Linux Book Collection (plus 264 general computer books)

  • CategoryOther
  • TypeE-Books
  • LanguageEnglish
  • Total size2.2 GB
  • Uploaded ByStonecold95
  • Downloads1446
  • Last checkedMay. 21st '18
  • Date uploadedJun. 21st '13
  • Seeders 3
  • Leechers2

Infohash : D154D316D3380A6A64AC2154BA607FB35C43FCD4

This torrent is two collections in one, both of which originally came from Demonoid (I think). The first is a collection of a bunch of books essential to anyone who wants to lean more about the Linux operating system. It has books organized into the following categories (with number of books in parentheses):

Essential books (26)
Essential Networking (8 )
IDS Firewall & Security (16)
Core Linux Concepts (7)
DNS (5)
BSD & Unix (6)
Cluster (3)
LDAP (1)
Mail Servers (4)
NFS & NIS (1)
Samba (1)
SELinux (2)
Squid (1)
SSH & VPN (4)
Apache (6)

The second has 264 unsorted general computer books. It contains books on things like Windows, security (never thought I'd use "Windows" and "security" in the same sentence!), BitTorrent, hacking, UNIX, Linux, programming (especially C++), and more. There might be duplicates between the two parts, but not many.

Most of the e-books are in either PDF or CHM format, with a few being TXT (and one DOC and DjVu).

Files:

