Technology, programming, IT, computer science, hacking
File List
- Net+ 2009.pdf 74.5 MB
- Python/Programming Computer Vision with Python.pdf 69.2 MB
- Nmap Network Scanning.pdf 55.0 MB
- Hacking Exposed 7.epub 45.2 MB
- Wireshark Network Analysis_ The Official Wireshark Certified Network Analyst Study Guide - Laura Chappell.pdf 35.3 MB
- linux_server_hacks.pdf 34.2 MB
- Python/Starting Out with Python (2009).pdf 33.8 MB
- GoogleHackingforPenetrationTesters.pdf 32.2 MB
- Low Tech Hacking -Street Smarts for Security Professionals [NepsterJay].pdf 31.6 MB
- Python/Hello World - Computer Programming for Kids and Other Beginners, Fourth printing (2009).pdf 29.9 MB
- debian-handbook.pdf 28.6 MB
- PracticalPacketAnalysis2e.pdf 27.4 MB
- Python/Python - How to Program, 1e (2002).pdf 25.0 MB
- The Art of Readable Code.pdf 24.9 MB
- Learning Java, 4th Edition[A4].pdf 24.6 MB
- Machine Learning for hackers.pdf 24.0 MB
- Introduction to Software Development.pdf 22.7 MB
- BackTrack 5 Cookbook.pdf 22.3 MB
- Hacking Web Apps.pdf 22.0 MB
- HTML-Guide.pdf 20.8 MB
- Wireshark Network Analysis_ The Official Wireshark Certork Analyst Study Guide - Laura Chappell & Gerald Combs.mobi 20.7 MB
- Web Penetration Testing with Kali Linux.pdf 20.0 MB
- Mastering Microsoft Exchange Server 2013 - Elfassy, David.pdf 19.7 MB
- Python/Beginning Python (2005).pdf 17.5 MB
- Python/A Learner's Guide to Programming Using the Python Language (2009).pdf 16.8 MB
- BackTrack 5 Wireless Penetration Testing Beginners Guide[NepsterJay].pdf 16.6 MB
- netcat_power_tools.pdf 16.0 MB
- Python/GUI Programming with Python - QT Edition (2002).chm 15.9 MB
- CCENT Cisco Certified Entry Networking Technician (2013).pdf 15.8 MB
- CCENT-CCNA ICND1 640-822 Official Cert Guide, 3rd Edition.pdf 15.7 MB
- Python/Learning Python, Fourth Edition (2009).pdf 15.5 MB
- Python/Python Developer's Handbook, First Edition (2000).pdf 15.0 MB
- Hacking Exposed 6 (ntwk security) - S. McClure, et. al., (McGraw-Hill, 2009) BBS.pdf 14.8 MB
- Offensive.Security.WiFu.v2.0.pdf 14.5 MB
- Python/IronPython in Action (2009).pdf 14.2 MB
- Learning PHP, MySQL & JavaScript, 4th Edition.pdf 14.2 MB
- CCNA Wireless Study Guide_ IUWNE Exam 640-721 - Lammle, Todd.pdf 13.7 MB
- Python/Beginning Python - From Novice to Professional (2005) - BBL.pdf 13.3 MB
- Advanced Penetration Testing for Highly-Secured Environments- The Ultimate Security Guide [eBook].pdf 12.7 MB
- Python/wxPython in Action (2006).pdf 12.6 MB
- Offensive Security - Advanced Windows Exploitation (AWE) v 1.1/Offensive Security - Advanced Windows Exploitation (AWE) v 1.1/AWE-3.pdf 12.4 MB
- Moore-Critical-Thinking-Intelligence-Analysis.pdf 12.2 MB
- Hacking the Human.pdf 12.2 MB
- Hacking Exposed Computer Forensics Secrets & Solutions.pdf 11.6 MB
- Python/Matplotlib for Python Developers (2009).pdf 11.4 MB
- The Web Application Hackers Handbook.pdf 11.1 MB
- Hacking Exposed Wireless (ntwk security) 2nd ed - J. Cache, et al., (McGraw-Hill, 2010) BBS.pdf 11.1 MB
- Python/Python - Visual QuickStart Guide (2001).chm 11.1 MB
- Understanding TCP_IP [eBook].pdf 11.0 MB
- Fundamentals of Computer Programming with C#.pdf 11.0 MB
- Offensive Security - Advanced Windows Exploitation (AWE) v 1.1/Offensive Security - Advanced Windows Exploitation (AWE) v 1.1/AWE-2.pdf 10.7 MB
- Kali Linux Cookbook.pdf 10.7 MB
