BITCQ

elsevier

Size: 10 GB
Magnet link

Name Size
elsevier/specials/SDN and NFV Simplified A Visual Guide to Understanding Software Defined Networks and Network Function Virtualization.pdf 420.7 MB
elsevier/10 Cool LEGO Mindstorms Robotics Invention System 2 Projects Amazing Projects You Can Build Under an Hour.pdf 31.5 MB
elsevier/A Guide to Kernel Exploitation Attacking the Core.pdf 5.3 MB
elsevier/A Machine Learning Approach to Phishing Detection and Defense.pdf 7.1 MB
elsevier/A Study of Black Hole Attack Solutions On AODV Routing Protocl in MANET.pdf 10.6 MB
elsevier/Administering Cisco QoS in IP Networks.pdf 3.7 MB
elsevier/Advanced Persistent Security A Cyberwarfare Approach to Implementing Adaptive Enterprise Protection, Detection, and Reaction Strategies.pdf 2.3 MB
elsevier/Advanced Persistent Threat Understanding the Danger and How to Protect Your Organization.pdf 7.1 MB
elsevier/Aggressive Network Self-Defense I'm Mad As Hell, and I'm Not Gonna Take It Anymore.pdf 83 MB
elsevier/Alternate Data Storage Forensics Raise Digital Fingerprints from Alternate Data Storage ADS Devices.pdf 7.8 MB
elsevier/Android Forensics Investigation, Analysis and Mobile Security for Google Android.pdf 39 MB
elsevier/Apple I Replica Creation Back to the Garage.pdf 72.8 MB
elsevier/Applied Cyber Security and the Smart Grid Implementing Security Controls into the Modern Power Infrastructure.epub 3.5 MB
elsevier/Applied Cyber Security and the Smart Grid Implementing Security Controls into the Modern Power Infrastructure.pdf 9.2 MB
elsevier/Applied Network Security Monitoring Collection, Detection, and Analysis.epub 7.4 MB
elsevier/Applied Network Security Monitoring Collection, Detection, and Analysis.pdf 41.5 MB
elsevier/ASP Configuration Handbook Application Service Provider A Guide for ISPs.pdf 5 MB
elsevier/ASP.NET Web Developer's Guide.pdf 7 MB
elsevier/Assessing Vendors A Hands-On Guide to Assessing Infosec and IT Vendors.epub 2.3 MB
elsevier/Assessing Vendors A Hands-On Guide to Assessing Infosec and IT Vendors.pdf 1.4 MB
elsevier/Asterisk Hacking Turn your Phone System into a Samurai Sword-for Attack or Defense.pdf 10.2 MB
elsevier/Audio Content Security Attack Analysis on Audio Watermarking.pdf 2.3 MB
elsevier/Augmented Reality An Emerging Technologies Guide to AR.epub 4.2 MB
elsevier/Augmented Reality An Emerging Technologies Guide to AR.pdf 15.5 MB
elsevier/Augmented Reality Law, Privacy, and Ethics Law, Society, and Emerging AR Technologies.pdf 13 MB
elsevier/Automated Security Analysis of Android and iOS Applications with Mobile Security Framework.pdf 5.4 MB
elsevier/Automating Open Source Intelligence Algorithms for OSINT.pdf 6.8 MB
elsevier/AVIEN Malware Defense Guide for the Enterprise Stop the Stalkers on Your Desktop.pdf 5.7 MB
elsevier/Best Damn Cisco Internetworking Book Period.pdf 16.5 MB
elsevier/Best Damn Cybercrime and Digital Forensics Book Period Your Guide to Digital Information Seizure, Incident Response, and Computer Forensics.pdf 10.5 MB
elsevier/Best Damn Exchange, SQL and IIS Book Period.pdf 65.3 MB
elsevier/Best Damn Firewall Book Period 2nd Edition.pdf 47.7 MB
elsevier/Best Damn Firewall Book Period.chm 50.8 MB
elsevier/Best Damn Firewall Book Period.pdf 20.5 MB
elsevier/Best Damn IT Security Management Book Period Everything You Need to Know About Security Management.pdf 25.4 MB
elsevier/Best Damn Server Virtualization Book Period.pdf 34.7 MB
elsevier/Best Damn Windows Server 2003 Book Period.pdf 21.4 MB
elsevier/Best Damn Windows Server 2008 Book Period 2nd Edition.pdf 19.2 MB
elsevier/BigNum Math Implementing Cryptographic Multiple Precision Arithmetic Learn How to Implement Efficient Multiple Precision Algorithms.pdf 5.6 MB
elsevier/BizTalk Server 2000 Developer's Guide for ,NET.pdf 6.9 MB
elsevier/Black Hat Physical Device Security Exploiting Hardware and Software.pdf 78.6 MB
elsevier/Blackhatonomics An Inside Look at the Economics of Cybercrime.pdf 6.4 MB
elsevier/Bluetooth Application Developer's Guide The Short Range Interconnect Solution.pdf 54 MB
elsevier/Botnets The Killer Web App.pdf 7 MB
elsevier/Breaking into Information Security Crafting a Custom Career Path to Get the Job You Really Want.pdf 3.6 MB
elsevier/Buffer Overflow Attacks Detect, Exploit, Prevent.pdf 5.4 MB
elsevier/Building a Cisco Wireless LAN.pdf 7.1 MB
elsevier/Building a Digital Forensic Laboratory Establishing and Managing a Successful Facility.pdf 1.2 MB
elsevier/Building a Practical Information Security Prgram.pdf 2.6 MB
elsevier/Building a VoIP Network with Nortel's Multimedia Communication Server 5100.pdf 47.3 MB
elsevier/Building an Information Security Awareness Program.pdf 5.6 MB
elsevier/Building an Intelligence-Led Security Program.pdf 6.3 MB
elsevier/Building Cisco Networks for Windows 2000.pdf 5.7 MB
elsevier/Building Cisco Remote Access Networks.pdf 5.7 MB
elsevier/Building DMZs For Enterprise Networks Design, Deploy, and Maintain a Secure DMZ on Your Network.pdf 9.8 MB
elsevier/Building Robots with LEGO Mindstorms NXT The Ultimate Tool for MINDSTORMS Maniacs.pdf 71.2 MB
elsevier/Building Robots with LEGO Mindstorms The Ultimate Tool for Mindstorms Maniacs.pdf 14.2 MB
elsevier/Building SANs with Brocade Fabric Switches How to Design, Implement, and Maintain Storage Are Networks SANs with Brocade Fabric Switches.pdf 3 MB
elsevier/Business Continuity & Disaster Recovery for IT Professionals Increase Your Company's Odds of Surviving a Major Disaster.pdf 5.7 MB
elsevier/Business Continuity and Disaster Recovery Planning for IT Professionals 2nd Edition.pdf 7.2 MB
elsevier/C# .NET Web Developer's Guide Develop and Deliver Enterprise-Critical Desktop and Web Applications with C# .NET.pdf 6.8 MB
elsevier/C# for Java Programmers.pdf 5.5 MB
elsevier/CD and DVD Forensics Handle, Examine, and Process CD and DVD Evidence for Computer Forensics.pdf 6 MB
elsevier/Check Point Next Generation with Application Intelligence Security Administration.pdf 151.6 MB
elsevier/Check Point NG VPN-1 FireWall-1 Advanced Configuration and Troubleshooting.pdf 9.2 MB
elsevier/Check Point NGX R65 Security Administration.pdf 10.6 MB
elsevier/CheckPoint NG-AI Next Generation with Application Intelligence Security Administration.chm 22.8 MB
elsevier/Cisco AVVID and IP Telephony Design & Implementation Design and Deploy IP Telephony Solutions.pdf 7.5 MB
elsevier/Cisco CCNA CCENT Exam 640-802, 640-822, 640-816 Preparation Kit.pdf 15.2 MB
elsevier/Cisco Router and Switch Forensics Investigating and Analyzing Malicious Network Activity.pdf 25.6 MB
elsevier/Cisco Security Professional's Guide to Secure Intrusion Detection Systems.pdf 13.1 MB
elsevier/Cisco Security Specialist's Guide to PIX Firewalls.pdf 10.8 MB
elsevier/CISSP Study Guide 3rd Edition.pdf 30.5 MB
elsevier/Citrix XenDesktop Implementation A Practical Guide for IT Professionals.pdf 33.5 MB
