You are on page 1of 18

http://www.taringa.net/posts/ebooks-tutoriales/1167947/The-Hacking-Security-Crac king-165-Libros_.html Attack Of The 50ft Botnet http://rapidshare.com/files/107953073/Attack_20of_20the_2050ft_20Botnet.

pdf

A Buffer Overflow Study Attacks And Defenses 2002 29 http://rapidshare.com/files/107953082/A_20Buffer_20Overflow_20Study_20-_20Attack s_20and_20Defenses_20_282002_29.pdf

Credit Card Visa Hack Cambridge Lab 2003 29 http://rapidshare.com/files/107953084/Credit_20Card_20Visa_20Hack_28Cambridge_20 Lab-2003_29.pdf

Computer Vulnerability March 9 2000 29 http://rapidshare.com/files/107953092/Computer_20Vulnerability_28March_209_20200 0_29.pdf

How Thieves Targeted Ebay Users But Got Stopped Instead Interhack June 2003 29 P http://rapidshare.com/files/107953129/How_20Thieves_20Targeted_20eBay_20Users_20 but_20Got_20Stopped_20Instead_28Interhack-June_202003_29.p

Hacker's Desk Reference http://rapidshare.com/files/107953152/Hacker_27s_20Desk_20Reference.pdf

The Complete History Of Hacking http://rapidshare.com/files/107953156/The_20Complete_20History_20of_20Hacking.pd f

Hacking Exposed Windows 2003 Chapter 5 http://rapidshare.com/files/107953186/Hacking_20Exposed-_20Windows_202003_20Chap ter_205.pdf

How Computers Work

http://rapidshare.com/files/107953206/How_20computers_20work.pdf

Hacking For Dummies Access To Other Peoples Systems Made Simple http://rapidshare.com/files/107953232/Hacking_20for_20Dummies-Access_20to_20Othe r_20Peoples_20Systems_20Made_20Simple.pdf

Hacking Guide V3 1 5Bwww Netz Ru 5D http://rapidshare.com/files/107953246/Hacking_20Guide_20v3.1_5Bwww.netz.ru_5D.pd f

Maximum Security A Hackers Guide To Protect Your Internet http://rapidshare.com/files/107953249/Maximum_20Security_-A_20Hackers_20Guide_20 to_20_20Protect_20Your_20Internet_20.chm

Spidering Hacks O'Reilly October 2003 29 http://rapidshare.com/files/107953251/Spidering_20Hacks_28O_27Reilly-_20October_ 202003_29.chm

Amazon Hacks O'reilly August 2003 29 http://rapidshare.com/files/107953276/Amazon_20Hacks_20-_20_28O_27reilly-August_ 202003_29.chm

Hacked Tale http://rapidshare.com/files/107953309/hacked_tale.pdf

O'Reilly Network Security Tools http://rapidshare.com/files/107953375/O_27Reilly_20-_20Network_20Security_20Tool s.rar

Maximum Security 2C 3rd Edition Sams April 2001 29 http://rapidshare.com/files/107953399/Maximum_20Security_2C_203rd_20Edition_28Sa ms-April_202001_29.chm

Hackers Delight Addison Wesley 2003 29

http://rapidshare.com/files/107953403/Hackers_20Delight_28_20Addison_20Wesley-_2 02003_20_29.chm

Network Security Tools Oreilly Apr 2005 29 http://rapidshare.com/files/107953415/Network_20Security_20Tools_20_28OReilly-_2 0Apr_202005_29.chm

Sams 1337 H4x0r H4ndb00k Aug 2005 http://rapidshare.com/files/107953437/Sams.1337.h4x0r.h4ndb00k.Aug.2005.chm

Addison Wesley 2004 Wi Foo The Secrets Of Wireless Hacking http://rapidshare.com/files/107953561/Addison_20Wesley_20-_202004_20-_20Wi-Foo_2 0The_20Secrets_20of_20Wireless_20Hacking.chm

The Art Of Deception By Kevin Mitnick http://rapidshare.com/files/107953574/The_20Art_20of_20Deception_20by_20Kevin_20 Mitnick.pdf

Practical Study Remote Access Cisco December 22 2C 2003 29 http://rapidshare.com/files/107953577/Practical_20Study_20Remote_20Access_20_28C isco-December_2022_2C_202003_29.chm

