首页 磁力链接怎么用

Computer Security Enthusiast

文件类型 收录时间 最后活跃 资源热度 文件大小 文件数量
2008-11-20 20:35 2024-12-23 17:42 93 3.02 GB 379
二维码链接
Computer Security Enthusiast的二维码
种子下载(838888不存储任何种子文件)
种子下载线路1(迅雷)--推荐
种子下载线路2(比特彗星)
种子下载线路3(torcache)
3条线路均为国内外知名下载网站种子链接,内容跟本站无关!
文件列表
  1. 101 Spy Gadgets for the Evil Genius.pdf.7z40.98MB
  2. 1337 h4x0r h4ndb00k.chm.7z1.82MB
  3. 19 Deadly Sins of Software Security - Programming Flaws & How to Fix Them.chm.7z1.37MB
  4. 22 Radio & Receiver Projects for the Evil Genius.pdf.7z5.71MB
  5. 50 Awesome Auto Projects for the Evil Genius.pdf.7z18.48MB
  6. 51 High-Tech Practical Jokes for the Evil Genius.pdf.7z10.03MB
  7. 802.11 Security.pdf.7z816.72KB
  8. A Classical Introduction to Cryptography Exercise Book.pdf.7z7.75MB
  9. A Technical Guide to IPSec Virtual Private Networks.pdf.7z4.76MB
  10. AAA & Network Security for Mobile Access - Radius, Diameter, EAP, PKI, & IP Mobility.pdf.7z3.45MB
  11. Absolute OpenBSD - UNIX for the Practical Paranoid.chm.7z1.02MB
  12. Access Denied - The Practice & Policy of Global Internet Filtering.pdf.7z6.37MB
  13. Active Defense - A Comprehensive Guide to Network Security.pdf.7z5.8MB
  14. Administering & Securing the Apache Server.chm.7z13.61MB
  15. Advances in Elliptic Curve Cryptography.pdf.7z1.79MB
  16. Aggressive Network Self-Defense.pdf.7z80.93MB
  17. Ajax Security.pdf.7z11.42MB
  18. Anti-Hacker Tool Kit, 2nd Ed..chm.7z29.17MB
  19. Anti-Hacker Tool Kit, 3rd Ed..chm.7z34.84MB
  20. Apache Security.chm.7z1.61MB
  21. Applied Cryptanalysis - Breaking Ciphers in the Real World.pdf.7z16.36MB
  22. Applied Cryptography & Network Security - 2nd International Conference, ACNS 2004.pdf.7z8.14MB
  23. Applied Cryptography - Protocols, Algorithms, & Source COde in C, 2nd Ed..chm.7z3.64MB
  24. AVIEN Malware Defense Guide for the Enterprise.pdf.7z4.96MB
  25. Beginning Cryptography with Java.chm.7z2.47MB
  26. BigNum Math - Implementing Cryptographic Multiple Precision Arithmetic.pdf.7z3.23MB
  27. Biometrics & Network Security.chm.7z1.11MB
  28. Black Hat Physical Device Security - Exploiting Hardware & Software.pdf.7z76.12MB
  29. Blackjacking - Security Threats to BlackBerry Devices, PDAs, & Cell Phones in the Enterprise.pdf.7z9.02MB
  30. Bluetooth Security.pdf.7z691.85KB
  31. Botnets - The Killer Web App.pdf.7z5.27MB
  32. Brute Force - Cracking the Data Encryption Standard.pdf.7z1.53MB
  33. Buffer Overflow Attacks - Detect, Exploit, Prevent.pdf.7z2.9MB
  34. Building DMZs for Enterprise Networks.pdf.7z8.14MB
  35. Building Internet Firewalls, 2nd Ed..pdf.7z4.66MB
  36. Building Secure Servers with Linux.chm.7z1.16MB
  37. Building Secure Servers with Linux.pdf.7z2.51MB
  38. Building Secure Wireless Networks with 802.11.pdf.7z5.54MB
  39. Bulletproof Wireless Security - GSM, UMTS, 802.11, & Ad Hoc Security.pdf.7z2.35MB
  40. CCNA Security Official Exam Certification Guide [Exam 640-553].pdf.7z13.16MB
  41. CCSP Cisco Secure PIX Firewall Advanced Exam Certification Guide.pdf.7z10.45MB
  42. CD & DVD Forensics.pdf.7z4.4MB
  43. CD Cracking Uncovered - Protection Against Unsanctioned CD Copying.chm.7z9.08MB
  44. CEH - Official Certified Ethical Hacker Review Guide [Exam 312-50].pdf.7z3.1MB
  45. CEH Official Certified Ethical Hacker Review Guide.pdf.7z3.1MB
  46. Certified Ethical Hacker Exam Prep [Exam 312-50].chm.7z8.33MB
