首页 磁力链接怎么用

Computer Security Enthusiast

文件类型 收录时间 最后活跃 资源热度 文件大小 文件数量
2008-11-30 20:03 2024-7-5 02:18 123 4.11 GB 471
二维码链接
Computer Security Enthusiast的二维码
种子下载(838888不存储任何种子文件)
种子下载线路1(迅雷)--推荐
种子下载线路2(比特彗星)
种子下载线路3(torcache)
3条线路均为国内外知名下载网站种子链接,内容跟本站无关!
文件列表
  1. 101 Spy Gadgets for the Evil Genius.pdf.7z40.98MB
  2. 1337 h4x0r h4ndb00k.chm.7z1.82MB
  3. 19 Deadly Sins of Software Security - Programming Flaws & How to Fix Them.chm.7z1.37MB
  4. 22 Radio & Receiver Projects for the Evil Genius.pdf.7z5.71MB
  5. 50 Awesome Auto Projects for the Evil Genius.pdf.7z18.48MB
  6. 51 High-Tech Practical Jokes for the Evil Genius.pdf.7z10.03MB
  7. 802.11 Security.pdf.7z816.72KB
  8. A Classical Introduction to Cryptography Exercise Book.pdf.7z7.75MB
  9. A Technical Guide to IPSec Virtual Private Networks.pdf.7z4.76MB
  10. A+, Network+, Security+ Exams in a Nutshell - A Desktop Quick Reference.pdf.7z4MB
  11. AAA & Network Security for Mobile Access - Radius, Diameter, EAP, PKI, & IP Mobility.pdf.7z3.45MB
  12. Absolute OpenBSD - UNIX for the Practical Paranoid.chm.7z1.02MB
  13. Access Denied - The Practice & Policy of Global Internet Filtering.pdf.7z6.37MB
  14. Active Defense - A Comprehensive Guide to Network Security.pdf.7z5.8MB
  15. Administering & Securing the Apache Server.chm.7z13.61MB
  16. Advanced CISSP Prep Guide - Exam Q&A.chm.7z1.64MB
  17. Advances in Elliptic Curve Cryptography.pdf.7z1.79MB
  18. Advances in Enterprise Information Technology Security.pdf.7z4.85MB
  19. Advances in Network & Distributed Systems Security.pdf.7z1.83MB
  20. Aggressive Network Self-Defense.pdf.7z80.93MB
  21. Ajax Security.pdf.7z11.42MB
  22. Anti-Hacker Tool Kit, 2nd Ed..chm.7z29.17MB
  23. Anti-Hacker Tool Kit, 3rd Ed..chm.7z34.84MB
  24. Apache Security.chm.7z1.61MB
  25. Applied Cryptanalysis - Breaking Ciphers in the Real World.pdf.7z16.36MB
  26. Applied Cryptography & Network Security - 2nd International Conference, ACNS 2004.pdf.7z8.14MB
  27. Applied Cryptography - Protocols, Algorithms, & Source COde in C, 2nd Ed..chm.7z3.64MB
  28. Applied Security Visualization.pdf.7z19.27MB
  29. Auditor's Guide to Information Systems Auditing.pdf.7z1.24MB
  30. AVIEN Malware Defense Guide for the Enterprise.pdf.7z4.96MB
  31. Beginning Cryptography with Java.chm.7z2.47MB
  32. BigNum Math - Implementing Cryptographic Multiple Precision Arithmetic.pdf.7z3.23MB
  33. Biometrics & Network Security.chm.7z1.11MB
  34. Black Hat Physical Device Security - Exploiting Hardware & Software.pdf.7z76.12MB
  35. Blackjacking - Security Threats to BlackBerry Devices, PDAs, & Cell Phones in the Enterprise.pdf.7z9.02MB
  36. Bluetooth Security.pdf.7z691.85KB
  37. Botnet Detection - Countering the Largest Security Threat.pdf.7z1.84MB
  38. Botnets - The Killer Web App.pdf.7z5.27MB
  39. Brute Force - Cracking the Data Encryption Standard.pdf.7z1.53MB
  40. Buffer Overflow Attacks - Detect, Exploit, Prevent.pdf.7z2.9MB
  41. Building an Effective Information Security Policy Architecture.pdf.7z2.34MB
  42. Building DMZs for Enterprise Networks.pdf.7z8.14MB
  43. Building Internet Firewalls, 2nd Ed..pdf.7z4.66MB
  44. Building Secure Servers with Linux.chm.7z1.16MB
  45. Building Secure Servers with Linux.pdf.7z2.51MB
  46. Building Secure Wireless Networks with 802.11.pdf.7z5.54MB
  47. Bulletproof Wireless Security - GSM, UMTS, 802.11, & Ad Hoc Security.pdf.7z2.35MB
  48. CCNA Security Official Exam Certification Guide [Exam 640-553].pdf.7z13.16MB
  49. CCSP Cisco Secure PIX Firewall Advanced Exam Certification Guide.pdf.7z10.45MB
  50. CD & DVD Forensics.pdf.7z4.4MB
  51. CD Cracking Uncovered - Protection Against Unsanctioned CD Copying.chm.7z9.08MB
  52. CEH - Official Certified Ethical Hacker Review Guide [Exam 312-50].pdf.7z3.1MB
  53. CEH Official Certified Ethical Hacker Review Guide.pdf.7z3.1MB
  54. Certified Ethical Hacker Exam Prep [Exam 312-50].chm.7z8.33MB
  55. Certified Ethical Hacking Official Course Material [Exam 312-50].chm.7z14.29MB
  56. Cisco ASA, PIX, & FWSM Firewall Handbook, 2nd Ed..pdf.7z7.48MB
  57. Cisco IOS Access Lists.pdf.7z1.28MB
  58. Cisco NAC Appliance - Enforcing Host Security with Clean Access.pdf.7z21.43MB
  59. Cisco Network Security Little Black Book.pdf.7z2.77MB
