snf.es


Imagen


Icon  Name                                                                                               Size  
[   ] wireless_hacking_presentation.pdf                                                                  2.2M  
[   ] metasploit-tptg.pdf                                                                                6.9M  
[   ] hakin9-metasploit-nutshell.pdf                                                                     7.4M  
[   ] esg-apts-deep-discovery-whitepaper-en.pdf                                                          482K  
[   ] b-advanced_persistent_threats_WP_21215957.en-us.pdf                                                3.0M  
[   ] art-of-asm.pdf                                                                                     4.3M  
[   ] analisi_tecnica_rsi_relative_strentgh_index_significato_formula_intepretazione_tempi_ed_esempi.pdf 399K  
[   ] advanced-persistent-threat-id52631.pdf                                                              82K  
[   ] advance-penetration-testing-kali-linux-training.pdf                                                 35K  
[   ] Yves Hilpisch-Python for Finance_ Analyze Big Financial Data-O'Reilly Media (2014).pdf              10M  
[   ] Yuxing Yan-Python for Finance-Packt Publishing - ebooks Account (2014).pdf                         4.8M  
[   ] Wireless Penetration Testing for Highly-Secured Environments.pdf                                    12M  
[   ] Windows Server 2012 Inside Out V413HAV.pdf                                                          33M  
[   ] Wiley.The.Shellcoders.Handbook.2nd.Edition.pdf                                                     3.6M  
[   ] Wes McKinney-Python for Data Analysis-O'Reilly Media (2012).pdf                                     14M  
[   ] Web Scraping with Python_ Collecting Data from the Modern Web-O'Reilly Media.pdf                   6.1M  
[   ] Toby Segaran-Programming Collective Intelligence.pdf                                               3.3M  
[   ] The_Art_of_Human_Hacking.pdf                                                                       6.1M  
[   ] The Web Application Hacker's Handbook -Finding and Exploiting Security Flaws V413HAV.pdf            14M  
[   ] Syngress.Zero.Day.Exploit.Countdown.To.Darkness.pdf                                                3.7M  
[   ] Syngress.Advanced.Persistent.Threat.pdf                                                            7.1M  
[   ] Sitepoint.Javascript.pdf                                                                           4.8M  
[   ] SitePoint.JQuery.Novice.To.Ninja.2nd.Edition.pdf                                                    16M  
[   ] Security Intelligence_ A Practitioner's Guide to Solving Enterprise Security Challenges-Wiley.pdf   22M  
[   ] Sam Newman-Building Microservices-O'Reilly Media (2015).pdf                                        4.8M  
[   ] Richard Lawson-Web Scraping with Python-Packt Publishing (2015).pdf                                5.2M  
[   ] Recognition and Machine Learning-Springer.pdf                                                      8.1M  
[   ] Penetration Testing with Raspberry Pi-Packt.pdf                                                    9.7M  
[   ] Paulino Calderon Pale-Mastering Nmap Scripting Engine-Packt Publishing (2015).pdf                  1.9M  
[   ] Packt.Web.Penetration.Testing.With.Kali.Linux.pdf                                                   19M  
[   ] Packt.PhoneGap.3.X.Mobile.Application.Development.Hotshot.pdf                                      5.9M  
[   ] Packt.PHP.AJAX.Cookbook.pdf                                                                        5.5M  
[   ] Packt.Object.Oriented.JavaScript.2nd.Edition.pdf                                                   2.1M  
[   ] Packt.Metasploit.pdf                                                                               4.9M  
[   ] Packt.Mastering.Metasploit.pdf                                                                      14M  
[   ] Packt.Mastering.Kali.Linux.For.Advanced.Penetration.Testing.pdf                                    9.0M  
[   ] Packt.Kali.Linux.pdf                                                                               7.8M  
[   ] Packt.Kali.Linux.Social.Engineering.pdf                                                            3.8M  
[   ] Packt.Kali.Linux.Network.Scanning.Cookbook.pdf                                                     4.6M  
[   ] Packt.Kali.Linux.Cookbook.pdf                                                                       11M  
[   ] Packt.Kali.Linux.CTF.Blueprints.pdf                                                                3.5M  
[   ] Packt.JQuery.UI.1.8.The.User.Interface.Library.pdf                                                 7.1M  
[   ] Packt.JQuery.Mobile.Cookbook.pdf                                                                   4.5M  
[   ] Packt.Creating.Mobile.Apps.With.JQuery.Mobile.pdf                                                  3.9M  
[   ] Packt.Creating.2nd.Edition.pdf                                                                     4.3M  
[   ] Packt.CoffeeScript.Programming.With.JQuery.Rails.And.Node.JS.pdf                                   4.0M  
[   ] OReilly.Programming.JavaScript.Applications.pdf                                                    8.1M  
[   ] OReilly.JavaScript.Testing.With.Jasmine.pdf                                                        1.4M  
[   ] OReilly.JQuery.Cookbook.Solutions.And.Examples.For.JQuery.Developers.pdf                           5.7M  
