Download Now

eBook Collection for Aspiring Hackers
eBook Collection for Aspiring Hackers
Size: 1.452 GB Type: e-Books









eBook Collection for Aspiring Hackers
English | PDF | Large Books Collection | 1.74 GB
Genre: Security Related, Programming, Hacking


eBook List:
Comp-Arch & OS/Computer Architechture.pdf (5.57 MB)
Comp-Arch & OS/Computer Hardware Main Components.pdf (608.07 KB)
Comp-Arch & OS/Computer Organisation & Fundementals.pdf (2.02 MB)
Comp-Arch & OS/Computer Systems - A Programmers Perspective.pdf (6.75 MB)
Comp-Arch & OS/Embedded Hardware.pdf (10.30 MB)
Comp-Arch & OS/How Computers Work (8th Edition).pdf (39.00 MB)
Comp-Arch & OS/Operatin System Internals and Design Principles.pdf (14.49 MB)
Comp-Arch & OS/Operating System Concepts.pdf (40.63 MB)
Comp-Arch & OS/The Indispensable PC Hardware Book - Third Edition.pdf (29.67 MB)
Linux_Unix/Advanced Bash Scripting - Mendel Cooper.pdf (2.60 MB)
Linux_Unix/Classic Shell Scripting.pdf (7.67 MB)
Linux_Unix/Essential System Administration.pdf (9.96 MB)
Linux_Unix/Learning the bash Shell - Unix Shell Programming.pdf (1.63 MB)
Linux_Unix/Linux - The Complete Reference.pdf (8.91 MB)
Linux_Unix/Linux Bible.pdf (10.73 MB)
Linux_Unix/Linux Command line & Shell Scripting Bible.pdf (14.37 MB)
Linux_Unix/Sed & Awk.pdf (2.25 MB)
Linux_Unix/The Design of Unix Operating System.pdf (103.95 MB)
Linux_Unix/The Linux Command Line - A Complete Introduction.pdf (5.93 MB)
Linux_Unix/Understanding Linux Kernel.pdf (5.35 MB)
Linux_Unix/Understanding Linux Network Internals.pdf (11.49 MB)
Linux_Unix/UNIX and Linux System Administration Handbook (4th Edition).pdf (16.07 MB)
Linux_Unix/Unix Power Tools.pdf (8.40 MB)
Networking/Computer Networking - A Top-Down Approach.pdf (8.30 MB)
Networking/Data Communications and Networking By Behrouz A.Forouzan.pdf (10.84 MB)
Networking/Internetworking with TCP_IP Vol I.pdf (36.97 MB)
Networking/Mobile Communciations by Jochen Schiller.pdf (18.19 MB)
Networking/TCP-IP Illustrated Vol.3.pdf (40.02 MB)
Programming/64 Bit Intel Assembly Language Programming for Linux.pdf (4.89 MB)
Programming/Advanced Programming in the UNIX Environment.pdf (8.51 MB)
Programming/Alfred V. Aho - Data Structures and Algorithms.pdf (6.59 MB)
Programming/C/21st Century C.pdf (4.59 MB)
Programming/C/Advanced C.pdf (4.08 MB)
Programming/C/C Primer Plus.pdf (5.37 MB)
Programming/C/C Puzzle Book.pdf (2.24 MB)
Programming/C/C++ Primer Plus.pdf (6.43 MB)
Programming/C/Expert C Programming.pdf (2.15 MB)
Programming/C/Memory Management in C.pdf (415.49 KB)
Programming/C/Programming in C - Stephen G.Cochan.pdf (4.95 MB)
Programming/Linux System Programming Talking Directly to the Kernel and C Library.pdf (8.65 MB)
Programming/Network/Java Network Programming.pdf (11.24 MB)
Programming/Network/Network Programming in C.pdf (273.51 KB)
Programming/Network/Python Network Programming.pdf (5.08 MB)
Programming/Network/TCP IP Sockets in C.pdf (1.28 MB)
Programming/Network/Unix Network Programming Volume 1.pdf (13.70 MB)
Programming/Network/Unix Network Programming Volume 2.pdf (21.13 MB)
Programming/Perl/Learning Perl.pdf (8.84 MB)
Programming/Perl/Perl Pocket Reference.pdf (2.24 MB)
Programming/Perl/Programming Perl.pdf (15.67 MB)
Programming/Python/Learning Python.pdf (8.30 MB)
Programming/Python/Programming in Python.pdf (7.08 MB)
Programming/Python/Python for Unix Sys Admins.pdf (3.42 MB)
Programming/The Art of Assembly Language.pdf (22.22 MB)
Programming/The Linux Programming Interface.pdf (6.92 MB)
Security/Advanced Operating Systems and Kernel Applications Techniques and Technologies.pdf (6.2
Security/Backtrack5 Wireless Penetration Testing.pdf (16.59 MB)
Security/Big Book of ShiChuang Hacks.pdf (73.78 MB)
Security/Build Your Own Security Lab for Network Testing.pdf (8.58 MB)
Security/Crypto/Applied Cryptography - Bruce Schenier.pdf (2.77 MB)