  47. Certified Ethical Hacking Official Course Material [Exam 312-50].chm.7z14.29MB
  48. Cisco ASA, PIX, & FWSM Firewall Handbook, 2nd Ed..pdf.7z7.48MB
  49. Cisco IOS Access Lists.pdf.7z1.28MB
  50. Cisco NAC Appliance - Enforcing Host Security with Clean Access.pdf.7z21.43MB
  51. Cisco Network Security Little Black Book.pdf.7z2.77MB
  52. Cisco Router Firewall Security.chm.7z5.83MB
  53. Cisco Secure Firewall Services Module (FWSM).pdf.7z1.92MB
  54. Cisco Secure Internet Security Solutions.pdf.7z6.22MB
  55. Cisco Security Professional's Guide to Secure Intrusion Detection Systems.pdf.7z12.16MB
  56. Cisco Wireless LAN Security.chm.7z5.82MB
  57. Codes & Ciphers - Julius Caesar, the Enigma, & the Internet.pdf.7z1.02MB
  58. Codes - The Guide to Secrecy from Ancient to Modern Times.pdf.7z4.68MB
  59. Combating Spyware in the Enterprise.pdf.7z7.14MB
  60. Complexity & Cryptography - An Introduction.pdf.7z1.09MB
  61. CompTIA Security+ Study Guide & Practice Exam, 2nd Ed. [Exam JK0-010].pdf.7z9.11MB
  62. Computer & Intrusion Forensics.pdf.7z2.56MB
  63. Computer Network Security.pdf.7z21.45MB
  64. Computer Security & Cryptography.pdf.7z8.34MB
  65. Computer Security Basics, 2nd Ed..chm.7z1.65MB
  66. Computer Security, Privacy, & Politics - Current Issues, Challenges, & Solutions.pdf.7z1.63MB
  67. Computer Viruses & Malware.pdf.7z9.15MB
  68. Computer Viruses - From Theory to Applications.pdf.7z2.28MB
  69. Computer Viruses for Dummies.pdf.7z2.33MB
  70. Configuring Juniper Networks NetScreen & SSG Firewalls.pdf.7z9.33MB
  71. Configuring NetScreen Firewalls.pdf.7z5.93MB
  72. Configuring SonicWALL Firewalls.pdf.7z10.82MB
  73. Contemporary Cryptography.pdf.7z2.37MB
  74. Core Security Patterns - Best Practices & Strategies for J2EE, Web Services, & Identity Management.chm.7z7.3MB
  75. Covert Java - Techniques for Decompiling, Patching, & Reverse Engineering.pdf.7z2.08MB
  76. Crackproof Your Software - Protect Your Software Against Crackers.pdf.7z7.11MB
  77. Crimeware - Understanding New Attacks & Defenses.chm.7z10.42MB
  78. Cryptography & Network Security, 4th Ed..chm.7z12.52MB
  79. Cryptography & Security Services - Mechanisms & Applications.pdf.7z4.4MB
  80. Cryptography - A Very Short Introduction.chm.7z1.31MB
  81. Cryptography for Developers.pdf.7z2.67MB
  82. Cryptography for Dummies.chm.7z4.02MB
  83. Cryptography in C & C++.chm.7z3.5MB
  84. Cryptology Unlocked.pdf.7z1.81MB
  85. Cyber Crime Investigator's Field Guide.pdf.7z1.54MB
  86. Cyber Forensics - A Field Manual for Collecting, Examining, & Preserving Evidence of Computer Crimes.pdf.7z3.5MB
  87. Decrypted Secrets - Methods & Maxims of Cryptology, 4th, Revised & Extended Ed..pdf.7z11.45MB
  88. Defend I.T. - Security by Example.chm.7z1.33MB
  89. Defense & Detection Strategies against Internet Worms.pdf.7z1.02MB
  90. Deploying Secure 802.11 Wireless Networks with Microsoft Windows.chm.7z6.91MB
  91. Designing BSD Rootkits - An Introduction to Kernel Hacking.pdf.7z5.35MB
  92. Developer's Guide to Web Application Security.pdf.7z9.62MB
  93. Disassembling Code - IDA Pro & SoftICE.chm.7z4.16MB
  94. Effective Oracle Database 10g Security by Design.chm.7z2.98MB
  95. Electronic Gadgets for the Evil Genius - 28 Build-It-Yourself Projects.pdf.7z54.93MB
  96. EnCase Computer Forensics - The Official EnCE-EnCase Certified Examiner Study Guide, 2nd Ed..pdf.7z13.35MB