PDF Hack Aug 2004 29 http://rapidshare.com/files/107953593/PDF_20Hack_28Aug_202004_29.chm

Addison Wesley Pub Exploiting Software How To Break Code Kb http://rapidshare.com/files/107953596/Addison.Wesley.Pub.Exploiting.Software.How .to.Break.Code.eBook-kB.pdf

Searchenginemythsexposed http://rapidshare.com/files/107953601/SearchEngineMythsExposed.pdf

Malware Fighting Malicious Code Prentice Hall November 21 2003 29

http://rapidshare.com/files/107953612/Malware_20-_20Fighting_20Malicious_20Code_ 20_28Prentice_20Hall-November_2021_202003_29.chm

The Art Of Intrusion The Real Stories Behind The Exploits Of Hackers Intruders http://rapidshare.com/files/107953624/The_20Art_20of_20Intrusion-The_20Real_20St ories_20Behind_20the_20Exploits_20of_20Hackers_20Intruders

Crackproof Your Software No Starch 2002 29 http://rapidshare.com/files/107953632/Crackproof_20Your_20Software_28No_20Starch -2002_29.pdf

Hack Attacks Revealed A Complete Reference With Custom Security Hacking Toolkit http://rapidshare.com/files/107953652/Hack_20Attacks_20Revealed-_20A_20Complete_ 20Reference_20with_20Custom_20Security_20Hacking_20Toolkit

PC Hacks Oct 2004 29 http://rapidshare.com/files/107953654/PC_20Hacks_28Oct_202004_29.chm Silence On The Wire A Field Guide To Passive Reconnaissance And Indirect 2 http://rapidshare.com/files/107953678/Silence_20On_20The_20Wire_20-_20A_20Field_ 20Guide_20To_20Passive_20Reconnaissance_20And_20Indirect_2

Hacking Exposed Network Security Secrets And Solutions Mcgraw Hill 2001 29 http://rapidshare.com/files/107953686/Hacking_20Exposed-_20Network_20Security_20 Secrets_20and_20Solutions_20_28MCGraw-Hill-2001_29.pdf

Mcgraw Hill Hacking Exposed Web Applications http://rapidshare.com/files/107953700/McGraw_20Hill_Hacking_20Exposed_20Web_20Ap plications.pdf

Understanding Windows Shellcode http://rapidshare.com/files/107953714/Understanding_20Windows_20Shellcode.pdf

The Hacker's Dictionary Legaltorrents

http://rapidshare.com/files/107953741/The_20Hacker_27s_20Dictionary_20eBooK_20-L egalTorrents.pdf

Hack Proofing Your Identity In The Information Age Syngress 2002 29 http://rapidshare.com/files/107953766/Hack_20Proofing_20Your_20Identity_20in_20t he_20Information_20Age_20_28Syngress-2002_29.pdf

Underground Hacking Madness 26 Obsession On The Electronic Frontier Suelette 2 http://rapidshare.com/files/107953770/Underground_20Hacking_20Madness_20_26_20Ob session_20on_20the_20Electronic_20Frontier_20_28Suelette_2

Windows Server Hack O'Reilly March 2004 29 http://rapidshare.com/files/107953790/Windows_20Server_20Hack_28O_27Reilly_20-_2 0March_202004_29.chm

Wiley 2C The Shellcoder's Handbook Discovering And Exploiting Security 2004 29 http://rapidshare.com/files/107953805/Wiley_2C_20The_20Shellcoder_27s_20Handbook _20Discovering_20and_20Exploiting_20Security_20_282004_29_

Google Hacking For Penetration Tester Syngress 2005 29 http://rapidshare.com/files/107953914/Google_20Hacking_20for_20Penetration_20Tes ter_20_28Syngress-2005_29.pdf

Windows XP Hacks O'reilly Auguest 2003 29 http://rapidshare.com/files/107953925/Windows_20XP_20Hacks_20_28O_27reilly-_20Au guest_202003_29.chm

Hacking For Dummies John Wiley 2004 29 http://rapidshare.com/files/107953926/Hacking_20for_20Dummies_20_28John_20Wiley2004_29.pdf

Tricks Of The Internet Gurus April 1999 29 http://rapidshare.com/files/107953935/Tricks_20of_20the_20Internet_20Gurus_20_28 April_201999_29.pdf

