![[ ]](http://www.blogger.com/icons/layout.gif)
1. (MSPress) Writing Secure Code.pdf
2. 0072260858.Mcgraw-Hill Osborne Media.19 Deadly Sins of Software Security (Security One-off).chm
![[ ]](http://www.blogger.com/icons/unknown.gif)
4. 0201549794.Addison-Wesley Professional.The Design and Implementation of the 4.4 BSD Operating System (Unix and Open Systems Series.).pdf
![[ ]](http://www.blogger.com/icons/unknown.gif)
6. 1931769508.A-List Publishing.Hacker Linux Uncovered.chm
7. A.LIST.Publishing.Hacker.Disassembling.Uncovered.eBook-LiB.chm
![[ ]](http://www.blogger.com/icons/layout.gif)
9.Addison.Wesley,.Advanced.Programming.in.the.UNIX.Environment.(2005),.2Ed.BBL.LotB.chm 10. Addison.Wesley,.Software.Security.Building.Security.In.(2006).BBL.chm
11. Addison.Wesley.Advanced.Programming.In.The.Unix.Environment.(2005).2Ed.pdf
12. Addison.Wesley.Compilers.Principles.Techniques.and.Tools.2nd.Edition.Aug.2006.pdf
![[ ]](http://www.blogger.com/icons/unknown.gif)
14. Addison.Wesley.Pub.Exploiting.Software.How.to.Break.Code.eBook-kB.pdf
15. Addison Wesley - Hack I.T. Security Through Penetration Testing.chm
16. Addison Wesley - Secure Programming with Static Analysis - 2007.pdf
17. Art.of.Software.Security.Assessment.chm
![[ ]](http://www.blogger.com/icons/layout.gif)
19. C++ and Assembly Language Reference.pdf
![[ ]](http://www.blogger.com/icons/unknown.gif)
![[ ]](http://www.blogger.com/icons/layout.gif)
![[ ]](http://www.blogger.com/icons/layout.gif)
24. Ebook - Windows - Programming .NET Security.chm
25.John.Wiley.and.Sons.The.Art.of.Intrusion.The.Real.Stories.Behind.the.Exploits.of.Hackers.Intruders.and.Deceivers.pdf 26. McGraw.Hill.HackNotes.Web.Security.Portable.Reference.eBook-DDU.pdf
27. McGraw.Hill.HackNotes.Windows.Security.Portable.Reference.eBook-DDU.pdf
28. McGraw.Hill.Osborne.Media.XML.Security.eBook-TLFeBOOK.pdf
![[ ]](http://www.blogger.com/icons/unknown.gif)
![[ ]](http://www.blogger.com/icons/unknown.gif)
![[ ]](http://www.blogger.com/icons/unknown.gif)
33. Oreilly.Security.Warrior.eBook-DDU.chm
34.Prentice.Hall.PTR.Internet.Denial.of.Service.Attack.and.Defense.Mechanisms.Dec.2004.eBook-DDU.chm
![[ ]](http://www.blogger.com/icons/unknown.gif)
37. Secure Coding Principles and Practices.pdf
38. Software Vulnerability Analysis.pdf
39. Strengthening Network Security With Web-Based Vulnerability Assessment.pdf
40. THE SHELLCODER'S HANDBOOK.pdf
41.The.Art.of.Exploitation-FOS.chm
42. The.Ethical.Hack.A.Framework.for.Business.Value.Penetration.Testing.eBook-EEn.pdf
43. The.International.Handbook.of.Computer.Security.eBook-EEn.pdf
![[ ]](http://www.blogger.com/icons/unknown.gif)
45. The Art Of Computer Virus Research And Defense.chm
46. The Database Hacker's Handbook - Defending Database Servers.chm
46. The_Art_of_Deception_by_Kevin_Mitnick.pdf
![[ ]](http://www.blogger.com/icons/layout.gif)
48. The_ Assembly_ Programming_ Master_ Book.chm
50. Wiley, The Shellcoder's Handbook Discovering and Exploiting Security (2004) spy LotB.rar 51. Wiley - How Debuggers Work.djvu
![[ ]](http://www.blogger.com/icons/layout.gif)
![[ ]](http://www.blogger.com/icons/unknown.gif)
54. eBook - Eng] Penetration Tester's - Open Source Toolkit.pdf
![[ ]](http://www.blogger.com/icons/unknown.gif)
![[ ]](http://www.blogger.com/icons/layout.gif)
57. ebook - Designing and Writing Secure Application Code.pdf
58. programing - Windows.System.Programming.Third.Edition.chm
![[ ]](http://www.blogger.com/icons/layout.gif)
60. windowskernel.rar
61. network-protocols-handbook.9780974094526.27099.pdf
{ 0 comments... Views All / Send Comment! }
Post a Comment