magnet:?xt=urn:btih:25E33F5E1F2BB134B22FD076B068844A2EBA8685
(eBook - PDF) Hugo Cornwall - The Hacker's Handbook (1).pdf 284.7 kB
(eBook - PDF) Hugo Cornwall - The Hacker's Handbook .pdf 284.7 kB
(ebook - PDF) How to Crack CD Protections(1).pdf 30.7 kB
(ebook - PDF) How to Crack CD Protections.pdf 30.7 kB
(ebook - html) complete set of hacking tools+manuals(1).zip 2.8 MB
(ebook - html) complete set of hacking tools+manuals.zip 2.8 MB
(ebook-pdf) Hackerland(1).pdf 389.3 kB
(ebook-pdf) Hackerland.pdf 389.3 kB
- hack - (ebook - txt) - hacking for dummies 2.doc 150.5 kB
0071410732 - McGraw-Hill.Wi-Fi.Security - fly.pdf 5.9 MB
0072193999 - McGraw-Hill.XML.Security - fly.pdf 3.8 MB
0471328480 - Wiley.Managing.the.Risks.of.Payment.System - fly.pdf 3.9 MB
2600.The.Hacker.Quarterly.vol19.no3-EEn.pdf 9.7 MB
2600.The.Hacker.Quarterly.vol19.no4-EEn.pdf 10.4 MB
2600.The.Hacker.Quarterly.vol20.no1.Spring.2003-EEn.by.efish.pdf 2.3 MB
A Buffer Overflow Study - Attacks and Defenses.pdf 496.5 kB
AMACOM - The E-Privacy Imperative - fly.pdf 2.1 MB
Aberdeen-Rethinking Data Protection Strategies.pdf 540.5 kB
Addison Wesley - Enterprise Security. The Manager's Defense Guide by Kiwy.pdf 2.5 MB
Addison Wesley - Hack I.T.rar 4.8 MB
FaresCD.Com.Ethic.HackBooks 122.4 MB