Categories
Technical
-- Database/SQL
-- Multimedia
-- Internet/Networking
-- Operating System
-- Programming
-- Security/Hacking
-- Science/Engineering
-- Web/HTML/CSS/Ajax
-- Unix/Linux
-- Windows
-- Mac OS X
-- Office
-- Perl/PHP/Python
-- C/C++/C#
-- .NET
-- Java
-- Hardware
-- Game Development
-- Embedded Systems
-- Graphics and Design
-- Network Programming
Study
Novel
Nonfiction
Health
Tutorial
Entertainment
Business
Magazine
Arts & Design
Audiobooks & Video Training
Cultures & Languages
Family & Home
Law & Politics
Lyrics & Music
Software Related
eBook Torrents
Uncategorized
-- Database/SQL
-- Multimedia
-- Internet/Networking
-- Operating System
-- Programming
-- Security/Hacking
-- Science/Engineering
-- Web/HTML/CSS/Ajax
-- Unix/Linux
-- Windows
-- Mac OS X
-- Office
-- Perl/PHP/Python
-- C/C++/C#
-- .NET
-- Java
-- Hardware
-- Game Development
-- Embedded Systems
-- Graphics and Design
-- Network Programming
Study
Novel
Nonfiction
Health
Tutorial
Entertainment
Business
Magazine
Arts & Design
Audiobooks & Video Training
Cultures & Languages
Family & Home
Law & Politics
Lyrics & Music
Software Related
eBook Torrents
Uncategorized
Archive by Date
2012-08-06
2012-08-05
2012-08-04
2012-08-03
2012-08-02
2012-08-01
2012-07-31
2012-07-30
2012-07-29
2012-07-28
2012-08-05
2012-08-04
2012-08-03
2012-08-02
2012-08-01
2012-07-31
2012-07-30
2012-07-29
2012-07-28
Search Tag
iWork
Holistic
REEVES
Mejores
Charleson
DANiSH
WEEKLY
Weapons
Nernst
essay
Soothing
Hellberg
Clubhouse
Coverage
kler
Interregnum
Microwave
Homological
Kings
DeJong
Mixed
Superplumes
32bit
TIED
Cruiser
Dense
TrueType
Gingery
Vendredi
AnTs
Cucina
Perimeter
Loyalty
Maiden
Beza
Proposed
CALCULATION
Gwilym
Servo
Atreyu
Ceilings
Dioxin
oracle
Morket
Cloudy
Schmaranz
Jobim
Compulsion
Primitivism
Artbeats
Technical Security/Hacking ebook
Technical Security/Hacking ebook
Security/Hacking Practical Unix and Internet Security (Repost) |
|
Practical Unix and Internet Security Publisher: O'Reilly Media; ISBN: 1565921488; edition 1996; CHM; 1004 pages; 10,7 mbPractical Unix & Internet Security is on its second edition, and its maturity shows. To call this highly reada ... Tags : Repost Security Practical Unix Internet , Posted on 2010-06-16 | |
Security/Hacking 黑客编程技巧大全 |
|
黑客编程技巧大全,讲述了黑客编程常用的手段,不妨学习学习 Tags : 黑客 大全 技巧 , Posted on 2010-06-13 | |
Security/Hacking IT Security Management: IT Securiteers - Setting up an IT Security Function |
|
Alberto Partida, Diego Andina, "IT Security Management: IT Securiteers - Setting up an IT Security Function " Springer; 2010; ISBN: 9048188814; 247 pages; PDF; 4,4 MB IT securiteers - The human and technical dimension working for t ... Tags : Setting Security Management Function Securiteers , Posted on 2010-06-13 | |
Security/Hacking 高并发高流量网站架构 |
|
海量数据处理方法1.我们网站的信息系统,每天新增100W条用户数据,不知道如果解决才能查询更新更快,更合理.2.有一个条数据,同时有1W个用户查看(并发用户),我们的统计是每次+1,现在数据库更新时有问题了,排队更新,速度太慢.1,记住要安需所取,就是用户一次看多少 ... Tags : 架构 流量 , Posted on 2010-06-12 | |
Security/Hacking 蓝牙核心技术 |
|
第1章蓝牙技术概述1.1蓝牙技术的发展1.2蓝牙技术的特点1.3蓝牙技术的协议标准1.4蓝牙与其他短距无线通信技术1.5蓝牙技术的应用1.6本书的内容组织1.7使用本书的几点建议第一部分蓝牙协议规范第2章蓝牙射频协议 ... Tags : 蓝牙 核心 技术 , Posted on 2010-06-10 | |
Security/Hacking Konfliktmanagement für Sicherheitsprofis: Auswege aus der „Buhmann-Falle“ für IT-Sicherheitsbeauftragte, Datenschützer und Co |
|
Sebastian Klipper, "Konfliktmanagement für Sicherheitsprofis: Auswege aus der „Buhmann-Falle“ für IT-Sicherheitsbeauftragte, Datenschützer und Co" Vieweg+Teubner Verlag; 2010; ISBN: 383481010X; 193 pages; PDF; 5 MB Ob Datensch ... Tags : Auswege , Posted on 2010-06-09 | |
