http://ubuntuone.com/2JzQDW3RZXSBooyK9GDlpy
Black Hat Physical Device Security
http://ubuntuone.com/0bse9nLK8pKLXDLZA45lJ8
Botnets
http://ubuntuone.com/3e57afxurlLWpzjOj0hkyq
Buffer Overflow Attacks
http://ubuntuone.com/3EKWrf37HpmHVc1tDcv8FU
CD and DVD Forensics
http://ubuntuone.com/1DLQXKTz264KCJ0RXe7FfY
Creating Security Policies and Implementing Identity Management with Active Directory
http://ubuntuone.com/6HNbXIRzZllgMWZreaLfru
Cryptography for Developers
http://ubuntuone.com/1fbNwSudEYZJocLJ6en9qf
DMZ For Enterprise Networks
http://ubuntuone.com/6TJkvEwWjbTPqKxVZPzLAF
Designing A Wireless Network
http://ubuntuone.com/5gD2UDRVDkMuoFGL8UHa1l
Google Hacking For Penetration Tester
http://ubuntuone.com/046xHyagL8aZbPZC7ZWKjd
Hack Proofing Your Identity In The Information Age
http://ubuntuone.com/3JcF4nUn3RuMSwiJwd6DzS
Hack The Stack
http://ubuntuone.com/7E5vRTENAdTssltBZ7dpy3
Linksys Wrt54g Ultimate Hacking
http://ubuntuone.com/7Y3Rl5RwG8moX9qm5UmJzY
Managing Cisco Network Security
http://ubuntuone.com/2Rl0sfp6yXDSX5VqWiufj6
Metasploit Toolkit
http://ubuntuone.com/4j9MXfNbKBLYuqRAxHc8yh
Mobile Malware Attacks and Defense
http://ubuntuone.com/7QqXHZ1zEIDhvXSzZPYGNG
Network Security Assessment
http://ubuntuone.com/0MIwjHyK7W8u6HB4nzvwfF
No Tech Hacking
http://ubuntuone.com/2VCDV8MExEWmLfeJ1ZVvJy
Open Source Security Tools
http://ubuntuone.com/3nqJPtUGasYHJgK6VVqKaw
Penetration Tester's Open Source Toolkit
http://ubuntuone.com/7NAPNEcuo1M06JrjemZpE9
Perfect Passwords
http://ubuntuone.com/4bdNswT3ygUOz8tlFX7THI
Perl Scripting for IT Security
http://ubuntuone.com/1LURW7L2zCAKqUHz1Y0c5U
RFID Security
http://ubuntuone.com/0J5L5xZ9D5ox4vAidd2BWJ
Reverse Engineering Code with IDA Pro
http://ubuntuone.com/00Ip3bgEds2rQdqimev8IR
Snort Intrusion Detection and Prevention Toolkit
http://ubuntuone.com/25jNwmNExBZ6FgDYt1Cooe
Sockets Shellcode Porting & Coding
http://ubuntuone.com/0959sbMx8FvjXHVucLJhxx
Stealing the Network - How to Own a Shadow
http://ubuntuone.com/1IgJYkUXGSPrEujuBxt2yE
Stealing the Network - How to Own an Identity
http://ubuntuone.com/0Bczt1giWm1zocGB3tIXyg
Stealing the Network - How to Own the Box
http://ubuntuone.com/2ydfVmf9AtiMvzmwgxvMvG
Web Application Vulnerabilities
http://ubuntuone.com/4WXCpwxXRrmNeQYje7ad4h
Windows System Administration
http://ubuntuone.com/3TWFJfVznr6ZqzFk1Cfocw
Wireless Hacking
http://ubuntuone.com/5Q1dSzl0Fas5qbYV3vKa7P
Wireshark and Ethereal
http://ubuntuone.com/2tGnDeeMPcEgK0vAK8q4jg
Writing Security Tools and Exploits
http://ubuntuone.com/2JYch9hZl3pN8i7Dxj6eb5
XSS Exploits Cross Site Scripting Attacks and Defense
http://ubuntuone.com/5D8nFt2YX4xMUUgZMwqY6A
Zero Day Exploit
http://ubuntuone.com/492KDEzLbg62PPILFXrEwQ
0 comentários: sobre Livros que merecem toda atenção
Postar um comentário para Livros que merecem toda atenção: