Categories
Technical
-- Database/SQL
-- Multimedia
-- Internet/Networking
-- Operating System
-- Programming
-- Security/Hacking
-- Science/Engineering
-- Web/HTML/CSS/Ajax
-- Unix/Linux
-- Windows
-- Mac OS X
-- Office
-- Perl/PHP/Python
-- C/C++/C#
-- .NET
-- Java
-- Hardware
-- Game Development
-- Embedded Systems
-- Graphics and Design
-- Network Programming
Study
Novel
Nonfiction
Health
Tutorial
Entertainment
Business
Magazine
Arts & Design
Audiobooks & Video Training
Cultures & Languages
Family & Home
Law & Politics
Lyrics & Music
Software Related
eBook Torrents
Uncategorized
-- Database/SQL
-- Multimedia
-- Internet/Networking
-- Operating System
-- Programming
-- Security/Hacking
-- Science/Engineering
-- Web/HTML/CSS/Ajax
-- Unix/Linux
-- Windows
-- Mac OS X
-- Office
-- Perl/PHP/Python
-- C/C++/C#
-- .NET
-- Java
-- Hardware
-- Game Development
-- Embedded Systems
-- Graphics and Design
-- Network Programming
Study
Novel
Nonfiction
Health
Tutorial
Entertainment
Business
Magazine
Arts & Design
Audiobooks & Video Training
Cultures & Languages
Family & Home
Law & Politics
Lyrics & Music
Software Related
eBook Torrents
Uncategorized
Archive by Date
2012-08-06
2012-08-05
2012-08-04
2012-08-03
2012-08-02
2012-08-01
2012-07-31
2012-07-30
2012-07-29
2012-07-28
2012-08-05
2012-08-04
2012-08-03
2012-08-02
2012-08-01
2012-07-31
2012-07-30
2012-07-29
2012-07-28
Search Tag
Wasa
Juma
Erprobung
炒股
Downblouse
渐行渐近
Education
elevation
Entering
RENDERING
medium
Priesterin
Kakwani
Zanotto
Imperia
Laux
Fassbaender
mobilities
谈判
Gyssel
温州人
Negocio
FRANZ
Redclyffe
Epinikian
Rizzo
Nutzung
uniformes
Catches
Canova
Karnani
Miall
Cubicle
Saghe
Yonge
MANSFIELD
Balfour
Ahcc
Glauben
Shermany
Zimna
EXPANDED
Supersymmetry
Repenser
Kingreen
Fiddler
Forta
Germination
Giorgia
Glover
Technical Security/Hacking ebook
Technical Security/Hacking ebook
Security/Hacking 网络技术实验 |
|
对计算机网络相关的基础课、专业课等开设相应的实验,培养出有扎实理论基础和较好实验动手能力的合格的计算机网络技术人才。 Tags : None, Posted on 2010-07-06 | |
Security/Hacking 精通脚本黑客 |
|
目前国内书店关于脚本方面地书籍特别多,但这些书相对来讲理论性地知识偏多。更重要地这些书中介绍地例子,在安全性上都是漏洞百出,这样导致新学脚本地朋友写出来地程序同样是漏洞百出,典型地恶性循环。而当前主要讲述脚本程序漏洞地方面书籍却没有,所以《 ... Tags : None, Posted on 2010-07-06 | |
Security/Hacking 公用机房的安全管理与技术维护 |
|
为适应现代教育发展的需要,在学生公用机房改变单一结构模式、为工作站配置硬盘、安装WINDOWS系统、扩大网络规模势在必行。本文提出了实现上述要求的一种立体网络模式:在服务器上安装Netware,、Win Nt服务系统,带硬盘的学生工作站能够通过MSdos、Windows或 ... Tags : None, Posted on 2010-07-06 | |
Security/Hacking High-Assurance Design: Architecting Secure and Reliable Enterprise Applications {Repost} |
|
High-Assurance Design: Architecting Secure and Reliable Enterprise Applications Publisher: Addison-Wesley Professional; ISBN: 0321375777; edition 2005; CHM; 696 pages; 17,2 mbHow to Design for Software Reliability, Security, and Maint ... Tags : Repost Applications Enterprise Design Architecting , Posted on 2010-07-04 | |
Security/Hacking 完全精通局域网 |
|
网络层(拨号接入)认证/授权 网络层认证/授权系统结网络层认证/授权业务模型 完全集中式认证集中式认证分布式认证混合式认证业务模型的系统配置网络层认证/授权系统工作流程本地认证/授权流程省内漫游认证/授权流程省际漫游认证/授权流程网络层认证/授 ... Tags : 局域网 , Posted on 2010-06-28 | |
Security/Hacking Proceedings of the 3rd European Conference on Computer Network Defense |
|
Vasilios Siris, Sotiris Ioannidis, Kostas Anagnostakis, Panagiotis Trimintzios, "Proceedings of the 3rd European Conference on Computer Network Defense" Springer; 2008; ISBN: 0387855548; 166 pages; PDF; 2,2 MB The European Conferen ... Tags : Defense Conference Network Computer European , Posted on 2010-06-27 | |
Security/Hacking Digital identity (Repost) |
|
