BITCQ

Utica Books

Size: 558.2 MB
Magnet link

Name Size
Utica Books/(Protecting Our Future 2) Mowbray, Thomas J_ LeClair, Jane-Cybersecurity in Our Digital Lives-John Wiley & Sons, Inc. (2013).epub 5.2 MB
Utica Books/-EC-Council. Ethical Hacking and Countermeasures (CEH v. 8).rar 125.4 MB
Utica Books/Aditya Sood and Richard Enbody Auth. Targeted Cyber Attacks. Multi-staged Attacks Driven by Exploits and Malware.pdf 5.5 MB
Utica Books/American Psychological Association-Publication Manual of the American Psychological Association-American Psychological Association (APA) (2009).pdf 9.4 MB
Utica Books/Charles P. Pfleeger, Shari Lawrence Pfleeger-Analyzing Computer Security_ A Threat _ Vulnerability _ Countermeasure Approach-Prentice Hall (2011).pdf 239.1 MB
Utica Books/Donovan, Martin-Hacking_ Learn the Basics of Ethical Hacking and Penetration Testing (2016).epub 1.5 MB
Utica Books/EC-Council Computer Forensics Investigating Data and Image Files .pdf 15.2 MB
Utica Books/Jason Andress and Steve Winterfeld Auth. Cyber Warfare. Techniques, Tactics and Tools for Security Practitioners.pdf 9.1 MB
Utica Books/Jeffrey Carr Inside cyber warfare mapping the cyber underworld.epub 5.8 MB
Utica Books/Joel Scambray, Neil Bergman, Mike Stanfield, Jason Rouse Hacking Exposed Mobile Security Secrets & Solutions.epub 12.9 MB
Utica Books/Maness, Ryan C._ Valeriano, Brandon-Cyber war versus cyber realities _ cyber conflict in the international system-Oxford University Press (2015).pdf 2.6 MB
Utica Books/Michael E. Whitman, Herbert J. Mattord Principles of Information Security.pdf 14.8 MB
Utica Books/Michael Sikorski, Andrew Honig Practical Malware Analysis The Hands-On Guide to Dissecting Malicious Software.epub 11 MB
Utica Books/Michael T. Raggo, Chet Hosmer Data hiding Exposing concealed data in multimedia, operating systems, mobile devices and network protocols.pdf 25.4 MB
Utica Books/P.W. Singer, Allan Friedman Cybersecurity and Cyberwar What Everyone Needs to Know.epub 2.4 MB
Utica Books/Patrick Engebretson The basics of hacking and penetration testing ethical hacking and penetration testing made easy.pdf 4.5 MB
Utica Books/Sean Bodmer, Dr. Max Kilger, Gregory Carpenter, Jade Jones Reverse Deception Organized Cyber Threat Counter-Exploitation.epub 3.6 MB
Utica Books/Sherri Davidoff, Jonathan Ham Network Forensics Tracking Hackers through Cyberspace.epub 45.9 MB
Utica Books/The Experts_ EC-Council.-Ethical Hacking and Countermeasures_ Attack Phases.pdf 17.1 MB
Utica Books/Thomas A. Johnson Cybersecurity Protecting Critical Infrastructures from Cyber Attack and Cyber Warfare.pdf 1.7 MB
Utica Books/Torrent_downloaded_from_Demonoid_-_www.demonoid.pw_.txt 59 B
Name
udp://tracker.coppersurfer.tk:6969/announce
udp://tracker.open-internet.nl:6969/announce
udp://tracker.leechers-paradise.org:6969/announce
udp://exodus.desync.com:6969/announce
udp://tracker.internetwarriors.net:1337/announce
udp://tracker.opentrackr.org:1337/announce
udp://9.rarbg.to:2710/announce
udp://9.rarbg.me:2710/announce
http://tracker3.itzmx.com:6961/announce
http://tracker1.itzmx.com:8080/announce
udp://thetracker.org:80/announce
udp://open.demonii.si:1337/announce
udp://bt.xxx-tracker.com:2710/announce
udp://tracker.torrent.eu.org:451/announce
udp://tracker.cyberia.is:6969/announce
udp://tracker.tiny-vps.com:6969/announce
udp://denis.stalker.upeer.me:6969/announce
http://open.acgnxtracker.com:80/announce
udp://ipv4.tracker.harry.lu:80/announce
udp://explodie.org:6969/announce
udp://tracker.opentrackr.org:1337/announce
udp://tracker.zer0day.to:1337/announce
udp://tracker.coppersurfer.tk:6969/announce
udp://tracker.leechers-paradise.org:6969/announce
udp://tracker.internetwarriors.net:1337/announce
udp://mgtracker.org:6969/announce
udp://explodie.org:6969/announce
Name Size Peers
Utica Books Application 558.2 MB 8

Loading...