Collection Of Various Computer Related Books

seeders: 0
leechers: 0
Added on November 26, 2006 by in Books
Torrent verified.



Collection Of Various Computer Related Books (Size: 1.51 GB)
 Collection Of Various Computer Related Books.daa1.51 GB
 Collection Of Various Computer Related Books.txt12 KB


Description

100 Linux Tips And Tricks.pdf

A Comparative Analysis of Methods of Defense against Buffer Overflow Attacks.pdf

A Little Bit about Buffer Overflows.pdf

Absolute Beginner's Guide to Networking, Fourth Edition.chm

Absolute Beginners Guide To Microsoft Windows XP, Second Edition.chm

Active Directory Cookbook, 2nd Edition.chm

Advanced Bash Shell Scripting Gude.pdf

Advanced buffer overflow exploits.txt

Advanced SQL Injection In SQL Server Applications.pdf

Advanced Wireless Networks - 4G Technologies.pdf

Alternate Data Streams in NTFS.pdf

An Example of the RSA Algorithm.pdf

Analysis of a Telnet Session Hijack via Spoofed MAC Addresses.pdf

Anti-Hacker Tool Kit, Second Edition.chm

Apache Phrase Book - Essential Code and Commands.chm

Applied Microsoft .Net Framework Programming.pdf

Beating IT Risks.pdf

Blindfolded SQL Injection.pdf

Bluetooth Security.pdf

Broadband Packet Switching Technologies.pdf

Broadband Telecommunications Handbook.pdf

Buffer Overflow Attacks - Detect, Exploit, Prevent.pdf

Building DMZs for Enterprise Networks.pdf

Bulletproof Wireless Security - GSM, UMTS, 802.11, and Ad Hoc Security (Communications ineering).pdf

Bypassing Firewalls Tools and Techniques.pdf

C# Programming Primer.pdf

C++ Cookbook.chm

C++ How to Program, Fifth Edition.chm

Cabling - The Complete Guide to Network Wiring.pdf

Certified Ethical Hacker Exam Prep.chm

Cisco - Password Recovery Procedures.pdf

CISSP - Certified Information Systems Security Professional Study Guide, Third Edition.pdf

Cleaning Windows XP For Dummies.pdf

CompTIA Security+ Certification.chm

Computer Networks, Fourth Edition.chm

Content Networking - Architecture, Protocols, and Practice.pdf

Cross-Site Scripting.pdf

Crypto - How the Code Rebels Beat the Government - Saving Privacy in the Digital Age.pdf

Cryptography FAQ's.txt

CYA - Securing Exchange Server 2003 and Outlook Web Access.pdf

CYA - Securing IIS 6.0.pdf

Cyber Terrorism - Political And Economic Implications.pdf

Datacom overview.pdf

DDOS Attack Tools.pdf

Defeating Sniffers and Intrusion Detection Systems.txt

Defend I.T. - Security by Example.chm

Designing and Developing Scalable IP Networks.pdf

Designing Storage Area Networks - A Practical Reference for Implementing Fibre Channel IP.chm

Detection Of Promiscuous Nodes Using ARP Packets.pdf

DNS and BIND, 5th Edition.chm

DNS on Windows Server 2003.chm

DNS Spoofing.txt

Don't Click on the Blue E!.chm

Encryption in a Windows Environment - EFS File, 802.1x Wireless, IPSec Transport, and IME Exchange.chm

Enterprise SOA - Designing IT for Business Innovation.chm

Ethereal Packet Sniffing.chm

Ethernet Networks - Design, Implementation, Operation, Management (Fourth Edition).pdf

Ethical Hacking & Countermeasures.pdf

Ethical Hacking Agreement.doc

Exploiting Software - How to Break Code.pdf

Exploiting Stack Based Buffer Overflows.txt

FAQ Network Intrusion Detection Systems.pdf

Firefox Hacks.chm

Firewalking - A Traceroute-Like Analysis of IP Packet Responses to Determine Gateway essing.pdf

Fixing Windows XP Annoyances.chm

FreeBSD Handbook 2006.pdf

General Guidelines On Random Query Evaluation.pdf

Google A Hacker's Best Friend.pdf

Google Hacking for Penetration Testers.pdf

Google Secrets - How To Get A Top 10 Ranking.pdf

Google Spamguide.pdf

GRC.com Denial Of Service Attack.pdf

Groupware & Security.pdf

GSM and GPRS.pdf

Guide to Elliptic Curve Cryptography.pdf

Guide To Using Google Discover Google's Buried Treasure.pdf

Hack Attacks Revealed A Complete Reference With Custom Security Hacking Toolkit.chm