  60. Cisco Router Firewall Security.chm.7z5.83MB
  61. Cisco Secure Firewall Services Module (FWSM).pdf.7z1.92MB
  62. Cisco Secure Internet Security Solutions.pdf.7z6.22MB
  63. Cisco Security Agent.chm.7z25.98MB
  64. Cisco Security Professional's Guide to Secure Intrusion Detection Systems.pdf.7z12.16MB
  65. Cisco Wireless LAN Security.chm.7z5.82MB
  66. CISSP - Certified Information Systems Security Professional Study Guide, 3rd Ed..pdf.7z5.31MB
  67. CISSP - Certified Information Systems Security Professional Study Guide, 4th Ed..pdf.7z8.08MB
  68. CISSP Certification All-in-One Exam Guide, 4th Ed..pdf.7z18.84MB
  69. CISSP for Dummies, 2nd Ed..chm.7z1.36MB
  70. Codes & Ciphers - Julius Caesar, the Enigma, & the Internet.pdf.7z1.02MB
  71. Codes - The Guide to Secrecy from Ancient to Modern Times.pdf.7z4.68MB
  72. Combating Spyware in the Enterprise.pdf.7z7.14MB
  73. Complete Guide to CISM Certification.pdf.7z9.7MB
  74. Complexity & Cryptography - An Introduction.pdf.7z1.09MB
  75. CompTIA A+ Exam Prep [Exams A+ Essentials, 220-602, 220-603, & 220-604].chm.7z49.58MB
  76. CompTIA Security+ Study Guide & Practice Exam, 2nd Ed. [Exam JK0-010].pdf.7z9.11MB
  77. Computer & Intrusion Forensics.pdf.7z2.56MB
  78. Computer Network Security.pdf.7z21.45MB
  79. Computer Security & Cryptography.pdf.7z8.34MB
  80. Computer Security Basics, 2nd Ed..chm.7z1.65MB
  81. Computer Security, Privacy, & Politics - Current Issues, Challenges, & Solutions.pdf.7z1.63MB
  82. Computer Viruses & Malware.pdf.7z9.15MB
  83. Computer Viruses - From Theory to Applications.pdf.7z2.28MB
  84. Computer Viruses for Dummies.pdf.7z2.33MB
  85. Configuring Juniper Networks NetScreen & SSG Firewalls.pdf.7z9.33MB
  86. Configuring NetScreen Firewalls.pdf.7z5.93MB
  87. Configuring SonicWALL Firewalls.pdf.7z10.82MB
  88. Contemporary Cryptography.pdf.7z2.37MB
  89. Core Security Patterns - Best Practices & Strategies for J2EE, Web Services, & Identity Management.chm.7z7.3MB
  90. Covert Java - Techniques for Decompiling, Patching, & Reverse Engineering.pdf.7z2.08MB
  91. Crackproof Your Software - Protect Your Software Against Crackers.pdf.7z7.11MB
  92. Crimeware - Understanding New Attacks & Defenses.chm.7z10.42MB
  93. Critical Incident Management.chm.7z2.59MB
  94. Cryptography & Network Security, 4th Ed..chm.7z12.52MB
  95. Cryptography & Security Services - Mechanisms & Applications.pdf.7z4.4MB
  96. Cryptography - A Very Short Introduction.chm.7z1.31MB
  97. Cryptography for Developers.pdf.7z2.67MB
  98. Cryptography for Dummies.chm.7z4.02MB
  99. Cryptography in C & C++.chm.7z3.5MB
  100. Cryptology Unlocked.pdf.7z1.81MB
  101. Cyber Crime Investigator's Field Guide.pdf.7z1.54MB
  102. Cyber Forensics - A Field Manual for Collecting, Examining, & Preserving Evidence of Computer Crimes.pdf.7z3.5MB
  103. Cyber Spying - Tracking Your Family's (Sometimes) Secret Online Lives.pdf.7z104.27MB
  104. Cyber Warfare & Cyber Terrorism.pdf.7z4.62MB
  105. Decrypted Secrets - Methods & Maxims of Cryptology, 4th, Revised & Extended Ed..pdf.7z11.45MB
  106. Defend I.T. - Security by Example.chm.7z1.33MB
  107. Defense & Detection Strategies against Internet Worms.pdf.7z1.02MB
  108. Deploying Secure 802.11 Wireless Networks with Microsoft Windows.chm.7z6.91MB
  109. Designing BSD Rootkits - An Introduction to Kernel Hacking.pdf.7z5.35MB
  110. Developer's Guide to Web Application Security.pdf.7z9.62MB
  111. Digital Evidence & Computer Crime - Forensic Science, Computers, & the Internet, 2nd Ed..chm.7z31.4MB
  112. Disassembling Code - IDA Pro & SoftICE.chm.7z4.16MB
  113. Effective Oracle Database 10g Security by Design.chm.7z2.98MB
  114. Electronic Gadgets for the Evil Genius - 28 Build-It-Yourself Projects.pdf.7z54.93MB
  115. EnCase Computer Forensics - The Official EnCE-EnCase Certified Examiner Study Guide, 2nd Ed..pdf.7z13.35MB
  116. Encyclopedia of Cryptology.chm.7z2.26MB
  117. End-to-End Network Security - Defense-in-Depth.pdf.7z11.07MB
  118. Enemy at the Water Cooler - Real-Life Stories of Insider Threats & Enterprise Security Management Countermeasures.pdf.7z4.92MB
  119. Enterprise Information Systems Assurance & System Security - Managerial & Technical Issues.pdf.7z5.73MB