elsevier/Classic Lego Mindstorms Projects and Software Tools Award-Winning Designs from Master Builders.pdf 45.5 MB
elsevier/Client-Side Attacks and Defense.pdf 15 MB
elsevier/Cloud Storage Forensics.pdf 5.6 MB
elsevier/Coding for Penetration Testers Building Better Tools 2nd Edition.epub 9.1 MB
elsevier/Coding for Penetration Testers Building Better Tools 2nd Edition.pdf 5.5 MB
elsevier/Coding for Penetration Testers Building Better Tools.pdf 9.9 MB
elsevier/Collaboration with Cloud Computing Security, Social Media, and Unified Communications.pdf 13.9 MB
elsevier/Combating Spyware in the Enterprise Discover, Detect, and Eradicate the Internet's Greatest Threat.pdf 8 MB
elsevier/CompTIA Linux+ Certification Study Guide.pdf 4.2 MB
elsevier/CompTIA Network+ Certification Study Guide Exam N10-004 2nd Edition.pdf 7.5 MB
elsevier/CompTIA RFID+ Exam RF0-001 Study Guide and Practice Exam.pdf 3.3 MB
elsevier/CompTIA Security+ Certification Study Guide 3rd Edition.pdf 13 MB
elsevier/CompTIA Security+ Exam JK0-010 Study Guide and Practice Exam 2nd Edition.pdf 13 MB
elsevier/Computer Incident Response and Forensics Team Management Conducting a Successful Incident Response.pdf 43.8 MB
elsevier/Configuring and Troubleshooting Windows XP Professional.pdf 82 MB
elsevier/Configuring Check Point NGX VPN-1 FireWall-1 Secure Your Network and Build a Bulletproof Network VPN.pdf 10.9 MB
elsevier/Configuring Cisco AVVID Architecture for Voice, Video, and Integrated Data.pdf 3.9 MB
elsevier/Configuring CISCO Voice Over IP 2nd Edition.pdf 8.7 MB
elsevier/Configuring Citrix Metaframe for Windows 2000 Terminal Services.pdf 4.9 MB
elsevier/Configuring Citrix MetaFrame XP for Windows Including Feature Release 1 Everything You Need to Install and Configure Citrix MetaFrame XP.pdf 10.3 MB
elsevier/Configuring Exchange 2000 Server.pdf 7.5 MB
elsevier/Configuring IPv6 for Cisco IOS.pdf 2 MB
elsevier/Configuring ISA Server 2000 Building Firewalls for Windows 2000 Everything You Need to Deploy ISA Server in the Enterprise.pdf 7.1 MB
elsevier/Configuring Juniper Networks Netscreen & SSG Firewalls.pdf 13.7 MB
elsevier/Configuring NetScreen Firewalls Your Complete Guide to Juniper's NetScreen Firewall Appliances.pdf 11.2 MB
elsevier/Configuring SonicWALL Firewalls The Only Book on the Market's Fastest-Growing Firewall Product.pdf 13.9 MB
elsevier/Configuring Symantec AntiVirus Corporate Edition Develop an Effective Enterprise AntiVirus Solution.pdf 20.3 MB
elsevier/Configuring Windows 2000 WITHOUT Active Directory.pdf 10.8 MB
elsevier/Consumer's Guide to Cell Phones & Wireless Service Plans Everything You Need to Choose the Right Brand, With the Right Feature Sets, for Your Needs.pdf 4.2 MB
elsevier/Contemporary Digital Forensic Investigations of Cloud and Mobile Applications.pdf 65 MB
elsevier/Cryptography for Developers The Only Cryptography Guide Written for Software Developers.pdf 5 MB
elsevier/CSA Guide to Cloud Computing Implementing Cloud Privacy and Security.pdf 5.4 MB
elsevier/CYA Securing Exchange Server 2003 and Outlook Web Access Cover Your Ass by Getting It Right the First Time.pdf 9.1 MB
elsevier/CYA Securing IIS 6.0. Cover Your Ass by Getting It Right the First Time.pdf 22.1 MB
elsevier/Cyber Adversary Characterization Auditing the Hacker Mind.pdf 3.1 MB
elsevier/Cyber Crime and Cyber Terrorism Investigator's Handbook.pdf 5.8 MB
elsevier/Cyber Crime Investigations Bridging the Gaps Between Security Professional, Law Enforcement, and Prosecutors.pdf 9.2 MB
elsevier/Cyber Guerilla.pdf 2 MB
elsevier/Cyber Reconnaissance, Surveillance and Defense.pdf 25.1 MB
elsevier/Cyber Security and IT Infrastructure Protection.pdf 11 MB
elsevier/Cyber Security Awareness for Accountants and CPAs.azw3 1.7 MB
elsevier/Cyber Security Awareness for Accountants and CPAs.pdf 1.7 MB
elsevier/Cyber Security Awareness for CEOs and Management.pdf 6.8 MB
elsevier/Cyber Security Awareness for Corporate Directors and Board Members.azw3 1.4 MB
elsevier/Cyber Security Awareness for Corporate Directors and Board Members.pdf 1.4 MB
elsevier/Cyber Security Awareness for Lawyers.azw3 2.3 MB
elsevier/Cyber Security Awareness for Lawyers.pdf 2.3 MB
elsevier/Cyber Spying Tracking Your Family's (Sometimes) Secret Online LIves.pdf 69.3 MB
elsevier/Cyber Warfare Techniques, Tactics and Tools for Security Practitioners 2nd Edition.pdf 8.6 MB
elsevier/Cybercrime and Espionage An Analysis of Subversive Multi-vector Threats.pdf 14.3 MB
elsevier/Cybercrime Case Presentation Using Digital Forensics and Investigative Techniques to Identify Cybercrime Suspects.epub 6.1 MB
elsevier/Cybercrime Case Presentation Using Digital Forensics and Investigative Techniques to Identify Cybercrime Suspects.pdf 2.2 MB
elsevier/Cybercrime Investigation Case Studies An Excerpt from Placing the Suspect Behind the Keyboard.pdf 1.5 MB
elsevier/Cybercrime Investigative Case Management Using Digital Forensics and Investigative Techniques to Identify Cybercrime Suspects.epub 6.2 MB
elsevier/Cybercrime Investigative Case Management Using Digital Forensics and Investigative Techniques to Identify Cybercrime Suspects.pdf 2.7 MB
elsevier/Cybersecurity and Applied Mathematics.pdf 6.6 MB
elsevier/Data Breach Preparation and Response Breaches are Certain, Impact is Not.pdf 13 MB
elsevier/Data Hiding Exposing Concealed Data in Multimedia, Operating Systems, Mobile Devices and Network Protocols.pdf 25.4 MB
elsevier/Data Hiding Techniques in Windows OS A Practical Approach to Investigation and Defense.pdf 74.6 MB
elsevier/DBAs Guide to Databases On Linux Including Oracle & MySQL.pdf 24.5 MB
elsevier/Deploying Citrix MetaFrame Presentation Server 3.0 With Windows Server 2003 Terminal Services.pdf 105.8 MB
elsevier/Deploying Secure Containers for Training and Development.pdf 4.6 MB
elsevier/Designing A Wireless Network Understand How Wireless Communication Works.pdf 3.9 MB
elsevier/Designing and Building a Security Operations Center.pdf 3.7 MB
elsevier/Designing and Building Enterprise DMZs Build Network DMZs.pdf 12.9 MB
elsevier/Designing SQL Server 2000 Databases for .NET Enterprise Servers.pdf 4.9 MB
elsevier/Detecting and Combating Malicious Email.pdf 8.3 MB
elsevier/Developer's Guide to Web Application Security Can You Recognize Web Application Security Threats.pdf 10.9 MB
elsevier/Developing .NET Web Services with XML.pdf 6.1 MB
elsevier/Developing Web Services with Java APIs for XML Using WSDP Integrate XML Into Your Java Platform.pdf 4.7 MB
elsevier/Dictionary of Information Security.pdf 969 KB
elsevier/Digital Forensics for Legal Professionals Understanding Digital Evidence from the Warrant to the Courtroom.pdf 11 MB
elsevier/Digital Forensics for Network, Internet, and Cloud Computing A Forensic Evidence Guide for Moving Targets and Data.pdf 12.9 MB
