文档
- 下载次数:455次
- 下载速度:极快
- 收录时间:2022-03-24
- 最近下载:2024-11-12
- DMCA/屏蔽:DMCA/屏蔽
文档列表
Penetration Testing/Practical Hacking Techniques & Countermeasures (2007).pdf 151.0 MB
Software Security/Sockets, Shellcode, Porting & Coding (2005).pdf 117.8 MB
Operating Systems/Rootkit Arsenal [2nd Edition] (2013).pdf 111.3 MB
Operating Systems/The Rootkit Arsenal - Escape and Evasion in the Dark Corners of the System [2nd Edition] (2013).pdf 98.7 MB
Computer Programming/iOS/Learning iOS Programming [3rd edition] (2013).pdf 97.0 MB
Penetration Testing/Aggressive Network Self-Defense (2005).pdf 86.9 MB
Operating Systems/Rootkit Arsenal (2009).pdf 85.3 MB
Information Security (General)/Black Hat Physical Device Security (2005).pdf 82.4 MB
Computer Programming/Super Scratch Programming Adventure! Learn to Program By Making Cool Games (2012).pdf 77.5 MB
Software Security/Vulnerability Research/Fuzzing - Brute Force Vulnerability Discovery (2007).pdf 58.2 MB
Computer Programming/iOS/More iOS 6 Development (2013).pdf 55.8 MB
Computer Programming/Android/Android Apps for Absolute Beginners [2nd edition] (2012).pdf 41.9 MB
Computer Programming/iOS/Teach Yourself iOS 5 Application Development in 24 Hours [3rd edition] (2012).pdf 40.0 MB
Computer Programming/iOS/iOS 6 Programming Cookbook (2012).pdf 37.5 MB
Computer Programming/Android/OpenGL ES 2 for Android - A Quick-Start Guide (2013).pdf 32.1 MB
Malware Research/Malicious Cryptography - Exposing Cryptovirology (2004).pdf 30.5 MB
Lockpicking/Practical Lock Picking [2nd Edition] (2012).pdf 30.1 MB
Lockpicking/Keys to the Kingdom (2012).pdf 28.4 MB
Intelligence Agencies/By Way of Deception (1990).pdf 27.7 MB
Software Security/Vulnerability Research/The IDA Pro Book (2008).pdf 27.1 MB
Malware Research/Malware Forensics - Investigating & Analyzing Malicious Code (2008).pdf 26.2 MB
Operating Systems/Windows Internals - Part 1 [6th edition] (2012).pdf 26.2 MB
Computer Programming/Python/Python - How to Program (2001).pdf 26.2 MB
Computer Programming/iOS/iOS 5 Programming Cookbook (2012).pdf 26.2 MB
Computer Programming/iOS/iOS 6 Recipes - A Problem-Solution Approach (2012).pdf 25.5 MB
Digital Forensics/iOS Forensic Analysis (2010).pdf 25.1 MB
Operating Systems/Programming Windows [6th Edition] (2013).pdf 23.9 MB
Intelligence Agencies/Secret Power (1996).pdf 23.4 MB
Computer Programming/Android/Beginning Android Application Development (2011).pdf 22.8 MB
Operating Systems/Windows Internals - Part 2 [6th edition] (2012).pdf 22.7 MB
Computer Programming/Introduction to the Theory of Computation [2nd edition] (2006).pdf 21.6 MB
Penetration Testing/Web Penetration Testing with Kali Linux (2013).pdf 20.8 MB
Cryptology/Mathematics/Topics in Algebra (1964).pdf 20.6 MB
Lockpicking/Practical Lock Picking (2010).pdf 20.1 MB
Cryptology/Applied Cryptanalysis (2007).pdf 19.6 MB
Malware Research/Malware Detection (2007).pdf 19.4 MB
Computer Programming/Android/Android in Action (2011).pdf 19.1 MB
Computer Programming/Hello World! - Computer Programming for Kids and Other Beginners (2009).pdf 18.9 MB
Lockpicking/Master Locksmithing (2008).pdf 18.6 MB
Wireless Security/Wireless Security Handbook (2006).pdf 18.0 MB
Penetration Testing/Penetration Tester's Open Source Toolkit [3rd edition] (2011).pdf 17.8 MB
Information & Coding Theory/Error Control Coding (2002).pdf 17.8 MB
Cryptology/Cryptography - Theory and Practice [3rd edition] (2006).pdf 17.4 MB
Information Security (Fiction)/Dissecting the Hack (2010).pdf 17.4 MB
Information & Coding Theory/Information Theory and Statistics (1968).pdf 16.9 MB
Network Security & Tools/Practical Packet Analysis [2nd edition] (2011).pdf 16.8 MB
Cryptology/Machine Cryptography and Modern Cryptanalysis [Abridged, Chapters 2-4-5 only] (1985).pdf 16.4 MB