  120. Enterprise Java Security - Building Secure J2EE Applications.chm.7z3.93MB
  121. Essential Computer Security - Everyone's Guide to Email, Internet, & Wireless Security.pdf.7z6.28MB
  122. Essential PHP Security.chm.7z358.95KB
  123. Ethereal Packet Sniffing.chm.7z17.3MB
  124. Expert Web Services Security in the .NET Platform.chm.7z21.64MB
  125. Exploiting Software - How to Break Code.pdf.7z4.44MB
  126. Fast Track to Security.pdf.7z6.16MB
  127. File System Forensic Analysis.chm.7z3.84MB
  128. Firewall Fundamentals.chm.7z10.16MB
  129. Firewall Policies & VPN Configurations.pdf.7z5.58MB
  130. Firewalls & Internet Security - Repelling the Wily Hacker, 2nd Ed..pdf.7z56.81MB
  131. Firewalls - Jumpstart for Network & Systems Administrators.pdf.7z1.47MB
  132. Firewalls for Dummies, 2nd Ed..pdf.7z6.77MB
  133. Forensic Computer Crime Investigation.pdf.7z2.25MB
  134. Forensic Computing - A Practitioner's Guide, 2nd Ed..pdf.7z9.02MB
  135. Foundations of Computer Security.pdf.7z1.79MB
  136. Foundations of Cryptography - A Primer.pdf.7z748.64KB
  137. Foundations of Cryptography - Vol. 1, Basic Tools.pdf.7z2.34MB
  138. Foundations of Mac OS X Leopard Security.pdf.7z20.41MB
  139. Foundations of Security - What Every Programmer Needs to Know.pdf.7z2.18MB
  140. Fundamentals of Cryptology - A Professional Reference & Interactive Tutorial.pdf.7z26.18MB
  141. Fuzzing - Brute Force Vulnerability Discovery.pdf.7z42.05MB
  142. Google Hacking for Penetration Testers, Vol. 2.pdf.7z11.66MB
  143. Google Hacking for Penetration Testers.pdf.7z9.62MB
  144. Gray Hat Hacking - The Ethical Hacker's Handbook, 2nd Ed..pdf.7z8.03MB
  145. Grid Computing Security.pdf.7z7.65MB
  146. Guide to Elliptic Curve Cryptography.pdf.7z2.36MB
  147. Hack Attacks Revealed - A Complete Reference with Custom Security Hacking Toolkit.chm.7z6.35MB
  148. Hack I.T. - Security through Penetration Testing.chm.7z4.62MB
  149. Hack Proofing ColdFusion - The Only Way to Stop a Hacker Is to Think Like One.pdf.7z6.45MB
  150. Hack Proofing Linux - Your Guide to Open Source Security.pdf.7z9.74MB
  151. Hack Proofing Sun Solaris 8 - Protect Your Solaris Network from Attack.pdf.7z5.51MB
  152. Hack Proofing Windows 2000 Server.pdf.7z9.53MB
  153. Hack Proofing XML - The Only Way to Stop a Hacker Is to Think Like One.pdf.7z5.53MB
  154. Hack Proofing Your E-Commerce Site - The Only Way to Stop a Hacker Is to Think Like One.pdf.7z6MB
  155. Hack Proofing Your Identity in the Information Age - Protect Your Family on the Internet!.pdf.7z7.1MB
  156. Hack Proofing Your Network, 2nd Ed. - The Only Way to Stop a Hacker Is to Think Like One.pdf.7z7.35MB
  157. Hack Proofing Your Network.pdf.7z2.48MB
  158. Hack Proofing Your Web Applications - The Only Way to Stop a Hacker Is to Think Like One.pdf.7z7.18MB
  159. Hack Proofing Your Wireless Network - Protect Your Wireless Network from Attack.pdf.7z5.51MB
  160. Hack the Stack - Using Snort & Ethereal to Master the 8 Layers of an Insecure Network.pdf.7z5.99MB
  161. Hacker Debugging Uncovered.chm.7z14.42MB
  162. Hacker Disassembling Uncovered.chm.7z4.77MB
  163. Hacker Linux Uncovered.chm.7z4.51MB
  164. Hacker Web Exploitation Uncovered.chm.7z554.28KB
  165. Hacker's Challenge - Test Your Incident Response Skills Using 20 Scenarios.pdf.7z3.91MB
  166. Hacker's Delight.chm.7z2.1MB
  167. Hackers - Heroes of the Computer Revolution.pdf.7z2.02MB
  168. Hackers Beware - Defending Your Network from the Wiley Hacker.pdf.7z4.31MB
  169. Hacking - The Art of Exploitation, 2nd Ed..chm.7z4.71MB
  170. Hacking - The Art of Exploitation.chm.7z1.4MB
  171. Hacking a Terror Network - The Silent Threat of Covert Channels.pdf.7z6.25MB
  172. Hacking Exposed, 2nd Ed. - Network Security Secrets & Solutions.pdf.7z7.41MB
  173. Hacking Exposed-Cisco Networks - Cisco Security Secrets & Solutions.chm.7z9.92MB
  174. Hacking Exposed-Linux - Linux Security Secrets & Solutions, 3rd Ed..pdf.7z5.09MB
  175. Hacking Exposed-Linux - Linux Security Secrets & Solutions.pdf.7z88.82MB
  176. Hacking Exposed-Network Security - Secrets & Solutions, 2nd Ed..pdf.7z7.41MB
  177. Hacking Exposed-Network Security - Secrets & Solutions, 3rd Ed..pdf.7z4.66MB
  178. Hacking Exposed-VoIP - Voice Over IP Security Secrets & Solutions.chm.7z16.53MB