elsevier/Digital Forensics Processing and Procedures Meeting the Requirements of ISO 17020, ISO17025, ISO 27001 and Best Practice Requirements.pdf 15 MB
elsevier/Digital Forensics Threatscape and Best Practices.pdf 7.8 MB
elsevier/Digital Forensics with Open Source Tools.pdf 4.4 MB
elsevier/Digital Triage Forensics Processing the Digital Crime Scene.pdf 19.5 MB
elsevier/Dissecting the Hack - The F0rb1dd3n Network (2010) Revised Edition.pdf 16.1 MB
elsevier/Dissecting the Hack - The F0rb1dd3n Network (2010).pdf 14.9 MB
elsevier/Dissecting the Hack - The V3rb0t3n Network.pdf 11.7 MB
elsevier/DNS Security Defending the Domain Name System.pdf 6 MB
elsevier/Dr. Tom Shinder's Configuring ISA Server 2004.chm 32.6 MB
elsevier/Dr. Tom Shinder's ISA 2006 Migration Guide Your Clear, Concise, and Thorough Path to Migrate from Previous Versions of ISA Server to ISA Server 2006.pdf 16.1 MB
elsevier/Dr. Tom Shinder's ISA Server and Beyond Real World Security Solutions for Microsoft Enterprise Networks.pdf 15.3 MB
elsevier/E-discovery Creating and Managing and Enterpriswide Program A Technical Guide to Digital Investigation and Litigation Support.pdf 6.5 MB
elsevier/E-mail Virus Protection Handbook.pdf 5.8 MB
elsevier/Eleventh 11th Hour CISSP Study Guide 2nd Edition.pdf 2.4 MB
elsevier/Eleventh 11th Hour CISSP Study Guide 3rd Edition.pdf 5.5 MB
elsevier/Eleventh 11th Hour Linux+ Study Guide Exam XK0-003.pdf 3.1 MB
elsevier/Eleventh 11th Hour Network+ Study Guide Exam N10-004.pdf 4.2 MB
elsevier/Eleventh 11th Hour Security+ Study Guide Exam SY0-201.pdf 1.9 MB
elsevier/Enemy at The Water Cooler Real-Life Stories of Insider Threats and Enterprise Security Management Countermeasures.pdf 6.3 MB
elsevier/Essential Computer Security Everyone's Guide to E-mail, Internet, and Wireless Security.pdf 11.7 MB
elsevier/Essential Skills for Hackers.pdf 6.2 MB
elsevier/Ethereal Packet Sniffing.chm 17.1 MB
elsevier/Executing Windows Command Line Investigations While Ensuring Evidentiary Integrity.pdf 13.2 MB
elsevier/Federal Cloud Computing The Definitive Guide for Cloud Service Providers 2nd Edition.pdf 7.6 MB
elsevier/Federated Identity Primer.pdf 3.2 MB
elsevier/Firewall Policies and VPN Configurations.pdf 15.7 MB
elsevier/FISMA and the Risk Management Framework The New Practice of Federal Cyber Security.pdf 9.8 MB
elsevier/FISMA Certification & Accreditation Handbook.pdf 5.1 MB
elsevier/FISMA Compliance Handbook 2nd Edition.epub 5.4 MB
elsevier/FISMA Compliance Handbook 2nd Edition.pdf 8.8 MB
elsevier/Game Console Hacking Xbox, Playstation, Nintendo, Atari, & Gamepark 32.pdf 45.4 MB
elsevier/GFI Network Security and PCI Compliance Power Tools Learn How to Use GFI's Tools to Search for Vulnerabilities in Your Network.pdf 23 MB
elsevier/Google Earth Forensics Using Google Earth Geo-Location in Digital Forensic Investigations.pdf 6.6 MB
elsevier/Google Hacking for Penetration Testers 3rd Edition.pdf 37.4 MB
elsevier/Google Hacking for Penetration Testers.pdf 32.2 MB
elsevier/Google Talking An Easy-to-Read Guide Packed with Tips and Tricks on Google Talk.pdf 8.3 MB
elsevier/Hack Proofing ColdFusion The Only Way to Stop a Hacker Is to Think Like One.pdf 7.8 MB
elsevier/Hack Proofing Linux Your Guide to Open Source Security.pdf 11.4 MB
elsevier/Hack Proofing Sun Solaris 8.pdf 6.8 MB
elsevier/Hack Proofing Windows 2000 Server.pdf 8.9 MB
elsevier/Hack Proofing XML.pdf 5.7 MB
elsevier/Hack Proofing Your E-Commerce Site.pdf 7.3 MB
elsevier/Hack Proofing your Identity in the Information Age.pdf 2.5 MB
elsevier/Hack Proofing Your Network 2nd Edition.pdf 5.5 MB
elsevier/Hack Proofing Your Network Internet Tradecraft.pdf 3 MB
elsevier/Hack Proofing Your Web Applications The Only Way to Stop a Hacker is to Think Like One.pdf 7.5 MB
elsevier/Hack Proofing Your Wireless Network Protect Your Wireless Network From Attack.pdf 2.5 MB
elsevier/Hack the Stack Using Snort and Ethereal to Master the 8 Layers of an Insecure Network.pdf 11.8 MB
elsevier/Hack-Proofing your Wireless Network.pdf 3.5 MB
elsevier/Hacking a Terror Network The Silent Threat of Covert Channels.pdf 6.4 MB
elsevier/Hacking and Penetration Testing with Low Power Devices.pdf 8.3 MB
elsevier/Hacking the Code ASP.NET Web Application Security.chm 4.8 MB
elsevier/Hacking Web Apps Detecting and Preventing Web Application Security Problems.pdf 14.7 MB
elsevier/Hacking Web Intelligence Open Source Intelligence and Web Reconnaissance Concepts and Techniques.pdf 36.8 MB
elsevier/Hacking Wireless Access Points Cracking, Tracking, and Signal Jacking.pdf 5.5 MB
elsevier/Hacking with Kali Practical Penetration Testing Techniques.pdf 23.6 MB
elsevier/Handbook of System Safety and Security.pdf 13.9 MB
elsevier/Hardware Hacking Have Fun While Voiding Your Warranty.pdf 14.9 MB
elsevier/HCISPP Study Guide.pdf 6 MB
elsevier/Hiding Behind the Keyboard Uncovering Covert Communication Methods with Forensic Analysis.pdf 29.9 MB
elsevier/Host Integrity Monitoring Using Osiris and Samhain.pdf 3 MB
elsevier/How to Attack and Defend Your Website.pdf 23.6 MB
elsevier/How to Cheat at Administering Office Communications Server 2007.pdf 28.7 MB
elsevier/How to Cheat at Configuring Exchange Server 2007 Including Outlook Web, Mobile, and Voice Access.pdf 19.8 MB
elsevier/How to Cheat at Configuring ISA Server 2004.pdf 66.3 MB
elsevier/How to Cheat at Configuring Open Source Security Tools The Perfect Reference for the Multitasked SysAdmin.pdf 7.6 MB
elsevier/How to Cheat at Configuring VMware ESX Server.pdf 16 MB
elsevier/How to Cheat at Deploying and Securing RFID.pdf 7.1 MB
elsevier/How to Cheat at Deploying Exchange Server 2000 with Active Directory.pdf 596 KB
elsevier/How to Cheat at Designing a Windows Server 2003 Active Directory Infrastructure.pdf 7.7 MB
elsevier/How to Cheat at Designing Security for a W2K3 Server Network.pdf 67.3 MB
elsevier/How to Cheat at IIS 7 Server Administration.pdf 15.2 MB
elsevier/How to Cheat at IT Project Management.pdf 3.4 MB
elsevier/How to Cheat at Managing Information Security.pdf 2.5 MB
elsevier/How to Cheat at Managing Microsoft Operations Manager 2005 In the Land of the Blind, the One-Eyed Man is King.pdf 11.2 MB
elsevier/How to Cheat at Managing Windows Server Update Services Automate Patch Management Across Your Network.pdf 10 MB
elsevier/How to Cheat at Managing Windows Small Business Server 2003 In the Land of the Blind, the One-Eyed Man is King.pdf 7.9 MB
elsevier/How to Cheat at Microsoft Vista Administration.pdf 28.1 MB
elsevier/How to Cheat at Securing a Wireless Network.pdf 11.7 MB
elsevier/How to Cheat at Securing Linux.pdf 27 MB
elsevier/How to Cheat at Securing SQL Server 2005 The Perfect Book for Multitasked IT Managers Responsible for Securing SQL Server.pdf 9.2 MB
elsevier/How to Cheat at Securing Your Network The Perfect Reference for the Multitasked Administrator.pdf 9.6 MB