  • HE LOVES YOU, AND HE BOILED FOR YOUR SINS.pdf (9.3 MB)
100+ General Computer Books
  • 100 Linux Tips And Tricks.pdf (1.2 MB)
  • A Comparative Analysis of Methods of Defense against Buffer Overflow Attacks.pdf (53.0 KB)
  • A Little Bit about Buffer Overflows.pdf (16.8 KB)
  • Absolute Beginner's Guide to Networking, Fourth Edition.chm (7.2 MB)
  • Absolute Beginners Guide To Microsoft Windows XP, Second Edition.chm (14.3 MB)
  • Active Directory Cookbook, 2nd Edition.chm (2.0 MB)
  • Advanced Bash Shell Scripting Gude.pdf (4.6 MB)
  • Advanced buffer overflow exploits.txt (60.2 KB)
  • Advanced SQL Injection In SQL Server Applications.pdf (291.0 KB)
  • Advanced Wireless Networks - 4G Technologies.pdf (20.9 MB)
  • Alternate Data Streams in NTFS.pdf (16.4 KB)
  • An Example of the RSA Algorithm.pdf (16.0 KB)
  • Analysis of a Telnet Session Hijack via Spoofed MAC Addresses.pdf (28.9 KB)
  • Anti-Hacker Tool Kit, Second Edition.chm (28.8 MB)
  • Apache Phrase Book - Essential Code and Commands.chm (465.4 KB)
  • Applied Microsoft .Net Framework Programming.pdf (4.2 MB)
  • Beating IT Risks.pdf (3.1 MB)
  • Blindfolded SQL Injection.pdf (299.5 KB)
  • Bluetooth Security.pdf (1.5 MB)
  • Broadband Packet Switching Technologies.pdf (14.2 MB)
  • Broadband Telecommunications Handbook.pdf (46.1 MB)
  • Buffer Overflow Attacks - Detect, Exploit, Prevent.pdf (5.4 MB)
  • Bulletproof Wireless Security - GSM, UMTS, 802.11, and Ad Hoc Security (Communications Engineering).pdf (3.3 MB)
  • Bypassing Firewalls Tools and Techniques.pdf (35.4 KB)
  • C# Programming Primer.pdf (4.1 MB)
  • C++ Cookbook.chm (856.3 KB)
  • C++ How to Program, Fifth Edition.chm (10.2 MB)
  • Cabling - The Complete Guide to Network Wiring.pdf (16.7 MB)
  • Certified Ethical Hacker Exam Prep.chm (8.3 MB)
  • Cisco - Password Recovery Procedures.pdf (23.2 KB)
  • CISSP - Certified Information Systems Security Professional Study Guide, Third Edition.pdf (14.2 MB)
  • Cleaning Windows XP For Dummies.pdf (8.5 MB)
  • Collection Of Various Computer Books.md5 (21.0 KB)
  • CompTIA Security+ Certification.chm (1.2 MB)
  • Computer Networks, Fourth Edition.chm (8.6 MB)
  • Content Networking - Architecture, Protocols, and Practice.pdf (7.7 MB)
  • Cross-Site Scripting.pdf (603.8 KB)
  • Crypto - How the Code Rebels Beat the Government - Saving Privacy in the Digital Age.pdf (2.0 MB)
  • Cryptography FAQ's.txt (167.5 KB)
  • CYA - Securing Exchange Server 2003 and Outlook Web Access.pdf (9.1 MB)
  • CYA - Securing IIS 6.0.pdf (8.9 MB)
  • Cyber Terrorism - Political And Economic Implications.pdf (24.2 MB)
  • Datacom overview.pdf (396.3 KB)
  • DDOS Attack Tools.pdf (285.9 KB)
  • Defeating Sniffers and Intrusion Detection Systems.txt (50.6 KB)
  • Defend I.T. - Security by Example.chm (1.3 MB)
  • Designing and Developing Scalable IP Networks.pdf (2.8 MB)
  • Designing Storage Area Networks - A Practical Reference for Implementing Fibre Channel and IP.chm (4.9 MB)
  • Detection Of Promiscuous Nodes Using ARP Packets.pdf (93.6 KB)
  • DNS and BIND, 5th Edition.chm (2.4 MB)
  • DNS on Windows Server 2003.chm (2.7 MB)
  • DNS Spoofing.txt (43.3 KB)
  • Don't Click on the Blue E!.chm (3.9 MB)
  • Encryption in a Windows Environment - EFS File, 802.1x Wireless, IPSec Transport, and S-MIME Exchange.chm (1.8 MB)
  • Enterprise SOA - Designing IT for Business Innovation.chm (6.2 MB)
  • Ethereal Packet Sniffing.chm (17.1 MB)
  • Ethernet Networks - Design, Implementation, Operation, Management (Fourth Edition).pdf (5.2 MB)
  • Ethical Hacking & Countermeasures.pdf (7.1 MB)
  • Ethical Hacking Agreement.doc (39.5 KB)
  • Exploiting Software - How to Break Code.pdf (7.6 MB)
  • Exploiting Stack Based Buffer Overflows.txt (21.4 KB)
  • FAQ Network Intrusion Detection Systems.pdf (235.4 KB)
  • Firefox Hacks.chm (2.7 MB)
  • Firewalking - A Traceroute-Like Analysis of IP Packet Responses to Determine Gateway Accessing.pdf (66.2 KB)
  • Fixing Windows XP Annoyances.chm (3.8 MB)
  • FreeBSD Handbook 2006.pdf (9.1 MB)
  • General Guidelines On Random Query Evaluation.pdf (294.1 KB)
  • Google A Hacker's Best Friend.pdf (227.0 KB)
  • Google Hacking for Penetration Testers.pdf (32.2 MB)
  • Google Secrets - How To Get A Top 10 Ranking.pdf (1.3 MB)
  • Google Spamguide.pdf (112.2 KB)
  • GRC.com Denial Of Service Attack.pdf (131.9 KB)
  • Groupware & Security.pdf (810.9 KB)
  • GSM and GPRS.pdf (576.8 KB)
  • Guide to Elliptic Curve Cryptography.pdf (4.4 MB)
  • Guide To Using Google Discover Google's Buried Treasure.pdf (4.9 MB)
  • Hack I.T. - Security Through Penetration Testing.chm (4.6 MB)
  • Hack Proofing Linux.pdf (11.8 MB)
  • Hacker Disassembling Uncovered.chm (4.7 MB)
  • Hacker's Delight.chm (2.1 MB)
  • Hacker's Desk Reference.pdf (521.6 KB)
  • Hackers Beware.pdf (4.9 MB)
  • Hacking - Firewalls And Networks How To Hack Into Remote Computers.pdf (2.9 MB)
  • Hacking - The Art of Exploitation.chm (1.4 MB)
  • Hacking a Terror Network.pdf (8.4 MB)
  • Hacking Exposed Web Applications.pdf (2.6 MB)
  • Hacking Firefox - More Than 150 Hacks, Mods, and Customizations.pdf (13.6 MB)
  • Hacking GPS.pdf (10.3 MB)
  • Hacking Wireless Networks For Dummies.pdf (11.0 MB)
  • How SQL Slammer Works.txt (5.1 KB)
  • How To Build A Freebsd-Stable Firewall With Ipfilter.pdf (66.5 KB)
  • How to Cheat at Designing a Windows Server 2003 Active Directory Infrastructure.pdf (7.7 MB)
  • How to develop a Network Security Policy.pdf (28.7 KB)
  • How to write Buffer Overflows.pdf (33.5 KB)
  • ICMP Crafting and other uses.pdf (227.2 KB)
  • Illustrated TCPIP - A Graphic Guide to the Protocol Suite.chm (5.9 MB)
  • Illustrated Windows XP 101 Hot Tips.pdf (56.3 MB)
  • Information Security Management Handbook, Fifth Edition.pdf (42.9 MB)
  • Information Systems - The State of the Field.pdf (3.7 MB)
  • Inside Network Perimeter Security, Second Edition.chm (8.6 MB)
  • Insider Threat - Protecting The Enterprise From Sabotage, Spying, And Theft.pdf (6.7 MB)
  • Internet Denial of Service - Attack and Defense Mechanisms.chm (2.1 MB)
  • Internet Security - A Jumpstar

Code:

  • udp://tracker.openbittorrent.com:80/announce
  • udp://tracker.publicbt.com:80/announce
  • http://fr33dom.h33t.com:3310/announce
  • http://exodus.desync.com:6969/announce