首页
磁力链接怎么用
한국어
English
日本語
简体中文
繁體中文
Computer Security Enthusiast
文件类型
收录时间
最后活跃
资源热度
文件大小
文件数量
2008-11-20 20:35
2024-11-1 02:36
88
3.02 GB
379
磁力链接
magnet:?xt=urn:btih:914FA10E4026771E4056E09EE5517D49474AC0F8
迅雷链接
thunder://QUFtYWduZXQ6P3h0PXVybjpidGloOjkxNEZBMTBFNDAyNjc3MUU0MDU2RTA5RUU1NTE3RDQ5NDc0QUMwRjhaWg==
二维码链接
种子下载(838888不存储任何种子文件)
种子下载线路1(迅雷)--推荐
种子下载线路2(比特彗星)
种子下载线路3(torcache)
3条线路均为国内外知名下载网站种子链接,内容跟本站无关!
相关链接
Computer
Security
Enthusiast
文件列表
101 Spy Gadgets for the Evil Genius.pdf.7z
40.98MB
1337 h4x0r h4ndb00k.chm.7z
1.82MB
19 Deadly Sins of Software Security - Programming Flaws & How to Fix Them.chm.7z
1.37MB
22 Radio & Receiver Projects for the Evil Genius.pdf.7z
5.71MB
50 Awesome Auto Projects for the Evil Genius.pdf.7z
18.48MB
51 High-Tech Practical Jokes for the Evil Genius.pdf.7z
10.03MB
802.11 Security.pdf.7z
816.72KB
A Classical Introduction to Cryptography Exercise Book.pdf.7z
7.75MB
A Technical Guide to IPSec Virtual Private Networks.pdf.7z
4.76MB
AAA & Network Security for Mobile Access - Radius, Diameter, EAP, PKI, & IP Mobility.pdf.7z
3.45MB
Absolute OpenBSD - UNIX for the Practical Paranoid.chm.7z
1.02MB
Access Denied - The Practice & Policy of Global Internet Filtering.pdf.7z
6.37MB
Active Defense - A Comprehensive Guide to Network Security.pdf.7z
5.8MB
Administering & Securing the Apache Server.chm.7z
13.61MB
Advances in Elliptic Curve Cryptography.pdf.7z
1.79MB
Aggressive Network Self-Defense.pdf.7z
80.93MB
Ajax Security.pdf.7z
11.42MB
Anti-Hacker Tool Kit, 2nd Ed..chm.7z
29.17MB
Anti-Hacker Tool Kit, 3rd Ed..chm.7z
34.84MB
Apache Security.chm.7z
1.61MB
Applied Cryptanalysis - Breaking Ciphers in the Real World.pdf.7z
16.36MB
Applied Cryptography & Network Security - 2nd International Conference, ACNS 2004.pdf.7z
8.14MB
Applied Cryptography - Protocols, Algorithms, & Source COde in C, 2nd Ed..chm.7z
3.64MB
AVIEN Malware Defense Guide for the Enterprise.pdf.7z
4.96MB
Beginning Cryptography with Java.chm.7z
2.47MB
BigNum Math - Implementing Cryptographic Multiple Precision Arithmetic.pdf.7z
3.23MB
Biometrics & Network Security.chm.7z
1.11MB
Black Hat Physical Device Security - Exploiting Hardware & Software.pdf.7z
76.12MB
Blackjacking - Security Threats to BlackBerry Devices, PDAs, & Cell Phones in the Enterprise.pdf.7z
9.02MB
Bluetooth Security.pdf.7z
691.85KB
Botnets - The Killer Web App.pdf.7z
5.27MB
Brute Force - Cracking the Data Encryption Standard.pdf.7z
1.53MB
Buffer Overflow Attacks - Detect, Exploit, Prevent.pdf.7z
2.9MB
Building DMZs for Enterprise Networks.pdf.7z
8.14MB
Building Internet Firewalls, 2nd Ed..pdf.7z
4.66MB
Building Secure Servers with Linux.chm.7z
1.16MB
Building Secure Servers with Linux.pdf.7z
2.51MB
Building Secure Wireless Networks with 802.11.pdf.7z
5.54MB
Bulletproof Wireless Security - GSM, UMTS, 802.11, & Ad Hoc Security.pdf.7z
2.35MB
CCNA Security Official Exam Certification Guide [Exam 640-553].pdf.7z
13.16MB
CCSP Cisco Secure PIX Firewall Advanced Exam Certification Guide.pdf.7z
10.45MB
CD & DVD Forensics.pdf.7z
4.4MB
CD Cracking Uncovered - Protection Against Unsanctioned CD Copying.chm.7z
9.08MB
