top |
back |
Chained Exploits - Advanced Hacking Attacks from Start to Finish.pdf |
Exploiting Software - How To Break Code.pdf |
Hack Collection (2009).mht |
Hacking.The.Next.Generation.Sep.2009.pdf |
McGraw Hill - Hacking Exposed Computer Forensics 2nd Edition November 2009 (ATTiCA).pdf |
McGrawHill - Hacking Exposed Malware and Rootkits.Sep.2009.pdf |
McGraw-Hill.Osborne.Media.Hacking.Exposed.Sixth.Edition.Network.Security.SecretsAnd.Solutions.Jan.2009.pdf |
Springer - Identifying Malicious Code Through Reverse Engineering (Advances in Information Security).Apr.2009.pdf |
Wordware.The.Rootkit.Arsenal.May.2009.pdf |