Name Size
Parent Directory -
CySCA2014InABox/ -
Developpement/ -
Google-Hacking/ -
Guide SSI/ -
LINUX/ -
MCSA-MCSE/ -
Materiel/ -
Network-Mapper/ -
Neural Networks/ -
Reseau/ -
Securite/ -
Systeme/ -
Wireless/ -
amd_manuals/ -
intel_manuals/ -
15344.pdf 52K
2014-apt-study.pdf 166K
50-1337.pdf 14M
Advanced Persistent Threat Hacking, The Art & Science...pdf 11M
Alex R. Young, Marc Harter-Node.js in Practice-Manning (2015).pdf 7.3M
Allen Downey B.-Think Bayes-O'Reilly Media (2013).pdf 12M
Apress.Pro.Data.Visualization.Using.R.And.JavaScript.Jun.2013.ISBN.1430258063.pdf 8.8M
Apress.Pro.PHP.And.JQuery.Add.Quick.Smooth.And.Easy.Interactivity.pdf 11M
Bachaalany, Elias_ Koret, Joxean-The Antivirus Hacker's Handbook-Wiley (2015).pdf 5.7M
Basarat Ali Syed (auth.)-Beginning Node.js-Apress (2014).pdf 6.9M
Bastian Ballmann-Understanding Network Hacks_ Attack and Defense with Python-Springer (2015).pdf 11M
Beginning_Arduino.pdf 16M
Ben Clark-Rtfm_ Red Team Field Manual-CreateSpace Independent Publishing Platform (2014).pdf 10M
Building.Embedded.Linux.Systems.pdf 1.4M
Chris Sanders and Jason Smith (Auth.)-Applied Network Security Monitoring. Collection, Detection, and Analysis (2014).pdf 37M
CreateSpace.Publishing.Basic.Security.Testing.With.Kali.Linux.Jan.2014.ISBN.1494861275.pdf 14M
CybraryAdvancedPenSlides.pdf 2.3M
David Nathans-Designing and Building Security Operations Center-Syngress (2014).pdf 3.4M
Drew Conway, John Myles White-Machine Learning for Hackers-O'Reilly Media (2012).pdf 1.7M
Fernando Doglio (auth.)-Pro REST API Development with Node.js-Apress (2015).pdf 7.2M
FirstStrike_Plus.pdf 171K
HITB-Ezine-Issue-003.pdf 16M
HITB-Ezine-Issue-004.pdf 16M
Introduction To Software Reverse Engineering 2003.pdf 333K
Ivan Ristic-Bulletproof SSL and TLS_ Understanding and Deploying SSL_TLS.pdf 6.8M
J.J. MURPHY-ANALISI TECNICA DEI MERCATI FINANZIARI.pdf 15M
JavaScript by Example, 2nd Edition.pdf 27M
Jay Jacobs, Bob Rudis-Data-Driven Security_ Analysis, Visualization and Dashboards-Wiley (2014).pdf 8.2M
Jennifer Golbeck-Introduction to Social Media Investigation_ A Hands-on Approach-Syngress (2015).pdf 59M
Johnny Long, Bill Gardner, Justin Brown-Google Hacking for Penetration Testers-Syngress (2015).pdf 37M
Loraine Blaxter, Christina Hughes, Malcolm Tight-How to Research, 4th Edition -Open University Press (2010).pdf 1.2M
Lutz M.-Python pocket reference-O'Reilly (2014).pdf 2.4M
Manning.Secrets.Of.The.JavaScript.Ninja.Dec.2012.ISBN.193398869X.pdf 15M
Matthew A. Russell-Mining the social web.pdf 21M
Michael Collins-Network Security Through Data Analysis_ Building Situational Awareness-O'Reilly Media (2014).pdf 13M
No.Starch.The.Principles.Of.Object.Oriented.JavaScript.Feb.2014.ISBN.1593275404.pdf 2.6M
OReilly.20.Recipes.For.Programming.PhoneGap.Apr.2012.ISBN.1449319548.pdf 6.4M
OReilly.JavaScript.Testing.With.Jasmine.Apr.2013.ISBN.1449356370.pdf 1.4M
OReilly.Programming.JavaScript.Applications.Jul.2014.ISBN.1491950293.pdf 8.1M
Qing Li, Gregory Clark-Security Intelligence_ A Practitioner's Guide to Solving Enterprise Security Challenges-Wiley.pdf 22M
Recognition and Machine Learning-Springer.pdf 8.1M
Sam Newman-Building Microservices-O'Reilly Media (2015).pdf 4.8M
SitePoint.JQuery.Novice.To.Ninja.2nd.Edition.Feb.2012.ISBN.0987153013.pdf 16M
Sitepoint.Javascript.Jan.2015.ISBN.0992461251.pdf 4.8M
Steven Bird, Ewan Klein, Edward Loper-Natural Language Processing with Python-O'Reilly Media (2009).pdf 5.2M
Syngress.Advanced.Persistent.Threat.Nov.2012.ISBN.1597499498.pdf 7.1M
The_Art_of_Human_Hacking.pdf 6.1M
Usurpation.pdf 478K
Wes McKinney-Python for Data Analysis-O'Reilly Media (2012).pdf 14M
Wiley.The.Shellcoders.Handbook.2nd.Edition.Aug.2007.ISBN.047008023X.pdf 3.6M
Will Gragido, John Pirc-Cybercrime and Espionage_ An Analysis of Subversive Multi-Vector Threats-Syngress (2011).pdf 14M
Windows Server 2012 Inside Out V413HAV.pdf 33M
Yves Hilpisch-Python for Finance_ Analyze Big Financial Data-O'Reilly Media (2014).pdf 10M
ZenkRoulette 1 CR Pixie CMS.pdf 209K
ZenkRoulette 2 CR PluXml 5.0.1.pdf 223K
ZenkRoulette 3 CR SoftBB 0.1.3.pdf 224K
ZenkRoulette 4 CR Cacti 0.8.7g.pdf 233K
ZenkRoulette 5 CR B2evolution.pdf 233K
ZenkRoulette 6 CR Alex Guestbook Version 5.0.2.pdf 274K
[2002] - HTML & XHTML the definite guide 5 ed.chm 2.5M
[French ebook] hackin9_numero4_juillet-aout-2005.pdf 24M
advance-penetration-testing-kali-linux-training.pdf 35K
advanced-persistent-threat-id52631.pdf 82K
analisi_tecnica_rsi_relative_strentgh_index_significato_formula_intepretazione_tempi_ed_esempi.pdf 399K
b-advanced_persistent_threats_WP_21215957.en-us.pdf 3.0M
blackhat-RDP-hacking-terminal-services.pdf 104K
esg-apts-deep-discovery-whitepaper-en.pdf 482K
hakin9-metasploit-nutshell.pdf 7.4M
wireless_hacking_presentation.pdf 2.2M