  97. Encyclopedia of Cryptology.chm.7z2.26MB
  98. End-to-End Network Security - Defense-in-Depth.pdf.7z11.07MB
  99. Enemy at the Water Cooler - Real-Life Stories of Insider Threats & Enterprise Security Management Countermeasures.pdf.7z4.92MB
  100. Enterprise Java Security - Building Secure J2EE Applications.chm.7z3.93MB
  101. Ethereal Packet Sniffing.chm.7z17.3MB
  102. Expert Web Services Security in the .NET Platform.chm.7z21.64MB
  103. Exploiting Software - How to Break Code.pdf.7z4.44MB
  104. Fast Track to Security.pdf.7z6.16MB
  105. File System Forensic Analysis.chm.7z3.84MB
  106. Firewall Fundamentals.chm.7z10.16MB
  107. Firewall Policies & VPN Configurations.pdf.7z5.58MB
  108. Firewalls & Internet Security - Repelling the Wily Hacker, 2nd Ed..pdf.7z56.81MB
  109. Firewalls - Jumpstart for Network & Systems Administrators.pdf.7z1.47MB
  110. Firewalls for Dummies, 2nd Ed..pdf.7z6.77MB
  111. Forensic Computer Crime Investigation.pdf.7z2.25MB
  112. Forensic Computing - A Practitioner's Guide, 2nd Ed..pdf.7z9.02MB
  113. Foundations of Computer Security.pdf.7z1.79MB
  114. Foundations of Cryptography - A Primer.pdf.7z748.64KB
  115. Foundations of Cryptography - Vol. 1, Basic Tools.pdf.7z2.34MB
  116. Foundations of Mac OS X Leopard Security.pdf.7z20.41MB
  117. Foundations of Security - What Every Programmer Needs to Know.pdf.7z2.18MB
  118. Fundamentals of Cryptology - A Professional Reference & Interactive Tutorial.pdf.7z26.18MB
  119. Fuzzing - Brute Force Vulnerability Discovery.pdf.7z42.05MB
  120. Google Hacking for Penetration Testers, Vol. 2.pdf.7z11.66MB
  121. Google Hacking for Penetration Testers.pdf.7z9.62MB
  122. Gray Hat Hacking - The Ethical Hacker's Handbook, 2nd Ed..pdf.7z8.03MB
  123. Guide to Elliptic Curve Cryptography.pdf.7z2.36MB
  124. Hack Attacks Revealed - A Complete Reference with Custom Security Hacking Toolkit.chm.7z6.35MB
  125. Hack I.T. - Security through Penetration Testing.chm.7z4.62MB
  126. Hack Proofing ColdFusion - The Only Way to Stop a Hacker Is to Think Like One.pdf.7z6.45MB
  127. Hack Proofing Linux - Your Guide to Open Source Security.pdf.7z9.74MB
  128. Hack Proofing Sun Solaris 8 - Protect Your Solaris Network from Attack.pdf.7z5.51MB
  129. Hack Proofing Windows 2000 Server.pdf.7z9.53MB
  130. Hack Proofing XML - The Only Way to Stop a Hacker Is to Think Like One.pdf.7z5.53MB
  131. Hack Proofing Your E-Commerce Site - The Only Way to Stop a Hacker Is to Think Like One.pdf.7z6MB
  132. Hack Proofing Your Identity in the Information Age - Protect Your Family on the Internet!.pdf.7z7.1MB
  133. Hack Proofing Your Network, 2nd Ed. - The Only Way to Stop a Hacker Is to Think Like One.pdf.7z7.35MB
  134. Hack Proofing Your Network.pdf.7z2.48MB
  135. Hack Proofing Your Web Applications - The Only Way to Stop a Hacker Is to Think Like One.pdf.7z7.18MB
  136. Hack Proofing Your Wireless Network - Protect Your Wireless Network from Attack.pdf.7z5.51MB
  137. Hack the Stack - Using Snort & Ethereal to Master the 8 Layers of an Insecure Network.pdf.7z5.99MB
  138. Hacker Debugging Uncovered.chm.7z14.42MB
  139. Hacker Disassembling Uncovered.chm.7z4.77MB
  140. Hacker Linux Uncovered.chm.7z4.51MB
  141. Hacker Web Exploitation Uncovered.chm.7z554.28KB
  142. Hacker's Challenge - Test Your Incident Response Skills Using 20 Scenarios.pdf.7z3.91MB