elsevier/How to Cheat at VoIP Security.pdf 53.5 MB
elsevier/How to Cheat at Windows System Administration Using Command Line Scripts.pdf 2.1 MB
elsevier/How to Defeat Advanced Malware New Tools for Protection and Forensics.pdf 3.9 MB
elsevier/How to Define and Build an Effective Cyber Threat Intelligence Capability.pdf 3.5 MB
elsevier/Identity and Access Management Business Performance Through Connected Intelligence.epub 26 MB
elsevier/Identity and Access Management Business Performance Through Connected Intelligence.pdf 165.7 MB
elsevier/Implementing Digital Forensic Readiness From Reactive to Proactive Process.pdf 10 MB
elsevier/Industrial Network Security Securing Critical Infrastructure Network for Smart Grid, SCADA, and Other Industrial Control Systems 2nd Edition.pdf 19.2 MB
elsevier/Information Hiding in Speech Signals for Secure Communication.pdf 11.4 MB
elsevier/Information Security Analytics Finding Security Insights, Patterns, and Anomalies in Big Data.pdf 8.5 MB
elsevier/Information Security Risk Assessment Toolkit Practical Assessments through Data Collection and Data Analysis.epub 10.8 MB
elsevier/Information Security Risk Assessment Toolkit Practical Assessments through Data Collection and Data Analysis.pdf 7.4 MB
elsevier/Information Security Science Measuring the Vulnerability to Data Compromises.pdf 25.1 MB
elsevier/InfoSec Career Hacking Sell Your Skillz, Not Your Soul A Technical Guide to Landing (and Keeping) a Job in the Information Security Field.pdf 83.9 MB
elsevier/Infosec Management Fundamentals.pdf 3.4 MB
elsevier/InfoSecurity 2008 Threat Analysis A One-Stop Refrence Containing The Most Read Topics in the Infosecurity Library.pdf 11.5 MB
elsevier/Inside the SPAM Cartel Trade Secrets from the Dark Side.chm 6 MB
elsevier/Inside the SPAM Cartel Trade Secrets from the Dark Side.pdf 7.2 MB
elsevier/Insider Threat Protecting the Enterprise from Sabotage, Spying, and Theft Prevent Employees and Contractors from Stealing Corporate Data.pdf 6.7 MB
elsevier/Integrating ISA Server 2006 with Microsoft Exchange 2007 Protect your E-Mail Environment with ISA Server 2006 and Microsoft Forefront Security Suite.pdf 11.7 MB
elsevier/Integrating Python with Leading Computer Forensics Platforms.epub 58 MB
elsevier/Integrating Python with Leading Computer Forensics Platforms.pdf 35.7 MB
elsevier/Introduction to Cyber-Warfare A Multidisciplinary Approach.pdf 9.3 MB
elsevier/Introduction to Information Security A Strategic-based Approach.pdf 5.7 MB
elsevier/Introduction to Social Media Investigation A Hands-on Approach.pdf 39.4 MB
elsevier/Introduction to US Cybersecurity Careers.pdf 6 MB
elsevier/Intrusion Prevention and Active Response.pdf 84.8 MB
elsevier/Investigating Internet Crimes An Introduction to Solving Crimes in Cyberspace.pdf 33.1 MB
elsevier/IP Addressing Subnetting IPv6.pdf 54.8 MB
elsevier/iPhone and iOS Forensics Investigation, Analysis and Mobile Security for Apple iPhone, iPad and iOS Devices.pdf 8.8 MB
elsevier/Ira Winkler's Zen and the Art of Information Security.pdf 1.7 MB
elsevier/Islands in the Clickstream Reflections on Life in a Virtual World.pdf 1.6 MB
elsevier/Job Reconnaissance Using Hacking Skills to Win the Job Hunt Game.epub 2.4 MB
elsevier/Job Reconnaissance Using Hacking Skills to Win the Job Hunt Game.pdf 3.8 MB
elsevier/Joe Grand's Best Of Hardware, Wireless & Game Console Hacking Includes DVD with 20 Hacks in High-Res Color.pdf 7.3 MB
elsevier/Juniper Networks Secure Access SSL VPN Configuration Guide Complete Coverage of the Juniper Network Secure Access SSL VPN Line and IVE Software.pdf 27.8 MB
elsevier/Keys to the Kingdom Impressioning, Bumping, Master Escalation, and Other Key-Based Attacks Against Physical Locks.pdf 27.1 MB
elsevier/Kismet Hacking The Only Book on the Industry Standard for Examining Wireless Network Traffic.pdf 5.5 MB
elsevier/LEGO Mindstorms Masterpieces Building and Programming Advanced Robots Learn from the Lego Masters.pdf 18.7 MB
elsevier/LEGO Software Power Tools.pdf 14.9 MB
elsevier/Linksys WRT54G Ultimate Hacking.pdf 15.8 MB
elsevier/Linux Malware Incident Response A Practitioner's Guide to Forensic Collection and Examination of Volatile Data An Excerpt from Malware Forensics Field Guide for Linux Systems.pdf 15 MB
elsevier/Linux Malware Incident Response A Practitioner's Guide to Forensic Collection and Examination of Volatile Data.epub 4.1 MB
elsevier/Logging And Log Management The Authoritative Guide to understanding the Concepts Surrounding Loggin and Log Management.pdf 11.8 MB
elsevier/Lossless Information Hiding in Images.pdf 7.3 MB
elsevier/Low Tech Hacking Street Smarts for Security Professionals.pdf 7.7 MB
elsevier/Mac OS X, iPod, and iPhone Forensic Analysis DVD Toolkit.pdf 42.5 MB
elsevier/Malware Forensics Field Guide for Linux Systems Digital Forensics Field Guides.pdf 56.7 MB
elsevier/Malware Forensics Field Guide for Windows Systems Digital Forensics Field Guides.pdf 42.2 MB
elsevier/Malware Forensics Investigating and Analyzing Malicious Code.pdf 24.6 MB
elsevier/Managed Code Rootkits Hooking into Runtime Environments.pdf 5.6 MB
elsevier/Managing and Securing A Cisco SWAN Structured Wireless-Aware Network.pdf 9.5 MB
elsevier/Managing Catastrophic Loss of Sensitive Data A Guide for IT and Security Professionals.pdf 1.1 MB
elsevier/Managing Cisco Network Security 2nd Edition.pdf 5.9 MB
elsevier/Managing Information Security 2nd Edition.epub 3.6 MB
elsevier/Managing Information Security 2nd Edition.pdf 13.6 MB
elsevier/Managing Information Security.pdf 6 MB
elsevier/Managing Windows 2000 Network Services.pdf 27.9 MB
elsevier/MCSA MCSE Exam 70-290 Managing and Maintaining a Windows Server 2003 Environment Study Guide & DVD Training System.pdf 10.6 MB
elsevier/MCSA MCSE Exam 70-291 Implementing, Managing, and Maintaining a Windows Server 2003 Network Infrastructure Study Guide & DVD Training System.pdf 11.4 MB
elsevier/MCSA MCSE Exam 70-291 Study Guide and Training System Implementing, Managing, and Maintaining a Windows Server 2003 Network Infrastructure Guide.ppt 1012 KB
elsevier/MCSA MCSE Managing and Maintaining a Windows Server 2003 Environment for an MCSA Certified on Windows 2000 (70-292) Study Guide & DVD Training System.pdf 8.9 MB
elsevier/MCSE Designing a Windows Server 2003 Active Directory and Network Infrastructure Exam 70-297 Study Guide & DVD Training System.pdf 6.5 MB
elsevier/MCSE Designing Security for a Windows Server 2003 Network Exam 70-298 Study Guide & DVD Training System.pdf 5.8 MB
elsevier/MCSE Exam 70-293 Planning and Maintaining a Windows Server 2003 Network Infrastructure Study Guide & DVD Training System.pdf 9.2 MB
elsevier/MCSE Exam 70-294 Planning, Implementing, and Maintaining a Windows Server 2003 Active Directory Infrastructure Study Guide & DVD Training System.pdf 12.3 MB
