Securing Cloud Services ~~R@JU~~ [WBRG]
|
0 |
0 |
9.8 MB |
Jun. 21st '15 |
Android Security cookbook ~~R@JU~~ [WBRG]
|
0 |
0 |
20.5 MB |
Jun. 21st '15 |
Anti-Hacker Tool Kit, 4th Edition ~~R@JU~~ [WBRG]
|
0 |
0 |
36.4 MB |
Jun. 21st '15 |
Computer Security Handbook ,6th Edition ~~R@JU~~ [WBRG]
|
0 |
0 |
28.4 MB |
Jun. 21st '15 |
Cyber Warfare, 2nd edition ~~R@JU~~ [WBRG]
|
0 |
0 |
9.1 MB |
Jun. 21st '15 |
Managing Trust in cyberspace ~~R@JU~~ [WBRG]
|
0 |
0 |
11.7 MB |
Jun. 21st '15 |
Penetration Testing,A Hanss-on Introduction to Hacking ~~r@JU~~ [WBRG]
|
0 |
0 |
13.3 MB |
Jun. 21st '15 |
Physical layer security in wireless communications ~~R@JU~~ [WBRG]
|
0 |
0 |
9.9 MB |
Jun. 21st '15 |
Security and privacy in Smart Grids ~~R@JU~~ [WBRG]
|
0 |
0 |
17.3 MB |
Jun. 21st '15 |
Security for Multihop wireless networks ~~R@JU~~ [WBRG]
|
0 |
0 |
11.6 MB |
Jun. 21st '15 |
Learning Web Design, 3rd Edition ~~R@JU~~ [WBRG]
|
0 |
1 |
18.2 MB |
Jun. 21st '15 |
Static Analysis of Software ~~R@JU~~ [WBRG]
|
0 |
0 |
18.6 MB |
Jun. 21st '15 |
Guide To Kali Linux ~~R@JU~~ [WBRG]
|
0 |
0 |
9.7 MB |
Jun. 21st '15 |
How Google Tests Software ~~R@JU~~ [WBRG]
|
0 |
0 |
9.6 MB |
Jun. 21st '15 |
A Peek at Computer Electronics ~~R@JU~~ [WBRG]
|
0 |
0 |
6.1 MB |
Jun. 21st '15 |
Building Internet Firewalls, 2nd Edition ~~R@JU~~ [WBRG]
|
0 |
0 |
5.5 MB |
Jun. 21st '15 |
Hacking Exposed - Mobile Security Secrets and Solutions ~~R@JU~~ [WBRG]
|
0 |
0 |
7.3 MB |
Jun. 21st '15 |
Microsoft Windows XP Networking and Security Inside Out ~~R@JU~~ [WBRG]
|
0 |
0 |
18 MB |
Jun. 21st '15 |
Modeling the Internet and the Web ~~R@JU~~ [WBRG]
|
0 |
1 |
4.8 MB |
Jun. 21st '15 |
Gray Hat Hacking, 3rd Edition ~~R@JU~~ [WBRG]
|
0 |
0 |
14 MB |
Jun. 21st '15 |