The Extreme Searchers Internet Handbook A Guide For The Serious Searcher Fe http://rapidshare.com/files/107953955/The_20Extreme_20Searchers_20Internet_20Han dbook_20A_20Guide_20for_20the_20Serious_20Searcher_20_28Fe

Wi Foo The Secrets Of Wireless Hacking http://rapidshare.com/files/107953958/Wi-Foo_20-_20The_20Secrets_20Of_20Wireless _20Hacking.chm

Steal This Computer Book 3 What They Won't Tell You About The Internet N http://rapidshare.com/files/107953971/Steal_20This_20Computer_20Book_203_20What_ 20They_20Won_27t_20Tell_20You_20About_20the_20Internet_28N

Hacking Exposed 2C 5th Edition http://rapidshare.com/files/107954011/Hacking_20Exposed_2C_205th_20Edition.chm

Cascading Style Sheets CSS Reference Card 1 0 http://rapidshare.com/files/107955299/Cascading_20Style_20Sheets_20_CSS__20refer ence_20card_201.0.pdf

02 15 05 Butterworth Heinemann Fatigue Testing And Analysis Theory And Practice Yyepg http://rapidshare.com/files/107955357/02.15.05.Butterworth-Heinemann.Fatigue.Tes ting.and.Analysis.Theory.and.Practice.eBook-YYePG.pdf

1931769494 A List Publishing Hacker Web Exploitation Uncovered http://rapidshare.com/files/107957364/1931769494.A-List_20Publishing.Hacker_20We b_20Exploitation_20Uncovered.chm

A Buffer Overflow Study Attacks And Defenses 02 http://rapidshare.com/files/107957367/A_Buffer_Overflow_Study_-_Attacks_and_Defe nses__2002_.pdf

Strengthening Network Security With Web Based Vulnerability Assessment

http://rapidshare.com/files/107957378/Strengthening_20Network_20Security_20With_ 20Web-Based_20Vulnerability_20Assessment.pdf

Computer Vulnerability March 9 00 http://rapidshare.com/files/107957397/Computer_Vulnerability_March_9_2000_.pdf

The Oracle Hackers Handbook Jan 2007 BBL http://rapidshare.com/files/107957464/The.Oracle.Hackers.Handbook.Jan.2007.eBook -BBL.chm

C And Assembly Language Reference http://rapidshare.com/files/107957508/C___20and_20Assembly_20Language_20Referenc e.pdf

The Database Hacker's Handbook Defending Database Servers http://rapidshare.com/files/107957540/The_20Database_20Hacker_27s_20Handbook_20_20Defending_20Database_20Servers.chm

The Art Of Exploitation FOS http://rapidshare.com/files/107957541/The.Art.of.Exploitation-FOS.chm

Addison Wesley Professional Rootkits Subverting The Windows Kernel http://rapidshare.com/files/107957550/Addison.Wesley.Professional.Rootkits.Subve rting.the.Windows.Kernel.chm

Oreilly Oracle Security Oreilly 1998 http://rapidshare.com/files/107957564/OReilly_20-_20Oracle.Security.OReilly.1998 .chm

Wiley The Shellcoder's Handbook Discovering And Exploiting Security 04 Spy http://rapidshare.com/files/107957585/Wiley__20The_20Shellcoder_27s_20Handbook_2 0Discovering_20and_20Exploiting_20Security_20_2004__20spy_

Prentice Hall PTR Internet Denial Of Service Attack And Defense Mechanisms Dec 2 004 DDU http://rapidshare.com/files/107957590/Prentice.Hall.PTR.Internet.Denial.of.Servi ce.Attack.and.Defense.Mechanisms.Dec.2004.eBook-DDU.chm

Secure Coding Principles And Practices http://rapidshare.com/files/107957596/Secure_20Coding_20Principles_20and_20Pract ices.pdf

Sams Inside Network Security Assessment Guarding Your IT Infrastructure Nov 2005 http://rapidshare.com/files/107957600/Sams.Inside.Network.Security.Assessment.Gu arding.Your.IT.Infrastructure.Nov.2005.chm

John Wiley And Sons The Art Of Intrusion The Real Stories Behind The Exploits Of Hackers Intruders A http://rapidshare.com/files/107957620/John.Wiley.and.Sons.The.Art.of.Intrusion.T he.Real.Stories.Behind.the.Exploits.of.Hackers.Intruders.a

