Professional Documents
Culture Documents
How Thieves Targeted Ebay Users But Got Stopped Instead Interhack June 2003 29 P http://rapidshare.com/files/107953129/How_20Thieves_20Targeted_20eBay_20Users_20 but_20Got_20Stopped_20Instead_28Interhack-June_202003_29.p
http://rapidshare.com/files/107953206/How_20computers_20work.pdf
Hacking For Dummies Access To Other Peoples Systems Made Simple http://rapidshare.com/files/107953232/Hacking_20for_20Dummies-Access_20to_20Othe r_20Peoples_20Systems_20Made_20Simple.pdf
http://rapidshare.com/files/107953403/Hackers_20Delight_28_20Addison_20Wesley-_2 02003_20_29.chm
Addison Wesley 2004 Wi Foo The Secrets Of Wireless Hacking http://rapidshare.com/files/107953561/Addison_20Wesley_20-_202004_20-_20Wi-Foo_2 0The_20Secrets_20of_20Wireless_20Hacking.chm
Addison Wesley Pub Exploiting Software How To Break Code Kb http://rapidshare.com/files/107953596/Addison.Wesley.Pub.Exploiting.Software.How .to.Break.Code.eBook-kB.pdf
Searchenginemythsexposed http://rapidshare.com/files/107953601/SearchEngineMythsExposed.pdf
http://rapidshare.com/files/107953612/Malware_20-_20Fighting_20Malicious_20Code_ 20_28Prentice_20Hall-November_2021_202003_29.chm
The Art Of Intrusion The Real Stories Behind The Exploits Of Hackers Intruders http://rapidshare.com/files/107953624/The_20Art_20of_20Intrusion-The_20Real_20St ories_20Behind_20the_20Exploits_20of_20Hackers_20Intruders
Hack Attacks Revealed A Complete Reference With Custom Security Hacking Toolkit http://rapidshare.com/files/107953652/Hack_20Attacks_20Revealed-_20A_20Complete_ 20Reference_20with_20Custom_20Security_20Hacking_20Toolkit
PC Hacks Oct 2004 29 http://rapidshare.com/files/107953654/PC_20Hacks_28Oct_202004_29.chm Silence On The Wire A Field Guide To Passive Reconnaissance And Indirect 2 http://rapidshare.com/files/107953678/Silence_20On_20The_20Wire_20-_20A_20Field_ 20Guide_20To_20Passive_20Reconnaissance_20And_20Indirect_2
Hacking Exposed Network Security Secrets And Solutions Mcgraw Hill 2001 29 http://rapidshare.com/files/107953686/Hacking_20Exposed-_20Network_20Security_20 Secrets_20and_20Solutions_20_28MCGraw-Hill-2001_29.pdf
http://rapidshare.com/files/107953741/The_20Hacker_27s_20Dictionary_20eBooK_20-L egalTorrents.pdf
Hack Proofing Your Identity In The Information Age Syngress 2002 29 http://rapidshare.com/files/107953766/Hack_20Proofing_20Your_20Identity_20in_20t he_20Information_20Age_20_28Syngress-2002_29.pdf
Underground Hacking Madness 26 Obsession On The Electronic Frontier Suelette 2 http://rapidshare.com/files/107953770/Underground_20Hacking_20Madness_20_26_20Ob session_20on_20the_20Electronic_20Frontier_20_28Suelette_2
Wiley 2C The Shellcoder's Handbook Discovering And Exploiting Security 2004 29 http://rapidshare.com/files/107953805/Wiley_2C_20The_20Shellcoder_27s_20Handbook _20Discovering_20and_20Exploiting_20Security_20_282004_29_
The Extreme Searchers Internet Handbook A Guide For The Serious Searcher Fe http://rapidshare.com/files/107953955/The_20Extreme_20Searchers_20Internet_20Han dbook_20A_20Guide_20for_20the_20Serious_20Searcher_20_28Fe
