E-Book Collection for Aspiring Hackers 2014 | 1.7 Gb

Name : E-Book Collection
Version : for Aspiring Hackers                         2014
Language : English/ML
OS Support : Xp/Vista/7/8/All
Type File : rar/pdf
Publisher : Anonymouse
Size : 1.7 Gb



eBook List:Comp-Arch & OS/Computer Architechture.pdf (5.57 MB)
Comp-Arch & OS/Computer Hardware Main Components.pdf (608.07 KB)
Comp-Arch & OS/Computer Organisation & Fundementals.pdf (2.02 MB)
Comp-Arch & OS/Computer Systems - A Programmers Perspective.pdf (6.75 MB)
Comp-Arch & OS/Embedded Hardware.pdf (10.30 MB)
Comp-Arch & OS/How Computers Work (8th Edition).pdf (39.00 MB)
Comp-Arch & OS/Operatin System Internals and Design Principles.pdf (14.49 MB)
Comp-Arch & OS/Operating System Concepts.pdf (40.63 MB)
Comp-Arch & OS/The Indispensable PC Hardware Book - Third Edition.pdf (29.67 MB)
Linux_Unix/Advanced Bash Scripting - Mendel Cooper.pdf (2.60 MB)
Linux_Unix/Classic Shell Scripting.pdf (7.67 MB)
Linux_Unix/Essential System Administration.pdf (9.96 MB)
Linux_Unix/Learning the bash Shell - Unix Shell Programming.pdf (1.63 MB)
Linux_Unix/Linux - The Complete Reference.pdf (8.91 MB)
Linux_Unix/Linux Bible.pdf (10.73 MB)
Linux_Unix/Linux Command line & Shell Scripting Bible.pdf (14.37 MB)
Linux_Unix/Sed & Awk.pdf (2.25 MB)
Linux_Unix/The Design of Unix Operating System.pdf (103.95 MB)
Linux_Unix/The Linux Command Line - A Complete Introduction.pdf (5.93 MB)
Linux_Unix/Understanding Linux Kernel.pdf (5.35 MB)
Linux_Unix/Understanding Linux Network Internals.pdf (11.49 MB)
Linux_Unix/UNIX and Linux System Administration Handbook (4th Edition).pdf (16.07 MB)
Linux_Unix/Unix Power Tools.pdf (8.40 MB)
Networking/Computer Networking - A Top-Down Approach.pdf (8.30 MB)
Networking/Data Communications and Networking By Behrouz A.Forouzan.pdf (10.84 MB)
Networking/Internetworking with TCP_IP Vol I.pdf (36.97 MB)
Networking/Mobile Communciations by Jochen Schiller.pdf (18.19 MB)
Networking/TCP-IP Illustrated Vol.3.pdf (40.02 MB)
Programming/64 Bit Intel Assembly Language Programming for Linux.pdf (4.89 MB)
Programming/Advanced Programming in the UNIX Environment.pdf (8.51 MB)
Programming/Alfred V. Aho - Data Structures and Algorithms.pdf (6.59 MB)
Programming/C/21st Century C.pdf (4.59 MB)
Programming/C/Advanced C.pdf (4.08 MB)
Programming/C/C Primer Plus.pdf (5.37 MB)
Programming/C/C Puzzle Book.pdf (2.24 MB)
Programming/C/C++ Primer Plus.pdf (6.43 MB)
Programming/C/Expert C Programming.pdf (2.15 MB)
Programming/C/Memory Management in C.pdf (415.49 KB)
Programming/C/Programming in C - Stephen G.Cochan.pdf (4.95 MB)
Programming/Linux System Programming Talking Directly to the Kernel
and C Library.pdf (8.65 MB)
Programming/Network/Java Network Programming.pdf (11.24 MB)
Programming/Network/Network Programming in C.pdf (273.51 KB)
Programming/Network/Python Network Programming.pdf (5.08 MB)
Programming/Network/TCP IP Sockets in C.pdf (1.28 MB)
Programming/Network/Unix Network Programming Volume 1.pdf (13.70 MB)
Programming/Network/Unix Network Programming Volume 2.pdf (21.13 MB)
Programming/Perl/Learning Perl.pdf (8.84 MB)
Programming/Perl/Perl Pocket Reference.pdf (2.24 MB)
Programming/Perl/Programming Perl.pdf (15.67 MB)
Programming/Python/Learning Python.pdf (8.30 MB)
Programming/Python/Programming in Python.pdf (7.08 MB)
Programming/Python/Python for Unix Sys Admins.pdf (3.42 MB)
Programming/The Art of Assembly Language.pdf (22.22 MB)
Programming/The Linux Programming Interface.pdf (6.92 MB)
Security/Advanced Operating Systems and Kernel Applications Techniques
and Technologies.pdf (6.2
Security/Backtrack5 Wireless Penetration Testing.pdf (16.59 MB)
Security/Big Book of Windows Hacks.pdf (73.78 MB)
Security/Build Your Own Security Lab for Network Testing.pdf (8.58 MB)
Security/Crypto/Applied Cryptography - Bruce Schenier.pdf (2.77 MB)