CEH - Official Certified Ethical Hacker Review Guide [Exam 312-50].pdf.7z
3.1MB
CEH Official Certified Ethical Hacker Review Guide.pdf.7z
3.1MB
Certified Ethical Hacker Exam Prep [Exam 312-50].chm.7z
8.33MB
Certified Ethical Hacking Official Course Material [Exam 312-50].chm.7z
14.29MB
Cisco ASA, PIX, & FWSM Firewall Handbook, 2nd Ed..pdf.7z
7.48MB
Cisco IOS Access Lists.pdf.7z
1.28MB
Cisco NAC Appliance - Enforcing Host Security with Clean Access.pdf.7z
21.43MB
Cisco Network Security Little Black Book.pdf.7z
2.77MB
Cisco Router Firewall Security.chm.7z
5.83MB
Cisco Secure Firewall Services Module (FWSM).pdf.7z
1.92MB
Cisco Secure Internet Security Solutions.pdf.7z
6.22MB
Cisco Security Professional's Guide to Secure Intrusion Detection Systems.pdf.7z
12.16MB
Cisco Wireless LAN Security.chm.7z
5.82MB
Codes & Ciphers - Julius Caesar, the Enigma, & the Internet.pdf.7z
1.02MB
Codes - The Guide to Secrecy from Ancient to Modern Times.pdf.7z
4.68MB
Combating Spyware in the Enterprise.pdf.7z
7.14MB
Complexity & Cryptography - An Introduction.pdf.7z
1.09MB
CompTIA Security+ Study Guide & Practice Exam, 2nd Ed. [Exam JK0-010].pdf.7z
9.11MB
Computer & Intrusion Forensics.pdf.7z
2.56MB
Computer Network Security.pdf.7z
21.45MB
Computer Security & Cryptography.pdf.7z
8.34MB
Computer Security Basics, 2nd Ed..chm.7z
1.65MB
Computer Security, Privacy, & Politics - Current Issues, Challenges, & Solutions.pdf.7z
1.63MB
Computer Viruses & Malware.pdf.7z
9.15MB
Computer Viruses - From Theory to Applications.pdf.7z
2.28MB
Computer Viruses for Dummies.pdf.7z
2.33MB
Configuring Juniper Networks NetScreen & SSG Firewalls.pdf.7z
9.33MB
Configuring NetScreen Firewalls.pdf.7z
5.93MB
Configuring SonicWALL Firewalls.pdf.7z
10.82MB
Contemporary Cryptography.pdf.7z
2.37MB
Core Security Patterns - Best Practices & Strategies for J2EE, Web Services, & Identity Management.chm.7z
7.3MB
Covert Java - Techniques for Decompiling, Patching, & Reverse Engineering.pdf.7z
2.08MB
Crackproof Your Software - Protect Your Software Against Crackers.pdf.7z
7.11MB
Crimeware - Understanding New Attacks & Defenses.chm.7z
10.42MB
Cryptography & Network Security, 4th Ed..chm.7z
12.52MB
Cryptography & Security Services - Mechanisms & Applications.pdf.7z
4.4MB
Cryptography - A Very Short Introduction.chm.7z
1.31MB
Cryptography for Developers.pdf.7z
2.67MB
Cryptography for Dummies.chm.7z
4.02MB
Cryptography in C & C++.chm.7z
3.5MB
Cryptology Unlocked.pdf.7z
1.81MB
Cyber Crime Investigator's Field Guide.pdf.7z
1.54MB
Cyber Forensics - A Field Manual for Collecting, Examining, & Preserving Evidence of Computer Crimes.pdf.7z
3.5MB
Decrypted Secrets - Methods & Maxims of Cryptology, 4th, Revised & Extended Ed..pdf.7z
11.45MB
Defend I.T. - Security by Example.chm.7z
1.33MB
Defense & Detection Strategies against Internet Worms.pdf.7z
1.02MB
Deploying Secure 802.11 Wireless Networks with Microsoft Windows.chm.7z
6.91MB
Designing BSD Rootkits - An Introduction to Kernel Hacking.pdf.7z
5.35MB
Developer's Guide to Web Application Security.pdf.7z
9.62MB
Disassembling Code - IDA Pro & SoftICE.chm.7z
4.16MB