  143. Hacker's Delight.chm.7z2.1MB
  144. Hackers - Heroes of the Computer Revolution.pdf.7z2.02MB
  145. Hackers Beware - Defending Your Network from the Wiley Hacker.pdf.7z4.31MB
  146. Hacking - The Art of Exploitation, 2nd Ed..chm.7z4.71MB
  147. Hacking - The Art of Exploitation.chm.7z1.4MB
  148. Hacking a Terror Network - The Silent Threat of Covert Channels.pdf.7z6.25MB
  149. Hacking Exposed, 2nd Ed. - Network Security Secrets & Solutions.pdf.7z7.41MB
  150. Hacking Exposed-Cisco Networks - Cisco Security Secrets & Solutions.chm.7z9.92MB
  151. Hacking Exposed-Linux - Linux Security Secrets & Solutions.pdf.7z88.82MB
  152. Hacking Exposed-Network Security - Secrets & Solutions, 2nd Ed..pdf.7z7.41MB
  153. Hacking Exposed-Network Security - Secrets & Solutions, 3rd Ed..pdf.7z4.66MB
  154. Hacking Exposed-VoIP - Voice Over IP Security Secrets & Solutions.chm.7z16.53MB
  155. Hacking Exposed-Web 2.0 - Web 2.0 Security Secrets & Solutions.pdf.7z3.94MB
  156. Hacking Exposed-Web Applications - Web Application Security Secrets & Solutions.pdf.7z4MB
  157. Hacking Exposed-Windows - Windows Security Secrets & Solutions, 3rd Ed..pdf.7z4.42MB
  158. Hacking Exposed-Wireless - Wireless Security Secrets & Solutions.chm.7z12.37MB
  159. Hacking for Dummies, 2nd Ed..pdf.7z4.08MB
  160. Hacking for Dummies.pdf.7z5.32MB
  161. Hacking Wireless Networks for Dummies.pdf.7z7.71MB
  162. HackNotes - Linux & Unix Security Portable Reference.pdf.7z1.76MB
  163. HackNotes - Network Security Portable Reference.pdf.7z1.98MB
  164. HackNotes - Web Security Portable Reference.pdf.7z1.87MB
  165. HackNotes - Windows Security Portable Reference.pdf.7z2.74MB
  166. Halting the Hacker - A Practical Guide to Computer Security, 2nd Ed..chm.7z628.52KB
  167. Handbook of Digital & Multimedia Forensic Evidence.pdf.7z1.74MB
  168. Hardening Apache.chm.7z1.06MB
  169. Hardening Linux.chm.7z9.48MB
  170. Hardening Linux.pdf.7z2.11MB
  171. Hardening Network Infrastructure.chm.7z17.12MB
  172. Hardening Windows Systems.chm.7z23.73MB
  173. Hardening Windows, 2nd Ed..pdf.7z3.85MB
  174. Hardening Windows.chm.7z1.71MB
  175. Home Network Security Simplified.chm.7z14.31MB
  176. Honeypots - Tracking Hackers.chm.7z2.5MB
  177. Honeypots for Windows.chm.7z16.2MB
  178. How to Cheat at Configuring Open Source Security Tools - The Perfect Reference for the Multitasked SysAdmin.pdf.7z6.29MB
  179. How to Cheat at Securing Linux - The Perfect Reference for the Multitasked SysAdmin.pdf.7z8.14MB
  180. How to Cheat at VolP Security.pdf.7z40.86MB
  181. Implementing Email Security & Tokens - Current Standards, Tools, & Practices.pdf.7z1.42MB
  182. Implementing NAP & NAC Security Technologies - The Complete Guide to Network Access Control.pdf.7z5.33MB
  183. Implementing SSH - Strategies for Optimizing the Secure Shell.pdf.7z5.75MB
  184. Incident Response & Computer Forensics, 2nd Ed..pdf.7z9.34MB
  185. Incident Response - Computer Forensics Toolkit.pdf.7z4.15MB
  186. Information Security Policies & Procedures - A Practitioner's Reference, 2nd Ed..pdf.7z1.6MB
  187. InfoSec Career Hacking - Sell Your Skillz, Not Your Soul.pdf.7z82.21MB
  188. InfoSecurity 2008 Threat Analysis.pdf.7z9.38MB
  189. Inside Java 2 Platform Security, 2nd Ed. - Architecture, API Design, & Implementation.chm.7z1.17MB
