Index of /uploads/Books

Upload a file here  
Please note that uploaded content is user generated and can potentially contain pornographic or illegal content. If you encounter any such content, please report it.

Turn galery mode on

File Last Modified Size

Parent Directory
2597_tdm.pdf2018-04-03 19:40155.8K
5G_Wireless_Systems_Simulation_and_Evaluation_Techniques_Yang_Yang_2017.zip2017-09-17 13:4118.4M
Advanced_Persistent_Training_Jordan_Schroeder_2017.zip2017-11-26 11:321.6M
Algorithms_for_Data_Science_Brian_Steele_2016.zip2017-12-03 11:437.1M
American Psychiatric Association - DSM V.pdf2018-01-14 02:0630.5M
AndroidHacker-sHandbook.pdf2018-02-01 22:537.9M
Anonymous_Communication_Network_Protecting_Privacy_on_the_Web_Kun_Peng_2014.pdf2017-08-06 15:252.0M
Beginning PHP5, Apache, and My - Elizabeth Naramore & Jason Ger_230.pdf2017-12-19 23:477.1M
Beginning_Django_Web_Application_Development_and_Deployment_with_Python_Daniel_Rubio_2017.zip2017-12-09 12:299.8M
Beginning_Ethical_Hacking_with_Kali_Linux_Sanjib_Sinha_2018.zip2019-02-09 13:0617.1M
Beginning_Ethical_Hacking_with_Python_Sanjib_Sinha_2017.zip2019-02-09 13:044.4M
Blockchain_Basics_A_Non_Technical_Introduction_in_25_Steps_Daniel_Drescher_2017.zip2017-11-26 11:134.9M
Building_Virtual_Pentesting_Labs_for_Advanced_Penetration_Testing_Kevin_Cardwell_2014.zip2017-06-27 17:3170.1M
carro paz roberto - gestion de stock.pdf2017-10-27 02:596.8M
CEH v9 Certified Ethical Hacker Version 9.pdf2018-02-01 22:5312.6M
Certified_Ethical_Hacker_CEH_Foundation_Guide_Sagar_Ajay_Rahalkar_2016.zip2017-04-02 10:3312.5M
Chinese_Cybersecurity_and_Cyberdefense_Daniel_Ventre_2014.pdf2017-04-22 11:523.0M
Cisco_Networks_Engineers_Handbook_of_Routing_Switching_and_Security_with_IOS_NX_OS_and_ASA_Chris_Carthern_2015.epub2017-01-07 16:5110.1M
Cisco_Networks_Engineers_Handbook_of_Routing_Switching_and_Security_with_IOS_NX_OS_and_ASA_Chris_Carthern_2015.pdf2017-01-07 16:5524.3M
Clean_Code_A_Handbook_of_Agile_Software_Craftsmanship_Robert_Martin_2008.pdf2016-12-12 07:243.6M
Client_Side_Attacks_and_Defense_Robert_Shimonski_2012.zip2017-08-26 19:5215.6M
Computer_and_Network_Security_Essentials_Kevin_Daimi_2018.zip2018-09-16 17:3315.5M
Computer_Incident_Response_and_Forensics_Team_Management_Leighton_R_Johnson_2013.zip2017-05-14 12:1760.0M
Computer_Security_Fundamentals_Third_Edition_Chuck_Easttom_2016.zip2017-05-13 12:4318.2M
Computer_Security_Principles_and_Practice_3rd_Edition_William_Stallings_2015.pdf2017-05-24 17:5619.9M
Conducting_Network_Penetration_and_Espionage_in_a_Global_Environment_Bruce_Middleton_2014.pdf2017-03-04 13:5620.5M
Cryptography_Cracking_Codes_Rob_Curley_2013.pdf2017-07-16 13:0512.6M
cyber security,analytics technology and automation.pdf2018-02-01 22:516.1M