Effective Oracle Database 10g Security by Design.chm.7z
2.98MB
Electronic Gadgets for the Evil Genius - 28 Build-It-Yourself Projects.pdf.7z
54.93MB
EnCase Computer Forensics - The Official EnCE-EnCase Certified Examiner Study Guide, 2nd Ed..pdf.7z
13.35MB
Encyclopedia of Cryptology.chm.7z
2.26MB
End-to-End Network Security - Defense-in-Depth.pdf.7z
11.07MB
Enemy at the Water Cooler - Real-Life Stories of Insider Threats & Enterprise Security Management Countermeasures.pdf.7z
4.92MB
Enterprise Java Security - Building Secure J2EE Applications.chm.7z
3.93MB
Ethereal Packet Sniffing.chm.7z
17.3MB
Expert Web Services Security in the .NET Platform.chm.7z
21.64MB
Exploiting Software - How to Break Code.pdf.7z
4.44MB
Fast Track to Security.pdf.7z
6.16MB
File System Forensic Analysis.chm.7z
3.84MB
Firewall Fundamentals.chm.7z
10.16MB
Firewall Policies & VPN Configurations.pdf.7z
5.58MB
Firewalls & Internet Security - Repelling the Wily Hacker, 2nd Ed..pdf.7z
56.81MB
Firewalls - Jumpstart for Network & Systems Administrators.pdf.7z
1.47MB
Firewalls for Dummies, 2nd Ed..pdf.7z
6.77MB
Forensic Computer Crime Investigation.pdf.7z
2.25MB
Forensic Computing - A Practitioner's Guide, 2nd Ed..pdf.7z
9.02MB
Foundations of Computer Security.pdf.7z
1.79MB
Foundations of Cryptography - A Primer.pdf.7z
748.64KB
Foundations of Cryptography - Vol. 1, Basic Tools.pdf.7z
2.34MB
Foundations of Mac OS X Leopard Security.pdf.7z
20.41MB
Foundations of Security - What Every Programmer Needs to Know.pdf.7z
2.18MB
Fundamentals of Cryptology - A Professional Reference & Interactive Tutorial.pdf.7z
26.18MB
Fuzzing - Brute Force Vulnerability Discovery.pdf.7z
42.05MB
Google Hacking for Penetration Testers, Vol. 2.pdf.7z
11.66MB
Google Hacking for Penetration Testers.pdf.7z
9.62MB
Gray Hat Hacking - The Ethical Hacker's Handbook, 2nd Ed..pdf.7z
8.03MB
Guide to Elliptic Curve Cryptography.pdf.7z
2.36MB
Hack Attacks Revealed - A Complete Reference with Custom Security Hacking Toolkit.chm.7z
6.35MB
Hack I.T. - Security through Penetration Testing.chm.7z
4.62MB
Hack Proofing ColdFusion - The Only Way to Stop a Hacker Is to Think Like One.pdf.7z
6.45MB
Hack Proofing Linux - Your Guide to Open Source Security.pdf.7z
9.74MB
Hack Proofing Sun Solaris 8 - Protect Your Solaris Network from Attack.pdf.7z
5.51MB
Hack Proofing Windows 2000 Server.pdf.7z
9.53MB
Hack Proofing XML - The Only Way to Stop a Hacker Is to Think Like One.pdf.7z
5.53MB
Hack Proofing Your E-Commerce Site - The Only Way to Stop a Hacker Is to Think Like One.pdf.7z
6MB
Hack Proofing Your Identity in the Information Age - Protect Your Family on the Internet!.pdf.7z
7.1MB
Hack Proofing Your Network, 2nd Ed. - The Only Way to Stop a Hacker Is to Think Like One.pdf.7z
7.35MB
Hack Proofing Your Network.pdf.7z
2.48MB
Hack Proofing Your Web Applications - The Only Way to Stop a Hacker Is to Think Like One.pdf.7z
7.18MB
Hack Proofing Your Wireless Network - Protect Your Wireless Network from Attack.pdf.7z
5.51MB
Hack the Stack - Using Snort & Ethereal to Master the 8 Layers of an Insecure Network.pdf.7z
5.99MB
Hacker Debugging Uncovered.chm.7z
14.42MB