- Offensive Security - Advanced Windows Exploitation (AWE) v 1.1/Offensive Security - Advanced Windows Exploitation (AWE) v 1.1/AWE-1.pdf 10.6 MB
- CompTIA Linux Plus Study Guide 2013 for Exams LX0-101 and LX0-102 2nd Ed.pdf 10.6 MB
- Offensive Security - Penetration Testing with BackTrack (Lab Guide)v3.2.pdf 10.4 MB
- Python/Professional Python Frameworks - Web 2.0 Programming with Django and TurboGears (2007).pdf 10.3 MB
- Python/Expert Python Programming (2008).pdf 10.2 MB
- Syngress.Asterisk.Hacking.May.2007.pdf 10.2 MB
- Linux Utilities Cookbook [eBook].pdf 10.0 MB
- Ninja-Hacking.pdf 9.9 MB
- Hackers Delight - By Henry S. Warren,.pdf 9.8 MB
- Python/Programming Python, 3rd Edition (2006).chm 9.7 MB
- Python/Core Python Applns. Pgmg. 3rd ed. - W. Chun (Pearson, 2012) BBS.pdf 9.3 MB
- Python/Practical Programming - An Introduction to Computer Science Using Python, v.2009-5-6 (2009).pdf 9.2 MB
- Hacking with Kali - Broad, James, Bindner, Andrew.pdf 9.1 MB
- Microsoft Windows Xp - Command-Line Reference A-Z.pdf 9.0 MB
- Scalix- Linux Administrator’s Guide.pdf 8.5 MB
- CWTS_ Certified Wireless Technology Specialist Official Study Guide_ Exam PW0-070 - Robert J. Bartz.pdf 8.3 MB
- WordPress.3.Ultimate.Security.pdf 8.3 MB
- Mastering Metasploit- RAW [eBook].pdf 7.8 MB
- Python/The Definitive Guide to Jython - Python for the Java Platform (2010).pdf 7.7 MB
- Hardcore Windows XP - The Step by Step Guide To Ultimate Performance.pdf 7.7 MB
- How to Master CCNA v2.0.pdf 7.7 MB
- Python/Beginning Game Development with Python and Pygame - From Novice to Professional (2007).pdf 7.6 MB
- Python/Python 3 for Absolute Beginners (2009).pdf 7.6 MB
- Offensive Security - Advanced Windows Exploitation (AWE) v 1.1/Offensive Security - Advanced Windows Exploitation (AWE) v 1.1/AWE-4.pdf 7.5 MB
- Java Programming From Problem Analysis To Program Design 4th ed.pdf 7.5 MB
- OpenVPN 2 Cookbook [eBook].pdf 7.5 MB
- Python/Numerical Methods in Engineering with Python (2005).pdf 7.1 MB
- Python/Rapid GUI Programming with Python and Qt - The Definitive Guide to PyQt Programming (2008).pdf 7.0 MB
- Python/Making Use of Python (2002).pdf 6.9 MB
- Metasploit.pdf 6.9 MB
- Python/Foundations of Agile Python Development (2008).pdf 6.9 MB
- Python/A Primer on Scientific Programming with Python (2009).pdf 6.8 MB
- Certified Ethical Hacker Study Guide.pdf 6.7 MB
- Metasploit Penetration Testing Cookbook, Second Edition [eBook].pdf 6.5 MB
- Python/Python 2.1 Bible (2001).pdf 6.5 MB
- Python/Python - Create-Modify-Reuse (2008).pdf 6.3 MB
- Programming in Objective-C, 6th Edition.pdf 6.3 MB
- Python/Rapid Web Applications with TurboGears - Using Python to Create Ajax-Powered Sites (2006).chm 6.2 MB
- Python/Python Power - The Comprehensive Guide (2008).pdf 6.1 MB
- Firebug 1.5 Editing Debugging and Monitoring Web Pages [eBook].pdf 5.6 MB
- An Introduction to the Analysis of Algorithms, 2nd Edition.pdf 5.6 MB
- Python/Python Programming for the Absolute Beginner (2003).chm 5.5 MB
- Python/CherryPy Essentials - Rapid Python Web Application Development (2007).pdf 5.5 MB
- Hacking Intranet Websites.pdf 5.4 MB
- Buffer Overflow Attacks - Detect, Exploit, Prevent (Syngress, 2005) BBS.pdf 5.4 MB
- hacking_gmail.pdf 5.3 MB
- Python/A Primer on Scientific Programming with Python, 3rd Edition.pdf 5.3 MB
