pack15.5
File List
- Ransomware: Practical Reverse Engineering.zip 190.5 MB
- Applied Cryptography: Protocols, Algorithms, and Source Code in C 20th Anniversary Edition.pdf 157.2 MB
- Secret History: The Story of Cryptology.pdf 137.7 MB
- Foundations of Coding: Theory and Applications of Error-Correcting Codes with an Introduction to Cryptography and Information Theory.pdf 61.4 MB
- Guide to Pairing-Based Cryptograpy.pdf 57.3 MB
- Cryptographic Hardware and Embedded Systems - CHES 2015.pdf 56.0 MB
- Making, Breaking Codes: An Introduction to Cryptology.pdf 43.8 MB
- Introduction to Modern Cryptography.pdf 37.7 MB
- CEHv9 Certified Ethical Hacker Version 9 Study Guide Exam 312-50.pdf 37.1 MB
- Cryptographic Hardware and Embedded Systems CHES 2017.pdf 36.7 MB
- CryptoSchool.pdf 35.4 MB
- Fundamentals of Cryptology: A Professional Reference and Interactive Tutorial.pdf 29.7 MB
- Malicious Cryptography - Exposing Cryptovirology.pdf 29.1 MB
- Cryptographic Hardware and Embedded Systems -- CHES 2014.pdf 26.5 MB
- Introduction to Cryptography with Coding Theory.pdf 26.4 MB
- Unauthorised Access: Physical Penetration Testing for IT Security Teams.pdf 26.0 MB
- Practical Cryptology and Web Security.pdf 25.2 MB
- Applied Cryptography and Network Security 2015.pdf 23.1 MB
- Practical Reverse Engineering: x86, x64, ARM, Windows Kernel, Reversing Tools, and Obfuscation.pdf 22.4 MB
- Advances in Cryptology EUROCRYPT 2016 Part I.pdf 22.4 MB
- Threat Modeling: Designing for Security.pdf 21.7 MB
- Windows Malware Analysis Essentials: Master the fundamentals of malware analysis for the Windows platform and enhance your anti-malware skill set.pdf 20.6 MB
- Cryptography: An Introduction.pdf 20.3 MB
- Advances in Cryptology EUROCRYPT 2016 Part II.pdf 19.4 MB
- New Directions of Modern Cryptography.epub 18.8 MB
- Cryptography and Data Security.pdf 18.6 MB
- Hack in the Box: Volume 1, Issue 2, April 2010.pdf 18.5 MB
- Global Security Solutions and Applied Cryptography in Smart Grid Communications.pdf 18.1 MB
- Cracking Codes and Cryptograms for Dummies (ISBN - 0470591005).pdf 18.1 MB
- Prentice, Modern Cryptography Theory And Practice (2003) Kb.pdf 17.8 MB
- The Web Application Hacker's Handbook Finding and Exploiting Security Flaws 2nd Edition.pdf 16.3 MB
- Hack in the Box: Volume 1, Issue 3, July 2010.pdf 16.2 MB
- Hack in the Box: Stepping into a Malicious PDF Document Volume 1 Issue 4 October 2010.pdf 15.8 MB
- Applied Cryptography and Network Security 2016.pdf 15.6 MB
- Security Automation with Ansible 2: Leverage Ansible 2 to automate complex security tasks like application security, network security, and malware analysis.epub 14.6 MB
- Security and Cryptography for Networks 10th International Conference.pdf 14.5 MB
- The Art Of Memory Forensics - Detecting Malware And Threats In Windows Linux And Mac Memory.pdf 14.3 MB
- User's Guide To Cryptography And Standards.pdf 14.2 MB
- Paradigms in Cryptology - Mycrypt 2016: Malicious and Exploratory Cryptology.pdf 14.1 MB
- Modern Cryptography: Applied Mathematics for Encryption and Information Security.pdf 13.7 MB
- Cryptography: Cracking Codes.pdf 12.8 MB
- Visual Cryptography and Its Applications.pdf 12.1 MB
- Cryptographic Hardware and Embedded Systems - CHES 2009.pdf 11.1 MB
- Security, Privacy, and Applied Cryptography Engineering.pdf 10.6 MB
- Public-Key Cryptography PKC 2017.pdf 9.9 MB
- Visual Cryptography and Secret Image Sharing.pdf 9.7 MB
- Practical Malware Analysis - The Hands-On Guide to Dissecting Malicious Software.pdf 9.3 MB
- Theory of Cryptography 2007.pdf 9.1 MB
- Cryptography and Network Security: Principles and Practice 7th Global Edition.pdf 9.0 MB
- Decrypted Secrets: Methods and Maxims of Cryptology.djvu 8.7 MB
- Topics in Cryptology CT-RSA 2014.pdf 8.4 MB