elsevier/MCSE Exam 70-296 Planning, Implementing and Maintaining a Windows Server 2003 Environment for an MCSE Certified on Windows 2000 Study Guide & DVD Training System.pdf 11.9 MB
elsevier/MCSE MCSA Implementing & Administering Security in a Windows 2000 Network (Exam 70-214) Study Guide & DVD Training System.pdf 11.1 MB
elsevier/Meeting People via WiFi and Bluetooth.pdf 12.1 MB
elsevier/Metasploit Toolkit for Penetration Testing, Exploit Development, and Vulnerability Research.pdf 4.9 MB
elsevier/Metrics and Methods for Security Risk Management.pdf 6.2 MB
elsevier/Microsoft Exchange Server 2007 with SP1 Tony Redmond's Guide to Successful Implementation.pdf 16 MB
elsevier/Microsoft Forefront Security Administration Guide.pdf 24.6 MB
elsevier/Microsoft Log Parser Toolkit.pdf 86.6 MB
elsevier/Microsoft Virtualization Master Microsoft Server, Desktop, Application, and Presentation Virtualization.pdf 48.4 MB
elsevier/Microsoft Vista for IT Security Professionals.pdf 17.6 MB
elsevier/Microsoft Windows 7 Administrator's Reference Upgrading, Deploying, Managing, and Securing Windows 7.pdf 28.9 MB
elsevier/Microsoft Windows Server 2008 R2 Administrator's Reference The Administrator's Essential Reference.pdf 66.7 MB
elsevier/Migrating to the Cloud Oracle Client Server Modernization.pdf 8 MB
elsevier/Mission Critical Windows 2000 Server Administration.pdf 5.3 MB
elsevier/Mobile Data Loss Threats and Countermeasures.pdf 2.5 MB
elsevier/Mobile Malware Attacks and Defense.pdf 9.9 MB
elsevier/Mobile Security and Privacy Advances, Challenges and Future Research Directions.pdf 11.3 MB
elsevier/Moving to the Cloud Developing Apps in the New World of Cloud Computing.pdf 16.9 MB
elsevier/Nagios 3 Enterprise Network Monitoring Including Plug-Ins and Hardware Devices.pdf 3.8 MB
elsevier/Nessus Network Auditing 2nd Edition.pdf 10.4 MB
elsevier/Nessus Network Auditing.pdf 4.6 MB
elsevier/Nessus, Snort & Ethereal Power Tools Customizing Open Source Security Applications.pdf 3 MB
elsevier/NET Mobile Web Developer's Guide Develop and Deliver Enterprise-Critical Mobile Web Applications.pdf 5.3 MB
elsevier/Netcat Power Tools.pdf 10.3 MB
elsevier/Network and System Security 2nd Edition.mobi 9.3 MB
elsevier/Network and System Security 2nd Edition.pdf 11.8 MB
elsevier/Network Intrusion Analysis Methodologies, Tools, and Techniques for Incident Analysis and Response.pdf 30.7 MB
elsevier/Network Performance and Security Testing and Analyzing Using Open Source and Low-Cost Tools.pdf 63.2 MB
elsevier/Network Security Assessment From Vulnerability to Patch.pdf 10.2 MB
elsevier/Network Security Evaluation Using the NSA IEM Learn How the NSA Conducts Network Security Evaluations.pdf 7.3 MB
elsevier/Network+ Exam N10-003 Study Guide & Practice Exams.pdf 9.3 MB
elsevier/Next Generation Red Teaming.pdf 2.5 MB
elsevier/Next Generation SSH2 Implementation Securing Data in Motion.pdf 7.2 MB
elsevier/Ninja Hacking Unconventional Penetration Testing Tactics and Techniques.pdf 9.9 MB
elsevier/Nmap in the Enterprise Your Guide to Network Scanning.pdf 4.6 MB
elsevier/No Tech Hacking A Guide to Social Engineering, Dumpster Diving, and Shoulder Surfing.pdf 26.1 MB
elsevier/Nokia Firewall, VPN, and IPSO Configuration Guide.pdf 10.5 MB
elsevier/Nokia Network Security Solution Handbook.pdf 7.6 MB
elsevier/Open Source Fuzzing Tools Check Your Software for Vulnerabilities and Eliminate Them.pdf 4.2 MB
elsevier/Operating System Forensics.pdf 74 MB
elsevier/Optimizing IEEE 802.11i Resource and Security Essentials For Mobile and Stationary Devices.pdf 2.8 MB
elsevier/OS X Exploits and Defense Own it Just like Windows or Linux.pdf 7.5 MB
elsevier/OS X for Hackers at Heart The Apple of Every Hacker's Eye.pdf 15.3 MB
elsevier/OS X Incident Response Scripting and Analysis.pdf 51.8 MB
elsevier/OSSEC HIDS Host-Based Intrusion Detection Guide.pdf 8.6 MB
elsevier/Palm OS web application developer's guide (Files).zip 2.1 MB
elsevier/Palm OS Web Application Developer's Guide Developing and Delivering PQAs with Web Clipping.pdf 4 MB
elsevier/PCI Compliance Understand and Implement Effective PCI Data Security Standard Compliance 4th Edition.pdf 7.2 MB
elsevier/PCI Compliance Understand and Implement Effective PCI Data Security Standard Compliance.pdf 6.3 MB
elsevier/PCI DSS 3.1 The Standard That Killed SSL.pdf 667 KB
elsevier/Penetration Tester's Open Source Toolkit 3rd Edition.pdf 17 MB
elsevier/Penetration Tester's Open Source Toolkit 4th Edition.pdf 30.5 MB
elsevier/Penetration Tester's Open Source Toolkit Volume 2.pdf 27.1 MB
elsevier/Perfect Passwords Selection, Protection, Authentication Create Password Policies That Baffle the Bad Guys, Not Your Users.pdf 1.8 MB
elsevier/Perl Scripting for Windows Security Live Response, Forensic Analysis, and Monitoring Master Perl for Digital Forensic Analysis and Application Monitoring.pdf 5.5 MB
elsevier/Phishing Exposed Uncover Secrets from the Dark Side.pdf 8.3 MB
elsevier/Physical and Logical Security Convergence Powered by Enterprise Security Management.pdf 21.2 MB
elsevier/Placing the Suspect Behind the Keyboard Using Digital Forensics and Investigative Techniques to Identify Cybercrime Suspects.pdf 21.6 MB
elsevier/Practical Anonymity Hiding in Plain Sight Online.pdf 3.4 MB
elsevier/Practical Deployment of Cisco Identity Services Engine (ISE) Real-World Examples of AAA Deployments.epub 22.1 MB
elsevier/Practical Deployment of Cisco Identity Services Engine (ISE) Real-World Examples of AAA Deployments.pdf 81.5 MB
elsevier/Practical Lock Picking A Physical Penetration Tester's Training Guide 2nd Edition.pdf 28.7 MB
elsevier/Practical Lock Picking A Physical Penetration Tester's Training Guide.pdf 7.9 MB
elsevier/Practical Oracle Security Your Unauthorized Guide to Relational Database Security.pdf 4.6 MB
elsevier/Practical VoIP Security.pdf 46.6 MB
elsevier/Preserving Electronic Evidence for Trial A Team Approach to the Litigation Hold, Data Collection, and Evidence Preservation.pdf 1.6 MB
elsevier/Professional Penetration Testing Creating and Learning in a Hacking Lab 2nd Edition.epub 25.1 MB
elsevier/Professional Penetration Testing Creating and Learning in a Hacking Lab 2nd Edition.pdf 37.5 MB
elsevier/Professional Penetration Testing Creating And Operating A Formal Hacking Lab.pdf 8.9 MB
elsevier/Programmer's Ultimate Security DeskRef.pdf 4.5 MB
elsevier/Programming LEGO Mindstorms NXT Teach Your Robot New Tricks.pdf 10.3 MB
elsevier/Programming LEGO Mindstorms with Java The Ultimate Tool for Mindstorms Maniacs.pdf 7.1 MB
elsevier/Protecting Patient Information A Decision-Maker's Guide to RIsk, Prevention, and Damage Control.pdf 3.6 MB
elsevier/Python Forensics A Workbench for Inventing and Sharing Digital Forensic Technology.pdf 31.1 MB
elsevier/Python Passive Network Mapping P2NMAP.pdf 36.4 MB
elsevier/Research Methods for Cyber Security.pdf 10.6 MB