Hacker Disassembling Uncovered.chm.7z
4.77MB
Hacker Linux Uncovered.chm.7z
4.51MB
Hacker Web Exploitation Uncovered.chm.7z
554.28KB
Hacker's Challenge - Test Your Incident Response Skills Using 20 Scenarios.pdf.7z
3.91MB
Hacker's Delight.chm.7z
2.1MB
Hackers - Heroes of the Computer Revolution.pdf.7z
2.02MB
Hackers Beware - Defending Your Network from the Wiley Hacker.pdf.7z
4.31MB
Hacking - The Art of Exploitation, 2nd Ed..chm.7z
4.71MB
Hacking - The Art of Exploitation.chm.7z
1.4MB
Hacking a Terror Network - The Silent Threat of Covert Channels.pdf.7z
6.25MB
Hacking Exposed, 2nd Ed. - Network Security Secrets & Solutions.pdf.7z
7.41MB
Hacking Exposed-Cisco Networks - Cisco Security Secrets & Solutions.chm.7z
9.92MB
Hacking Exposed-Linux - Linux Security Secrets & Solutions.pdf.7z
88.82MB
Hacking Exposed-Network Security - Secrets & Solutions, 2nd Ed..pdf.7z
7.41MB
Hacking Exposed-Network Security - Secrets & Solutions, 3rd Ed..pdf.7z
4.66MB
Hacking Exposed-VoIP - Voice Over IP Security Secrets & Solutions.chm.7z
16.53MB
Hacking Exposed-Web 2.0 - Web 2.0 Security Secrets & Solutions.pdf.7z
3.94MB
Hacking Exposed-Web Applications - Web Application Security Secrets & Solutions.pdf.7z
4MB
Hacking Exposed-Windows - Windows Security Secrets & Solutions, 3rd Ed..pdf.7z
4.42MB
Hacking Exposed-Wireless - Wireless Security Secrets & Solutions.chm.7z
12.37MB
Hacking for Dummies, 2nd Ed..pdf.7z
4.08MB
Hacking for Dummies.pdf.7z
5.32MB
Hacking Wireless Networks for Dummies.pdf.7z
7.71MB
HackNotes - Linux & Unix Security Portable Reference.pdf.7z
1.76MB
HackNotes - Network Security Portable Reference.pdf.7z
1.98MB
HackNotes - Web Security Portable Reference.pdf.7z
1.87MB
HackNotes - Windows Security Portable Reference.pdf.7z
2.74MB
Halting the Hacker - A Practical Guide to Computer Security, 2nd Ed..chm.7z
628.52KB
Handbook of Digital & Multimedia Forensic Evidence.pdf.7z
1.74MB
Hardening Apache.chm.7z
1.06MB
Hardening Linux.chm.7z
9.48MB
Hardening Linux.pdf.7z
2.11MB
Hardening Network Infrastructure.chm.7z
17.12MB
Hardening Windows Systems.chm.7z
23.73MB
Hardening Windows, 2nd Ed..pdf.7z
3.85MB
Hardening Windows.chm.7z
1.71MB
Home Network Security Simplified.chm.7z
14.31MB
Honeypots - Tracking Hackers.chm.7z
2.5MB
Honeypots for Windows.chm.7z
16.2MB
How to Cheat at Configuring Open Source Security Tools - The Perfect Reference for the Multitasked SysAdmin.pdf.7z
6.29MB
How to Cheat at Securing Linux - The Perfect Reference for the Multitasked SysAdmin.pdf.7z
8.14MB
How to Cheat at VolP Security.pdf.7z
40.86MB
Implementing Email Security & Tokens - Current Standards, Tools, & Practices.pdf.7z
1.42MB
Implementing NAP & NAC Security Technologies - The Complete Guide to Network Access Control.pdf.7z
5.33MB
Implementing SSH - Strategies for Optimizing the Secure Shell.pdf.7z
5.75MB
Incident Response & Computer Forensics, 2nd Ed..pdf.7z
9.34MB
Incident Response - Computer Forensics Toolkit.pdf.7z
4.15MB
Information Security Policies & Procedures - A Practitioner's Reference, 2nd Ed..pdf.7z
1.6MB
InfoSec Career Hacking - Sell Your Skillz, Not Your Soul.pdf.7z
82.21MB
InfoSecurity 2008 Threat Analysis.pdf.7z