Cyber_Attacks_Protecting_National_Infrastructure_Edward_G_Amoroso_2010.pdf2017-07-01 18:301.5M
Cyber_Deception_Building_the_Scientific_Foundation_Sushil_Jajodia_2016.pdf2017-02-01 14:579.2M
Cyber_Security_and_IT_Infrastructure_Protection_John_R_Vacca_2014.zip2017-08-19 15:409.6M
Cyber_Threat_How_to_Manage_the_Growing_Risk_of_Cyber_Attacks_N_Macdonnell_Ulsch_2014.zip2017-07-15 17:491.6M
Cybersecurity_Attack_and_Defense_Strategies_Yuri_Diogenes_Erdal_Ozkaya_2018.zip2018-10-28 13:1827.9M
Cybersecurity_Managing_Systems_Conducting_Testing_and_Investigating_Intrusions_Thomas_J_Mowbray_2013.zip2017-04-16 15:5312.1M
Cybersecurity_Protecting_Critical_Infrastructures_from_Cyber_Attack_and_Cyber_Warfare_Thomas_A_Johnson_2015.zip2017-07-02 14:418.1M
Data_Privacy_Foundations_New_Developments_and_the_Big_Data_Challenge_Vicen—Ā_Torra_2017.pdf2017-05-26 05:324.2M
Data_Privacy_Principles_and_Practice_Nataraj_Venkataramanan_2016.pdf2017-07-01 13:004.6M
Data_Protection_Ensuring_Data_Availability_Preston_de_Guise_2017.pdf2017-06-27 17:026.4M
Databases_Theory_and_Applications_Zi_Huang_Xiaokui_Xiao_2017.pdf2017-10-21 14:0122.0M
DataStructuresUsingC.pdf2018-09-25 19:525.3M
DDoS_Attacks_Evolution_Detection_Prevention_Reaction_and_Tolerance_Dhruba_Kumar_Bhattacharyya_2016.pdf2017-12-03 11:2110.0M
Derivatives_Wendy_L_Pirie_2017.pdf2017-06-24 14:327.4M
Digital_Security_Cyber_Terror_and_Cyber_Security_Ananda_Mitra_2010,.pdf2017-08-20 13:5213.4M
Digital_Watermarking_and_Steganography_Fundamentals_and_Techniques_2nd_Edition_Frank_Y_Shih_2017.pdf2017-04-11 05:2424.6M
djordj-kleyson-samyiy-bogatyiy-chelovek-v-vavilone-1.pdf2018-11-24 12:56383.1K
Effective_Python_Penetration_Testing_Rejah_Rehim_2016.zip2017-07-28 15:095.1M
Effective_Unit_Testing_A_guide_for_Java_Developers_Lasse_Koskela_2013.pdf2016-12-03 12:445.2M
Essential_Cybersecurity_Science_Josiah_Dykstra_2016.zip2017-04-12 18:1910.7M
Ethical_Hacking_and_Penetration_Testing_Guide_Rafay_Baloch_2015.pdf2016-12-06 10:2022.4M
Explorations_In_Computing_An_Introduction_To_Computer_Science_And_Python_Programming_John_S_Conery_2015.pdf2017-01-15 18:3815.8M
FB_IMG_1521320343697.jpg2018-04-21 01:21100.3K
Financial_Cryptography_and_Data_Security_FC_2017_Michael_Brenner_2017.pdf2018-03-04 13:0620.2M
Functional_Python_Programming_Steven_Lott_2015.ZIP2016-12-06 09:563.2M
Gitler_Moya-borba.5DWPGg.305448.fb2.zip2018-09-09 14:261.1M
Guide_to_Computer_Network_Security_2nd_Edition_Joseph_Migga_Kizza_2013.pdf2017-06-12 15:265.7M
Guide_to_Computer_Network_Security_4th_Edition_Joseph_Migga_Kizza_2017.pdf2017-06-12 15:278.5M
Hacking_Android_Srinivasa_Rao_Kotipalli_Mohammed_A_Imran_2016.pdf2017-01-28 19:5510.3M
Hacking_Exposed_Wireless_Wireless_Security_Settings_&_Solutions_2nd_Edition_Johnny_ Cache_2010.pdf2017-05-21 13:2511.1M
Hacking_For_Dummies_4th_Edition_Kevin_Beaver_2013.zip2017-04-02 17:5114.2M