Steal This Computer Book 3 What They Won't Tell You About The Internet N http://rapidshare.com/files/107953971/Steal_20This_20Computer_20Book_203_20What_ 20They_20Won_27t_20Tell_20You_20About_20the_20Internet_28N
02 15 05 Butterworth Heinemann Fatigue Testing And Analysis Theory And Practice Yyepg http://rapidshare.com/files/107955357/02.15.05.Butterworth-Heinemann.Fatigue.Tes ting.and.Analysis.Theory.and.Practice.eBook-YYePG.pdf
http://rapidshare.com/files/107957378/Strengthening_20Network_20Security_20With_ 20Web-Based_20Vulnerability_20Assessment.pdf
Addison Wesley Professional Rootkits Subverting The Windows Kernel http://rapidshare.com/files/107957550/Addison.Wesley.Professional.Rootkits.Subve rting.the.Windows.Kernel.chm
Wiley The Shellcoder's Handbook Discovering And Exploiting Security 04 Spy http://rapidshare.com/files/107957585/Wiley__20The_20Shellcoder_27s_20Handbook_2 0Discovering_20and_20Exploiting_20Security_20_2004__20spy_
Prentice Hall PTR Internet Denial Of Service Attack And Defense Mechanisms Dec 2 004 DDU http://rapidshare.com/files/107957590/Prentice.Hall.PTR.Internet.Denial.of.Servi ce.Attack.and.Defense.Mechanisms.Dec.2004.eBook-DDU.chm
Sams Inside Network Security Assessment Guarding Your IT Infrastructure Nov 2005 http://rapidshare.com/files/107957600/Sams.Inside.Network.Security.Assessment.Gu arding.Your.IT.Infrastructure.Nov.2005.chm
John Wiley And Sons The Art Of Intrusion The Real Stories Behind The Exploits Of Hackers Intruders A http://rapidshare.com/files/107957620/John.Wiley.and.Sons.The.Art.of.Intrusion.T he.Real.Stories.Behind.the.Exploits.of.Hackers.Intruders.a
Mcgraw Hill Hacknotes Web Security Portable Reference DDU http://rapidshare.com/files/107957666/McGraw.Hill.HackNotes.Web.Security.Portabl e.Reference.eBook-DDU.pdf
Addison Wesley Advanced Programming In The UNIX Environment 05 2Ed BBL Lotb http://rapidshare.com/files/107957676/Addison.Wesley_.Advanced.Programming.in.th e.UNIX.Environment._2005__.2Ed.BBL.LotB.chm
http://rapidshare.com/files/107957774/Ebook_20-_20Windows_20-_20Programming_20.N ET_20Security.chm
Microsoft Press The Security Development Lifecycle Jun 2006 http://rapidshare.com/files/107957776/Microsoft.Press.The.Security.Development.L ifecycle.Jun.2006.chm
Mcgraw Hill Hacknotes Windows Security Portable Reference DDU http://rapidshare.com/files/107957839/McGraw.Hill.HackNotes.Windows.Security.Por table.Reference.eBook-DDU.pdf
The Ethical Hack A Framework For Business Value Penetration Testing Een http://rapidshare.com/files/107957859/The.Ethical.Hack.A.Framework.for.Business. Value.Penetration.Testing.eBook-EEn.pdf
Auerbach Publications The Security Risk Assessment Handbook 05 DDU Lotb http://rapidshare.com/files/107957887/Auerbach.Publications_.The.Security.Risk.A ssessment.Handbook._2005_.DDU.LotB.pdf
Addison Wesley Pub Exploiting Software How To Break Code Kb http://rapidshare.com/files/107957939/Addison.Wesley.Pub.Exploiting.Software.How .to.Break.Code.eBook-kB.pdf
