
Code: http://uploading.com/files/JA9ZQ6GF/booktraining.net_Google_Hacking_for_Penetration tester.rar |
McGraw Hill Hacking Exposed Linux Third Edition Jul 2008

Code: |
http://uploading.com/files/SQ5EO5Z2/booktraining.net_McGraw.Hill.Hacking.Exp.rar |
Hack the Stack - Using Snort and Ethereal To Master The 8 Layer of Insecure Network

Code: |
http://uploading.com/files/TH7I50N9/booktraining.net_Hack_the_Stack_-_Using.rar |
Hacking Wireless Network For Dummies

Code: http://uploading.com/files/0RDXDQAZ/booktraining.net_Hacking_Wireless_Network.rar |
Custom collection volume 1
1) The art of assembly
2) Kevin Mitnick - The art of Intrusion
3) NSA - The 60 Minute Network Security Guide [[color="#FF0000"]unclassified][/color]
4) Smashing The Stack
5) Smashing The Stack For Fun and Profit - Insecure.org release




Code: |
http://uploading.com/files/4WQU0MHK/booktraining.net_hackvol1.rar |
Custom collection volume 2
1) Rootkits - Subverting the windows kernel
2) Stealing the Network - How to own the box (Syngress)
3) Reversing Secrets of Reverse Engineering (Wiley Publishing)



Code: http://uploading.com/files/N9MCR1W2/booktraining.net_hackvol2.rar RS: http://rapidshare.com/files/245832945/hackvol1.rar |
http://rapidshare.com/files/245832789/hackvol2.rar |
http://rapidshare.com/files/245796583/Google_Hacking_for_Penetration_Tester.rar
http://rapidshare.com/files/245296587/McGraw.Hill.Hacking.Exposed.Linux.Third.Edition.Jul.2008.rar
http://rapidshare.com/files/245800427/Hack_the_Stack_-_Using_Snort_and_Ethereal_To_Master_The_8_Layer_of_Insecure_Network.rar
No comments:
Post a Comment