  190. Inside Network Perimeter Security, 2nd Ed..chm.7z8.65MB
  191. Inside the Spam Cartel - Trade Secrets from the Dark Side.chm.7z6.04MB
  192. Insider Attack & Cyber Security - Beyond the Hacker.pdf.7z2.19MB
  193. Insider Threat - Protecting the Enterprise from Sabotage, Spying, & Theft.pdf.7z4.03MB
  194. Internet Denial of Service - Attack & Defense Mechanisms.chm.7z2.06MB
  195. Internet Forensics.chm.7z839.55KB
  196. Internet Security - Cryptographic Principles, Algorithms, & Protocols.pdf.7z1.84MB
  197. Introduction to Communication Electronic Warfare Systems.pdf.7z40.89MB
  198. Introduction to Cryptography - Principles & Applications, 2nd Ed..pdf.7z2.02MB
  199. Intrusion Detection & Prevention.chm.7z3.16MB
  200. Intrusion Prevention Fundamentals.chm.7z2.12MB
  201. Jeff Duntemann's Drive-By Wi-Fi Guide.chm.7z12.74MB
  202. Juniper Networks Field Guide & Reference.chm.7z3.13MB
  203. Juniper Networks Secure Access SSL VPN Configuration Guide.pdf.7z16.26MB
  204. Kismet Hacking.pdf.7z3.77MB
  205. LAN Switch Security - What Hackers Know About Your Switches.pdf.7z2.64MB
  206. Linux Firewalls - Attack Detection & Response with iptables, psad, & fwsnort.pdf.7z3.85MB
  207. Linux Network Security.chm.7z6.52MB
  208. Linux Security Cookbook.chm.7z643.31KB
  209. Mac OS X Maximum Security.chm.7z3.71MB
  210. Mac OS X Security.chm.7z4.63MB
  211. Mainframe Basics for Security Professionals - Getting Started with RACF.pdf.7z3.42MB
  212. Malicious Cryptography - Exposing Cryptovirology.pdf.7z2.19MB
  213. Malware - Fighting Malicious Code.chm.7z6.39MB
  214. Malware Detection.pdf.7z14.25MB
  215. Malware Forensics - Investigating & Analyzing Malicious Code.pdf.7z17.22MB
  216. Managing Cisco Network Security.pdf.7z4.42MB
  217. Managing Security with Snort & IDS Tools.chm.7z1.74MB
  218. Mastering FreeBSD & OpenBSD Security.chm.7z1.33MB
  219. Mastering Network Security.pdf.7z2.36MB
  220. Mastering Windows Network Forensics & Investigation.chm.7z45.71MB
  221. Maximum Linux Security, 2nd Ed..pdf.7z4MB
  222. Maximum Security, 4th Ed..chm.7z2.93MB
  223. Maximum Wireless Security.chm.7z4.24MB
  224. Metasploit Toolkit for Penetration Testing, Exploit Development, & Vulnerability Research.pdf.7z3.58MB
  225. Microsoft Encyclopedia of Security.pdf.7z7.27MB
  226. Microsoft Forefront Security Administration Guide.pdf.7z16.17MB
  227. Microsoft Windows Security Inside Out for Windows XP & Windows 2000.chm.7z19.47MB
  228. Mission Critical! Internet Security.pdf.7z3.5MB
  229. Mobile & Wireless Network Security & Privacy.pdf.7z2.93MB
  230. Mobility, Data Mining, & Privacy - Geographic Knowledge Discovery.pdf.7z3.36MB
  231. Modern Cryptography - Theory & Practice.pdf.7z11.07MB
  232. MORE Electronic Gadgets for the Evil Genius - 40 New Build-It-Yourself Projects.pdf.7z56.02MB
  233. Multicast & Group Security.pdf.7z2.36MB
  234. Multimedia Forensics & Security.pdf.7z10.42MB
  235. Multimedia Security Technologies for Digital Rights Management.pdf.7z2.66MB
  236. Nessus Network Auditing, 2nd Ed..pdf.7z8.72MB
  237. Nessus, Snort, & Ethereal Power Tools - Customizing Open Source Security Applications.pdf.7z4.32MB
  238. Netcat Power Tools.pdf.7z8.52MB
  239. Network Administrator Street Smarts - A Real World Guide to CompTIA Network+ Skills.pdf.7z9.75MB
  240. Network Intrusion Detection, 3rd Ed..pdf.7z2.03MB