9.38MB
Inside Java 2 Platform Security, 2nd Ed. - Architecture, API Design, & Implementation.chm.7z
1.17MB
Inside Network Perimeter Security, 2nd Ed..chm.7z
8.65MB
Inside the Spam Cartel - Trade Secrets from the Dark Side.chm.7z
6.04MB
Insider Attack & Cyber Security - Beyond the Hacker.pdf.7z
2.19MB
Insider Threat - Protecting the Enterprise from Sabotage, Spying, & Theft.pdf.7z
4.03MB
Internet Denial of Service - Attack & Defense Mechanisms.chm.7z
2.06MB
Internet Forensics.chm.7z
839.55KB
Internet Security - Cryptographic Principles, Algorithms, & Protocols.pdf.7z
1.84MB
Introduction to Communication Electronic Warfare Systems.pdf.7z
40.89MB
Introduction to Cryptography - Principles & Applications, 2nd Ed..pdf.7z
2.02MB
Intrusion Detection & Prevention.chm.7z
3.16MB
Intrusion Prevention Fundamentals.chm.7z
2.12MB
Jeff Duntemann's Drive-By Wi-Fi Guide.chm.7z
12.74MB
Juniper Networks Field Guide & Reference.chm.7z
3.13MB
Juniper Networks Secure Access SSL VPN Configuration Guide.pdf.7z
16.26MB
Kismet Hacking.pdf.7z
3.77MB
LAN Switch Security - What Hackers Know About Your Switches.pdf.7z
2.64MB
Linux Firewalls - Attack Detection & Response with iptables, psad, & fwsnort.pdf.7z
3.85MB
Linux Network Security.chm.7z
6.52MB
Linux Security Cookbook.chm.7z
643.31KB
Mac OS X Maximum Security.chm.7z
3.71MB
Mac OS X Security.chm.7z
4.63MB
Mainframe Basics for Security Professionals - Getting Started with RACF.pdf.7z
3.42MB
Malicious Cryptography - Exposing Cryptovirology.pdf.7z
2.19MB
Malware - Fighting Malicious Code.chm.7z
6.39MB
Malware Detection.pdf.7z
14.25MB
Malware Forensics - Investigating & Analyzing Malicious Code.pdf.7z
17.22MB
Managing Cisco Network Security.pdf.7z
4.42MB
Managing Security with Snort & IDS Tools.chm.7z
1.74MB
Mastering FreeBSD & OpenBSD Security.chm.7z
1.33MB
Mastering Network Security.pdf.7z
2.36MB
Mastering Windows Network Forensics & Investigation.chm.7z
45.71MB
Maximum Linux Security, 2nd Ed..pdf.7z
4MB
Maximum Security, 4th Ed..chm.7z
2.93MB
Maximum Wireless Security.chm.7z
4.24MB
Metasploit Toolkit for Penetration Testing, Exploit Development, & Vulnerability Research.pdf.7z
3.58MB
Microsoft Encyclopedia of Security.pdf.7z
7.27MB
Microsoft Forefront Security Administration Guide.pdf.7z
16.17MB
Microsoft Windows Security Inside Out for Windows XP & Windows 2000.chm.7z
19.47MB
Mission Critical! Internet Security.pdf.7z
3.5MB
Mobile & Wireless Network Security & Privacy.pdf.7z
2.93MB
Mobility, Data Mining, & Privacy - Geographic Knowledge Discovery.pdf.7z
3.36MB
Modern Cryptography - Theory & Practice.pdf.7z
11.07MB
MORE Electronic Gadgets for the Evil Genius - 40 New Build-It-Yourself Projects.pdf.7z
56.02MB
Multicast & Group Security.pdf.7z
2.36MB
Multimedia Forensics & Security.pdf.7z
10.42MB
Multimedia Security Technologies for Digital Rights Management.pdf.7z
2.66MB
Nessus Network Auditing, 2nd Ed..pdf.7z
8.72MB
Nessus, Snort, & Ethereal Power Tools - Customizing Open Source Security Applications.pdf.7z
4.32MB
Netcat Power Tools.pdf.7z
8.52MB
Network Administrator Street Smarts - A Real World Guide to CompTIA Network+ Skills.pdf.7z