Mcgraw Hill Hacknotes Web Security Portable Reference DDU http://rapidshare.com/files/107957666/McGraw.Hill.HackNotes.Web.Security.Portabl e.Reference.eBook-DDU.pdf

Addison Wesley Advanced Programming In The UNIX Environment 05 2Ed BBL Lotb http://rapidshare.com/files/107957676/Addison.Wesley_.Advanced.Programming.in.th e.UNIX.Environment._2005__.2Ed.BBL.LotB.chm

Addison Wesley Software Security Building Security In 06 BBL http://rapidshare.com/files/107957756/Addison.Wesley_.Software.Security.Building .Security.In._2006_.BBL.chm

Computer Security Art And Science http://rapidshare.com/files/107957768/Computer_20Security_20Art_20And_20Science. chm

Windows Programming NET Security

http://rapidshare.com/files/107957774/Ebook_20-_20Windows_20-_20Programming_20.N ET_20Security.chm

Microsoft Press The Security Development Lifecycle Jun 2006 http://rapidshare.com/files/107957776/Microsoft.Press.The.Security.Development.L ifecycle.Jun.2006.chm

The Art Of Intrusion http://rapidshare.com/files/107957780/The_Art_of_Intrusion.pdf

Sams Maximum Security Fourth Edition http://rapidshare.com/files/107957809/Sams.Maximum.Security.Fourth.Edition.chm

Mcgraw Hill Osborne Media XML Security Tlf http://rapidshare.com/files/107957823/McGraw.Hill.Osborne.Media.XML.Security.eBo ok-TLFeBOOK.pdf

Mcgraw Hill Hacknotes Windows Security Portable Reference DDU http://rapidshare.com/files/107957839/McGraw.Hill.HackNotes.Windows.Security.Por table.Reference.eBook-DDU.pdf

Software Vulnerability Analysis http://rapidshare.com/files/107957840/Software_20Vulnerability_20Analysis.pdf

Oreilly Security Warrior DDU http://rapidshare.com/files/107957855/Oreilly.Security.Warrior.eBook-DDU.chm

Art Of Software Security Assessment http://rapidshare.com/files/107957857/Art.of.Software.Security.Assessment.chm

The Ethical Hack A Framework For Business Value Penetration Testing Een http://rapidshare.com/files/107957859/The.Ethical.Hack.A.Framework.for.Business. Value.Penetration.Testing.eBook-EEn.pdf

1931769508 A List Publishing Hacker Linux Uncovered http://rapidshare.com/files/107957873/1931769508.A-List_20Publishing.Hacker_20Li nux_20Uncovered.chm

Auerbach Publications The Security Risk Assessment Handbook 05 DDU Lotb http://rapidshare.com/files/107957887/Auerbach.Publications_.The.Security.Risk.A ssessment.Handbook._2005_.DDU.LotB.pdf

Addison Wesley Pub Exploiting Software How To Break Code Kb http://rapidshare.com/files/107957939/Addison.Wesley.Pub.Exploiting.Software.How .to.Break.Code.eBook-kB.pdf

Microsoft Press Improving Web Application Security Threats And Countermeasures L ib http://rapidshare.com/files/107957957/Microsoft.Press.Improving.Web.Application. Security.Threats.and.Countermeasures.eBook-LiB.chm

The Art Of Computer Virus Research And Defense http://rapidshare.com/files/107957982/The_20Art_20Of_20Computer_20Virus_20Resear ch_20And_20Defense.chm Addison Wesley Advanced Programming In The Unix Environment 05 2Ed http://rapidshare.com/files/107958024/Addison.Wesley.Advanced.Programming.In.The .Unix.Environment._2005_.2Ed.pdf

The Art Of Deception By Kevin Mitnick http://rapidshare.com/files/107958027/The_Art_of_Deception_by_Kevin_Mitnick.pdf

0131482092 Prentice Hall Ptr Solaris TM Internals Solaris 10 And Opensolaris Ker ne http://rapidshare.com/files/107958046/0131482092.Prentice_20Hall_20Ptr.Solaris_T M__20Internals-_20Solaris_2010_20and_20OpenSolaris_20Kerne

THE SHELLCODER'S HANDBOOK

http://rapidshare.com/files/107958051/THE_20SHELLCODER_27S_20HANDBOOK.pdf

The Assembly Programming Master Book http://rapidshare.com/files/107958061/The__20Assembly__20Programming__20Master__ 20Book.chm