  179. Hacking Exposed-Web 2.0 - Web 2.0 Security Secrets & Solutions.pdf.7z3.94MB
  180. Hacking Exposed-Web Applications - Web Application Security Secrets & Solutions.pdf.7z4MB
  181. Hacking Exposed-Windows - Windows Security Secrets & Solutions, 3rd Ed..pdf.7z4.42MB
  182. Hacking Exposed-Wireless - Wireless Security Secrets & Solutions.chm.7z12.37MB
  183. Hacking for Dummies, 2nd Ed..pdf.7z4.08MB
  184. Hacking for Dummies.pdf.7z5.32MB
  185. Hacking the Cable Modem - What Cable Companies Don't Want You to Know.pdf.7z16.81MB
  186. Hacking Wireless Networks for Dummies.pdf.7z7.71MB
  187. HackNotes - Linux & Unix Security Portable Reference.pdf.7z1.76MB
  188. HackNotes - Network Security Portable Reference.pdf.7z1.98MB
  189. HackNotes - Web Security Portable Reference.pdf.7z1.87MB
  190. HackNotes - Windows Security Portable Reference.pdf.7z2.74MB
  191. Halting the Hacker - A Practical Guide to Computer Security, 2nd Ed..chm.7z628.52KB
  192. Handbook of Database Security - Applications & Trends.pdf.7z4.71MB
  193. Handbook of Digital & Multimedia Forensic Evidence.pdf.7z1.74MB
  194. Handbook of Research on Wireless Security.pdf.7z11.01MB
  195. Hardening Apache.chm.7z1.06MB
  196. Hardening Linux.chm.7z9.48MB
  197. Hardening Linux.pdf.7z2.11MB
  198. Hardening Network Infrastructure.chm.7z17.12MB
  199. Hardening Windows Systems.chm.7z23.73MB
  200. Hardening Windows, 2nd Ed..pdf.7z3.85MB
  201. Hardening Windows.chm.7z1.71MB
  202. High-Assurance Design - Architecting Secure & Reliable Enterprise Applications.chm.7z3.68MB
  203. Home Network Security Simplified.chm.7z14.31MB
  204. Honeypots - Tracking Hackers.chm.7z2.5MB
  205. Honeypots for Windows.chm.7z16.2MB
  206. How to Cheat at Configuring Open Source Security Tools - The Perfect Reference for the Multitasked SysAdmin.pdf.7z6.29MB
  207. How to Cheat at Deploying & Securing RFID.pdf.7z3.98MB
  208. How to Cheat at Designing Security for a Windows Server 2003 Network.pdf.7z62.4MB
  209. How to Cheat at Managing Information Security.pdf.7z5.36MB
  210. How to Cheat at Securing a Wireless Network.pdf.7z10.25MB
  211. How to Cheat at Securing Linux - The Perfect Reference for the Multitasked SysAdmin.pdf.7z8.14MB
  212. How to Cheat at VolP Security.pdf.7z40.86MB
  213. How to Cheat at Windows System Administration Using Command Line Scripts.pdf.7z2.98MB
  214. IM Instant Messaging Security.pdf.7z1.77MB
  215. Implementing Email Security & Tokens - Current Standards, Tools, & Practices.pdf.7z1.42MB
  216. Implementing NAP & NAC Security Technologies - The Complete Guide to Network Access Control.pdf.7z5.33MB
  217. Implementing SSH - Strategies for Optimizing the Secure Shell.pdf.7z5.75MB
  218. Incident Response & Computer Forensics, 2nd Ed..pdf.7z9.34MB
  219. Incident Response - A Strategic Guide to Handling System & Network Security Breaches.chm.7z991.41KB
  220. Incident Response - Computer Forensics Toolkit.pdf.7z4.15MB
  221. Information Security - Principles & Practice.pdf.7z4.15MB
  222. Information Security Management Handbook, 5th Ed..pdf.7z27.47MB
  223. Information Security Policies & Actions in Modern Integrated Systems.chm.7z7.22MB
  224. Information Security Policies & Procedures - A Practitioner's Reference, 2nd Ed..pdf.7z1.6MB
  225. Information Technology Security - Advice from Experts.chm.7z801.73KB
  226. InfoSec Career Hacking - Sell Your Skillz, Not Your Soul.pdf.7z82.21MB
  227. InfoSecurity 2008 Threat Analysis.pdf.7z9.38MB
  228. Inside Java 2 Platform Security, 2nd Ed. - Architecture, API Design, & Implementation.chm.7z1.17MB
  229. Inside Network Perimeter Security, 2nd Ed..chm.7z8.65MB
  230. Inside the Spam Cartel - Trade Secrets from the Dark Side.chm.7z6.04MB
  231. Insider Attack & Cyber Security - Beyond the Hacker.pdf.7z2.19MB
  232. Insider Threat - Protecting the Enterprise from Sabotage, Spying, & Theft.pdf.7z4.03MB
  233. Internet & Intranet Security Management - Risks & Solutions.pdf.7z1.34MB
  234. Internet & Intranet Security.chm.7z5.66MB
  235. Internet Denial of Service - Attack & Defense Mechanisms.chm.7z2.06MB
  236. Internet Forensics.chm.7z839.55KB
  237. Internet Security - A Jumpstart for Systems Administrators & IT Managers.chm.7z3.86MB