Hack I.T. - Security Through Penetration Testing.chm

Hack Proofing Linux.pdf

Hacker Disassembling Uncovered.chm

Hacker Web Exploitation Uncovered.chm

Hacker's Delight.chm

Hacker's Desk Reference.pdf

Hackers Beware.pdf

Hacking - The Art of Exploitation.chm

Hacking a Terror Network.pdf

Hacking Exposed Web Applications.pdf

Hacking Firefox - More Than 150 Hacks, Mods, and Customizations.pdf

Hacking GPS.pdf

Hacking Windows XP.pdf

Hacking Wireless Networks For Dummies.pdf

How SQL Slammer Works.txt

How To Build A Freebsd-Stable Firewall With Ipfilter.pdf

How to Cheat at Designing a Windows Server 2003 Active Directory Infrastructure.pdf

How to develop a Network Security Policy.pdf

How to write Buffer Overflows.pdf

ICMP Crafting and other uses.pdf

Illustrated TCPIP - A Graphic Guide to the Protocol Suite.chm

Illustrated Windows XP 101 Hot Tips.pdf

Information Security Management Handbook, Fifth Edition.pdf

Information Systems - The State of the Field.pdf

Inside Network Perimeter Security, Second Edition.chm

Insider Threat - Protecting The Enterprise From Sabotage, Spying, And Theft.pdf

Internet Denial of Service - Attack and Defense Mechanisms.chm

Internet Security - A Jumpstart for Systems Administrators and IT Managers.chm

Introduction To Algorithms 2nd Edition Solutions (Instructors.Manual).pdf

Intrusion Prevention Fundamentals.chm

IP Addressing and Subnetting, Including IPv6.chm

IP in Wireless Networks.chm

IP Storage Networking - Straight to the Core.chm

IPSec - The New Security Standard for the Internet, Intranets, and Virtual Private orks.chm

IPSec VPN Design.chm

IPv6 Essentials.pdf

IPv6 Network Programming.pdf

ISDN - Integrated Services.pdf

Java.pdf

Kerberos - The Definitive Guide.chm

LAN.pdf

LDAP System Administration.chm

Learning PHP and MySQL.chm

Linux Basic Commands.pdf

Linux Command Directory.pdf

Linux Complete Command Reference.pdf

Linux in a Nutshell, 5th Edition .chm

Linux Kernel Development, 2nd Edition.chm

Linux Network Administrator's Guide, Second Edition.pdf

Linux Power Tools.chm

Linux Quick Fix Notebook.chm

Linux Server Hacks.pdf

Linux Timesaving Techniques For Dummies.pdf

Linux Troubleshooting for System Administrators and Power Users.chm

Linux+ Certification Bible.pdf

Malware - Fighting Malicious Code.chm

Man in the Middle Attack using DHCP.txt

Mastering Active Directory for Windows Server 2003.chm

Methods of Hacking - Social Engineering.pdf

Microsoft IIS 6.0 Administrator's Pocket Consultant.chm

Microsoft Internet Security and Acceleration (ISA) Server 2004 Administrator's Pocket sultant.chm

Microsoft SQL Server 2005 Implementation and Maintenance.pdf

Microsoft Windows Scripting Self-Paced Learning Guide.pdf

Microsoft Windows Server 2003 Administrator's Pocket Consultant.chm

Microsoft Windows XP Networking Inside Out.pdf

Microsoft Windows XP Power Toolkit.chm

MIT Encyclopedia Of The Cognitive Sciences.pdf

Modern Cryptography - Theory and Practice.pdf

Moving to Linux - Kiss the Blue Screen of Death Goodbye!.chm

MS Press - Microsoft Encyclopedia of Security.pdf

MS Press Windows Server 2003 Administrators Companion 2nd Edition March 2006.pdf

Nagios - System and Network Monitoring.pdf

Nessus, Snort, & Ethereal Power Tools - Customizing Open Source Security Applications.pdf

Netware Hacking.pdf

Network Intrusion Detection, Third Edition.pdf

Network Management.pdf

Network Security Assessment.chm

Network Security Hacks.chm

Network Security with OpenSSL.pdf

Network Tutorial, Fifth Edition.chm

O'Reilly - Google Hacks 2nd Edition.chm

Open Source Network Administration.chm

Open-Source Security Testing Methodology Manual.pdf

PC Disaster and Recovery.chm

PC Hardware in a Nutshell, Second Edition.chm

PC networks.pdf

PC Upgrade and Repair Bible Desktop Edition.pdf

Peer to Peer - Harnessing the Power of Disruptive Technologies.pdf

Penetration Testing Templates.pdf

Perl Medic - Transforming Legacy Code.chm

Placing Backdoors Through Firewalls.pdf

Practical VoIP Security.pdf

Pro DNS and BIND.pdf

Programming Applications for Microsoft Windows, Fourth Edition.chm

Programming the Microsoft Windows Driver Model, Second Edition.chm

Programming with Microsoft Visual C++ .NET, Sixth Edition.chm

Python in A Nutshell, 2nd Edition.chm

Real 802.11 Security - Wi-Fi Protected Access and 802.11i.chm

Red Hat Fedora 5 Unleashed.chm

Red Hat Linux Networking and System Administration.pdf

Red Hat Linux Security and Optimization.pdf

Reversing - Secrets of Reverse Engineering.pdf

RHCE Red Hat Certified Engineer Linux Study Guide (Exam RH302), Fourth Edition.chm