Computer Programming/Android/Android for Programmers - An App-Driven Approach (2012).pdf 16.0 MB
Cryptology/Computer Security and Cryptography (2007).pdf 14.8 MB
Social Engineering/Personal Protection/The Big Book of Secret Hiding Places (1987).pdf 14.3 MB
Web Security/The Web Application Hackers Handbook [2nd edition] (2011).pdf 14.2 MB
Computer Programming/iOS/Developing iOS Applications with Flex 4.5 (2011).pdf 14.2 MB
Computer Programming/Python/Beginning Python - From Novice to Pro (2005).pdf 13.9 MB
Computer Programming/The C Programming Language [2nd edition] (1988).pdf 13.8 MB
Penetration Testing/Hacking/Gray Hat Hacking - The Ethical Hacker's Handbook [2nd edition] (2008).pdf 13.2 MB
Cryptology/Decrypted Secrets - Methods and Maxims of Cryptology [4th edition] (2007).pdf 12.9 MB
Penetration Testing/Hacking/Gray Hat Hacking - The Ethical Hacker's Handbook [3rd edition] (2011).pdf 12.8 MB
Network Security & Tools/Snort 2.1 Intrusion Detection [2nd edition] (2004).pdf 12.7 MB
Mental Exercise & Other Tests/Test Your EQ Assess Your Emotional Intelligence with 20 Personality Questionnaires (2009).pdf 12.2 MB
Digital Forensics/Hacking Exposed - Computer Forensics [2nd edition] (2010).pdf 12.2 MB
Network Security & Tools/Hack the Stack - Using Snort and Ethereal to Master the 8 Layers of an Insecure Network (2006).pdf 11.9 MB
Web Security/The Web Application Hackers Handbook (2008).pdf 11.5 MB
Malware Research/Computer Viruses & Malware (2006).pdf 11.3 MB
Computer Programming/Android/Professional Android Application Development (2009).pdf 11.1 MB
Social Engineering/Social Engineering - The Art of Human Hacking (2011).pdf 11.0 MB
Computer Programming/iOS/Programming iOS 5 [2nd edition] (2011).pdf 11.0 MB
Malware Research/Hacking Exposed - Malware & Rootkits (2010).pdf 10.9 MB
Mobile App Security/Hacking and Securing iOS Applications (2012).pdf 10.7 MB
Cryptology/Basic Cryptanalysis (1990).pdf 10.4 MB
Penetration Testing/Coding for Penetration Testers (2011).pdf 10.4 MB
Social Engineering/Ninja Hacking - Unconventional Penetration Testing (2011).pdf 10.3 MB
Digital Forensics/Forensic Computing - A Practitioner's Guide [2nd edition] (2007).pdf 10.0 MB
Operating Systems/Advanced Windows Debugging (2008).pdf 9.9 MB
Malware Research/Practical Malware Analysis (2012).pdf 9.9 MB
Cryptology/Military Cryptanalysis - Part IV - Transposition And Fractionating Systems (1939).pdf 9.8 MB
Software Security/Vulnerability Research/The IDA Pro Book [2nd edition] (2011).pdf 9.7 MB
Information Security (Fiction)/Stealing the Network - How to Own A Shadow (2007).pdf 9.6 MB
Computer Programming/The Art Of Debugging With GDB, DDD, and Eclipse (2008).pdf 9.5 MB
Computer Programming/Android/Learn Java for Android Development (2010).pdf 9.5 MB
Cryptology/A Classical Introduction to Cryptography Exercise Book (2006).pdf 9.4 MB
Malware Research/Malware Analyst's Cookbook (2011).pdf 9.4 MB
Penetration Testing/Professional Penetration Testing (2010).pdf 9.3 MB
Digital Forensics/iPhone and iOS Forensics (2011).pdf 9.2 MB
Information Security (General)/Hack Proofing Your Network [2nd edition] (2002).pdf 9.2 MB
Software Security/The Shellcoder's Handbook [2nd edition] (2007).pdf 9.2 MB
Computer Programming/C How To Program [6th Edition] (2010).pdf 9.1 MB
Penetration Testing/Hacking - The Next Generation (2009).pdf 9.0 MB
Computer Programming/Android/Designing for Android (2012).pdf 8.9 MB
Software Security/Reversing - Secrets Of Reverse Engineering (2005).pdf 8.8 MB
Penetration Testing/Hacking/Hacking Exposed - Network Security Secrets & Solutions [2nd edition] (2001).pdf 8.4 MB
Computer Programming/Python/Violent Python - A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers (2012).pdf 8.2 MB