elsevier/Reverse Engineering Code with IDA Pro.pdf 4.9 MB
elsevier/RFID Security Protect to Supply Chain.pdf 5.2 MB
elsevier/Rick Gallagher's MPLS Training Guide Building Multi Protocol Label Switching Networks.pdf 50.9 MB
elsevier/Rick Gallagher's MPLS Training Guide Building Multi-Protocol Label Switching Networks.chm 19.6 MB
elsevier/Risk Management Framework A Lab-Based Approach to Securing Information Systems.epub 15.8 MB
elsevier/Risk Management Framework A Lab-Based Approach to Securing Information Systems.pdf 8.6 MB
elsevier/Ruby Developer's Guide Everything You Need to Develop and Deliver Ruby Applications.pdf 4.3 MB
elsevier/SAP Security Configuration and Deployment The IT Administrator's Guide to Best Practices.pdf 4.4 MB
elsevier/Sarbanes-Oxley IT Compliance Using COBIT and Open Source Tools A Toolkit for IT Professionals.pdf 2.4 MB
elsevier/Sarbanes-Oxley IT Compliance Using Open Source Tools A Toolkit for IT Professionals 2nd Edition.pdf 9.8 MB
elsevier/Scene of the Cybercrime 2nd Edition.pdf 7.7 MB
elsevier/Scene of the Cybercrime Computer Forensics Handbook Bring Cybercriminals to Justice.pdf 3.2 MB
elsevier/Scripting VMware Power Tools Automating Virtual Intrastructure Administration.pdf 6.9 MB
elsevier/Secrets Stolen, Fortunes Lost Preventing Intellectual Property Theft and Economic Espionage in the 21st Century.pdf 2.3 MB
elsevier/Secure your Network for Free Using Nmap, Wireshark, Snort, Nessus, and MRTG.pdf 7 MB
elsevier/Securing Citrix Presentation Server in the Enterprise Learn How to Use XenApp Server to Keep Attackers from Penetrating Your Network.pdf 15.2 MB
elsevier/Securing Citrix XenApp Server in the Enterprise.pdf 15.5 MB
elsevier/Securing IM and P2P Applications for the Enterprise.pdf 6.1 MB
elsevier/Securing Social Media in the Enterprise.pdf 6.5 MB
elsevier/Securing SQL Server Protecting Your Database from Attackers 3rd Edition.pdf 9.7 MB
elsevier/Securing the Cloud Cloud Computer Security Techniques and Tactics.pdf 3.3 MB
elsevier/Securing the Internet of Things.pdf 7 MB
elsevier/Securing the Smart Grid Next Generation Power Grid Security.pdf 8.6 MB
elsevier/Securing VoIP Keeping Your VoIP Network Safe.pdf 19.4 MB
elsevier/Securing Windows Server 2008 Prevent Attacks from Outside and Inside Your Organization.pdf 15.2 MB
elsevier/Security Assessment Case Studies for Implementing the NSA IAM.pdf 5 MB
elsevier/Security Controls Evaluation, Testing, and Assessment Handbook.pdf 46 MB
elsevier/Security for Microsoft Windows Systems Administrators Introduction to Key Information Security Concepts.pdf 11.9 MB
elsevier/Security Log Management Identifying Patterns in the Chaos.pdf 6.6 MB
elsevier/Security Risk Management Building an Information Security Risk Management Program from the Ground Up.pdf 3.3 MB
elsevier/Security SAGE's Guide to Hardening the Network Infrastructure.pdf 9.4 MB
elsevier/Security+ Study Guide & DVD Training System.pdf 8.1 MB
elsevier/Seven Deadliest Microsoft Attacks.pdf 2.2 MB
elsevier/Seven Deadliest Network Attacks.pdf 7 MB
elsevier/Seven Deadliest Social Network Attacks.pdf 5.4 MB
elsevier/Seven Deadliest Unified Communications Attacks.pdf 5.7 MB
elsevier/Seven Deadliest USB Attacks.pdf 5.2 MB
elsevier/Seven Deadliest Web Application Attacks.pdf 2.8 MB
elsevier/Seven Deadliest Wireless Technologies Attacks.pdf 1.7 MB
elsevier/Simple Steps to Data Encryption A Practical Guide to Secure Encryption.pdf 6.6 MB
elsevier/Skype Me From Single User to Small Enterprise and Beyond.pdf 7.6 MB
elsevier/Smart Grid Security Innovative Solutions for a Modernized Grid.pdf 21.8 MB
elsevier/Sniffer Pro Network Optimization & Troubleshooting Handbook Everything You Need to Perform Vital Network Analysis.pdf 7.2 MB
elsevier/Snort 2.0 Intrusion Detection.pdf 4.8 MB
elsevier/Snort 2.1 Intrusion Detection 2nd Edition.pdf 12.6 MB
elsevier/Snort IDS and IPS Toolkit.pdf 8.4 MB
elsevier/Social Engineering Penetration Testing Executing Social Engineering Pen Tests, Assessments and Defense.pdf 15.4 MB
elsevier/Social Media Security Leveraging Social Networking While Mitigating Risk.pdf 10.9 MB
elsevier/Sockets, Shellcode, Porting & Coding - Reverse Engineering Exploits And Tool Coding For Security Professionals.pdf 112.3 MB
elsevier/Software Piracy Exposed Secrets from the Dark Side Revealed.pdf 6.2 MB
elsevier/SonicWALL Secure Wireless Network Integrated Solutions Guide.pdf 13.3 MB
elsevier/Special Ops Host and Network Security for Microsoft UNIX, and Oracle.pdf 11.7 MB
elsevier/SQL Injection Attacks and Defense 2nd Edition.pdf 20.9 MB
elsevier/SQL Injection Attacks and Defense.pdf 6.5 MB
elsevier/SSCP Systems Security Certification Practicioner Study Guide & DVD Training System.pdf 6.3 MB
elsevier/Stealing The Network How to Own a Continent.chm 2.7 MB
elsevier/Stealing The Network How to Own a Shadow.pdf 9.1 MB
elsevier/Stealing The Network How to Own an Identity.pdf 3.9 MB
elsevier/Stealing The Network How To Own The Box.pdf 4.1 MB
elsevier/Stealing The Network The Complete Series Collector's Book.pdf 10.8 MB
elsevier/Syngress Force Emerging Threat Analysis From Mischief to Malicious.pdf 7.9 MB
elsevier/Syngress IT Security Project Management Handbook.pdf 7.8 MB
elsevier/Targeted Cyber Attacks Multi-staged Attacks Driven by Exploits and Malware.pdf 5.7 MB
elsevier/Techno Security's Guide to E-Discovery and Digital Forensics A Comprehensive Handbook for Investigators, Examiners, IT Security Managers, Lawyers, and Academia.pdf 4.3 MB
elsevier/Techno Security's Guide to Managing Risks For IT Managers, Auditors, and Investigators.pdf 53.4 MB
elsevier/Techno Security's Guide to Securing SCADA A Comprehensive Handbook On Protecting the Critical Infrastructure.pdf 3.7 MB
elsevier/The Basics of Cloud Computing Understanding the Fundamentals of Cloud Computing in Theory and Practice.epub 2.8 MB
elsevier/The Basics of Cloud Computing Understanding the Fundamentals of Cloud Computing in Theory and Practice.pdf 8.1 MB
elsevier/The Basics of Cyber Safety Computer and Mobile Device Safety Made Easy.pdf 6.3 MB
elsevier/The Basics of Cyber Warfare Understanding the Fundamentals of Cyber Warfare in Theory and Practice.pdf 2.8 MB
elsevier/The Basics of Digital Forensics The Primer for Getting Started in DIgital Forensics 2nd Edition.pdf 6.9 MB
elsevier/The Basics of Digital Forensics The Primer for Getting Started in DIgital Forensics.pdf 6.7 MB
elsevier/The Basics of Digital Privacy Simple Tools to Protect Your Personal Information and Your Identity Online.pdf 10.3 MB
elsevier/The Basics of Hacking and Penetration Testing Ethical Hacking and Penetration Testing Made Easy 2nd Edition.pdf 4.5 MB
elsevier/The Basics of Hacking and Penetration Testing.pdf 3.7 MB
elsevier/The Basics of Information Security Understanding the Fundamentals of Infosec in Theory and Practice 2nd Edition.pdf 10.1 MB