Digital identity by Phil WindleyO'Reilly; ISBN: 0596008783; 01 August 2005; CHM; 1.13 MB; 254 PagesThe rise of network-based, automated services in the past decade has definitely changed the way businesses operate, but not always for t ... Tags : Repost identity Digital , Posted on 2010-06-23 | |
Newest
Security/Hacking Хакеры
Security/Hacking PDF Hacks: 100 Industrial-Strength Tips & Tools (Repost)
Security/Hacking International Relations and Security in the Digital Age: International Relations and Security in the Digital Age
Security/Hacking Information Security Cost Management
Security/Hacking Seven Deadliest Unified Communications Attacks (Repost)
Security/Hacking CompTIA Security Certification Study Guide, Third Edition
Security/Hacking New American Expat: Thriving and Surviving Overseas in the Post-9/11 World {Repost}
Security/Hacking Managing an Information Security and Privacy Awareness and Training Program
Security/Hacking Mechatronics for Safety, Security and Dependability in a New Era {Repost}
Security/Hacking How to Survive the End of the World as We Know It: Tactics, Techniques, and Technologies for Uncertain Times
Security/Hacking Spyware and Adware (Advances in Information Security)
Security/Hacking Network and System Security
Security/Hacking Amazon Hacks: 100 Industrial-Strength Tips & Tools (Repost)
Security/Hacking Introduction to Network Security (Repost)
Security/Hacking Security Study Guide {Repost}
Security/Hacking Aggressive Network Self Defense (2005) & Agile Web Development With Rails 1st Edition (2005) (Repost)
Security/Hacking The Hacker's Underground Handbook Learn What it Takes to Crack Even the Most Secure Systems
Security/Hacking Developer's Guide to Web Application Security By Michael Cross
Security/Hacking Hack Proofing ColdFusion By Steve Casco, Rob Rusher
Security/Hacking Wireshark & Ethereal Network Protocol Analyzer Toolkit (Repost)
Security/Hacking PDF Hacks: 100 Industrial-Strength Tips & Tools (Repost)
Security/Hacking International Relations and Security in the Digital Age: International Relations and Security in the Digital Age
Security/Hacking Information Security Cost Management
Security/Hacking Seven Deadliest Unified Communications Attacks (Repost)
Security/Hacking CompTIA Security Certification Study Guide, Third Edition
Security/Hacking New American Expat: Thriving and Surviving Overseas in the Post-9/11 World {Repost}
Security/Hacking Managing an Information Security and Privacy Awareness and Training Program
Security/Hacking Mechatronics for Safety, Security and Dependability in a New Era {Repost}
Security/Hacking How to Survive the End of the World as We Know It: Tactics, Techniques, and Technologies for Uncertain Times
Security/Hacking Spyware and Adware (Advances in Information Security)
Security/Hacking Network and System Security
Security/Hacking Amazon Hacks: 100 Industrial-Strength Tips & Tools (Repost)
Security/Hacking Introduction to Network Security (Repost)
Security/Hacking Security Study Guide {Repost}
Security/Hacking Aggressive Network Self Defense (2005) & Agile Web Development With Rails 1st Edition (2005) (Repost)
Security/Hacking The Hacker's Underground Handbook Learn What it Takes to Crack Even the Most Secure Systems
Security/Hacking Developer's Guide to Web Application Security By Michael Cross
Security/Hacking Hack Proofing ColdFusion By Steve Casco, Rob Rusher
Security/Hacking Wireshark & Ethereal Network Protocol Analyzer Toolkit (Repost)