Security/Crypto/Cryptography and Network Security - William Stallings.pdf (7.98 MB)
Security/Crypto/Encryption Solution Design and Deployment Considerations.pdf (1.81 MB)
Security/Crypto/Handbook Of Applied Cryptography.pdf (11.72 MB)
Security/Crypto/Implementing SSL_TLS Using Cryptography and PKI.pdf (4.51 MB)
Security/Crypto/Malicious Cryptography - Exposing Cryptovirology.pdf (29.06 MB)
Security/Hack Attacks Revealed.pdf (8.21 MB)
Security/Hackers Delight.pdf (24.49 MB)
Security/Hacking - The Art of Explotation.pdf (4.02 MB)
Security/Hacking Exposed.pdf (33.03 MB)
Security/Hacking Secret Ciphers with Python.pdf (6.61 MB)
Security/Hacking the Xbox.pdf (17.76 MB)
Security/Hacking ShiChuang.pdf (9.66 MB)
Security/Hands-On Ethical Hacking and Network Defense.pdf (83.36 MB)
Security/Hardening Linux.pdf (6.30 MB)
Security/Hardening the Operating System.pdf (1.41 MB)
Security/Kevin Mitnick - The Art of Deception.pdf (5.19 MB)
Security/Kevin Mitnick - The Art of Intrusion.pdf (3.07 MB)
Security/Letter & Word Frequencies - Major Languages.docx (13.23 KB)
Security/Linux Firewalls.pdf (6.51 MB)
Security/Linux Server Hacks.pdf (34.20 MB)
Security/Malware & Forensics/File System Forensic Analysis.pdf (4.03 MB)
Security/Malware & Forensics/Malware Analysts Cookbook.pdf (8.92 MB)
Security/Malware & Forensics/Practical Malware Analysis.pdf (9.45 MB)
Security/Malware & Forensics/Secrets of Reverse Engineering.pdf (8.56 MB)
Security/Malware & Forensics/The Giant Black Book of Computer Viruses.pdf (5.71 MB)
Security/Malware & Forensics/X86 Disassemblypdf (2.10 MB)
Security/Network Intrusion Detection.pdf (2.46 MB)
Security/P.Languages for Information Security.pdf (1.00 MB)
Security/Papers/Chip & Pin Broken_Smart Card Authentication.pdf (1.41 MB)
Security/Papers/DFA of Secret Key Cryptosystems.pdf (699.23 KB)
Security/Papers/Differential Cryptanalysis Of DES Like Cryptosystems.pdf (634.49 KB)
Security/Papers/Malicious Cryptography - Kleptographic Aspects (Academic Paper).pdf (167.57 KB)
Security/Papers/Modern Game Console Exploitation.pdf (221.06 KB)
Security/Papers/RSA Timing Attacks.pdf (79.51 KB)
Security/Papers/RSA Timing Attacks_Boneh.pdf (144.22 KB)
Security/Papers/Securing & Hardening Linux v1.0.pdf (118.88 KB)
Security/Papers/Timins Attacks on Public Key Crypto.pdf (206.71 KB)
Security/Papers/Wireless Hacking Tools.pdf (125.85 KB)
Security/Pen Testing/Advanced Penetration Testing For Highly Secured Environments.pdf (15.39 MB)
Security/Pen Testing/Basics of Penetration Testing.pdf (3.74 MB)
Security/Pen Testing/Counter Hack Reloaded.pdf (12.88 MB)
Security/Pen Testing/Using Google in Penetration Testing.pdf (14.91 MB)
Security/Pen Testing/Web Penetration Testing with Kali Linux.pdf (20.21 MB)
Security/Rootkits/A Guide to Kernel Exploitation.pdf (5.26 MB)
Security/Rootkits/BootRoot.pdf (437.03 KB)
Security/Rootkits/Designing BSD Rootkits.pdf (8.38 MB)
Security/Rootkits/Malware & Rootkits.pdf (10.98 MB)
Security/Rootkits/ManagedCodeRootkits.pdf (5.56 MB)
Security/Rootkits/Rootkit Arsenal.pdf (81.33 MB)
Security/Rootkits/Rootkits - Subverting the ShiChuang Kernel.pdf (2.29 MB)
Security/The Shellcoder's Handbook.pdf (8.74 MB)
Security/Tools/Metasploit - The Penetration Testers Guide.pdf (6.90 MB)
Security/Tools/Nmap Network Scanning.pdf (423.84 MB)
Security/Tools/Practical Packet Analysis.pdf (16.47 MB)
Security/Trusted Computer System Evaluation Criteria_DoD.pdf (423.11 KB)
Security/Trusted Computing for Military Applications.pdf (764.54 KB)
Security/Violent Python.pdf (6.89 MB)
Security/Wi Foo - The Secrets of Wireless Hacking.pdf (7.73 MB)
Security/ShiChuang Internals.pdf (21.69 MB)









eBook Collection for Aspiring Hackers









Direct Download

Tags: Collection, Aspiring, Hackers

Comments
Name:*
E-Mail:*
Add Comments:
Enter Code: *