Personal Development Courses H/HACK COLLECTION (2009)

Up to the top level directory /
Go Back ..
CHAINED EXPLOITS - ADVANCED HACKING ATTACKS FROM START TO FINISH.PDF01/25/201014.48 MB
EXPLOITING SOFTWARE - HOW TO BREAK CODE.PDF01/25/20107.58 MB
HACK COLLECTION (2009).MHT08/04/2010519.39 KB
HACKING.THE.NEXT.GENERATION.SEP.2009.PDF01/25/20108.61 MB
MCGRAW HILL - HACKING EXPOSED COMPUTER FORENSICS 2ND EDITION NOVEMBER 2009 (ATTICA).PDF01/25/201011.46 MB
MCGRAWHILL - HACKING EXPOSED MALWARE AND ROOTKITS.SEP.2009.PDF01/25/201010.40 MB
MCGRAW-HILL.OSBORNE.MEDIA.HACKING.EXPOSED.SIXTH.EDITION.NETWORK.SECURITY.SECRETSAND.SOLUTIONS.JAN.2009.PDF01/25/201014.84 MB
SPRINGER - IDENTIFYING MALICIOUS CODE THROUGH REVERSE ENGINEERING (ADVANCES IN INFORMATION SECURITY).APR.2009.PDF01/25/20106.23 MB
WORDWARE.THE.ROOTKIT.ARSENAL.MAY.2009.PDF01/25/201081.33 MB

Total: 155.47 MB (163,025,255 Bytes) in: 9 File(s)