  241. Network Perimeter Security - Building Defense In-Depth.chm.7z3.56MB
  242. Network Security - Know It All.pdf.7z4.96MB
  243. Network Security Assessment - From Vulnerability to Patch.pdf.7z7.5MB
  244. Network Security Assessment - Know Your Network, 2nd Ed..pdf.7z4.07MB
  245. Network Security Assessment - Know Your Network.chm.7z1.68MB
  246. Network Security Bible.pdf.7z5.58MB
  247. Network Security Hacks - 100 Industrial-Strength Tips & Tools.chm.7z1.62MB
  248. Network Security Hacks - Tips & Tools for Protecting Your Privacy, 2nd Ed..chm.7z3.88MB
  249. Network Security Illustrated.pdf.7z8.43MB
  250. Network Security JumpStart.pdf.7z1.42MB
  251. Network Security Technologies & Solutions.chm.7z26.27MB
  252. Network Security Tools - Writing, Hacking, & Modifying Security Tools.chm.7z1.29MB
  253. Network Security with OpenSSL.pdf.7z1.28MB
  254. Network Warrior.pdf.7z5.19MB
  255. No Tech Hacking - A Guide to Social Engineering, Dumpster Diving, & Shoulder Surfing.pdf.7z20.59MB
  256. Open Source Fuzzing Tools.pdf.7z2.91MB
  257. Open Source Security Tools - A Practical Guide to Security Applications.chm.7z5.67MB
  258. Oracle Security.chm.7z1.3MB
  259. OS X Exploits & Defense.pdf.7z6.71MB
  260. OS X for Hackers at Heart - The Apple of Every Hacker's Eye.pdf.7z13.36MB
  261. Penetration Tester's Open Source Toolkit, Vol. 2.pdf.7z20.61MB
  262. Penetration Tester's Open Source Toolkit.pdf.7z25.47MB
  263. Penetration Testing & Network Defense.chm.7z14.75MB
  264. Perfect Passwords - Selection, Protection, Authentication.pdf.7z1.22MB
  265. Perl Scripting for Windows Security - Live Response, Forensic Analysis, & Monitoring.pdf.7z4.11MB
  266. PGP & GPG - Email for the Practical Paranoid.pdf.7z1.75MB
  267. Phishing - Cutting the Identity Theft Line.pdf.7z6.43MB
  268. PHP Oracle Web Development - Data processing, Security, Caching, XML, Web Services, & AJAX.pdf.7z3.05MB
  269. Physical & Logical Security Convergence - Powered By Enterprise Security Management.pdf.7z7.53MB
  270. Practical Guide for Implementing Secure Intranets & Extranets.chm.7z5.49MB
  271. Practical Hacking Techniques & Countermeasures.pdf.7z63.85MB
  272. Practical Oracle Security - Your Unauthorized Guide to Relational Database Security.pdf.7z3.35MB
  273. Practical Packet Analysis - Using Wireshark to Solve Real-World Network Problems.pdf.7z7.31MB
  274. Practical Unix & Internet Security, 3rd Ed..chm.7z2.4MB
  275. Practical VoIP Security.pdf.7z6.12MB
  276. Preventing Web Attacks with Apache.chm.7z6.06MB
  277. Privacy Preserving Data Mining.pdf.7z5.63MB
  278. Privacy Protection & Computer Forensics, 2nd Ed..pdf.7z2.52MB
  279. Privacy, Security, & Trust within the Context of Pervasive Computing.pdf.7z1.82MB
  280. Probabilistic & Statistical Methods in Cryptology - An Introduction by Selected Topics.pdf.7z1MB
  281. Professional Rootkits.chm.7z7.92MB
  282. Professional Windows Desktop & Server Hardening.chm.7z14.05MB
  283. Real 802.11 Security - Wi-Fi Protected Access & 802.11i.chm.7z2.95MB
  284. Reverse Engineering of Object Oriented Code.pdf.7z4.81MB
  285. Reversing - Secrets of Reverse Engineering.pdf.7z3.83MB
  286. Rootkits - Subverting the Windows Kernel.chm.7z1.6MB
  287. Rootkits for Dummies.pdf.7z3.27MB
  288. Router Security Strategies - Securing IP Network Traffic Planes.pdf.7z2.55MB