Information Security (Fiction)/Stealing the Network - How to Own an Identity (2005).pdf 8.1 MB
Network Security & Tools/How to Cheat at Configuring Open Source Security Tools (2007).pdf 8.0 MB
Cryptology/Military Cryptanalysis - Part I - Monoalphabetic Substitution Systems (1939).pdf 7.7 MB
Cryptology/The Code Book (1999).pdf 7.6 MB
Malware Research/Botnets - The Killer Web App (2007).pdf 7.3 MB
Mental Exercise & Other Tests/Math Puzzles and Games - Grades 6-8 (2009).pdf 7.3 MB
Penetration Testing/Metasploit - The Penetration Testers Guide (2011).pdf 7.2 MB
Mental Exercise & Other Tests/IQ Gym - Grow Your Mind (2008).pdf 7.2 MB
VPN Security/A Technical Guide to IPSec Virtual Private Networks (2001).pdf 7.1 MB
Malware Research/Mobile Malware Attacks and Defense (2009).pdf 7.1 MB
Computer Programming/Android/Android Programming Tutorials (2011).pdf 7.0 MB
Computer Programming/Python/Hacking Secret Ciphers with Python (2013).pdf 6.9 MB
Web Security/SQL Injection Attacks and Defense [2nd edition] (2012).pdf 6.7 MB
Computer Programming/Ruby by Example - Concepts and Code (2007).pdf 6.7 MB
Computer Programming/Android/Hello, Android - Introducing Google's Mobile Development Platform (2008).pdf 6.7 MB
Mobile App Security/Android Apps Security (2012).pdf 6.6 MB
Network Security & Tools/Nmap Cookbook (2010).pdf 6.6 MB
Web Security/XSS Attacks - Cross Site Scripting Exploits & Defense (2007).pdf 6.5 MB
Software Security/Software Piracy Exposed (2005).pdf 6.5 MB
Penetration Testing/BackTrack 4 - Assuring Security by Penetration Testing (2010).pdf 6.5 MB
Cryptology/Military Cryptanalysis - Part III - Simpler Varieties Of Aperiodic Substitution Systems (1939).pdf 6.3 MB
Penetration Testing/Hacking/Hacking Exposed - Windows [3rd edition] (2008).pdf 6.3 MB
Wireless Security/RFID Security (2006).pdf 6.2 MB
Information Security (General)/Security Engineering [2nd edition] (2008).pdf 6.2 MB
Digital Forensics/Windows Forensic Analysis DVD Toolkit [2nd edition] (2009).pdf 6.2 MB
Cryptology/Military Cryptanalysis - Part II - Simpler Varieties Of Polyalphabetic Substitution Systems (1939).pdf 6.0 MB
Malware Research/The Giant Black Boot of Computer Viruses (1995).pdf 6.0 MB
Malware Research/AVIEN Malware Defense Guide for the Enterprise (2007).pdf 6.0 MB
Computer Programming/Android/Expert Android (2013).pdf 5.9 MB
Cryptology/Manual for the Solution of Military Ciphers (1916).pdf 5.9 MB
Software Security/Buffer Overflow Attacks - Detect, Exploit, Prevent (2005).pdf 5.6 MB
Cryptology/The Index Of Coincidence And Its Applications In Cryptanalysis (1922).pdf 5.6 MB
Social Engineering/Personal Protection/How To be Invisible - The Essential Guide to Protecting Your Personal Privacy (2004).pdf 5.6 MB
Software Security/Vulnerability Research/A Guide to Kernel Exploitation (2011).pdf 5.5 MB
Software Security/Vulnerability Research/A Bug Hunter's Diary (2011).pdf 5.4 MB
Digital Forensics/CD And DVD Forensics (2006).pdf 5.4 MB
Computer Programming/Android/The Business of Android Apps Development [2nd edition] (2013).pdf 5.3 MB
Computer Programming/Python/Invent Your Own Computer Games with Python [2nd edition] (2010).pdf 5.1 MB
Penetration Testing/Metasploit Toolkit for Penetration Testing, Exploit Development, & Vulnerability Research (2007).pdf 5.1 MB
Cryptology/Cryptology Unlocked (2007).pdf 4.9 MB
Information Security (Fiction)/Stealing the Network - How to Own the Box (2003).pdf 4.8 MB
Software Security/Vulnerability Research/Fuzzing for Software Security Testing and Quality Assurance (2008).pdf 4.7 MB
Computer Programming/Python/The Quick Python Book [2nd edition] (2010).pdf 4.6 MB
Penetration Testing/Hacking/Hacking - The Art of Exploitation [2nd edition] (2008).pdf 4.6 MB