- A Classical Introduction to Cryptography Exercise Book.pdf 8.4 MB
- Contemporary Cryptography.pdf 7.7 MB
- Cuckoo Malware Analysis: Analyze malware using Cuckoo Sandbox.pdf 7.5 MB
- Introduction to Modern Cryptography 2nd Edition.pdf 7.5 MB
- Accelerated Windows Malware Analysis with Memory Dumps: Training Course Transcript and Windbg Practice Exercises.pdf 7.1 MB
- Understanding Cryptography.pdf 6.8 MB
- Innovative Cryptography 2nd Edition.pdf 6.6 MB
- Introduction to Certificateless Cryptography.pdf 6.2 MB
- Social Engineering: The Art of Human Hacking.pdf 6.1 MB
- Selected Areas in Cryptography SAC 2009.pdf 6.0 MB
- Introduction to Cryptography with Maple.pdf 5.8 MB
- AVIEN Malware Defense Guide.pdf 5.7 MB
- BigNum Math Implementing Cryptographic Multiple Precision Arithmetic 2006.pdf 5.6 MB
- Selected Areas in Cryptography SAC 2008.pdf 5.4 MB
- To Be A Machine: Adventures Among Cyborgs, Utopians, Hackers, and the Futurists Solving modest Problem of Death.epub 5.1 MB
- Cryptography for Developers: The Only Cryptography Guide Written for Software Developers.pdf 5.0 MB
- Applied Quantum Cryptography.pdf 4.9 MB
- The Code Book: The Science of Secrecy From Ancient Egypt to Quantum Cryptography.epub 4.9 MB
- Cryptology Unlocked.pdf 4.7 MB
- Handbook Of Applied Cryptography.pdf 4.6 MB
- Cryptography and Security in Computing.pdf 4.5 MB
- Mathematics of Public Key Cryptography.pdf 4.5 MB
- Everyday Cryptography: Fundamental Principles & Applications.azw3 4.5 MB
- Computational Number Theory and Modern Cryptography.pdf 4.5 MB
- Serious Cryptography: A Practical Introduction to Modern Encryption.azw3 4.1 MB
- Cryptography For Dummies 2004.chm 4.0 MB
- The Design of Rijndael AES - The Advanced Encryption Standard (Information Security and Cryptography).pdf 3.8 MB
- A Brief History of Cryptology and Cryptography Algorithms.pdf 3.8 MB
- Coding Theory and Cryptology.pdf 3.7 MB
- Group Theoretic Cryptography.pdf 3.7 MB
- Introduction to Cryptography.pdf 3.7 MB
- Cryptography for Dummies (ISBN - 0764541889).pdf 3.6 MB
- Cryptography In C And C++ (2001).chm 3.5 MB
- An Introduction to Cryptography, Second Edition.pdf 3.4 MB
- Selected Areas in Cryptography SAC 2004.djvu 3.3 MB
- Complexity and Cryptography An Introduction (2006)-J Talbot.pdf 3.3 MB
- An Introduction to Mathematical Cryptography.pdf 3.1 MB
- Elementary Number Theory, Cryptography and Codes.pdf 3.1 MB
- Coding and Cryptology.pdf 3.0 MB
- Implementing Cryptographic Multiple Precision Arithmetics.pdf 2.9 MB
- Hack in the Box: Volume 1, Issue 1, January 2010.pdf 2.9 MB
- Cryptography: Theory and Practice 3rd Edition.djvu 2.9 MB
- The Art of Deception: Controlling the Human Element of Security.pdf 2.9 MB
- Applied Cryptography: Protocols, Algorithms, and Source Code in C 2nd Edition.pdf 2.8 MB
- Cryptography Engineering: Design Principles and Practical Applications.pdf 2.8 MB
- Cryptography InfoSec Pro Guide.epub 2.3 MB
- Post-Quantum Cryptography.pdf 2.2 MB
- Cryptography: An Introduction 3rd Edition.pdf 2.1 MB
- Introduction to Cryptography with Open-Source Software.pdf 1.9 MB
- A Cryptography Primer.pdf 1.8 MB
- Java Cryptography.pdf 1.5 MB
- Malware and Computer Security Incidents: Handling Guides.pdf 1.4 MB
- Protecting Information: From Classical Error Correction to Quantum Cryptography.pdf 1.3 MB
- Hardware Malware.pdf 1.1 MB
- Practical Cryptography.pdf 618.1 KB
- Cryptocurrency 2017: Top 50 Cryptocurrencies.azw3 306.7 KB
- WiFuzz: detecting and exploiting logical flaws in the Wi-Fi cryptographic handshake.pdf 245.6 KB
Download Torrent
Related Resources
Copyright Infringement
If the content above is not authorized, please contact us via activebusinesscommunication[AT]gmail.com. Remember to include the full url in your complaint.