  238. Internet Security - Cryptographic Principles, Algorithms, & Protocols.pdf.7z1.84MB
  239. Introduction to Communication Electronic Warfare Systems.pdf.7z40.89MB
  240. Introduction to Cryptography - Principles & Applications, 2nd Ed..pdf.7z2.02MB
  241. Intrusion Detection & Prevention.chm.7z3.16MB
  242. Intrusion Prevention & Active Response - Deploying Network & Host IPS.pdf.7z82.56MB
  243. Intrusion Prevention Fundamentals.chm.7z2.12MB
  244. Investigating Computer-Related Crime - A Handbook for Corporate Investigators.pdf.7z1013.04KB
  245. Investigative Data Mining for Security & Criminal Detection.chm.7z25.71MB
  246. IPSec - The New Security Standard for the Internet, Intranets, & Virtual Private Networks, 2nd Ed..chm.7z1.57MB
  247. IPSec VPN Design.chm.7z8.96MB
  248. IPTV Security - Protecting High-Value Digital Contents.pdf.7z1.89MB
  249. IT Auditing - Using Controls to Protect Information Assets.chm.7z3.08MB
  250. IT Security Interviews Exposed - Secrets to Landing Your Next Information Security Job.pdf.7z1.68MB
  251. J2EE Security for Servlets, EJBs, & Web Services.chm.7z1.91MB
  252. Jeff Duntemann's Drive-By Wi-Fi Guide.chm.7z12.74MB
  253. Juniper Networks Field Guide & Reference.chm.7z3.13MB
  254. Juniper Networks Secure Access SSL VPN Configuration Guide.pdf.7z16.26MB
  255. Kismet Hacking.pdf.7z3.77MB
  256. LAN Switch Security - What Hackers Know About Your Switches.pdf.7z2.64MB
  257. Linux Firewalls - Attack Detection & Response with iptables, psad, & fwsnort.pdf.7z3.85MB
  258. Linux Network Security.chm.7z6.52MB
  259. Linux Security Cookbook.chm.7z643.31KB
  260. Mac OS X Maximum Security.chm.7z3.71MB
  261. Mac OS X Security.chm.7z4.63MB
  262. Mainframe Basics for Security Professionals - Getting Started with RACF.pdf.7z3.42MB
  263. Malicious Cryptography - Exposing Cryptovirology.pdf.7z2.19MB
  264. Malware - Fighting Malicious Code.chm.7z6.39MB
  265. Malware Detection.pdf.7z14.25MB
  266. Malware Forensics - Investigating & Analyzing Malicious Code.pdf.7z17.22MB
  267. Managing Cisco Network Security.pdf.7z4.42MB
  268. Managing Security with Snort & IDS Tools.chm.7z1.74MB
  269. Mastering FreeBSD & OpenBSD Security.chm.7z1.33MB
  270. Mastering Network Security.pdf.7z2.36MB
  271. Mastering Windows Network Forensics & Investigation.chm.7z45.71MB
  272. Maximum Linux Security, 2nd Ed..pdf.7z4MB
  273. Maximum Security, 4th Ed..chm.7z2.93MB
  274. Maximum Wireless Security.chm.7z4.24MB
  275. MCSA-MCSE Implementing & Administering Security in a Microsoft Windows Server 2003 Network Self-Paced Training Kit [Exam 70-299].pdf.7z4.77MB
  276. MCSE Core Elective Exams in a Nutshell - A Desktop Quick Reference.chm.7z3.9MB
  277. MCSE Designing Security for a Microsoft Windows Server 2003 Network Self-Paced Training Kit [Exam 70-298].chm.7z11.28MB
  278. MCSE Implementing & Administering Security in a Windows 2003 Network Exam Cram 2 [Exam 70-299].chm.7z3.54MB
  279. Metasploit Toolkit for Penetration Testing, Exploit Development, & Vulnerability Research.pdf.7z3.58MB
  280. Microsoft Encyclopedia of Security.pdf.7z7.27MB
  281. Microsoft Forefront Security Administration Guide.pdf.7z16.17MB
  282. Microsoft Log Parser Toolkit.pdf.7z83.97MB
  283. Microsoft Windows Security Inside Out for Windows XP & Windows 2000.chm.7z19.47MB
  284. Microsoft Windows Server 2003 PKI & Certificate Security.pdf.7z5.7MB
  285. Mission Critical! Internet Security.pdf.7z3.5MB
  286. Mobile & Wireless Network Security & Privacy.pdf.7z2.93MB
  287. Mobility, Data Mining, & Privacy - Geographic Knowledge Discovery.pdf.7z3.36MB
  288. Modern Cryptography - Theory & Practice.pdf.7z11.07MB
  289. MORE Electronic Gadgets for the Evil Genius - 40 New Build-It-Yourself Projects.pdf.7z56.02MB
  290. Multicast & Group Security.pdf.7z2.36MB
  291. Multimedia Forensics & Security.pdf.7z10.42MB
  292. Multimedia Security Technologies for Digital Rights Management.pdf.7z2.66MB
  293. Nessus Network Auditing, 2nd Ed..pdf.7z8.72MB
  294. Nessus, Snort, & Ethereal Power Tools - Customizing Open Source Security Applications.pdf.7z4.32MB
  295. Netcat Power Tools.pdf.7z8.52MB
  296. Network Administrator Street Smarts - A Real World Guide to CompTIA Network+ Skills.pdf.7z9.75MB