elsevier/The Basics of IT Audit Purposes, Processes, and Practical Information.pdf 2.8 MB
elsevier/The Basics of Web Hacking Tools and Techniques to Attack the Web.pdf 12.5 MB
elsevier/The Cloud Security Ecosystem Technical, Legal, Business and Management Issues.pdf 11.9 MB
elsevier/The Hacker's Guide to OS X Exploiting OS X from the Root Up.pdf 19.7 MB
elsevier/The IT Digital Legal Companion A Comprehensive Business Guide to Software, IT, Internet, Media and IP Law.pdf 4.2 MB
elsevier/The IT Regulatory and Standards Compliance Handbook How to Survive Information Systems Audit and Assessments.pdf 15 MB
elsevier/The Manager's Handbook for Business Security 2nd Edition.pdf 6 MB
elsevier/The Mezonic Agenda Hacking the Presidency.pdf 16.3 MB
elsevier/The Official CHFI Exam 312-49 Study Guide for Computer Hacking Forensics Investigators.pdf 7.6 MB
elsevier/The Real Citrix CCA Exam Preparation Kit Prepare for XenApp 5.0.pdf 6 MB
elsevier/The Real MCITP Windows Server 2008 Enterprise Administrator Exam 70-647 Prep Kit.pdf 24.9 MB
elsevier/The Real MCITP Windows Server 2008 Server Administrator Exam 70-646 Prep Kit.pdf 25.9 MB
elsevier/The Real MCTS MCITP Configuring Microsoft Windows Vista Client Exam 70-620 Prep Kit.pdf 28.2 MB
elsevier/The Real MCTS MCITP Upgrading Your MCSA on Windows Server 2003 to Windows Server 2008 Exam 70-648 Prep Kit.pdf 26.5 MB
elsevier/The Real MCTS MCITP Upgrading Your MCSE on Windows Server 2003 to Windows Server 2008 Exam 70-649 Prep Kit.pdf 32.9 MB
elsevier/The Real MCTS MCITP Windows Server 2008 Configuring Active Directory Exam 70-640 Prep Kit.pdf 21.4 MB
elsevier/The Real MCTS MCITP Windows Server 2008 Configuring Applications Infrastructure Exam 70-643 Prep Kit.pdf 19.4 MB
elsevier/The Real MCTS MCITP Windows Server 2008 Configuring Network Infrastructure Exam 70-642 Prep Kit.pdf 14.6 MB
elsevier/The Real MCTS SQL Server 2008 Exam 70-432 Database Implementation and Maintenance Prep Kit.pdf 9.5 MB
elsevier/The Real MCTS SQL Server 2008 Exam 70-433 Database Design Prep Kit.pdf 15 MB
elsevier/The Ruby Developer's Guide.pdf 4.1 MB
elsevier/The Wireshark Field Guide Analyzing and Troubleshooting Network Traffic.pdf 25.2 MB
elsevier/Theoretical and Experimental Methods for Defending Against DDoS Attacks.pdf 5.3 MB
elsevier/Thor's Microsoft Security Bible A Collection of Practical Security Techniques.pdf 14.7 MB
elsevier/Thor's OS Xodus Why And How I Left Windows For OS X.pdf 25.6 MB
elsevier/Threat Forecasting Leveraging Big Data for Predictive Analysis.pdf 3.6 MB
elsevier/Troubleshooting Windows 2000 TCP-IP.pdf 5 MB
elsevier/Unified Communications Forensics Anatomy of Common UC Attacks.pdf 32.1 MB
elsevier/UNIX and Linux Forensic Analysis DVD Toolkit.pdf 5 MB
elsevier/UTM Security with Fortinet Mastering FortiOS.pdf 15.6 MB
elsevier/Video Conferencing Over IP Configure, Secure, and Troubleshoot Simple and Cost-Effective Solutions That Work.pdf 10.1 MB
elsevier/Violent Python A Cookbook for Hackers, Forensic Analysts, Penetration Testers, and Security Engineers.pdf 21.1 MB
elsevier/Virtualization and Forensics A Digital Forensic Investigator's Guide to Virtual Environments.pdf 17.2 MB
elsevier/Virtualization for Security Including Sandboxing, Disaster Recovery, High Availability, Forensic Analysis, and Honeypotting.pdf 7.1 MB
elsevier/Virtualization with Microsoft Virtual Server 2005 Free Your Infrastructure from Physical Limitations.pdf 10.1 MB
elsevier/Virtualization with VMware ESX Server.chm 7.6 MB
elsevier/Virtualization with VMware ESX Server.pdf 10.2 MB
elsevier/Virtualization with Xen Including XenEnterprise, XenServer, and XenExpress The Book That Demystifies Xen.pdf 5.8 MB
elsevier/VoIP Security.pdf 2.5 MB
elsevier/WarDriving & Wireless Pentration Testing.pdf 20.8 MB
elsevier/WarDriving Drive, Detect, Defend A Guide to Wireless Security.epub 30.1 MB
elsevier/Web Application Obfuscation.pdf 3.1 MB
elsevier/Web Application Vulnerabilities Detect, Exploit, Prevent.pdf 20.9 MB
elsevier/Webmaster's Guide to the Wireless Internet Everything You Need to Develop E-Commerce Enabled Wireless Web Sites.pdf 5.1 MB
elsevier/Windows 2000 Active Directory 2nd Edition.pdf 6.5 MB
elsevier/Windows 2000 Configuration Wizards.pdf 24.5 MB
elsevier/Windows 2000 Server System Administration Handbook.pdf 4.9 MB
elsevier/Windows 2012 Server Network Security Securing your Windows Network Systems and Infrastructure.pdf 30.4 MB
elsevier/Windows Forensic Analysis DVD Toolkit 2nd Edition.pdf 5.9 MB
elsevier/Windows Forensic Analysis DVD Toolkit.pdf 45.4 MB
elsevier/Windows Forensic Analysis Toolkit Advanced Analysis Techniques for Windows 7 3rd Edition.pdf 8.3 MB
elsevier/Windows Forensic Analysis Toolkit Advanced Analysis Techniques for Windows 8 4th Edition.pdf 12.9 MB
elsevier/Windows Performance Analysis Field Guide.pdf 43.2 MB
elsevier/Windows Registry Forensics Advanced Digital Forensic Analysis of the Windows Registry 2nd Edition.pdf 11.8 MB
elsevier/Windows Registry Forensics Advanced Digital Forensic Analysis of the Windows Registry.pdf 3.6 MB
elsevier/Windows Server 2012 Security from End to Edge and Beyond.pdf 50.9 MB
elsevier/Windows to Linux Migration Toolkit Your Windows to Linux Extreme Makeover.pdf 114.2 MB
elsevier/Winternals Defragmentation, Recovery, and Administration Field Guide A Must-Have for Windows Sys Admins.pdf 42.9 MB
elsevier/Wireless Hacking Projects for Wi-Fi Enthusiasts.pdf 18.3 MB
elsevier/Wireless Reconnaissance in Penetration Testing.pdf 9.4 MB
elsevier/Wireshark & Ethereal Network Protocol Analyzer Toolkit.pdf 14.8 MB
elsevier/Writing Security Tools and Exploits.pdf 7.8 MB
elsevier/X-Ways Forensics Practitioner's Guide.epub 4.5 MB
elsevier/X-Ways Forensics Practitioner's Guide.pdf 12.6 MB
elsevier/XBOX 360 Forensics A Digital Forensics Guide to Examining Artifacts.pdf 21.1 MB
elsevier/XML .NET Developer’s Guide (Files).rar 535 KB
elsevier/XML .NET Developer’s Guide Develop and Deliver Enterprise-Critical Applications with XML .NET.pdf 5.8 MB
elsevier/XSS Attacks Cross Site Scripting Exploits and Defense.pdf 7.3 MB
elsevier/You For Sale, Protecting Your Personal Data and Privacy Online.pdf 3.1 MB
elsevier/Zero-Day Exploit Countdown to Darkness.pdf 1.8 MB
elsevier/specials/(ISC)2 CISSP Certified Information Systems Security Professional Official Practice Tests 2nd Edition.pdf 12.8 MB
elsevier/specials/A+ Guide to Software Managing, Maintaining, and Troubleshooting 9th Edition.pdf 60.3 MB
elsevier/specials/CEH Certified Ethical Hacker All In One Exam Guide 4th Edition.pdf 19.2 MB
elsevier/specials/CEH v10 Certified Ethical Hacker Study Guide.pdf 9.6 MB
elsevier/specials/CEH v10 EC-COUNCIL Certified Ethical Hacker Most Demanding Complete Hacking Guide Exam 312-50.pdf 12.4 MB
elsevier/specials/CompTIA A+ Complete Deluxe Study Guide Exam 230-901 220-902 3rd Edition.pdf 43.3 MB