Routers and Networking.pdf

RSA Encryption Algorithm, a simple example.pdf

Sams Teach Yourself HTML in 10 Minutes, Fourth Edition.chm

Sams Teach Yourself Microsoft SQL Server 2005 Express in 24 Hours.chm

Sarbanes-Oxley - IT Compliance Using COBIT and Open Source Tools.chm

Securing Linux Servers for Service Providers.pdf

Security and Usability - Designing Secure Systems that People Can Use.chm

Security Assessment - Case Studies for Implementing the NSA IAM.pdf

Security Patterns - Integrating Security and Systems Engineering.pdf

Security Warrior.chm

Skinning Windows XP.chm

Skype - The Definitive Guide.chm

Skype Hacks.chm

Sniffer Pro - Network Optimization and Troubleshooting Handbook.pdf

Snort 2.1 - Intrusion Detection, Second Edition.pdf

Social Engineering – A Real Story in a Multi-national Company.pdf

Software Abstractions - Logic, Language, and Analysis.pdf

Software Fortresses - Modeling Enterprise Architectures.chm

Software Piracy Exposed.pdf

Software Requirements, Second Edition.chm

Solaris 10 System Administration Exam Prep.chm

Special Ops - Host and Network Security for Microsoft, UNIX, and Oracle.pdf

Spring Into Linux.chm

SQL Injection, Are Your Web Applications Vulnerable.pdf

SSL and TLS Essentials - Securing the Web.pdf

Steal This Computer Book 3 - What They Won't Tell You About the Internet.chm

Steal This File Sharing Book - What They Won't Tell You About File Sharing.chm

Stealing the Network - How to Own a Continent.chm

Stealing The Network - How To Own The Box.pdf

Storage Networking Protocol Fundamentals.chm

Strategic Information Security.chm

SUSE Linux.chm

Switching to VoIP.chm

SysAdmin - Security Tools in FreeBSD.pdf

TCP IP Foundations.pdf

TCPIP.pdf

Teach Yourself The C# Language in 21 Days.pdf

Terminal Services for Microsoft Windows Server 2003 - Advanced Technical Design e.chm

The A+ Certification and PC Repair Handbook.chm

The A+ Exams Guide - (Exam 220-301, 220-302) (TestTaker's Guide Series).chm

The Art of Computer Virus Research and Defense.chm

The Best Damn Firewall Book Period.pdf

The Best Damn Windows Server 2003 Book Period.pdf

The BitTorrent Bible.pdf

The Database Hacker's Handbook - Defending Database Servers.chm

The Ethical Hack - A Framework for Business Value Penetration Testing.pdf

The Everyday Internet All-In-One Desk Reference For Dummies.pdf

The Hacker Ethic.pdf

The Internet and its applications.pdf

The Practical Guide to HIPAA Privacy and Security Compliance.chm

The Shellcoder's Handbook - Discovering and Exploiting Security Holes.chm

The SMB Man-In-The-Middle Attack.pdf

The Tao of Network Security Monitoring - Beyond Intrusion Detection.chm

The XP Files - Windows' Hidden Tools for Secure Sharing, Communication, and aboration.pdf

Tripwire_exploit_poster.pdf

Understanding Buffer Overruns.txt

Understanding IPv6.chm

UNIX Power Tools, Third Edition.chm

Upgrading and Repairing Networks, Fourth Edition.chm

Upgrading and Repairing Pcs, 17th Edition.chm

Upgrading and Repairing Servers.chm

Using Binary Search with SQL Injection.txt

VBE Document Property Buffer Overflow.txt

Video Conferencing Over IP - Configure, Secure, and Troubleshoot.pdf

Voice Over 802.11.pdf

WAN, Wide Area Networks.pdf

WarDriving Drive, Detect, Defend - A Guide to Wireless Security.chm

WebJacking.pdf

Website Secrets Unleash the Power of, Google, Amazon, eBay & more.pdf

Well Known Trojans and Their Ports.pdf

Why Wireless Data.pdf

Wi-Foo - The Secrets of Wireless Hacking.chm

Win32 Stack Based Buffer Overflow Walkthrough.txt

Windows Forensics and Incident Recovery.chm

Windows NT File System Internals - A Developers Guide.pdf

Windows Server 2003 Security Cookbook.chm

Windows Server 2003 Security Infrastructures - Core Security Features.chm

Windows XP Bible.pdf

Windows XP for Power Users - Power Pack.pdf

Windows XP Services That Can Be Disabled.pdf

Winternals - Defragmentation, Recovery, and Administration Field Guide.pdf

Wireless and Mobile Data.pdf

Wireless Hacks.chm

Wireless WAN System.pdf

WWW techniques.pdf

XP Tips & Tweaks.pdf

Related Torrents

torrent name size seed leech

Sharing Widget


Download torrent
1.51 GB
seeders:0
leechers:0
Collection Of Various Computer Related Books