Microsoft Press Improving Web Application Security Threats And Countermeasures L ib http://rapidshare.com/files/107957957/Microsoft.Press.Improving.Web.Application. Security.Threats.and.Countermeasures.eBook-LiB.chm
The Art Of Computer Virus Research And Defense http://rapidshare.com/files/107957982/The_20Art_20Of_20Computer_20Virus_20Resear ch_20And_20Defense.chm Addison Wesley Advanced Programming In The Unix Environment 05 2Ed http://rapidshare.com/files/107958024/Addison.Wesley.Advanced.Programming.In.The .Unix.Environment._2005_.2Ed.pdf
0131482092 Prentice Hall Ptr Solaris TM Internals Solaris 10 And Opensolaris Ker ne http://rapidshare.com/files/107958046/0131482092.Prentice_20Hall_20Ptr.Solaris_T M__20Internals-_20Solaris_2010_20and_20OpenSolaris_20Kerne
http://rapidshare.com/files/107958051/THE_20SHELLCODER_27S_20HANDBOOK.pdf
Cisco Press Penetration Testing And Network Defense Nov 2005 FIXED DDU http://rapidshare.com/files/107958156/Cisco.Press.Penetration.Testing.and.Networ k.Defense.Nov.2005.FIXED.eBook-DDU.chm
0201549794 Addison Wesley Professional The Design And Implementation Of The 4 4 BSD http://rapidshare.com/files/107958206/0201549794.Addison-Wesley_20Professional.T he_20Design_20and_20Implementation_20of_20the_204.4_20BSD_
Wiley The Shellcoders Handbook 2nd Edition Aug 2007 2 http://rapidshare.com/files/107958485/Wiley.The.Shellcoders.Handbook.2nd.Edition .Aug.2007_2_.rar
http://rapidshare.com/files/107958493/_5beBook_5d_20Addison_20Wesley_20-_20Enter prise_20Java_202_20Security_20Building_20Secure_20and_20Ro
Addison Wesley Compilers Principles Techniques And Tools 2nd Edition Aug 2006 http://rapidshare.com/files/107958509/Addison.Wesley.Compilers.Principles.Techni ques.and.Tools.2nd.Edition.Aug.2006.pdf
CRC Press Cyber Crime Investigator's Field Guide B Middleton 02 W http://rapidshare.com/files/107959151/CRC_20Press_20-_20Cyber_20Crime_20Investig ator_27s_20Field_20Guide_20-_20B._20Middleton_20_2002__20W
Addison Wesley File System Forensic Analysis Mar 2005 DDU http://rapidshare.com/files/107959174/Addison.Wesley.File.System.Forensic.Analys is.Mar.2005.eBook-DDU.chm
Wireless Crime And Forensic Investigation G Kipper Auerbach 2007 WW http://rapidshare.com/files/107959317/Wireless_20Crime_20and_20Forensic_20Invest igation_20-_20G._20Kipper_20_Auerbach__202007__20WW.pdf
Incident Response And Computer Forensics 2nd Ed C Prosise K Mandia http://rapidshare.com/files/107959360/Incident_20Response_20and_20Computer_20For ensics_202nd_20ed._20-_20C._20Prosise__20K._20Mandia_20_20
Mastering Windows Network Forensics And Investigation Sybex 2007 WW http://rapidshare.com/files/107959680/Mastering_20Windows_20Network_20Forensics_ 20and_20Investigation_20_Sybex__202007__20WW.chm
C4 E6 Cf F2 B1 E0 D2 Eb Bc Bc Ca F5 http://rapidshare.com/files/107960192/_c4_e6_cf_f2_b1_e0_d2_eb_bc_bc_ca_f5.chm
Cambridge University Press Codes And Ciphers Julius Caesar The Enigma And The In ternet Kb http://rapidshare.com/files/107960274/Cambridge.University.Press.Codes.and.Ciphe rs.Julius.Caesar.the.Enigma.and.the.Internet.eBook-kB.pdf
Kernel Windows Undocumented File Formats Source Code Zip http://rapidshare.com/files/107960391/_Kernel__20Windows_20Undocumented_20File_2 0Formats_20Source_20Code.zip
