Index of /pdf/Books/Computer science/


../
Cryptography/                                      03-Jan-2021 18:19                   -
Hands-On Ethical Hacking and Network Defense Se..> 31-Dec-2016 21:02                   -
Infosec/                                           03-Jan-2021 18:21                   -
Networking/                                        31-Dec-2020 13:37                   -
O'Reilly/                                          31-Dec-2020 16:25                   -
Software_Engineering 9th- Ed By Ian Sommerville/   14-May-2017 21:10                   -
flask/                                             05-Jun-2017 09:06                   -
BackTrack 4-Asssuring security by pentest - Sha..> 26-Dec-2020 22:48            15396951
Bluetooth_Security.pdf                             26-Dec-2020 22:40             1567858
Buffer_Overflow_(Root_on_server_II).pdf            26-Dec-2020 22:40              717286
Bulletproof_Wireless_Security_-_GSM,_UMTS,_802...> 26-Dec-2020 22:40             3461192
Computer Networking A Top Down Approach (6th ed..> 26-Dec-2020 22:48            25831899
Computer Organization and Design- The HW_SW Int..> 26-Dec-2020 22:48            14306628
Computer Organization and Design- The HW_SW Int..> 26-Dec-2020 22:48            35556242
Cryptography and Network Security 5th ed - Will..> 26-Dec-2020 22:48             8366547
DTrace Dynamic Tracing In Oracle Solaris, Mac O..> 26-Dec-2020 22:48            12385025
Fundamentals of digital logic with VHDL design ..> 26-Dec-2020 22:48            12755598
High_Performance_Networking_Unleashed.pdf          26-Dec-2020 22:40             1925026
Interactive computer graphics_a top-down approa..> 26-Dec-2020 22:48            13150257
Introduction to the theory of computation_third..> 26-Dec-2020 22:48             3677709
Introduction to the theory of computation_third..> 26-Dec-2020 22:48            25049032
La cryptographie militaire - Auguste Kerckhoffs..> 26-Dec-2020 22:48              884458
Linux Administration-A Beginner's Guide 5th Edi..> 26-Dec-2020 22:48             6896603
No.Starch.Press.Rootkits.and.Bootkits.www.EBook..> 26-Dec-2020 22:40            12659115
No.Starch.Press.The.IDA.Pro.Book.2nd.Edition.15..> 26-Dec-2020 22:40            10610543
No.Starch.Press.The.Linux.Programming.Interface..> 26-Dec-2020 22:40            21531166
PhoenixProjectExcerpt.pdf                          26-Dec-2020 22:49             1256967
Reversing-Secrets of Reverse Engineering - Elda..> 26-Dec-2020 22:48             8779584
Running Xen-A Hands-On Guide to the Art of Virt..> 26-Dec-2020 22:48             4456561
The Definitive Guide to the Xen Hypervisor - Da..> 26-Dec-2020 22:49             2371180
The Perfect Weapon War, Sabotage, and Fear in t..> 26-Dec-2020 22:43             2053432
building_secure_and_reliable_systems.pdf           26-Dec-2020 22:40             9321717
cuckoo_egg.pdf                                     26-Dec-2020 22:40              925853
databasereliabilityengineering.epub                26-Dec-2020 22:43             6333003
databasereliabilityengineering.pdf                 26-Dec-2020 22:43             9788747
heap-exploitation.pdf                              29-May-2017 20:00              793028
jenkins2_upandrunning.epub                         26-Dec-2020 22:43            41045564
jenkins2_upandrunning.pdf                          26-Dec-2020 22:43            32250512
learningkalilinux.epub                             26-Dec-2020 22:43            19436248
learningkalilinux.pdf                              26-Dec-2020 22:43            23683959
malware_analysts_cookbook_and_dvd_tools_and_tec..> 26-Dec-2020 22:43            13162243
malware_analysts_cookbook_and_dvd_tools_and_tec..> 26-Dec-2020 22:43            19845437
malware_analysts_cookbook_dvd.zip                  26-Dec-2020 22:43           916675569
nginx_A practical guide to high performance - S..> 26-Dec-2020 22:48             5057591
no.starch.press.the.practice.of.network.securit..> 26-Dec-2020 22:40            24876869
parallélisme.pdf                                   28-Aug-2015 15:01               79171
practical_reverse_engineering_x86_x64_arm_windo..> 26-Dec-2020 22:43             3427760
practical_reverse_engineering_x86_x64_arm_windo..> 26-Dec-2020 22:43             4707941
prometheus_upandrunning.epub                       26-Dec-2020 22:43             5399551
prometheus_upandrunning.pdf                        26-Dec-2020 22:43             9089973
puppetbestpractices.epub                           26-Dec-2020 22:43             2265909
puppetbestpractices.pdf                            26-Dec-2020 22:43             4820128
secrets_and_lies_digital_security_in_a_networke..> 26-Dec-2020 22:43             3969844
security-in-wireless-mesh-networks-wireless-net..> 26-Dec-2020 22:40            10899882
shellcoders_handbook_discovering_and_exploiting..> 26-Dec-2020 22:43             1388417
shellcoders_handbook_discovering_and_exploiting..> 26-Dec-2020 22:43             3643500
socialengineering_thescienceofhumanhacking_2nde..> 26-Dec-2020 22:43             9864823
softsec.pdf                                        26-Dec-2020 22:40              854998
theartofdeception_controllingthehumanelementofs..> 26-Dec-2020 22:43             1278440
theartofdeception_controllingthehumanelementofs..> 26-Dec-2020 22:43            17232760
threat_modeling_designing_for_security.epub        26-Dec-2020 22:43             6730700
threat_modeling_designing_for_security.pdf         26-Dec-2020 22:43            22762425
unauthorisedaccess_physicalpenetrationtestingfo..> 26-Dec-2020 22:43             4060370
unauthorisedaccess_physicalpenetrationtestingfo..> 26-Dec-2020 22:43            27208153
web_application_hackers_handbook_finding_and_ex..> 26-Dec-2020 22:43            20573497
web_application_hackers_handbook_finding_and_ex..> 26-Dec-2020 22:43            17095873
wehaveroot_evenmoreadvicefromschneieronsecurity..> 26-Dec-2020 22:43             5077548
wireless-network-security-signals-and-communica..> 26-Dec-2020 22:40             5998917