9.75MB
Network Intrusion Detection, 3rd Ed..pdf.7z
2.03MB
Network Perimeter Security - Building Defense In-Depth.chm.7z
3.56MB
Network Security - Know It All.pdf.7z
4.96MB
Network Security Assessment - From Vulnerability to Patch.pdf.7z
7.5MB
Network Security Assessment - Know Your Network, 2nd Ed..pdf.7z
4.07MB
Network Security Assessment - Know Your Network.chm.7z
1.68MB
Network Security Bible.pdf.7z
5.58MB
Network Security Hacks - 100 Industrial-Strength Tips & Tools.chm.7z
1.62MB
Network Security Hacks - Tips & Tools for Protecting Your Privacy, 2nd Ed..chm.7z
3.88MB
Network Security Illustrated.pdf.7z
8.43MB
Network Security JumpStart.pdf.7z
1.42MB
Network Security Technologies & Solutions.chm.7z
26.27MB
Network Security Tools - Writing, Hacking, & Modifying Security Tools.chm.7z
1.29MB
Network Security with OpenSSL.pdf.7z
1.28MB
Network Warrior.pdf.7z
5.19MB
No Tech Hacking - A Guide to Social Engineering, Dumpster Diving, & Shoulder Surfing.pdf.7z
20.59MB
Open Source Fuzzing Tools.pdf.7z
2.91MB
Open Source Security Tools - A Practical Guide to Security Applications.chm.7z
5.67MB
Oracle Security.chm.7z
1.3MB
OS X Exploits & Defense.pdf.7z
6.71MB
OS X for Hackers at Heart - The Apple of Every Hacker's Eye.pdf.7z
13.36MB
Penetration Tester's Open Source Toolkit, Vol. 2.pdf.7z
20.61MB
Penetration Tester's Open Source Toolkit.pdf.7z
25.47MB
Penetration Testing & Network Defense.chm.7z
14.75MB
Perfect Passwords - Selection, Protection, Authentication.pdf.7z
1.22MB
Perl Scripting for Windows Security - Live Response, Forensic Analysis, & Monitoring.pdf.7z
4.11MB
PGP & GPG - Email for the Practical Paranoid.pdf.7z
1.75MB
Phishing - Cutting the Identity Theft Line.pdf.7z
6.43MB
PHP Oracle Web Development - Data processing, Security, Caching, XML, Web Services, & AJAX.pdf.7z
3.05MB
Physical & Logical Security Convergence - Powered By Enterprise Security Management.pdf.7z
7.53MB
Practical Guide for Implementing Secure Intranets & Extranets.chm.7z
5.49MB
Practical Hacking Techniques & Countermeasures.pdf.7z
63.85MB
Practical Oracle Security - Your Unauthorized Guide to Relational Database Security.pdf.7z
3.35MB
Practical Packet Analysis - Using Wireshark to Solve Real-World Network Problems.pdf.7z
7.31MB
Practical Unix & Internet Security, 3rd Ed..chm.7z
2.4MB
Practical VoIP Security.pdf.7z
6.12MB
Preventing Web Attacks with Apache.chm.7z
6.06MB
Privacy Preserving Data Mining.pdf.7z
5.63MB
Privacy Protection & Computer Forensics, 2nd Ed..pdf.7z
2.52MB
Privacy, Security, & Trust within the Context of Pervasive Computing.pdf.7z
1.82MB
Probabilistic & Statistical Methods in Cryptology - An Introduction by Selected Topics.pdf.7z
1MB
Professional Rootkits.chm.7z
7.92MB
Professional Windows Desktop & Server Hardening.chm.7z
14.05MB
Real 802.11 Security - Wi-Fi Protected Access & 802.11i.chm.7z
2.95MB
Reverse Engineering of Object Oriented Code.pdf.7z
4.81MB
Reversing - Secrets of Reverse Engineering.pdf.7z
3.83MB
Rootkits - Subverting the Windows Kernel.chm.7z
1.6MB
Rootkits for Dummies.pdf.7z
3.27MB
Router Security Strategies - Securing IP Network Traffic Planes.pdf.7z