  297. Network Intrusion Detection, 3rd Ed..pdf.7z2.03MB
  298. Network Perimeter Security - Building Defense In-Depth.chm.7z3.56MB
  299. Network Security - Know It All.pdf.7z4.96MB
  300. Network Security Assessment - From Vulnerability to Patch.pdf.7z7.5MB
  301. Network Security Assessment - Know Your Network, 2nd Ed..pdf.7z4.07MB
  302. Network Security Assessment - Know Your Network.chm.7z1.68MB
  303. Network Security Bible.pdf.7z5.58MB
  304. Network Security Hacks - 100 Industrial-Strength Tips & Tools.chm.7z1.62MB
  305. Network Security Hacks - Tips & Tools for Protecting Your Privacy, 2nd Ed..chm.7z3.88MB
  306. Network Security Illustrated.pdf.7z8.43MB
  307. Network Security JumpStart.pdf.7z1.42MB
  308. Network Security Technologies & Solutions.chm.7z26.27MB
  309. Network Security Tools - Writing, Hacking, & Modifying Security Tools.chm.7z1.29MB
  310. Network Security with OpenSSL.pdf.7z1.28MB
  311. Network Warrior.pdf.7z5.19MB
  312. Networking with Microsoft Windows Vista - Your Guide to Easy & Secure Windows Vista Networking.pdf.7z15.27MB
  313. Nmap in the Enterprise - Your Guide to Network Scanning.pdf.7z3.92MB
  314. No Tech Hacking - A Guide to Social Engineering, Dumpster Diving, & Shoulder Surfing.pdf.7z20.59MB
  315. Official (ISC)2 Guide to the CISSP Exam.pdf.7z7.84MB
  316. Online Business Security Systems.pdf.7z1.64MB
  317. Open Source Fuzzing Tools.pdf.7z2.91MB
  318. Open Source Security Tools - A Practical Guide to Security Applications.chm.7z5.67MB
  319. Oracle Security.chm.7z1.3MB
  320. OS X Exploits & Defense.pdf.7z6.71MB
  321. OS X for Hackers at Heart - The Apple of Every Hacker's Eye.pdf.7z13.36MB
  322. OSSEC Host-Based Intrusion Detection Guide.pdf.7z6.94MB
  323. PCI Compliance - Understand & Implement Effective PCI Data Security Standard Compliance.pdf.7z4.24MB
  324. Penetration Tester's Open Source Toolkit, Vol. 2.pdf.7z20.61MB
  325. Penetration Tester's Open Source Toolkit.pdf.7z25.47MB
  326. Penetration Testing & Network Defense.chm.7z14.75MB
  327. Perfect Passwords - Selection, Protection, Authentication.pdf.7z1.22MB
  328. Perl Scripting for Windows Security - Live Response, Forensic Analysis, & Monitoring.pdf.7z4.11MB
  329. PGP & GPG - Email for the Practical Paranoid.pdf.7z1.75MB
  330. Phishing - Cutting the Identity Theft Line.pdf.7z6.43MB
  331. Phishing Exposed.pdf.7z6.79MB
  332. PHP Oracle Web Development - Data processing, Security, Caching, XML, Web Services, & AJAX.pdf.7z3.05MB
  333. Physical & Logical Security Convergence - Powered By Enterprise Security Management.pdf.7z7.53MB
  334. Practical Guide for Implementing Secure Intranets & Extranets.chm.7z5.49MB
  335. Practical Hacking Techniques & Countermeasures.pdf.7z63.85MB
  336. Practical Oracle Security - Your Unauthorized Guide to Relational Database Security.pdf.7z3.35MB
  337. Practical Packet Analysis - Using Wireshark to Solve Real-World Network Problems.pdf.7z7.31MB
  338. Practical Unix & Internet Security, 3rd Ed..chm.7z2.4MB
  339. Practical VoIP Security.pdf.7z6.12MB
  340. Preventing Web Attacks with Apache.chm.7z6.06MB
  341. Privacy Defended - Protecting Yourself Online.chm.7z10.62MB
  342. Privacy Preserving Data Mining.pdf.7z5.63MB
  343. Privacy Protection & Computer Forensics, 2nd Ed..pdf.7z2.52MB
  344. Privacy, Security, & Trust within the Context of Pervasive Computing.pdf.7z1.82MB
  345. Probabilistic & Statistical Methods in Cryptology - An Introduction by Selected Topics.pdf.7z1MB
  346. Professional Rootkits.chm.7z7.92MB
  347. Professional Windows Desktop & Server Hardening.chm.7z14.05MB
  348. Real 802.11 Security - Wi-Fi Protected Access & 802.11i.chm.7z2.95MB
  349. Reverse Engineering Code with IDA Pro.pdf.7z3.59MB
  350. Reverse Engineering of Object Oriented Code.pdf.7z4.81MB
  351. Reversing - Secrets of Reverse Engineering.pdf.7z3.83MB
  352. RFID Handbook - Applications, Technology, Security, & Privacy.pdf.7z9.8MB
  353. RFID Security.pdf.7z4.09MB
  354. Rootkits - Subverting the Windows Kernel.chm.7z1.6MB
  355. Rootkits for Dummies.pdf.7z3.27MB
  356. Router Security Strategies - Securing IP Network Traffic Planes.pdf.7z2.55MB
  357. RSA Security's Official Guide to Cryptography.pdf.7z7.65MB
  358. Sarbanes-Oxley IT Compliance Using COBIT & Open Source Tools.chm.7z1.62MB