  289. RSA Security's Official Guide to Cryptography.pdf.7z7.65MB
  290. Secure Coding - Principles & Practices.chm.7z634.61KB
  291. Secure Computer & Network Systems - Modeling, Analysis, & Design.pdf.7z1.71MB
  292. Secure Programming Cookbook for C & C++.chm.7z1.35MB
  293. Secure Programming with Static Analysis.pdf.7z3.64MB
  294. Securing & Optimizing Linux - The Hacking Solution.pdf.7z5MB
  295. Securing IM & P2P Applications for the Enterprise.pdf.7z4.48MB
  296. Securing the Information Infrastructure.pdf.7z2.31MB
  297. Securing VoIP Networks - Threats, Vulnerabilities, & Countermeasures.pdf.7z4.69MB
  298. Securing Web Services with WS-Security - Demystifying WS-Security, WS-Policy, SAML, XML Signature, & XML Encryption.chm.7z3.83MB
  299. Securing Windows Server 2003.chm.7z3.42MB
  300. Securing Windows Server 2008 - Prevent Attacks from Outside & Inside Your Organization.pdf.7z12.07MB
  301. Securing Your Business with Cisco ASA & PIX Firewalls.chm.7z4.78MB
  302. Security & Quality of Service in Ad Hoc Wireless Networks.pdf.7z2.38MB
  303. Security for Microsoft Visual Basic .NET.chm.7z7.69MB
  304. Security for Wireless Ad Hoc Networks.pdf.7z3.23MB
  305. Security in Computing, 3rd Ed..chm.7z4.91MB
  306. Security in Computing, 4th Ed..chm.7z7.83MB
  307. Security in Distributed, Grid, Mobile, & Pervasive Computing.pdf.7z2.89MB
  308. Security in Wireless LANs & MANs.pdf.7z1.32MB
  309. Security Power Tools.pdf.7z8.52MB
  310. Security Technologies for the World Wide Web, 2nd Ed..pdf.7z2.45MB
  311. Security Warrior.chm.7z4.54MB
  312. Security, Privacy, & Trust in Modern Data Management.pdf.7z2.99MB
  313. Self-Defending Networks - The Next Generation of Network Security.pdf.7z16.5MB
  314. SELinux - NSA's Open Source Security Enhanced Linux.chm.7z1.05MB
  315. SELinux by Example - Using Security Enhanced Linux.chm.7z3.96MB
  316. Shellcoder's Programming Uncovered.chm.7z11.7MB
  317. Simple Computer Security - Disinfect Your PC.pdf.7z4.86MB
  318. Snort 2.1 Intrusion Detection, 2nd Ed..pdf.7z5.06MB
  319. Snort Cookbook.chm.7z2.49MB
  320. Snort IDS & IPS Toolkit.pdf.7z6.8MB
  321. Special Ops - Host & Network Security for Microsoft, UNIX, & Oracle.pdf.7z10.78MB
  322. SSH, The Secure Shell - The Definitive Guide.pdf.7z4.2MB
  323. SSL & TLS Essentials - Securing the Web.pdf.7z1.01MB
  324. SSL Remote Access VPNs.pdf.7z11.63MB
  325. Static & Dynamic Reverse Engineering Techniques for Java Software Systems.pdf.7z1.01MB
  326. Static & Dynamic Reverse Engineering Techniques for Java Software Sytems.pdf.7z1.01MB
  327. Steal This Computer Book 3 - What They Won't Tell You About the Internet.chm.7z13.89MB
  328. Stealing the Network - How to Own a Continent.chm.7z2.76MB
  329. Stealing the Network - How to Own a Shadow.pdf.7z8.09MB
  330. Stealing the Network - How to Own an Identity.pdf.7z5.77MB
  331. Stealing the Network - How to Own the Box.pdf.7z3.4MB
  332. Surveillance & Security - Technological Politics & Power in Everyday Life.pdf.7z2.65MB
  333. Syngress Force Emerging Threat Analysis - From Mischief to Malicious.pdf.7z6.07MB
  334. Tangled Web - Tales of Digital Crime from the Shadows of Cyberspace.pdf.7z2.03MB
  335. The Apache Modules Book - Application Development with Apache.pdf.7z1.47MB
  336. The Art of Computer Virus Research & Defense.chm.7z6.76MB
  337. The Art of Deception - Controlling the Human Element of Security.pdf.7z3.57MB
