| Utica Books/(Protecting Our Future 2) Mowbray, Thomas J_ LeClair, Jane-Cybersecurity in Our Digital Lives-John Wiley & Sons, Inc. (2013).epub |
5.2 MB |
| Utica Books/-EC-Council. Ethical Hacking and Countermeasures (CEH v. 8).rar |
125.4 MB |
| Utica Books/Aditya Sood and Richard Enbody Auth. Targeted Cyber Attacks. Multi-staged Attacks Driven by Exploits and Malware.pdf |
5.5 MB |
| Utica Books/American Psychological Association-Publication Manual of the American Psychological Association-American Psychological Association (APA) (2009).pdf |
9.4 MB |
| Utica Books/Charles P. Pfleeger, Shari Lawrence Pfleeger-Analyzing Computer Security_ A Threat _ Vulnerability _ Countermeasure Approach-Prentice Hall (2011).pdf |
239.1 MB |
| Utica Books/Donovan, Martin-Hacking_ Learn the Basics of Ethical Hacking and Penetration Testing (2016).epub |
1.5 MB |
| Utica Books/EC-Council Computer Forensics Investigating Data and Image Files .pdf |
15.2 MB |
| Utica Books/Jason Andress and Steve Winterfeld Auth. Cyber Warfare. Techniques, Tactics and Tools for Security Practitioners.pdf |
9.1 MB |
| Utica Books/Jeffrey Carr Inside cyber warfare mapping the cyber underworld.epub |
5.8 MB |
| Utica Books/Joel Scambray, Neil Bergman, Mike Stanfield, Jason Rouse Hacking Exposed Mobile Security Secrets & Solutions.epub |
12.9 MB |
| Utica Books/Maness, Ryan C._ Valeriano, Brandon-Cyber war versus cyber realities _ cyber conflict in the international system-Oxford University Press (2015).pdf |
2.6 MB |
| Utica Books/Michael E. Whitman, Herbert J. Mattord Principles of Information Security.pdf |
14.8 MB |
| Utica Books/Michael Sikorski, Andrew Honig Practical Malware Analysis The Hands-On Guide to Dissecting Malicious Software.epub |
11 MB |
| Utica Books/Michael T. Raggo, Chet Hosmer Data hiding Exposing concealed data in multimedia, operating systems, mobile devices and network protocols.pdf |
25.4 MB |
| Utica Books/P.W. Singer, Allan Friedman Cybersecurity and Cyberwar What Everyone Needs to Know.epub |
2.4 MB |
| Utica Books/Patrick Engebretson The basics of hacking and penetration testing ethical hacking and penetration testing made easy.pdf |
4.5 MB |
| Utica Books/Sean Bodmer, Dr. Max Kilger, Gregory Carpenter, Jade Jones Reverse Deception Organized Cyber Threat Counter-Exploitation.epub |
3.6 MB |
| Utica Books/Sherri Davidoff, Jonathan Ham Network Forensics Tracking Hackers through Cyberspace.epub |
45.9 MB |
| Utica Books/The Experts_ EC-Council.-Ethical Hacking and Countermeasures_ Attack Phases.pdf |
17.1 MB |
| Utica Books/Thomas A. Johnson Cybersecurity Protecting Critical Infrastructures from Cyber Attack and Cyber Warfare.pdf |
1.7 MB |
| Utica Books/Torrent_downloaded_from_Demonoid_-_www.demonoid.pw_.txt |
59 B |