[   ] OReilly.20.Recipes.For.Programming.PhoneGap.pdf                                                    6.4M  
[   ] No.Starch.The.Principles.Of.Object.Oriented.JavaScript.pdf                                         2.6M  
[   ] No.Starch.Metasploit.Jul.2011.pdf                                                                  6.9M  
[   ] Network Security Through Data Analysis_ Building Situational Awareness-O'Reilly Media.pdf           13M  
[   ] Natural Language Processing with Python-O'Reilly Media (2009).pdf                                  5.2M  
[   ] Morgan.Kaufmann.Object.Oriented.Construction.Handbook.pdf                                          6.0M  
[   ] Monika Agarwal, Abhinav Singh-Metasploit Penetration Testing Cookbook, Second Edition.pdf          6.9M  
[   ] Mining the social web_ data mining Facebook, Twitter, LinkedIn, Google.pdf                          21M  
[   ] Mario Casciaro-Node.js Design Patterns-Packt Publishing (2014).pdf                                  15M  
[   ] Manning.Secrets.Of.The.JavaScript.Ninja.pdf                                                         15M  
[   ] Lutz M.-Python pocket reference-O'Reilly (2014).pdf                                                2.4M  
[   ] Luis Pedro Coelho, Willi Richert-Building Machine Learning Systems with Python.pdf                 6.5M  
[   ] Loraine Blaxter, Christina Hughes, Malcolm Tight-How to Research.pdf                               1.2M  
[   ] Learning Penetration Testing with Python.pdf                                                       9.2M  
[   ] Johnny Long, Bill Gardner, Justin Brown-Google Hacking for Penetration Testers-Syngress.pdf         37M  
[   ] Jeremy Faircloth-Penetration Tester's Open Source Toolkit, Third Edition  -Elsevier Science.pdf     17M  
[   ] Jennifer Golbeck-Introduction to Social Media Investigation_ A Hands-on Approach-Syngress.pdf       59M  
[   ] Jay Jacobs, Bob Rudis-Data-Driven Security_ Analysis, Visualization and Dashboards-Wiley.pdf       8.2M  
[   ] JavaScript.Create.Scalable.Reusable.High.Quality.JavaScript.Applications.And.Libraries.pdf         7.2M  
[   ] JavaScript by Example, 2nd Edition.pdf                                                              27M  
[   ] Jason Andress, Ryan Linn-Coding for Penetration Testers_ Building Better Tools.pdf                 9.9M  
[   ] Jacob Perkins-Python 3 Text Processing with NLTK 3.pdf                                             1.6M  
[   ] J.J. MURPHY-ANALISI TECNICA DEI MERCATI FINANZIARI.pdf                                              15M  
[   ] High Performance Python_ Practical Performant Programming for Humans-O'Reilly.pdf                  7.6M  
[   ] FirstStrike_Plus.pdf                                                                               171K  
[   ] Fernando Doglio (auth.)-Pro REST API Development with Node.js-Apress (2015).pdf                    7.2M  
[   ] Drew Conway, John Myles White-Machine Learning for Hackers-O'Reilly Media (2012).pdf               1.7M  
[   ] Douglas Berdeaux-Penetration Testing with Perl-Packt Publishing - ebooks Account (2015).pdf        4.3M  
[   ] David Nathans-Designing and Building Security Operations Center-Syngress (2014).pdf                3.4M  
[   ] CybraryAdvancedPenSlides.pdf                                                                       2.3M  
[   ] Cybercrime and Espionage_ An Analysis of Subversive Multi-Vector Threats-Syngress (2011).pdf        14M  
[   ] CreateSpace.Publishing.Basic.Security.Testing.With.Kali.Linux.pdf                                   14M  
[   ] C# Programming From Problem Analysis to Program Design, 3rd Edition.pdf                             56M  
[   ] Bulletproof SSL and TLS_ Understanding and Deploying SSL_TLS and PKI to Secure Servers.pdf         6.8M  
[   ] Ben Clark-Rtfm_ Red Team Field Manual-CreateSpace Independent Publishing Platform.pdf               10M  
[   ] Bastian Ballmann-Understanding Network Hacks_ Attack and Defense with Python-Springer.pdf           11M  
[   ] Basarat Ali Syed (auth.)-Beginning Node.js-Apress (2014).pdf                                       6.9M  
[   ] Bachaalany, Elias_ Koret, Joxean-The Antivirus Hacker's Handbook-Wiley (2015).pdf                  5.7M  
[   ] Apress.Pro.PHP.And.JQuery.Add.Quick.Smooth.pdf                                                      11M  
[   ] Apress.Pro.Data.Visualization.Using.R.And.JavaScript.pdf                                           8.8M  
[   ] Applied Network Security Monitoring. Collection, Detection, and Analysis (2014).pdf                 37M  
[   ] Allen Downey B.-Think Bayes-O'Reilly Media (2013).pdf                                               12M  
[   ] Alex R. Young, Marc Harter-Node.js in Practice-Manning (2015).pdf                                  7.3M  
[   ] Advanced Persistent Threat Hacking, The Art & Science...pdf                                         11M  
[   ] Advanced Penetration Testing for Highly Secured Environments.pdf                                    16M  
[   ] Aditya Balapure-Learning Metasploit Exploitation and Development.pdf                               9.1M  
[   ] Addison.Wesley.Exploiting.Software.How.To.Break.Code.pdf                                           7.6M  
[   ] A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers.pdf          7.8M  
[   ] 2014-apt-study.pdf                                                                                 166K  
[   ] 15344.pdf                                                                                           52K  


© 2013-2017 - snf.es


email feed