Navigacija
Lista poslednjih: 16, 32, 64, 128 poruka.

KnjiGE za predstojeCe lEto

[es] :: Security :: KnjiGE za predstojeCe lEto

[ Pregleda: 4224 | Odgovora: 0 ] > FB > Twit

Postavi temu Odgovori

Autor

Pretraga teme: Traži
Markiranje Štampanje RSS

c00ina

Član broj: 60625
Poruke: 1
213.137.127.*



Profil

icon KnjiGE za predstojeCe lEto07.06.2005. u 22:03 - pre 229 meseci
evo malo knjiga,za leto



A Buffer Overflow Study - Attacks and Defenses (2002).pdf
Computer Vulnerability(March 9 2000).pdf
Crackproof Your Software(No Starch-2002).pdf
Credit Card Visa Hack(Cambridge Lab-2003).pdf
Google Hacking for Penetration Tester (Syngress-2005).pdf

Download : 18460309 Bytes

Code:
http://rapidshare.de/files/2116548/Myanmar_1.rar.html
...


Hack Attacks Revealed- A Complete Reference with Custom Security Hacking Toolkit (Wiley-2001).pdf
Hack Proofing Your Identity in the Information Age (Syngress-2002).pdf
Hack Proofing Your Network - Internet Tradecraft (Syngress-2000).pdf
Windows XP Hacks (O'reilly- Auguest 2003).chm

Download : 22802682 Bytes

Code:
http://rapidshare.de/files/2116744/Myanmar_2.rar.html


Hackers Beware (NewRiders -2002).pdf
Hacker's Desk Reference.pdf
Hacking Exposed- Network Security Secrets and Solutions (MCGraw-Hill-2001).pdf
Hacking Exposed- Web Applications (MCGraw-Hill-2002).pdf
Hacking Exposed- Windows 2003 Chapter 5.pdf

Download : 17814223 Bytes

Code:
http://rapidshare.de/files/2116845/Myanmar_3.rar.html


Hacking for Dummies (John Wiley-2004).pdf
Hacking for Dummies-Access to Other Peoples Systems Made Simple.pdf
Hacking Guide v3.1[w*w.netz.ru].pdf
How Thieves Targeted eBay Users but Got Stopped Instead(Interhack-June 2003).pdf
Reversing Secrets of Reverse Engineering (Apr 2005).pdf
Stealing the Network; How to Own the Box ( Syngress-2003).pdf
The Art of Deception by Kevin Mitnick.pdf
The Art of Intrusion-The Real Stories Behind the Exploits of Hackers Intruders and Deceivers (Wiley- Feb 2005).pdf

Download : 19801578 Bytes

Code:
http://rapidshare.de/files/2116932/Myanmar_4.rar.html


The Complete History of Hacking.pdf
The Extreme Searchers Internet Handbook A Guide for the Serious Searcher (Feb 2004).pdf
Tricks of the Internet Gurus (April 1999).pdf
Underground Hacking Madness & Obsession on the Electronic Frontier (Suelette Dreyfus & Julian Assange-2001).pdf
Amazon Hacks - (O'reilly-August 2003).chm
Hack IT Security Through Penetration Testing (Addison Wesley-2002).chm

Download : 19245575 Bytes

Code:
http://rapidshare.de/files/2117030/Myanmar_5.rar.html


Ethical Hacking and Countermeasures EC Council Exam 312 50 (OSB- 2004).chm
Hacker Disassembling Uncovered (A List- 2003).chm
Hackers Delight( Addison Wesley- 2003 ).chm
Hacking-The Art of Exploitation(No Starch-2003).chm

Download : 23423702 Bytes

Code:
http://rapidshare.de/files/2117127/Myanmar_6.rar.html


Malware - Fighting Malicious Code (Prentice Hall-November 21 2003).chm
Maximum Security, 3rd Edition(Sams-April 2001).chm
Maximum Security_ A Hackers Guide to Protect Your Internet .chm
Network Security Tools (OReilly- Apr 2005).chm
PC Hacks(Oct 2004).chm
PDF Hack(Aug 2004).chm
Practical Study Remote Access (Cisco-December 22, 2003).chm

Download : 24061940 Bytes

Code:
http://rapidshare.de/files/2117290/Myanmar_7.rar.html


Spidering Hacks(O'Reilly- October 2003).chm
Steal This Computer Book 3 What They Won't Tell You About the Internet(No Starch Press © 2003 ).chm
Web Hacking Attacks and Defence (Pearson Education-August 20.chm
Windows Server Hack(O'Reilly - March 2004).chm

Download : 24388981 Bytes

Code:
http://rapidshare.de/files/2117410/Myanmar_8.rar.html

Password: Golden Land Myanmar
 
Odgovor na temu

[es] :: Security :: KnjiGE za predstojeCe lEto

[ Pregleda: 4224 | Odgovora: 0 ] > FB > Twit

Postavi temu Odgovori

Navigacija
Lista poslednjih: 16, 32, 64, 128 poruka.