Computer Programming/Python/Making Games with Python & Pygame [2nd edition] (2012).pdf 4.5 MB
Digital Forensics/Windows Forensic Analysis DVD Toolkit (2007).pdf 4.5 MB
Mental Exercise & Other Tests/Mathematical Teasers (1970).pdf 4.5 MB
Software Security/Vulnerability Research/Open Source Fuzzing Tools (2007).pdf 4.4 MB
Computer Programming/Android/Learn Java for Android Development [2nd edition] (2013).pdf 4.1 MB
Information Security (Fiction)/Zero-Day Exploit - Countdown to Darkness (2004).pdf 3.9 MB
Penetration Testing/The Basics of Hacking and Penetration Testing (2011).pdf 3.9 MB
Mental Exercise & Other Tests/World's 200 Hardest Brain Teasers (2010).pdf 3.8 MB
Digital Forensics/Windows Registry Forensics (2011).pdf 3.8 MB
Penetration Testing/Hacknotes Linux And Unix Security Portable Reference (2003).pdf 3.6 MB
Lockpicking/Opening Locks By Bumping In Five Seconds Or Less (2006).pdf 3.3 MB
Social Engineering/The Art of Intrusion (2005).pdf 3.2 MB
Penetration Testing/Hacking/Gray Hat Python (2009).pdf 3.2 MB
Malware Research/Defense & Detection Strategies against Internet Worms (2004).pdf 3.0 MB
Social Engineering/Personal Protection/What Every BODY Is Saying (2007).pdf 2.8 MB
Social Engineering/Unauthorised Access (2009).pdf 2.8 MB
Penetration Testing/The Hacker’s Underground Handbook (2008).pdf 2.6 MB
Information & Coding Theory/The Art of Error Correcting Coding [2nd Edition] (2006).pdf 2.3 MB
Malware Research/Stuxnet Malware Analysis Paper (2011).pdf 2.3 MB
Information Security (General)/The Myths of Security (2009).pdf 2.0 MB
Cryptology/Brute Force - Cracking the Data Encryption Standard (2005).pdf 2.0 MB
Digital Forensics/Cybercrime/Fighting Computer Crime-A New Framework for Protecting Information (1998).pdf 1.9 MB
Social Engineering/Personal Protection/Executive's Guide to Personal Security (2003).pdf 1.8 MB
Cryptology/Algebraic Cryptanalysis (2009).pdf 1.8 MB
Operating Systems/Windows 7 Device Driver (2010).pdf 1.8 MB
Social Engineering/The Art of Deception (2002).pdf 1.6 MB
Cryptology/The Codebreakers - The Story of Secret Writing [Abridged] (1973).pdf 1.5 MB
Mental Exercise & Other Tests/Career, Aptitude and Selection Tests Match Your IQ, Personality and Abilities to Your Ideal Career [2nd Edition] (2006).pdf 1.5 MB
Malware Research/The Little Black Book of Computer Viruses (1990).pdf 1.5 MB
Information Security (General)/Kingpin - How One Hacker Took Over the Billion-Dollar Cybercrime Underground (2011).pdf 1.4 MB
Intelligence Agencies/Shadow Factory (2008).pdf 1.3 MB
Intelligence Agencies/The Big Breach (2001).pdf 1.3 MB
Computer Programming/Python/Dive Into Python (2004).pdf 1.3 MB
Cryptology/Codes and Ciphers - Julius Caesar, the Enigma, and the Internet (2001).pdf 1.3 MB
Information Security (General)/Beyond Fear - Thinking Sensibly About Security in an Uncertain World (2003).pdf 1.1 MB
Mental Exercise & Other Tests/The Psychologist's Book of Personality Tests (2001).pdf 1.1 MB
Network Security & Tools/Your Botnet is My Botnet - Analysis of a Botnet Takeover (2009).pdf 943.9 kB
Computer Programming/Python/Think Python - How to Think Like A Computer Scientist (2012).pdf 884.6 kB
Mental Exercise & Other Tests/Meyers-Briggs Type Indicator Lite Test (2012).pdf 694.3 kB
Social Engineering/Personal Protection/Never Be Lied to Again (1999).pdf 677.5 kB
Information & Coding Theory/Communication Theory of Secrecy Systems (1949).pdf 562.6 kB
Lockpicking/Bumping locks (2005).pdf 556.9 kB
Lockpicking/MIT Guide to Lock Picking (1991).pdf 521.1 kB
Computer Programming/theForger's Win32 API Tutorial (2003).pdf 408.6 kB
Information & Coding Theory/A Mathematical Theory of Communication (1948).pdf 366.3 kB
==查看完整文档列表==