Prentice Implementing CIFS The Common Internet File System Lib http://rapidshare.com/files/107960471/Prentice.Implementing.CIFS.The.Common.Inte rnet.File.System.eBook-LiB.chm
Oracle Press 0072231300 Effective Oracle Database 10g Security By Design 2 http://rapidshare.com/files/107960473/Oracle_20Press_20-_200072231300_20-_20Effe ctive_20Oracle_20Database_2010g_20Security_20by_20Design_2
Mcgraw Hill Hacknotes Web Security Portable Reference DDU http://rapidshare.com/files/107960518/McGraw.Hill.HackNotes.Web.Security.Portabl e.Reference.eBook-DDU.pdf
Reallyusefuls Com 1590596463 Apress Expert Dot NET 2 0 IL Assembler Aug 2006 BBL http://rapidshare.com/files/107960528/ReallyUsefulEbooks.com_1590596463_Apress.E xpert.dot.NET.2.0.IL.Assembler.Aug.2006.eBook-BBL.pdf
acks_20and_20Defense.chm
Giantblackbookvirus http://rapidshare.com/files/107960603/GiantBlackBookVirus.rar
Mcgraw Hill Hacknotes Windows Security Portable Reference DDU http://rapidshare.com/files/107960654/McGraw.Hill.HackNotes.Windows.Security.Por table.Reference.eBook-DDU.pdf
Cambridge University Press Advances In Elliptic Curve Cryptography May 2005 DDU http://rapidshare.com/files/107960656/Cambridge.University.Press.Advances.in.Ell iptic.Curve.Cryptography.May.2005.eBook-DDU.pdf
John Wiley And Sons Internet Security Cryptographic Principles Algorithms And Pr otocols DDU Pd http://rapidshare.com/files/107960684/John.Wiley.and.Sons.Internet.Security.Cryp tographic.Principles.Algorithms.and.Protocols.eBook-DDU.pd
Mcgraw Hill Hacking Exposed Web Applications Int DDU http://rapidshare.com/files/107960696/McGraw.Hill.Hacking.Exposed.Web.Applicatio ns.iNT.eBook-DDU.pdf
Hbyy2ppt Zip
http://rapidshare.com/files/107960707/hbyy2ppt.zip
Sams Covert Java Techniques For Decompiling Patching And Reverse Engineering Pd http://rapidshare.com/files/107960711/Sams_20-_20Covert_20Java_20Techniques_20fo r_20Decompiling__20Patching_and_20Reverse_20Engineering.pd
Springer Reverse Engineering Of Object Oriented Code Monographs In Computer Scie nce Kb http://rapidshare.com/files/107960721/Springer.Reverse.Engineering.of.Object.Ori ented.Code.Monographs.in.Computer.Science.eBook-kB.pdf
Addison 5b1 5d Wesley The Art Of Computer Virus Research And Defense Feb 2005 Li b Zip http://rapidshare.com/files/107960799/Addison_5b1_5d.Wesley.The.Art.of.Computer. Virus.Research.and.Defense.Feb.2005.eBook-LiB.zip
Mcgraw Hill RSA Security A1 Afs Official Guide To Cryptography Fly http://rapidshare.com/files/107960866/McGraw-Hill_20-_20RSA_20Security_a1_afs_20 Official_20Guide_20to_20Cryptography_20-_20fly.pdf
Decrypted Secrets Methods And Maxims Of Cryptology 9783540245025 27381 http://rapidshare.com/files/107960916/decrypted-secrets-methods-and-maxims-of-cr yptology.9783540245025.27381.pdf
Crypt http://rapidshare.com/files/107961024/crypt.rar
John Wiley And Sons Malicious Cryptography Exposing Cryptovirology DDU http://rapidshare.com/files/107961076/John.Wiley.and.Sons.Malicious.Cryptography .Exposing.Cryptovirology.eBook