Cisco Press Penetration Testing And Network Defense Nov 2005 FIXED DDU http://rapidshare.com/files/107958156/Cisco.Press.Penetration.Testing.and.Networ k.Defense.Nov.2005.FIXED.eBook-DDU.chm

0201549794 Addison Wesley Professional The Design And Implementation Of The 4 4 BSD http://rapidshare.com/files/107958206/0201549794.Addison-Wesley_20Professional.T he_20Design_20and_20Implementation_20of_20the_204.4_20BSD_

Designing And Writing Secure Application Code http://rapidshare.com/files/107958398/ebook_20-_20Designing_20and_20Writing_20Se cure_20Application_20Code.pdf

Wiley How Debuggers Work Djvu http://rapidshare.com/files/107958416/Wiley_20-_20How_20Debuggers_20Work.djvu Tlf Spusd http://rapidshare.com/files/107958448/tlf-spusd.pdf

Programing Windows System Programming Third Edition http://rapidshare.com/files/107958467/programing_20-_20Windows.System.Programmin g.Third.Edition.chm

Wiley The Shellcoders Handbook 2nd Edition Aug 2007 2 http://rapidshare.com/files/107958485/Wiley.The.Shellcoders.Handbook.2nd.Edition .Aug.2007_2_.rar

5b 5d Addison Wesley Enterprise Java 2 Security Building Secure And Ro

http://rapidshare.com/files/107958493/_5beBook_5d_20Addison_20Wesley_20-_20Enter prise_20Java_202_20Security_20Building_20Secure_20and_20Ro

Network Protocols Handbook 9780974094526 27099 http://rapidshare.com/files/107958496/network-protocols-handbook.9780974094526.2 7099.pdf

Addison Wesley Compilers Principles Techniques And Tools 2nd Edition Aug 2006 http://rapidshare.com/files/107958509/Addison.Wesley.Compilers.Principles.Techni ques.and.Tools.2nd.Edition.Aug.2006.pdf

Wiley The CISSP Prep Guide Gold Edition Kb http://rapidshare.com/files/107958526/Wiley.The.CISSP.Prep.Guide.Gold.Edition.eB ook-kB.pdf

5b Eng 5d Penetration Tester's Open Source Toolkit http://rapidshare.com/files/107958727/_5beBook_20-_20Eng_5d_20Penetration_20Test er_27s_20-_20Open_20Source_20Toolkit.pdf

Oreilly Internet Forensics Oct 2005 http://rapidshare.com/files/107959092/OReilly.Internet.Forensics.Oct.2005.chm

Internet Forensics R Jones Oreilly 2005 WW http://rapidshare.com/files/107959108/Internet_20Forensics_20-_20R._20Jones_20_O Reilly__202005__20WW.chm

CRC Press Cyber Crime Investigator's Field Guide B Middleton 02 W http://rapidshare.com/files/107959151/CRC_20Press_20-_20Cyber_20Crime_20Investig ator_27s_20Field_20Guide_20-_20B._20Middleton_20_2002__20W

Computer And Intrusion Forensics G Mohay Et Al Artech House 2003 WW http://rapidshare.com/files/107959155/Computer_20And_20Intrusion_20Forensics_20_20G._20Mohay__20et_20al.__20_Artech_20House__202003__20WW

Addison Wesley File System Forensic Analysis Mar 2005 DDU http://rapidshare.com/files/107959174/Addison.Wesley.File.System.Forensic.Analys is.Mar.2005.eBook-DDU.chm

CRC Press Cyber Forensics A Marcella R Greenfield 02 WW http://rapidshare.com/files/107959176/CRC_20Press_20-_20Cyber_20Forensics_20-_20 A._20Marcella__20R._20Greenfield_20_2002__20WW.pdf

CRC Press Investigating Computer Related Crime P Stephenson 00 WW http://rapidshare.com/files/107959211/CRC_20Press_20-_20Investigating_20Computer -Related_20Crime_20-_20P._20Stephenson_20_2000__20WW.pdf

Cyber Forensics Een http://rapidshare.com/files/107959212/Cyber.Forensics.eBook-EEn.pdf

CD And DVD Forensics P Crowley Syngress 2007 WW http://rapidshare.com/files/107959227/CD_20and_20DVD_20Forensics_20-_20P._20Crow ley_20_Syngress__202007__20WW.pdf