- Kevin_Mitnick_-_Art_Of_Deception.pdf 5.2 MB
- Identify Theft for Dummies - M. Arata (Wiley, 2010).pdf 5.1 MB
- Python/Python Scripting for Computational Science, Third Edition (2008).pdf 5.0 MB
- The Basics of Web Hacking - Pauli, Josh.pdf 5.0 MB
- The Psychology of Interrogations and Confessions A Handbook - Gisli H. Gudjonsson.pdf 5.0 MB
- Metasploit Toolkit for Penetration Testing, Exploit Development, and Vulnerability Research.pdf 4.9 MB
- Hacking, 2nd Edition.pdf 4.8 MB
- Python/Apress.Foundations.of.Python.3.Network.Programming.2nd.Edition.Dec.2010.pdf 4.8 MB
- Nessus-Network-Auditing.pdf 4.6 MB
- Own-The-Box.pdf 4.6 MB
- Python/Python Testing - Beginner's Guide (2010).pdf 4.6 MB
- Python/Beginning Python - Using Python 2.6 and Python 3.1 (2010).pdf 4.4 MB
- Python/The Quick Python Book, Second Edition (2010).pdf 4.4 MB
- Linux Kernel Development, 3rd Edition.pdf 4.3 MB
- WordPress Web Application Development [eBook].pdf 4.2 MB
- 100-uC-OS-II-002.pdf 4.1 MB
- Python/Bioinformatics Programming Using Python, First Edition (2009).pdf 4.1 MB
- Hacking The Art Of Exploitation 2nd Edition V413HAV.pdf 4.0 MB
- SSL VPN - Understanding, evaluating and planning secure, web-based remote access [eBook].pdf 3.8 MB
- Packt.Metasploit.Penetration.Testing.Cookbook.Jun.2012.RETAIL.eBook-ELOHiM.pdf 3.6 MB
- Python/Python & XML - XML Processing with Python, First Edition (2002).pdf 3.5 MB
- Offensive Security - BackTrack to the Max Cracking the Perimeter V 1.0.pdf 3.5 MB
- The Basics of Web Hacking.epub 3.5 MB
- Python/Core Python Programming, Second Edition (2006).chm 3.5 MB
- Python/Python for Unix and Linux System Administration (2008).pdf 3.4 MB
- Python/Data Structures and Algorithms with Object-Oriented Design Patterns in Python (2003).chm 3.3 MB
- Hacking - Firewalls And Networks How To Hack Into Remote Com.pdf 3.3 MB
- Wiley.Ubuntu.Linux.Toolbox.1000.plus.Commands.for.Ubuntu.and.Debian.Power.Users.Nov.2007.pdf 3.2 MB
- Python/Python Cookbook, 2nd Edition (2005).pdf 3.2 MB
- Data Mining and Machine Learning in Cybersecurity.pdf 3.2 MB
- Python/Natural Language Processing with Python (2009).pdf 3.1 MB
- Linux Shell Scripting Cookbook, Second Edition [eBook].pdf 3.1 MB
- Kevin Mitnick - The Art of Intrusion.pdf 3.1 MB
- Python/Pro IronPython (2009).pdf 3.0 MB
- Python/Gray Hat Python - Python Programming for Hackers and Reverse Engineers (2009).pdf 3.0 MB
- Python/Mobile Python - Rapid Prototyping of Applications on the Mobile Platform (2007).pdf 3.0 MB
- RTFM - Red Team Field Manual v2.pdf 2.9 MB
- Hacking---Firewalls-And-Networks-How-To-Hack-Into-Remote-Computers.pdf 2.9 MB
- Inside Cyber Warfar by Jeffrey Carr.pdf 2.8 MB
- Seven Deadliest Web Application Attacks.pdf 2.8 MB
- Linux System Programming.pdf 2.8 MB
- Python/Game Programming with Python, Lua, and Ruby (2003).pdf 2.7 MB
- Python/Beginning Python - From Novice to Professional, Second Edition (2008).pdf 2.7 MB
- Python/Invent Your Own Computer Games with Python (2008).pdf 2.7 MB
- advanced bash scripting guide.pdf 2.6 MB
- Python/Programming in Python 3 - A Complete Introduction to the Python Language, Second Edition (2010).pdf 2.5 MB
- Python/Dive Into Python 3, r867 (2010).pdf 2.5 MB
- Python/Dive Into Python 3, r870 (2010).pdf 2.5 MB
- How to Master Subnetting.pdf 2.5 MB
- Python/Teach Yourself Python in 24 Hours (2000).chm 2.4 MB
