Utica-Books-1eNOO
- (Protecting Our Future 2) Mowbray Thos J_ LeClair Jane-Cybersecurity in Our Digital Lives-John Wiley & Sons Inc. (2013).epub5.21MB
- -EC-Council. Ethical Hacking and Countermeasures (CEH v. 8).rar125.43MB
- Aditya Sood and Richard Enbody Auth. Targeted Cyber Attacks. Multi-staged Attacks Driven by Exploits and lware.pdf5.51MB
- American Psychological Association-Publication nual of the American Psychological Association-American Psychological Association (APA) (2009).pdf9.41MB
- Charles P. Pfleeger Shari Lawrence Pfleeger-Analyzing Computer Security_ A Threat _ Vulnerability _ Countermeasure Approach-Prentice Hall (2011).pdf239.14MB
- Donovan rtin-Hacking_ Learn the Basics of Ethical Hacking and Penetration Testing (2016).epub1.48MB
- EC-Council Computer Forensics Investigating Data and Ige Files .pdf15.22MB
- Jason Andress and Steve Winterfeld Auth. Cyber Warfare. Techniques Tactics and Tools for Security Practitioners.pdf9.07MB
- Jeffrey Carr Inside cyber warfare pping the cyber underworld.epub5.81MB
- Joel Scambray Neil Bergn Mike Stanfield Jason Rouse Hacking Exposed Mobile Security Secrets & Solutions.epub12.86MB
- ness Ryan C._ Valeriano Brandon-Cyber war versus cyber realities _ cyber conflict in the international system-Oxford University Press (2015).pdf2.64MB
- Michael E. Whitn Herbert J. Mattord Principles of Information Security.pdf14.83MB
- Michael Sikorski Andrew Honig Practical lware Analysis The Hands-On Guide to Dissecting Malicious Software.epub11.00MB
- Michael T. Raggo Chet Hoer Data hiding Exposing concealed data in multimedia operating systems mobile devices and network protocols.pdf25.44MB
- P.W. Singer Allan Friedn Cybersecurity and Cyberwar What Everyone Needs to Know.epub2.39MB
- Patrick Engebretson The basics of hacking and penetration testing ethical hacking and penetration testing de easy.pdf4.50MB
- Sean Bodmer Dr. x Kilger Gregory Carpenter Jade Jones Reverse Deception Organized Cyber Threat Counter-Exploitation.epub3.60MB
- Sherri Didoff Jonathan Ham Network Forensics Tracking Hackers through Cyberspace.epub45.90MB
- The Experts_ EC-Council.-Ethical Hacking and Countermeasures_ Attack Phases.pdf17.06MB
- Thos A. Johnson Cybersecurity Protecting Critical Infrastructures from Cyber Attack and Cyber Warfare.pdf1.71MB
- CreateTime2021-12-01
- UpdateTime2021-12-07
- FileTotalCount21
- TotalSize771.93MBHotTimes5ViewTimes10DMCA Report EmailmagnetLinkThunderTorrent DownBaiduYunLatest Search: 1.FETI-017 2.RSBX-101 3.IDBD-194 4.SWD-135 5.KWBD-093 6.BOMN-033 7.SS-012 8.ZACK-036 9.CMC-014 10.GESD-148 11.DSPE-005 12.NADE-224 13.SEED-077 14.MOR-015 15.DMM-70905 16.HODV-20930 17.AKBS-011 18.USV-008 19.MIBD-440 20.YUME-058 21.NNPJ-034 22.KWBD-145 23.PPPD-436 24.HND-256 25.RBB-093 26.MEKO-009 27.KUDK-036 28.MEYD-239 29.C-2109 30.RHE-407 31.ZUKO-124 32.DGR-007 33.SUPA-200 34.SDDE-600 35.TURU-062 36.OPPW-051 37.CVDX-388 38.017 39.101 40.194 41.135 42.093 43.033 44.012 45.036 46.014 47.148 48.005 49.224 50.077 51.015 52.70905 53.20930 54.011 55.008 56.440 57.058 58.034 59.145 60.436 61.256 62.093 63.009 64.036 65.239 66.2109 67.407 68.124 69.007 70.200 71.600 72.062 73.051 74.388