Wireless Crime And Forensic Investigation G Kipper Auerbach 2007 WW http://rapidshare.com/files/107959317/Wireless_20Crime_20and_20Forensic_20Invest igation_20-_20G._20Kipper_20_Auerbach__202007__20WW.pdf

Incident Response And Computer Forensics 2nd Ed C Prosise K Mandia http://rapidshare.com/files/107959360/Incident_20Response_20and_20Computer_20For ensics_202nd_20ed._20-_20C._20Prosise__20K._20Mandia_20_20

Encyclopedia Of Forensic Sciences 3 Volumes WW http://rapidshare.com/files/107959576/Encyclopedia_20of_20Forensic_20Sciences_20 _3_20volumes__20WW.pdf

Mastering Windows Network Forensics And Investigation Sybex 2007 WW http://rapidshare.com/files/107959680/Mastering_20Windows_20Network_20Forensics_ 20and_20Investigation_20_Sybex__202007__20WW.chm

Oreilly Essential PHP Security Oct 2005 http://rapidshare.com/files/107960079/OReilly.Essential.PHP.Security.Oct.2005.ch m

Writing Clean Code http://rapidshare.com/files/107960159/Writing_20Clean_20Code.rar

C4 E6 Cf F2 B1 E0 D2 Eb Bc Bc Ca F5 http://rapidshare.com/files/107960192/_c4_e6_cf_f2_b1_e0_d2_eb_bc_bc_ca_f5.chm

Cambridge University Press Codes And Ciphers Julius Caesar The Enigma And The In ternet Kb http://rapidshare.com/files/107960274/Cambridge.University.Press.Codes.and.Ciphe rs.Julius.Caesar.the.Enigma.and.the.Internet.eBook-kB.pdf

Oreilly Network Security Tools Apr 2005 Lib http://rapidshare.com/files/107960331/OReilly.Network.Security.Tools.Apr.2005.eB ook-LiB.chm

Kernel Windows Undocumented File Formats Source Code Zip http://rapidshare.com/files/107960391/_Kernel__20Windows_20Undocumented_20File_2 0Formats_20Source_20Code.zip

Prentice Implementing CIFS The Common Internet File System Lib http://rapidshare.com/files/107960471/Prentice.Implementing.CIFS.The.Common.Inte rnet.File.System.eBook-LiB.chm

Oracle Press 0072231300 Effective Oracle Database 10g Security By Design 2 http://rapidshare.com/files/107960473/Oracle_20Press_20-_200072231300_20-_20Effe ctive_20Oracle_20Database_2010g_20Security_20by_20Design_2

Wiley How Debuggers Work Djvu http://rapidshare.com/files/107960491/Wiley_20-_20How_20Debuggers_20Work.djvu

Mcgraw Hill Hacknotes Web Security Portable Reference DDU http://rapidshare.com/files/107960518/McGraw.Hill.HackNotes.Web.Security.Portabl e.Reference.eBook-DDU.pdf

Mcgraw Hill Web Services Security Lib http://rapidshare.com/files/107960521/McGraw.Hill.Web.Services.Security.eBook-Li B.chm

Apress Cryptography In C And C http://rapidshare.com/files/107960527/Apress_-_Cryptography_in_C_and_C__.chm

Reallyusefuls Com 1590596463 Apress Expert Dot NET 2 0 IL Assembler Aug 2006 BBL http://rapidshare.com/files/107960528/ReallyUsefulEbooks.com_1590596463_Apress.E xpert.dot.NET.2.0.IL.Assembler.Aug.2006.eBook-BBL.pdf

Packet Filtering Catching The Cool Packets Fly http://rapidshare.com/files/107960535/Packet.Filtering-Catching.the.Cool.Packets _-fly.chm

Mcgraw Hill Intrusion Detection And Prevention Lib http://rapidshare.com/files/107960540/McGraw.Hill.Intrusion.Detection.And.Preven tion.eBook-LiB.chm

Ms Press Writing Secure Code http://rapidshare.com/files/107960547/ms_20press_20-_20writing_20secure_20code.c hm

The Art Of Disassembly http://rapidshare.com/files/107960548/The_20Art_20of_20Disassembly.rar

Addison Wesley Web Hacking Attacks And Defense http://rapidshare.com/files/107960579/Addison_20Wesley_20-_20Web_20Hacking_20Att

acks_20and_20Defense.chm

Giantblackbookvirus http://rapidshare.com/files/107960603/GiantBlackBookVirus.rar