- Python/Python Essential Reference, Fourth Edition (2009).pdf 2.4 MB
- web_for_pentester.pdf 2.4 MB
- Python/Game Programming with Python, Lua, and Ruby (2003).chm 2.3 MB
- Instant Wireshark Starter [eBook].pdf 2.3 MB
- Python/Python Pocket Reference, 4th Edition (2009).pdf 2.3 MB
- Scene of the Cybercrime - Computer Forensics Handbook.pdf 2.2 MB
- Python/Beginning Python Visualization - Crafting Visual Transformation Scripts (2009).pdf 2.2 MB
- hashcat_user_manual.pdf 2.2 MB
- Python/XML Processing with Perl, Python, and PHP (2002).pdf 2.1 MB
- Hacking - Dangerous Google - Searching For Secrets by Michał Piotrowski.pdf 2.1 MB
- Python/Python Programming on Win32, First Edition (2000).chm 2.1 MB
- Python/Guide to NumPy (for Python) (2006).pdf 2.0 MB
- The Linux Command Line by William Shotts.pdf 2.0 MB
- Nmap 6 Network Exploration and Security Auditing Cookbook.pdf 1.9 MB
- Python/Python Programming with the Java Class Libraries - A Tutorial for Building Web and Enterprise Applications with Jython (2002).chm 1.8 MB
- command-line.pdf 1.7 MB
- Python/Python for Dummies (2006).pdf 1.7 MB
- SET_User_Manual.pdf 1.6 MB
- User_Manual.pdf 1.6 MB
- learnd2.pdf 1.6 MB
- we-are-anon.pdf 1.6 MB
- Linux-101-Hacks.pdf 1.6 MB
- Introduction to Linux; A Hands on Guide by Machtelt Garrels.pdf 1.5 MB
- Python/Python Cookbook, 2nd Edition (2005).chm 1.5 MB
- Apress - Pro Bash Programming Scripting the GNULinux Shell (10-2009) (ATTiCA).pdf 1.4 MB
- Python/Tkinter 8.4 reference - a GUI for Python (2010).pdf 1.4 MB
- Python/Snake Wrangling for Kids - Learning to Program with Python 3, win-v0.7.7 (2007).pdf 1.3 MB
- Python/Snake Wrangling for Kids - Learning to Program with Python 3, mac-v0.7.7 (2007).pdf 1.3 MB
- Python/Snake Wrangling for Kids - Learning to Program with Python 3, linux-v0.7.7 (2007).pdf 1.3 MB
- Python/Snake Wrangling for Kids - Learning to Program with Python 2, mac-v0.7.2 (2007).pdf 1.3 MB
- Python/Twisted Network Programming Essentials - Event-driven Network Programming with Python (2005).chm 1.2 MB
- Python/Snake Wrangling for Kids - Learning to Program with Python 2, win-v0.7.2 (2007).pdf 1.2 MB
- Python/Snake Wrangling for Kids - Learning to Program with Python 2, linux-v0.7.2 (2007).pdf 1.2 MB
- Python/diveintopython.pdf 1.2 MB
- Python/Python Programming - An Introduction to Computer Science - v1.0rc2 (2002).pdf 1.2 MB
- Ankit Fadia Hacking Guide.pdf 1.2 MB
- Python/Python in a Nutshell, 2nd Edition (2006).chm 1.1 MB
- Bash Guide for Beginners.pdf 1.1 MB
- Python/Learning to Program - Python (2006).pdf 1.1 MB
- HTTP_methods attacks.pdf 1.0 MB
- Secrets of Network Cartography A Comprehensive Guide to Nmap.pdf 1.0 MB
- Python/Python 2.6 Quick Reference (Letter) (2009).pdf 893.9 KB
- OS_and_application_fingerprinting.pdf 876.1 KB
- Python/Text Processing in Python (2003).chm 855.3 KB
- Simple Hacks - Addons, Macros And More.pdf 855.1 KB
- Python/Python for Software Design - How to Think Like a Computer Scientist (2009).pdf 783.9 KB
- Python/Python Phrasebook - Essential Code and Commands (2006).chm 767.1 KB
- Python/Jython For Java Programmers, First Edition (2001).chm 713.0 KB
- Bash Reference Manual by Chet Ramey and Brian Fox.pdf 700.1 KB
- GNU-Linux Command-Line Tools Summary Gareth Anderson.pdf 682.5 KB
- Python/Getting Started with Pyparsing (2007).pdf 624.1 KB