  359. Sarbanes-Oxley IT Compliance Using Open Source Tools, 2nd Ed..pdf.7z6.49MB
  360. Secrets Stolen, Fortunes Lost - Preventing Intellectual Property Theft & Economic Espionage in the 21st Century.pdf.7z2.35MB
  361. Secure Coding - Principles & Practices.chm.7z634.61KB
  362. Secure Communicating Systems - Design, Analysis, & Implementation.pdf.7z21.77MB
  363. Secure Computer & Network Systems - Modeling, Analysis, & Design.pdf.7z1.71MB
  364. Secure Data Management in Decentralized Systems.pdf.7z21.62MB
  365. Secure Programming Cookbook for C & C++.chm.7z1.35MB
  366. Secure Programming with Static Analysis.pdf.7z3.64MB
  367. Securing & Optimizing Linux - The Hacking Solution.pdf.7z5MB
  368. Securing IM & P2P Applications for the Enterprise.pdf.7z4.48MB
  369. Securing the Information Infrastructure.pdf.7z2.31MB
  370. Securing VoIP Networks - Threats, Vulnerabilities, & Countermeasures.pdf.7z4.69MB
  371. Securing Web Services with WS-Security - Demystifying WS-Security, WS-Policy, SAML, XML Signature, & XML Encryption.chm.7z3.83MB
  372. Securing Windows Server 2003.chm.7z3.42MB
  373. Securing Windows Server 2008 - Prevent Attacks from Outside & Inside Your Organization.pdf.7z12.07MB
  374. Securing Your Business with Cisco ASA & PIX Firewalls.chm.7z4.78MB
  375. Security & Quality of Service in Ad Hoc Wireless Networks.pdf.7z2.38MB
  376. Security & Usability - Designing Secure Systems that People Can Use.chm.7z7.64MB
  377. Security for Microsoft Visual Basic .NET.chm.7z7.69MB
  378. Security for Wireless Ad Hoc Networks.pdf.7z3.23MB
  379. Security in Computing, 3rd Ed..chm.7z4.91MB
  380. Security in Computing, 4th Ed..chm.7z7.83MB
  381. Security in Distributed, Grid, Mobile, & Pervasive Computing.pdf.7z2.89MB
  382. Security in Wireless LANs & MANs.pdf.7z1.32MB
  383. Security Log Management - Identifying Patterns in the Chaos.pdf.7z4.51MB
  384. Security Power Tools.pdf.7z8.52MB
  385. Security Technologies for the World Wide Web, 2nd Ed..pdf.7z2.45MB
  386. Security Warrior.chm.7z4.54MB
  387. Security+ Study Guide, 2nd Ed. [SYO-101].pdf.7z7.31MB
  388. Security, Privacy, & Trust in Modern Data Management.pdf.7z2.99MB
  389. Self-Defending Networks - The Next Generation of Network Security.pdf.7z16.5MB
  390. SELinux - NSA's Open Source Security Enhanced Linux.chm.7z1.05MB
  391. SELinux by Example - Using Security Enhanced Linux.chm.7z3.96MB
  392. Shellcoder's Programming Uncovered.chm.7z11.7MB
  393. Simple Computer Security - Disinfect Your PC.pdf.7z4.86MB
  394. Snort 2.1 Intrusion Detection, 2nd Ed..pdf.7z5.06MB
  395. Snort Cookbook.chm.7z2.49MB
  396. Snort IDS & IPS Toolkit.pdf.7z6.8MB
  397. Sockets, Shellcode, Porting, & Coding - Reverse Engineering Exploits & Tool Coding for Security Professionals.pdf.7z104.54MB
  398. Software Piracy Exposed.pdf.7z4.34MB
  399. Special Ops - Host & Network Security for Microsoft, UNIX, & Oracle.pdf.7z10.78MB
  400. SSH, The Secure Shell - The Definitive Guide.pdf.7z4.2MB
  401. SSL & TLS Essentials - Securing the Web.pdf.7z1.01MB
  402. SSL Remote Access VPNs.pdf.7z11.63MB
  403. Static & Dynamic Reverse Engineering Techniques for Java Software Systems.pdf.7z1.01MB
  404. Static & Dynamic Reverse Engineering Techniques for Java Software Sytems.pdf.7z1.01MB
  405. Steal This Computer Book 3 - What They Won't Tell You About the Internet.chm.7z13.89MB
  406. Stealing the Network - How to Own a Continent.chm.7z2.76MB
  407. Stealing the Network - How to Own a Shadow.pdf.7z8.09MB
  408. Stealing the Network - How to Own an Identity.pdf.7z5.77MB
  409. Stealing the Network - How to Own the Box.pdf.7z3.4MB
  410. Strategic Information Security.chm.7z820.2KB
  411. Surveillance & Security - Technological Politics & Power in Everyday Life.pdf.7z2.65MB
  412. Syngress Force Emerging Threat Analysis - From Mischief to Malicious.pdf.7z6.07MB
  413. Tangled Web - Tales of Digital Crime from the Shadows of Cyberspace.pdf.7z2.03MB
  414. The Apache Modules Book - Application Development with Apache.pdf.7z1.47MB
  415. The Art of Computer Virus Research & Defense.chm.7z6.76MB
  416. The Art of Deception - Controlling the Human Element of Security.pdf.7z3.57MB