Hacking_Point_of_Sale_Slava_Gomzin_2014.zip2017-06-27 16:4345.0M
Hands_On_Cybersecurity_with_Blockchain_Rajneesh_Gupta_2018.zip2019-01-27 13:5323.8M
Haskell_High_Performance_Programming_Samuli_Thomasson_2016.zip2017-08-06 15:593.6M
IL.ZIP2018-09-16 11:54177.7M
IMG_3525.JPG2017-05-23 23:5058.0K
Information_Security_Fundamentals_2nd_Edition_Thomas_R_Peltier_2013.pdf2017-06-04 13:1725.7M
Information_Warfare_2nd_Edition_Daniel_Ventre_2016.zip2017-07-22 14:337.8M
Introduction_to_Cyber_Warfare_A_Multidisciplinary_Approach_Paulo_Shakarian_2013.zip2017-07-27 19:1410.4M
Introduction_to_Modern_Cryptography_2nd_Edition_Jonathan_Katz_Yehuda_Lindell_2014.pdf2017-08-02 17:377.5M
Issues_and_Methods_in_Comparative_Politics_Third_Edition_Todd_Landman_2008.pdf2016-12-03 11:5010.7M
IT_Convergence_and_Security_2017_Volume_1_Kuinam_J_Kim_2017.pdf2017-09-16 13:1272.0M
IT_Convergence_and_Security_2017_Volume_2_Kuinam_J_Kim_2017.zip2017-09-16 13:2633.9M
Kali_Linux_2_Assuring_Security_by_Penetration_Testing_Third_Edition_Gerard_Johansen_2016.epub2017-02-19 12:3243.2M
Kali_Linux_2_Assuring_Security_by_Penetration_Testing_Third_Edition_Gerard_Johansen_2016.mobi2017-02-19 12:4259.6M
Kali_Linux_2_Assuring_Security_by_Penetration_Testing_Third_Edition_Gerard_Johansen_2016.pdf2017-02-19 12:5658.8M
Kali_Linux_2_Windows_Penetration_Testing_Wolf_Halton_2016.zip2017-08-12 13:30186.4M
Kali_Linux_Network_Scanning_Cookbook_Justin_Hutchens_2014.pdf2017-04-07 04:564.6M
Kali_Linux_Wireless_Penetration_Testing_Beginners_Guide_Vivek_Ramachandran_2015.zip2017-03-05 11:2839.9M
Kali_Linux_Wireless_Penetration_Testing_Cookbook_Sean_Philip_Oriyano_2017.zip2018-10-20 13:4415.5M
Learning_Android_Forensics_Rohit_Tamma_2015.zip2017-12-03 13:2428.7M
Learning_Bitcoin_Richard_Caetano_2015.zip2017-07-01 13:2326.2M
Learning_Data_Mining_with_R_Makhabel_Bater_2015.pdf2016-12-03 11:386.5M
Learning_Functional_Data_Structures_and_Algorithms_Atul_S_Khot_2017.zip2017-10-22 14:0216.6M
Learning_Java_by_Building_Android_Games_John_Horton_2015.zip2017-01-20 06:0010.2M
Learning_Xcode_8_Jak_Tiano_2016.zip2017-01-17 15:0548.7M
Linux Bible, 2008 Edition_ Boo - Christopher Negus_796.pdf2017-12-19 23:4913.0M
Linux_Bible_9th_Edition_Christopher_Negus_2015.zip2017-09-03 12:4640.3M
Linux_Sound_Programming_Jan_Newmarch_2017.zip2017-09-03 13:235.5M
Love_u.png2018-12-24 20:2313.2K
Low_Tech_Hacking_Jack_Wiles_2012.zip2017-04-16 13:079.5M
Machine_Learning_Using_R_Karthik_Ramasubramanian_2017.zip2017-12-01 17:2214.7M
Mastering_Data_Mining_with_Python_Find_Patterns_Hidden_In_Your_Data_Megan_Squire_2016.zip2017-01-08 14:4612.8M
Mastering_Kali_Linux_for_Advanced_Penetration_Testing_Robert_W_Beggs_2014.pdf2017-09-03 12:179.0M
Mastering_Kali_Linux_for_Web_Penetration_Testing_Michael_McPhee_2017.pdf2018-03-24 12:1934.5M