  338. The Art of Intrusion - The Real Stories Behind the Exploits of Hackers, Intruders, & Deceivers.pdf.7z1.15MB
  339. The Art of Software Security Assessment - Identifying & Preventing Software Vulnerabilities.chm.7z4.54MB
  340. The Best Damn Firewall Book Period, 2nd Ed..pdf.7z32.54MB
  341. The Best Damn Firewall Book Period.pdf.7z15.35MB
  342. The Best Damn IT Security Management Book Period.pdf.7z15.5MB
  343. The Book of PF - A No-Nonsense Guide to the OpenBSD Firewall.pdf.7z4.12MB
  344. The Business Case for Network Security - Advocacy, Governance, & ROI.chm.7z4.74MB
  345. The Craft of System Security.chm.7z5.33MB
  346. The Database Hacker's Handbook - Defending Database Servers.chm.7z1.13MB
  347. The Ethical Hack - A Framework for Business Value Penetration Testing.pdf.7z3.43MB
  348. The Giant Black Book of Computer Viruses.pdf.7z4.69MB
  349. The Naked Employee - How Technology Is Compromising Workplace Privacy.chm.7z629.13KB
  350. The Oracle Hacker's Handbook - Hacking & Defending Oracle.chm.7z483.62KB
  351. The Shellcoder's Handbook - Discovering & Exploiting Security Holes.chm.7z2.11MB
  352. The Tao of Network Security Monitoring - Beyond Intrusion Detection.chm.7z15.58MB
  353. The Web Application Hacker's Handbook - Discovering & Exploiting Security Flaws.pdf.7z4.72MB
  354. Understanding Forensic Digital Imaging.pdf.7z13.71MB
  355. UNIX & Linux Forensic Analysis DVD Toolkit.pdf.7z3.85MB
  356. Virtual Honeypots - From Botnet Tracking to Intrusion Detection.chm.7z4.1MB
  357. WAP, Bluetooth, & 3G Programming - Cracking the Code.pdf.7z6.87MB
  358. Wardriving & Wireless Penetration Testing.pdf.7z16.53MB
  359. WarDriving-Drive, Detect, Defend - A Guide to Wireless Security.chm.7z37.51MB
  360. Web Application Vulnerabilities - Detect, Exploit, Prevent.pdf.7z14.13MB
  361. Web Hacking - Attacks & Defense.chm.7z6.38MB
  362. Web Security & Commerce.pdf.7z2.92MB
  363. Web Security, Privacy, & Commerce, 2nd Ed..chm.7z6.17MB
  364. Web Services Security & E-Business.pdf.7z4.31MB
  365. Web Services Security.chm.7z3.96MB
  366. Webster's New World Hacker Dictionary.pdf.7z1.86MB
  367. Wi-Foo - The Secrets of Wireless Hacking.chm.7z6.78MB
  368. Windows Forensic Analysis.pdf.7z41.81MB
  369. Windows Forensics & Incident Recovery.chm.7z7.23MB
  370. Windows Server 2003 Security Guide.pdf.7z1.13MB
  371. Windows XP Hacks & Mods For Dummies.pdf.7z10.65MB
  372. Wireless Network Hacks & Mods for Dummies.pdf.7z3.66MB
  373. Wireless Operational Security.chm.7z1.48MB
  374. Wireless Personal Area Networks - Performance, Interconnection, & Security with IEEE 802.15.4.pdf.7z2.02MB
  375. Wireless Security Handbook.pdf.7z8.43MB
  376. Wireshark & Ethereal Network Protocol Analyzer Toolkit.pdf.7z10.52MB
  377. Writing Security Tools & Exploits.pdf.7z6.62MB
  378. XSS Attacks - Cross Site Scripting Exploits & Defense.pdf.7z4.88MB
  379. Zero-Day Exploit - Countdown to Darkness.pdf.7z2.45MB
友情提示
不会用的朋友看这里 把磁力链接复制到离线下载,或者bt下载软件里即可下载文件,或者直接复制迅雷链接到迅雷里下载! 亲,你造吗?将网页分享给您的基友,下载的人越多速度越快哦!

违规内容投诉邮箱:[email protected]

概述 838888磁力搜索是一个磁力链接搜索引擎,是学术研究的副产品,用于解决资源过度分散的问题 它通过BitTorrent协议加入DHT网络,实时的自动采集数据,仅存储文件的标题、大小、文件列表、文件标识符(磁力链接)等基础信息 838888磁力搜索不下载任何真实资源,无法判断资源的合法性及真实性,使用838888磁力搜索服务的用户需自行鉴别内容的真伪 838888磁力搜索不上传任何资源,不提供Tracker服务,不提供种子文件的下载,这意味着838888磁力搜索 838888磁力搜索是一个完全合法的系统