Security/Hacking Forensic Art (Repost) |
|
Forensic Art Publisher: Lucent Books; ISBN: 1420500694; edition 2007; PDF; 104 pages; 12,6 mbCrime solving is painstaking, but modern methods and technological advances have significantly changed the field of criminal investigation. C ... Tags : Repost Forensic , Posted on 2010-06-08 | |
Newest
Security/Hacking Хакеры
Security/Hacking PDF Hacks: 100 Industrial-Strength Tips & Tools (Repost)
Security/Hacking International Relations and Security in the Digital Age: International Relations and Security in the Digital Age
Security/Hacking Information Security Cost Management
Security/Hacking Seven Deadliest Unified Communications Attacks (Repost)
Security/Hacking CompTIA Security Certification Study Guide, Third Edition
Security/Hacking New American Expat: Thriving and Surviving Overseas in the Post-9/11 World {Repost}
Security/Hacking Managing an Information Security and Privacy Awareness and Training Program
Security/Hacking Mechatronics for Safety, Security and Dependability in a New Era {Repost}
Security/Hacking How to Survive the End of the World as We Know It: Tactics, Techniques, and Technologies for Uncertain Times
Security/Hacking Spyware and Adware (Advances in Information Security)
Security/Hacking Network and System Security
Security/Hacking Amazon Hacks: 100 Industrial-Strength Tips & Tools (Repost)
Security/Hacking Introduction to Network Security (Repost)
Security/Hacking Security Study Guide {Repost}
Security/Hacking Aggressive Network Self Defense (2005) & Agile Web Development With Rails 1st Edition (2005) (Repost)
Security/Hacking The Hacker's Underground Handbook Learn What it Takes to Crack Even the Most Secure Systems
Security/Hacking Developer's Guide to Web Application Security By Michael Cross
Security/Hacking Hack Proofing ColdFusion By Steve Casco, Rob Rusher
Security/Hacking Wireshark & Ethereal Network Protocol Analyzer Toolkit (Repost)
Security/Hacking PDF Hacks: 100 Industrial-Strength Tips & Tools (Repost)
Security/Hacking International Relations and Security in the Digital Age: International Relations and Security in the Digital Age
Security/Hacking Information Security Cost Management
Security/Hacking Seven Deadliest Unified Communications Attacks (Repost)
Security/Hacking CompTIA Security Certification Study Guide, Third Edition
Security/Hacking New American Expat: Thriving and Surviving Overseas in the Post-9/11 World {Repost}
Security/Hacking Managing an Information Security and Privacy Awareness and Training Program
Security/Hacking Mechatronics for Safety, Security and Dependability in a New Era {Repost}
Security/Hacking How to Survive the End of the World as We Know It: Tactics, Techniques, and Technologies for Uncertain Times
Security/Hacking Spyware and Adware (Advances in Information Security)
Security/Hacking Network and System Security
Security/Hacking Amazon Hacks: 100 Industrial-Strength Tips & Tools (Repost)
Security/Hacking Introduction to Network Security (Repost)
Security/Hacking Security Study Guide {Repost}
Security/Hacking Aggressive Network Self Defense (2005) & Agile Web Development With Rails 1st Edition (2005) (Repost)
Security/Hacking The Hacker's Underground Handbook Learn What it Takes to Crack Even the Most Secure Systems
Security/Hacking Developer's Guide to Web Application Security By Michael Cross
Security/Hacking Hack Proofing ColdFusion By Steve Casco, Rob Rusher
Security/Hacking Wireshark & Ethereal Network Protocol Analyzer Toolkit (Repost)