Code Complete 2nd Edition June 2004 http://rapidshare.com/files/107960636/Code.Complete.2nd.Edition.June.2004.rar

Mcgraw Hill Hacknotes Windows Security Portable Reference DDU http://rapidshare.com/files/107960654/McGraw.Hill.HackNotes.Windows.Security.Por table.Reference.eBook-DDU.pdf

Cambridge University Press Advances In Elliptic Curve Cryptography May 2005 DDU http://rapidshare.com/files/107960656/Cambridge.University.Press.Advances.in.Ell iptic.Curve.Cryptography.May.2005.eBook-DDU.pdf

Oreilly Web Security Privacy 26 Commerce 2nd Edition http://rapidshare.com/files/107960667/OReilly_20-_20Web_20Security__20Privacy_20 _26_20Commerce__202nd_20Edition.chm

John Wiley And Sons Internet Security Cryptographic Principles Algorithms And Pr otocols DDU Pd http://rapidshare.com/files/107960684/John.Wiley.and.Sons.Internet.Security.Cryp tographic.Principles.Algorithms.and.Protocols.eBook-DDU.pd

Crackproof Your Software 02 http://rapidshare.com/files/107960688/Crackproof_20Your_20Software_20_2002_.pdf

Mcgraw Hill Hacking Exposed Web Applications Int DDU http://rapidshare.com/files/107960696/McGraw.Hill.Hacking.Exposed.Web.Applicatio ns.iNT.eBook-DDU.pdf

Hbyy2ppt Zip

http://rapidshare.com/files/107960707/hbyy2ppt.zip

Sams Covert Java Techniques For Decompiling Patching And Reverse Engineering Pd http://rapidshare.com/files/107960711/Sams_20-_20Covert_20Java_20Techniques_20fo r_20Decompiling__20Patching_and_20Reverse_20Engineering.pd

Springer Reverse Engineering Of Object Oriented Code Monographs In Computer Scie nce Kb http://rapidshare.com/files/107960721/Springer.Reverse.Engineering.of.Object.Ori ented.Code.Monographs.in.Computer.Science.eBook-kB.pdf

Internet And Intranet Security Second Edition Fly http://rapidshare.com/files/107960739/Internet.and.Intranet.Security.Second.Edit ion-fly.chm

Undocumented Windows 2000 Secrets Bc F2 Cc E5 D6 D0 Ce C4 B0 E6 http://rapidshare.com/files/107960790/Undocumented_20Windows_202000_20Secrets_bc _f2_cc_e5_d6_d0_ce_c4_b0_e6.pdf

Addison 5b1 5d Wesley The Art Of Computer Virus Research And Defense Feb 2005 Li b Zip http://rapidshare.com/files/107960799/Addison_5b1_5d.Wesley.The.Art.of.Computer. Virus.Research.and.Defense.Feb.2005.eBook-LiB.zip

Protect Your Information With Intrusion Detection Fly http://rapidshare.com/files/107960819/Protect.Your.Information.with.Intrusion.De tection-fly.chm

Mcgraw Hill RSA Security A1 Afs Official Guide To Cryptography Fly http://rapidshare.com/files/107960866/McGraw-Hill_20-_20RSA_20Security_a1_afs_20 Official_20Guide_20to_20Cryptography_20-_20fly.pdf

0849380340 AUERBACH The Debugger's Handbook http://rapidshare.com/files/107960879/0849380340.AUERBACH.The_20Debugger_27s_20H andbook.pdf

Decrypted Secrets Methods And Maxims Of Cryptology 9783540245025 27381 http://rapidshare.com/files/107960916/decrypted-secrets-methods-and-maxims-of-cr yptology.9783540245025.27381.pdf

Computer Security And Cryptography http://rapidshare.com/files/107960959/computer-security-and-cryptography.pdf

No Starch Press The Art Of Assembly Language Lib http://rapidshare.com/files/107960968/No.Starch.Press.The.Art.Of.Assembly.Langua ge.eBook-LiB.chm

Crypt http://rapidshare.com/files/107961024/crypt.rar

John Wiley And Sons Malicious Cryptography Exposing Cryptovirology DDU http://rapidshare.com/files/107961076/John.Wiley.and.Sons.Malicious.Cryptography .Exposing.Cryptovirology.eBook

You might also like