磁力狗

磁力狗

BT种子名称

请保存以下最新地址

BT种子基本信息

  • 种子哈希:fa681d8eada1752081224957f2224c011d537716
  • 文档大小:2.7 GB
  • 文档个数:180个文档
  • 下载次数:455
  • 下载速度:极快
  • 收录时间:2022-03-24
  • 最近下载:2024-11-12
  • DMCA/屏蔽:DMCA/屏蔽

下载磁力链接

magnet:?xt=urn:btih:FA681D8EADA1752081224957F2224C011D537716magnet:?xt=urn:btih:FA681D8EADA1752081224957F2224C011D537716
复制磁力链接到PikPak、utorrent、Bitcomet、迅雷、115、百度网盘等下载工具进行下载。
Computing Security eBooks的二维码

文档列表

  • pdfPenetration Testing/Practical Hacking Techniques & Countermeasures (2007).pdf 151.0 MB
  • pdfSoftware Security/Sockets, Shellcode, Porting & Coding (2005).pdf 117.8 MB
  • pdfOperating Systems/Rootkit Arsenal [2nd Edition] (2013).pdf 111.3 MB
  • pdfOperating Systems/The Rootkit Arsenal - Escape and Evasion in the Dark Corners of the System [2nd Edition] (2013).pdf 98.7 MB
  • pdfComputer Programming/iOS/Learning iOS Programming [3rd edition] (2013).pdf 97.0 MB
  • pdfPenetration Testing/Aggressive Network Self-Defense (2005).pdf 86.9 MB
  • pdfOperating Systems/Rootkit Arsenal (2009).pdf 85.3 MB
  • pdfInformation Security (General)/Black Hat Physical Device Security (2005).pdf 82.4 MB
  • pdfComputer Programming/Super Scratch Programming Adventure! Learn to Program By Making Cool Games (2012).pdf 77.5 MB
  • pdfSoftware Security/Vulnerability Research/Fuzzing - Brute Force Vulnerability Discovery (2007).pdf 58.2 MB
  • pdfComputer Programming/iOS/More iOS 6 Development (2013).pdf 55.8 MB
  • pdfComputer Programming/Android/Android Apps for Absolute Beginners [2nd edition] (2012).pdf 41.9 MB
  • pdfComputer Programming/iOS/Teach Yourself iOS 5 Application Development in 24 Hours [3rd edition] (2012).pdf 40.0 MB
  • pdfComputer Programming/iOS/iOS 6 Programming Cookbook (2012).pdf 37.5 MB
  • pdfComputer Programming/Android/OpenGL ES 2 for Android - A Quick-Start Guide (2013).pdf 32.1 MB
  • pdfMalware Research/Malicious Cryptography - Exposing Cryptovirology (2004).pdf 30.5 MB
  • pdfLockpicking/Practical Lock Picking [2nd Edition] (2012).pdf 30.1 MB
  • pdfLockpicking/Keys to the Kingdom (2012).pdf 28.4 MB
  • pdfIntelligence Agencies/By Way of Deception (1990).pdf 27.7 MB
  • pdfSoftware Security/Vulnerability Research/The IDA Pro Book (2008).pdf 27.1 MB
  • ==查看完整文档列表==
>