2.55MB
RSA Security's Official Guide to Cryptography.pdf.7z
7.65MB
Secure Coding - Principles & Practices.chm.7z
634.61KB
Secure Computer & Network Systems - Modeling, Analysis, & Design.pdf.7z
1.71MB
Secure Programming Cookbook for C & C++.chm.7z
1.35MB
Secure Programming with Static Analysis.pdf.7z
3.64MB
Securing & Optimizing Linux - The Hacking Solution.pdf.7z
5MB
Securing IM & P2P Applications for the Enterprise.pdf.7z
4.48MB
Securing the Information Infrastructure.pdf.7z
2.31MB
Securing VoIP Networks - Threats, Vulnerabilities, & Countermeasures.pdf.7z
4.69MB
Securing Web Services with WS-Security - Demystifying WS-Security, WS-Policy, SAML, XML Signature, & XML Encryption.chm.7z
3.83MB
Securing Windows Server 2003.chm.7z
3.42MB
Securing Windows Server 2008 - Prevent Attacks from Outside & Inside Your Organization.pdf.7z
12.07MB
Securing Your Business with Cisco ASA & PIX Firewalls.chm.7z
4.78MB
Security & Quality of Service in Ad Hoc Wireless Networks.pdf.7z
2.38MB
Security for Microsoft Visual Basic .NET.chm.7z
7.69MB
Security for Wireless Ad Hoc Networks.pdf.7z
3.23MB
Security in Computing, 3rd Ed..chm.7z
4.91MB
Security in Computing, 4th Ed..chm.7z
7.83MB
Security in Distributed, Grid, Mobile, & Pervasive Computing.pdf.7z
2.89MB
Security in Wireless LANs & MANs.pdf.7z
1.32MB
Security Power Tools.pdf.7z
8.52MB
Security Technologies for the World Wide Web, 2nd Ed..pdf.7z
2.45MB
Security Warrior.chm.7z
4.54MB
Security, Privacy, & Trust in Modern Data Management.pdf.7z
2.99MB
Self-Defending Networks - The Next Generation of Network Security.pdf.7z
16.5MB
SELinux - NSA's Open Source Security Enhanced Linux.chm.7z
1.05MB
SELinux by Example - Using Security Enhanced Linux.chm.7z
3.96MB
Shellcoder's Programming Uncovered.chm.7z
11.7MB
Simple Computer Security - Disinfect Your PC.pdf.7z
4.86MB
Snort 2.1 Intrusion Detection, 2nd Ed..pdf.7z
5.06MB
Snort Cookbook.chm.7z
2.49MB
Snort IDS & IPS Toolkit.pdf.7z
6.8MB
Special Ops - Host & Network Security for Microsoft, UNIX, & Oracle.pdf.7z
10.78MB
SSH, The Secure Shell - The Definitive Guide.pdf.7z
4.2MB
SSL & TLS Essentials - Securing the Web.pdf.7z
1.01MB
SSL Remote Access VPNs.pdf.7z
11.63MB
Static & Dynamic Reverse Engineering Techniques for Java Software Systems.pdf.7z
1.01MB
Static & Dynamic Reverse Engineering Techniques for Java Software Sytems.pdf.7z
1.01MB
Steal This Computer Book 3 - What They Won't Tell You About the Internet.chm.7z
13.89MB
Stealing the Network - How to Own a Continent.chm.7z
2.76MB
Stealing the Network - How to Own a Shadow.pdf.7z
8.09MB
Stealing the Network - How to Own an Identity.pdf.7z
5.77MB
Stealing the Network - How to Own the Box.pdf.7z
3.4MB
Surveillance & Security - Technological Politics & Power in Everyday Life.pdf.7z
2.65MB
Syngress Force Emerging Threat Analysis - From Mischief to Malicious.pdf.7z
6.07MB
Tangled Web - Tales of Digital Crime from the Shadows of Cyberspace.pdf.7z
2.03MB
The Apache Modules Book - Application Development with Apache.pdf.7z
1.47MB
The Art of Computer Virus Research & Defense.chm.7z
6.76MB
The Art of Deception - Controlling the Human Element of Security.pdf.7z