Security/Crypto/Cryptography and Network Security - William Stallings.pdf (7.98 MB)
Security/Crypto/Encryption Solution Design and Deployment Considerations.pdf (1.81 MB)
Security/Crypto/Handbook Of Applied Cryptography.pdf (11.72 MB)
Security/Crypto/Implementing SSL_TLS Using Cryptography and PKI.pdf (4.51 MB)
Security/Crypto/Malicious Cryptography - Exposing Cryptovirology.pdf (29.06 MB)
Security/Hack Attacks Revealed.pdf (8.21 MB)
Security/Hackers Delight.pdf (24.49 MB)
Security/Hacking - The Art of Explotation.pdf (4.02 MB)
Security/Hacking Exposed.pdf (33.03 MB)
Security/Hacking Secret Ciphers with Python.pdf (6.61 MB)
Security/Hacking the Xbox.pdf (17.76 MB)
Security/Hacking Windows.pdf (9.66 MB)
Security/Hands-On Ethical Hacking and Network Defense.pdf (83.36 MB)
Security/Hardening Linux.pdf (6.30 MB)
Security/Hardening the Operating System.pdf (1.41 MB)
Security/Kevin Mitnick - The Art of Deception.pdf (5.19 MB)
Security/Kevin Mitnick - The Art of Intrusion.pdf (3.07 MB)
Security/Letter & Word Frequencies - Major Languages.docx (13.23 KB)
Security/Linux Firewalls.pdf (6.51 MB)
Security/Linux Server Hacks.pdf (34.20 MB)
Security/Malware & Forensics/File System Forensic Analysis.pdf (4.03 MB)
Security/Malware & Forensics/Malware Analysts Cookbook.pdf (8.92 MB)
Security/Malware & Forensics/Practical Malware Analysis.pdf (9.45 MB)
Security/Malware & Forensics/Secrets of Reverse Engineering.pdf (8.56 MB)
Security/Malware & Forensics/The Giant Black Book of Computer Viruses.pdf (5.71 MB)
Security/Malware & Forensics/X86 Disassemblypdf (2.10 MB)
Security/Network Intrusion Detection.pdf (2.46 MB)
Security/P.Languages for Information Security.pdf (1.00 MB)
Security/Papers/Chip & Pin Broken_Smart Card Authentication.pdf (1.41 MB)
Security/Papers/DFA of Secret Key Cryptosystems.pdf (699.23 KB)
Security/Papers/Differential Cryptanalysis Of DES Like Cryptosystems.pdf (634.49 KB)
Security/Papers/Malicious Cryptography -
Kleptographic Aspects (Academic Paper).pdf (167.57 KB)
Security/Papers/Modern Game Console Exploitation.pdf (221.06 KB)
Security/Papers/RSA Timing Attacks.pdf (79.51 KB)
Security/Papers/RSA Timing Attacks_Boneh.pdf (144.22 KB)
Security/Papers/Securing & Hardening Linux v1.0.pdf (118.88 KB)
Security/Papers/Timins Attacks on Public Key Crypto.pdf (206.71 KB)
Security/Papers/Wireless Hacking Tools.pdf (125.85 KB)
Security/Pen Testing/Advanced Penetration Testing For Highly Secured
Environments.pdf (15.39 MB)
Security/Pen Testing/Basics of Penetration Testing.pdf (3.74 MB)
Security/Pen Testing/Counter Hack Reloaded.pdf (12.88 MB)
Security/Pen Testing/Using Google in Penetration Testing.pdf (14.91 MB)
Security/Pen Testing/Web Penetration Testing with Kali Linux.pdf (20.21 MB)
Security/Rootkits/A Guide to Kernel Exploitation.pdf (5.26 MB)
Security/Rootkits/BootRoot.pdf (437.03 KB)
Security/Rootkits/Designing BSD Rootkits.pdf (8.38 MB)
Security/Rootkits/Malware & Rootkits.pdf (10.98 MB)
Security/Rootkits/ManagedCodeRootkits.pdf (5.56 MB)
Security/Rootkits/Rootkit Arsenal.pdf (81.33 MB)
Security/Rootkits/Rootkits - Subverting the Windows Kernel.pdf (2.29 MB)
Security/The Shellcoder's Handbook.pdf (8.74 MB)
Security/Tools/Metasploit - The Penetration Testers Guide.pdf (6.90 MB)
Security/Tools/Nmap Network Scanning.pdf (423.84 MB)
Security/Tools/Practical Packet Analysis.pdf (16.47 MB)
Security/Trusted Computer System Evaluation Criteria_DoD.pdf (423.11 KB)
Security/Trusted Computing for Military Applications.pdf (764.54 KB)
Security/Violent Python.pdf (6.89 MB)
Security/Wi Foo - The Secrets of Wireless Hacking.pdf (7.73 MB)
Security/Windows Internals.pdf (21.69 MB)

and much more,... 

DOWNLOAD 

Download | Via Uptobox
Download | Via Exoshare 24 Site

E-Book Collection for Aspiring Hackers 2014 | 1.7 Gb

Do you Like this Article

rss twitter facebook stumbleupon

Enjoy Free Email Updates!!

0 comments:

Post a Comment

 
Top