Mastering_Kali_Linux_Wireless_Pentesting_Brian_Sak_2016.zip2017-03-19 06:3794.2M
Mastering_Metasploit_2nd_Edition_Nipun_Jaswal_2016.zip2017-09-17 14:4064.3M
Mastering_Mobile_Forensics_Soufiane_Tahiri_2016.pdf2017-05-13 18:3015.7M
Mastering_Modern_Web_Penetration_Testing_Prakhar_Prasad_2016.pdf2017-06-17 12:3215.1M
Mastering_Swift_3_Linux_Jon_Hoffman_2017.zip2017-09-03 14:2323.1M
Mastering_Wireless_Penetration_Testing_for_Highly_Secured_Environments_Aaron Johns_2015.zip2017-03-08 19:3330.5M
Metasploit_Bootcamp_Nipun_Jaswal_2017.zip2017-09-17 14:5531.5M
Methods_in_Algorithmic_Analysis_Vladimir_A_Dobrushkin_2009.pdf2017-09-02 07:494.5M
Mobile_Application_Penetration_Testing_Vijay_Kumar_Velu_2016.pdf2017-03-25 12:1911.1M
Mobile_Payment_Systems_Secure_Network_Architectures_and_Protocols_Jesus_Tellez_Sherali_Zeadally_2017.zip2017-10-08 12:106.0M
Network_Forensics_Tracking_Hackers_through_Cyberspace_Sherri_Davidoff_2012.zip2017-02-25 19:5134.2M
New_Technology_Big_Data_and_the_Law_Marcelo_Corrales_2017.pdf2017-09-10 18:485.1M
Nmap_Essentials_David_Shaw_2015.zip2017-04-09 14:1718.9M
Numbers_and_Computers_Second_Edition_Ronald_T_Kneusel_2017.zip2017-02-12 11:488.6M
Open_Source_Intelligence_Investigation_Babak_Akhgar_2016.pdf2017-01-30 17:415.8M
Penetration_Testing_A_Hands_On_Introduction_to_Hacking_Georgia_Weidman_2014.zip2017-03-24 16:3250.3M
Penetration_Testing_A_Survival_Guide_Wolf_Halton_2016.zip2017-09-06 16:03159.1M
Penetration_Testing_Procedures_and_Methodologies_2011.pdf2017-03-10 20:117.4M
Penetration_Testing_with_BackBox_Stefan_Umit_Uygur_2014.zip2017-02-04 14:1519.5M
Penetration_Testing_with_Raspberry_Pi_Aamir_Lakhani_Joseph_Muniz_2015.pdf2017-01-08 14:499.7M
Penetration_Testing_with_Raspberry_Pi_Second_Edition_Michael_McFee_Jason_Beltrame_2016.epub2017-01-07 09:0819.7M
Penetration_Testing_with_Raspberry_Pi_Second_Edition_Michael_McFee_Jason_Beltrame_2016.mobi2017-01-07 09:1120.5M
Penetration_Testing_with_the_Bash_Shell_Keith_Makan_2014.zip2017-06-04 12:4021.0M
Personal_Cybersecurity_How_to_Avoid_and_Recover_from_Cybercrime_Marvin_Waschke_2017.zip2017-07-15 18:084.4M
Practical_Anonymity_Hiding_in_Plain_Sight_Online_Peter_Loshin_2013.zip2017-07-22 14:084.8M
Practical_DevOps_Joakim_Verona_2016.zip2016-12-26 18:458.3M
Practical_Digital_Forensics_Richard_Boddington_2016.pdf2017-07-01 19:0513.2M
Practical_Information_Security_Management_Tony_Campbell_2016.zip2017-11-26 11:579.1M
Practical_Internet_of_Things_Security_Brian_Russell_2016.pdf2017-06-10 15:324.2M
Practical_Mobile_Forensics_2nd_Edition_Heather_Mahalik_2016.pdf2017-05-13 14:0011.1M
Practical_Reverse_Engineering_Bruce_Dang_2014.zip2017-05-28 13:5013.8M
Practical_Windows_Forensics_Ayman_Shaaban_Konstantin_Sapronov_2016.zip2017-08-12 14:08115.1M