3.57MB
The Art of Intrusion - The Real Stories Behind the Exploits of Hackers, Intruders, & Deceivers.pdf.7z
1.15MB
The Art of Software Security Assessment - Identifying & Preventing Software Vulnerabilities.chm.7z
4.54MB
The Best Damn Firewall Book Period, 2nd Ed..pdf.7z
32.54MB
The Best Damn Firewall Book Period.pdf.7z
15.35MB
The Best Damn IT Security Management Book Period.pdf.7z
15.5MB
The Book of PF - A No-Nonsense Guide to the OpenBSD Firewall.pdf.7z
4.12MB
The Business Case for Network Security - Advocacy, Governance, & ROI.chm.7z
4.74MB
The Craft of System Security.chm.7z
5.33MB
The Database Hacker's Handbook - Defending Database Servers.chm.7z
1.13MB
The Ethical Hack - A Framework for Business Value Penetration Testing.pdf.7z
3.43MB
The Giant Black Book of Computer Viruses.pdf.7z
4.69MB
The Naked Employee - How Technology Is Compromising Workplace Privacy.chm.7z
629.13KB
The Oracle Hacker's Handbook - Hacking & Defending Oracle.chm.7z
483.62KB
The Shellcoder's Handbook - Discovering & Exploiting Security Holes.chm.7z
2.11MB
The Tao of Network Security Monitoring - Beyond Intrusion Detection.chm.7z
15.58MB
The Web Application Hacker's Handbook - Discovering & Exploiting Security Flaws.pdf.7z
4.72MB
Understanding Forensic Digital Imaging.pdf.7z
13.71MB
UNIX & Linux Forensic Analysis DVD Toolkit.pdf.7z
3.85MB
Virtual Honeypots - From Botnet Tracking to Intrusion Detection.chm.7z
4.1MB
WAP, Bluetooth, & 3G Programming - Cracking the Code.pdf.7z
6.87MB
Wardriving & Wireless Penetration Testing.pdf.7z
16.53MB
WarDriving-Drive, Detect, Defend - A Guide to Wireless Security.chm.7z
37.51MB
Web Application Vulnerabilities - Detect, Exploit, Prevent.pdf.7z
14.13MB
Web Hacking - Attacks & Defense.chm.7z
6.38MB
Web Security & Commerce.pdf.7z
2.92MB
Web Security, Privacy, & Commerce, 2nd Ed..chm.7z
6.17MB
Web Services Security & E-Business.pdf.7z
4.31MB
Web Services Security.chm.7z
3.96MB
Webster's New World Hacker Dictionary.pdf.7z
1.86MB
Wi-Foo - The Secrets of Wireless Hacking.chm.7z
6.78MB
Windows Forensic Analysis.pdf.7z
41.81MB
Windows Forensics & Incident Recovery.chm.7z
7.23MB
Windows Server 2003 Security Guide.pdf.7z
1.13MB
Windows XP Hacks & Mods For Dummies.pdf.7z
10.65MB
Wireless Network Hacks & Mods for Dummies.pdf.7z
3.66MB
Wireless Operational Security.chm.7z
1.48MB
Wireless Personal Area Networks - Performance, Interconnection, & Security with IEEE 802.15.4.pdf.7z
2.02MB
Wireless Security Handbook.pdf.7z
8.43MB
Wireshark & Ethereal Network Protocol Analyzer Toolkit.pdf.7z
10.52MB
Writing Security Tools & Exploits.pdf.7z
6.62MB
XSS Attacks - Cross Site Scripting Exploits & Defense.pdf.7z
4.88MB
Zero-Day Exploit - Countdown to Darkness.pdf.7z
2.45MB
友情提示
不会用的朋友看这里 把磁力链接复制到离线下载,或者bt下载软件里即可下载文件,或者直接复制迅雷链接到迅雷里下载! 亲,你造吗?将网页分享给您的基友,下载的人越多速度越快哦!
违规内容投诉邮箱:
[email protected]
概述 838888磁力搜索是一个磁力链接搜索引擎,是学术研究的副产品,用于解决资源过度分散的问题 它通过BitTorrent协议加入DHT网络,实时的自动采集数据,仅存储文件的标题、大小、文件列表、文件标识符(磁力链接)等基础信息 838888磁力搜索不下载任何真实资源,无法判断资源的合法性及真实性,使用838888磁力搜索服务的用户需自行鉴别内容的真伪 838888磁力搜索不上传任何资源,不提供Tracker服务,不提供种子文件的下载,这意味着838888磁力搜索 838888磁力搜索是一个完全合法的系统