- Hacking Into Computer Systems - Beginners.pdf 615.1 KB
- Hacking.Into.Computer.Systems-A.Beginners.Guide---420ebooks.pdf 615.1 KB
- Python/A Byte of Python, v1.92 (for Python 3.0) (2009).pdf 608.6 KB
- metasplitable2_sih60b.pdf 583.1 KB
- Hack The Net.pdf 570.3 KB
- Hackers Survival Guide.pdf 532.7 KB
- Python/Next-Generation Web Frameworks in Python (2007).chm 478.1 KB
- Python/Perl To Python Migration (2001).chm 426.3 KB
- Bluetooth Hacking.pdf 353.6 KB
- Fadia, Ankit - Encryption Algorithms Explained.pdf 337.7 KB
- Python/A Byte of Python, v1.20 (for Python 2.x) (2005).pdf 337.1 KB
- Python/Thinking in Tkinter (2005).pdf 282.2 KB
- CompTIA_Network_N10-005.pdf 255.3 KB
- CompTIA_Security_SY0-301.pdf 227.9 KB
- A Day in the Life of a Flux Reversal - Count Zero.pdf 200.3 KB
- Algorithms Explained.doc 157.0 KB
- Hacking and Network Defense.pdf 152.6 KB
- Hacking for Dummies 2.pdf 148.3 KB
- More Password Cracking Decrypted.doc 127.0 KB
- Hacking into Linux.doc 124.5 KB
- PayPal Hacks.pdf 123.9 KB
- Phrack/phrack20.tar.gz 123.0 KB
- Hacking a Coke Machine.pdf 117.0 KB
- Phrack/phrack22.tar.gz 90.9 KB
- Phrack/phrack27.tar.gz 89.8 KB
- Hacking The Linux.pdf 86.3 KB
- Hack Proofing Your Web Server.pdf 84.4 KB
- Phrack/phrack29.tar.gz 84.2 KB
- Phrack/phrack28.tar.gz 83.1 KB
- Phrack/phrack21.tar.gz 80.4 KB
- Phrack/phrack6.tar.gz 79.3 KB
- SSL Torn Apart.doc 77.5 KB
- How to Make Key Generators.pdf 72.5 KB
- SSH_Tectia.pdf 72.1 KB
- Phrack/phrack24.tar.gz 71.3 KB
- Phrack/phrack26.tar.gz 68.4 KB
- Phrack/phrack25.tar.gz 67.5 KB
- Sendmail and Beyond.doc 62.0 KB
- Phrack/phrack23.tar.gz 58.0 KB
- Gathering Info on Remote Host.doc 54.0 KB
- Getting geographical Information using an IP Address.doc 51.0 KB
- Getting geographical Information using an IP Address (1).doc 51.0 KB
- Phrack/phrack18.tar.gz 49.7 KB
- Phrack/phrack17.tar.gz 45.1 KB
- Phrack/phrack5.tar.gz 44.8 KB
- firewalls(2).doc 44.0 KB
- firewalls.doc 44.0 KB
- Phrack/phrack11.tar.gz 43.7 KB
- Phrack/phrack12.tar.gz 41.7 KB
- Phrack/phrack8.tar.gz 39.3 KB
- Untold Windows Tips and Secrets.doc 38.0 KB
- Phrack/phrack13.tar.gz 36.3 KB
- Windows Password Files Torn Apart.doc 36.0 KB
- Phrack/phrack14.tar.gz 35.5 KB
- FTP Exploits By Ankit Fadia.pdf 35.3 KB
- Phrack/phrack7.tar.gz 34.9 KB
- Phrack/phrack4.tar.gz 34.6 KB
- TCP Wrappers Unwrapped.doc 34.5 KB
- Phrack/phrack9.tar.gz 34.3 KB
- Phrack/phrack10.tar.gz 30.4 KB
- How to Crack CD Protections.pdf 30.0 KB
- Transparent Proxies in Squid.doc 29.5 KB
- Removing Banners from your site.doc 28.5 KB
- Phrack/phrack16.tar.gz 25.7 KB
- Phrack/phrack19.tar.gz 25.1 KB
- Phrack/phrack15.tar.gz 24.8 KB
- Tracing IP,DNS,WHOIS-nsLOOKUP.pdf 23.8 KB
- Truths!!!--What they Dont teach in Manuals!!!.pdf 22.7 KB
- Phrack/phrack3.tar.gz 21.0 KB
- Phrack/phrack2.tar.gz 18.3 KB
- Dos Attacked.pdf 18.2 KB
- Phrack/phrack1.tar.gz 10.5 KB
Download Torrent
If you want to get the torrent file or original data of Technology, programming, IT, computer science, hacking, please use uTorrent, BitTorrent or Thunder.
Click here to locate the torrent file of Technology, programming, IT, computer science, ...
Related Resources
Copyright Infringement
If the content above is not authorized, please contact us via activebusinesscommunication[AT]gmail.com. Remember to include the full url in your complaint.