elsevier/specials/CompTIA Pentest+ Study Guide Exam PT0-001.pdf 33.3 MB
elsevier/specials/Computer Forensics Investigating Data & Image Files.pdf 15.2 MB
elsevier/specials/Computer Forensics Investigating Hard Disks, File & Operating Systems.pdf 10.3 MB
elsevier/specials/Computer Forensics Investigating Network Intrusions & Cyber Crime.pdf 24 MB
elsevier/specials/Computer Forensics Investigating Wireless Networks and Devices.pdf 5.3 MB
elsevier/specials/Computer Networking A Top-Down Approach 7th Edition Global Edition.pdf 131.1 MB
elsevier/specials/Computer Networking for LANS to WANS Hardware, Software and Security 1st Edición - Mansfield, Jr., Kenneth C_.pdf 28.4 MB
elsevier/specials/Computer Networks 5th Edition.pdf 6.6 MB
elsevier/specials/Computer Networks and Internets 6th Edition.pdf 4.1 MB
elsevier/specials/Disaster Recovery.pdf 9.1 MB
elsevier/specials/EC Council Academia CEH Attack Vectors and Countermeasures Volume 2 of 4.pdf 325.9 MB
elsevier/specials/Ethical Hacking & Countermeasures Linux, Macintosh & Mobile Systems.pdf 6.4 MB
elsevier/specials/Ethical Hacking & Countermeasures Secure Network Infrastructures.pdf 7.9 MB
elsevier/specials/Ethical Hacking & Countermeasures Threats & Defense Mechanisms.pdf 15.2 MB
elsevier/specials/Ethical Hacking and Countermeasures Attack Phases.pdf 17.1 MB
elsevier/specials/Gray Hat Hacking The Ethical Hacker's Handbook 5th Edition.pdf 94.4 MB
elsevier/specials/Guide to Computer Network Security 4th Edition.pdf 8.5 MB
elsevier/specials/Guide to Networking Essentials 7th Edition.pdf 18.9 MB
elsevier/specials/Handbook of Digital Forensics of Multimedia Data and Devices.pdf 30.8 MB
elsevier/specials/Kali Linux Revealed Mastering the Penetration Testing Distribution.pdf 26.3 MB
elsevier/specials/Linux Command Line and Shell Scripting Bible The Comprehensive, Tutorial Resource.pdf 5.5 MB
elsevier/specials/MCSA Guide to Networking with Windows Server 2016 MCSE MCSA Exam 70-741.pdf 337.7 MB
elsevier/specials/Network Defense Perimeter Defense Mechanisms.pdf 5.7 MB
elsevier/specials/Network Safety.pdf 3.2 MB
elsevier/specials/Network+ Guide to Networks 8th Edition.pdf 42.2 MB
elsevier/specials/Networking All-In-One for Dummies 7th Edition.pdf 34.7 MB
elsevier/specials/Networking Essentials A CompTIA Network+ N10-006 Textbook 4th Edition Instructor Edition.pdf 93.4 MB
elsevier/specials/Networking Essentials A CompTIA Network+ N10-006 Textbook 4th Edition.pdf 92.9 MB
elsevier/specials/Networking The Complete Reference 3rd Edition.pdf 13 MB
elsevier/specials/Penetration Testing Communication Media Testing.pdf 12.4 MB
elsevier/specials/Penetration Testing Procedures & Methodologies.pdf 8 MB
elsevier/specials/Picture Yourself Networking Your Home or Small Office.pdf 13.3 MB
elsevier/specials/Practical Binary Analysis Build Your Own Linux Tools for Binary Instrumentation, Analysis, and Disassembly.pdf 32.9 MB
elsevier/specials/Python Basics A Self-Teaching Introduction.pdf 11.6 MB
elsevier/10 Cool LEGO Mindstorms Dark Side Robots, Transports, and Creatures Amazing Projects You Can Build in Under an Hour.pdf 15.7 MB
elsevier/specials/The Handbook of Information and Computer Ethics.pdf 3.5 MB
elsevier/specials/The Illustrated Network How TCP-IP Works in a Modern Network 2nd Edition.pdf 9 MB
elsevier/specials/Virtualization Security.pdf 7.6 MB
elsevier/specials/Wireless Communications & Networks by William Stallings 2nd International Edition.pdf 8.9 MB
elsevier/specials/Wireless Safety.pdf 3.3 MB
Name
udp://tracker.coppersurfer.tk:6969/announce
udp://tracker.open-internet.nl:6969/announce
udp://tracker.leechers-paradise.org:6969/announce
udp://exodus.desync.com:6969/announce
udp://tracker.internetwarriors.net:1337/announce
udp://tracker.opentrackr.org:1337/announce
udp://9.rarbg.to:2710/announce
udp://9.rarbg.me:2710/announce
http://tracker3.itzmx.com:6961/announce
http://tracker1.itzmx.com:8080/announce
udp://thetracker.org:80/announce
udp://open.demonii.si:1337/announce
udp://bt.xxx-tracker.com:2710/announce
udp://tracker.torrent.eu.org:451/announce
udp://tracker.cyberia.is:6969/announce
udp://tracker.tiny-vps.com:6969/announce
udp://denis.stalker.upeer.me:6969/announce
http://open.acgnxtracker.com:80/announce
udp://ipv4.tracker.harry.lu:80/announce
udp://explodie.org:6969/announce
udp://tracker.opentrackr.org:1337/announce
udp://tracker.zer0day.to:1337/announce
udp://tracker.coppersurfer.tk:6969/announce
udp://tracker.leechers-paradise.org:6969/announce
udp://tracker.internetwarriors.net:1337/announce
udp://mgtracker.org:6969/announce
udp://explodie.org:6969/announce
Name Size Peers
Concise Encyclopedia of Composite Materials (Elsevier, 1994).pdf Application 86.3 MB 7
Elsevier.-.Sabiston.Textbook.Of.Surgery.21st.Edition.2022 Application 283.8 MB 5
Katzung - Basic and Clinical Pharmacology 9e.pdf Kirkham - Principles of Soil and Plant Water Relations (Elsevier, 2005).pdf Application 23.5 MB 5
Handbook of Hazardous Chemical Properties - Nicholas P. Cheremisinoff (Elsevier-BH, 2000).pdf Application 36.9 MB 3
Compendium of Trace Metals and Marine Biota - Ronald Eisler (Elsevier, 2010).pdf Application 3.5 MB 3
Advances in Planar Lipid Bilayers and Liposomes Vol. 18 (Elsevier, 2013).pdf Application 16.4 MB 1
Fluid Catalytic Cracking V - Materials and Technological Innovations (Elsevier, 2001).pdf Application 12.3 MB 3
Heat Transfer Principles and Applications-Elsevier (2020).pdf Application 15.1 MB 51
Elsevier.-.Master.Techniques.In.Facial.Rejuvenation.2nd.Edition.2018 Application 147.3 MB 18
Howard Curtis - Orbital Mechanics for Engineering Students (ELSEVIER Aerospace Engineering) - 2005.pdf Application 10.3 MB 7
Radiative Heat Transfer 3rd ed - Michael F. Modest (Elsevier-AP, 2013).pdf Application 14.6 MB 4
Advances in Planar Lipid Bilayers and Liposomes Vol. 3 (Elsevier, 2006).pdf Application 4 MB 4
Valve Selection Handbook 4th ed - R. W. Zappe (Elsevier, 1999).pdf Application 16.6 MB 3
Nonequilibrium Thermodynamics 2nd ed - Yasar Demirel (Elsevier, 2007).pdf Application 6.1 MB 3
Environment and Development - S.G. Poulopoulos, V.J. Inglezakis (Elsevier, 2016).pdf Application 31.9 MB 3
Liquid Membranes - Principles and Applications in Chemical Separations and Wastewater Treatment - Vladimir S. Kislik (Elsevier, 2010).pdf Application 5.3 MB 2
Properties of Polymers 4th ed - D.W. van Krevelen, K. te Nijenhuis (Elsevier, 2009).pdf Application 6.7 MB 2
The Theory of Critical Distances - A New Perspective in Fracture Mechanics - David Taylor (Elsevier, 2007).pdf Application 2.4 MB 2
Heterogeneous Catalytic Materials - Solid State Chemistry, Surface Chemistry and Catalytic Behaviour - Guido Busca (Elsevier, 2014).pdf Application 17 MB 2
Lithium-Ion Batteries - Advances and Applications - Gianfranco Pistoia (Elsevier, 2014).pdf Application 60.8 MB 2

Loading...