Preventing_Digital_Extortion_Dhanya_Thakkar_2017.zip2017-08-02 17:0927.9M
Privileged_Attack_Vectors_Morey_J_Haber_Brad_Hibbert_2018.zip2018-09-23 12:274.1M
Professional LAMP _ Linux, Apa - Elizabeth Naramore_733.pdf2017-12-19 23:577.1M
Professional Linux Programming - Jon Masters & Richard Blum_798.pdf2017-12-20 00:012.9M
Professional_Penetration_Testing_Second_Edition_Thomas_Wilhelm_2013.zip2017-03-10 17:1359.2M
Programming_Languages_and_Systems_11th_Asian_Symposium_APLAN_2013.pdf2016-12-30 05:414.7M
Project_Management_24_Steps_to_Help_You_Master_Any_Project_Garry_R_Heerkens_2007.pdf2016-12-03 12:011.1M
Python 3 Object-oriented Programming (Second Edition) 2015.zip2017-01-01 09:4010.7M
Python_Penetration_Testing_Essentials_Mohit_2015.zip2017-03-19 11:527.2M
Python_Penetration_Testing_for_Developers_2016.epub2017-01-01 09:5818.6M
Python_Unlocked_Arun_Tigeraniya_2015.zip2017-08-08 17:307.8M
R_Unleash_Machine_Learning_Techniques_Raghav_Bali_2016.zip2017-02-05 14:0699.8M
Raspberry_Pi_for_Python_Programmers_Cookbook_Second_Edition_Tim_Cox_2016.zip2017-02-06 17:2099.1M
Robust_Control_Engineering_Practical_QFT_Solutions_Mario_Garcia_Sanz_2017.pdf2017-07-22 13:4680.1M
Running Linux, 4th Edition - Matthias Kalle Dalheimer & Ter_773.pdf2017-12-20 00:033.6M
Security_in_Fixed_and_Wireless_Networks_2nd_Edition_Guenter_Schaefer_2016.pdf2017-06-24 14:079.1M
Simple_Steps_to_Data_Encryption_A_Practical_Guide_to_Secure_Computing_Peter_Loshin_2013.zip2017-07-30 13:308.9M
Spring_MVC_Cookbook_Alex_Bretet_2016.zip2017-08-22 20:1335.9M
Text_Mining_for_Qualitative_Data_Analysis_in_the_Social_Sciences_Gregor_Wiedemann_2016.pdf2017-01-28 11:4810.0M
The_Antivirus_Hackers_Handbook_Joxean_Koret_Elias_Bachaalany_2015.zip2017-04-19 05:1113.3M
The_Basics_of_Cyber_Warfare_Steve_Winterfeld_2013.zip2017-04-08 12:008.9M
The_Basics_of_Digital_Privacy_Denny_Cherry_2013.zip2017-06-20 18:4417.4M
The_Basics_of_Hacking_and_Penetration_Testing_Second_Edition_Patrick_Engebretson_2013.zip2017-03-04 13:227.1M
The_Browser_Hackers_Handbook_Wade_Alcorn_2014.zip2017-02-19 14:1754.4M
The_Wisdom_of_Money_Pascal_Bruckner_2017.pdf2017-06-10 13:5410.0M
Visual_Studio_2015_Cookbook_Second_Edition_Jeff_Martin_2016.zip2017-01-14 19:3969.2M
web-penetration-testing-with-kali-linux.pdf2017-07-24 14:5720.0M
Web_Development_With_Bootstrap_4_And_Angular_2_Second_Edition_Sergey_Akopkokhyants_2016.zip2017-01-15 17:4811.1M
Web_Penetration_Testing_with_Kali_Linux_2nd_Edition_Juned_Ahmed_Ansari_2015.pdf2016-12-25 11:4411.1M
Wireless_Reconnaissance_in_Penetration_Testing_Matthew_Neely_2013.zip2017-03-04 12:1814.5M
Wireshark_Essentials_James_H_Baxter_2014.zip2017-06-15 19:1027.8M
Wireshark_Network_Security_Piyush_Verma_2015.zip2017-06-16 18:1533.2M
Xamarin_Blueprints_Michael_Williams_2016.zip2017-01-22 14:4759.9M