  417. The Art of Intrusion - The Real Stories Behind the Exploits of Hackers, Intruders, & Deceivers.pdf.7z1.15MB
  418. The Art of Software Security Assessment - Identifying & Preventing Software Vulnerabilities.chm.7z4.54MB
  419. The Best Damn Firewall Book Period, 2nd Ed..pdf.7z32.54MB
  420. The Best Damn Firewall Book Period.pdf.7z15.35MB
  421. The Best Damn IT Security Management Book Period.pdf.7z15.5MB
  422. The Book of PF - A No-Nonsense Guide to the OpenBSD Firewall.pdf.7z4.12MB
  423. The Business Case for Network Security - Advocacy, Governance, & ROI.chm.7z4.74MB
  424. The CISSP & CAP Prep Guide - Platinum Ed..chm.7z11.86MB
  425. The CISSP Prep Guide - Gold Ed..pdf.7z5.14MB
  426. The CISSP Prep Guide - Mastering the Ten Domains of Computer Security.pdf.7z3.89MB
  427. The Complete Idiot's Guide to Protecting Yourself Online.pdf.7z11.77MB
  428. The Craft of System Security.chm.7z5.33MB
  429. The Database Hacker's Handbook - Defending Database Servers.chm.7z1.13MB
  430. The Ethical Hack - A Framework for Business Value Penetration Testing.pdf.7z3.43MB
  431. The Giant Black Book of Computer Viruses.pdf.7z4.69MB
  432. The International Handbook of Computer Security.pdf.7z1.6MB
  433. The IT Regulatory & Standards Compliance Handbook - How to Survive an Information Systems Audit & Assessments.pdf.7z10.52MB
  434. The Naked Employee - How Technology Is Compromising Workplace Privacy.chm.7z629.13KB
  435. The Official CHFI Study Guide for Computer Hacking Forensics Investigators [Exam 312-49].pdf.7z11.72MB
  436. The Oracle Hacker's Handbook - Hacking & Defending Oracle.chm.7z483.62KB
  437. The Shellcoder's Handbook - Discovering & Exploiting Security Holes.chm.7z2.11MB
  438. The Tao of Network Security Monitoring - Beyond Intrusion Detection.chm.7z15.58MB
  439. The Web Application Hacker's Handbook - Discovering & Exploiting Security Flaws.pdf.7z4.72MB
  440. Understanding Forensic Digital Imaging.pdf.7z13.71MB
  441. UNIX & Linux Forensic Analysis DVD Toolkit.pdf.7z3.85MB
  442. Virtual Honeypots - From Botnet Tracking to Intrusion Detection.chm.7z4.1MB
  443. WAP, Bluetooth, & 3G Programming - Cracking the Code.pdf.7z6.87MB
  444. Wardriving & Wireless Penetration Testing.pdf.7z16.53MB
  445. WarDriving-Drive, Detect, Defend - A Guide to Wireless Security.chm.7z37.51MB
  446. Web Application Vulnerabilities - Detect, Exploit, Prevent.pdf.7z14.13MB
  447. Web Hacking - Attacks & Defense.chm.7z6.38MB
  448. Web Security & Commerce.pdf.7z2.92MB
  449. Web Security, Privacy, & Commerce, 2nd Ed..chm.7z6.17MB
  450. Web Services Security & E-Business.pdf.7z4.31MB
  451. Web Services Security.chm.7z3.96MB
  452. Webster's New World Hacker Dictionary.pdf.7z1.86MB
  453. Wi-Foo - The Secrets of Wireless Hacking.chm.7z6.78MB
  454. Windows Forensic Analysis.pdf.7z41.81MB
  455. Windows Forensics & Incident Recovery.chm.7z7.23MB
  456. Windows Server 2003 Security Guide.pdf.7z1.13MB
  457. Windows Server 2008 Networking & Network Access Protection (NAP).pdf.7z20.83MB
  458. Windows Server 2008 Security Resource Kit.pdf.7z7.14MB
  459. Windows Vista Security - Securing Vista Against Malicious Attacks.chm.7z25.13MB
  460. Windows XP Hacks & Mods For Dummies.pdf.7z10.65MB
  461. Wireless Network Hacks & Mods for Dummies.pdf.7z3.66MB
  462. Wireless Operational Security.chm.7z1.48MB
  463. Wireless Personal Area Networks - Performance, Interconnection, & Security with IEEE 802.15.4.pdf.7z2.02MB
  464. Wireless Security Handbook.pdf.7z8.43MB
  465. Wireshark & Ethereal Network Protocol Analyzer Toolkit.pdf.7z10.52MB
  466. Writing Secure Code for Windows Vista.chm.7z3.07MB
  467. Writing Secure Code, 2nd Ed..chm.7z2.23MB
  468. Writing Secure Code.pdf.7z3.36MB
  469. Writing Security Tools & Exploits.pdf.7z6.62MB
  470. XSS Attacks - Cross Site Scripting Exploits & Defense.pdf.7z4.88MB
  471. Zero-Day Exploit - Countdown to Darkness.pdf.7z2.45MB
友情提示
不会用的朋友看这里 把磁力链接复制到离线下载,或者bt下载软件里即可下载文件,或者直接复制迅雷链接到迅雷里下载! 亲,你造吗?将网页分享给您的基友,下载的人越多速度越快哦!

违规内容投诉邮箱:[email protected]

概述 838888磁力搜索是一个磁力链接搜索引擎,是学术研究的副产品,用于解决资源过度分散的问题 它通过BitTorrent协议加入DHT网络,实时的自动采集数据,仅存储文件的标题、大小、文件列表、文件标识符(磁力链接)等基础信息 838888磁力搜索不下载任何真实资源,无法判断资源的合法性及真实性,使用838888磁力搜索服务的用户需自行鉴别内容的真伪 838888磁力搜索不上传任何资源,不提供Tracker服务,不提供种子文件的下载,这意味着838888磁力搜索 838888磁力搜索是一个完全合法的系统