W3siaWQiOiJqdWljX2JfTURfVF83Mjh4OTAiLCJhZHNwb3QiOiJiX01EX1RfNzI4eDkwIiwid2VpZ2h0IjoiOSIsImZjYXAiOmZhbHNlLCJzY2hlZHVsZSI6ZmFsc2UsIm1heFdpZHRoIjpmYWxzZSwibWluV2lkdGgiOiI3NjgiLCJ0aW1lem9uZSI6ZmFsc2UsImV4Y2x1ZGUiOmZhbHNlLCJkb21haW4iOmZhbHNlLCJjb2RlIjoiPCEtLSBKdWljeUFkcyB2My4xIC0tPlxyXG48c2NyaXB0IHR5cGU9XCJ0ZXh0XC9qYXZhc2NyaXB0XCIgZGF0YS1jZmFzeW5jPVwiZmFsc2VcIiBhc3luYyBzcmM9XCJodHRwczpcL1wvcG93ZXJlZGJ5LmphZHMuY29cL2pzXC9qYWRzLmpzXCI+PFwvc2NyaXB0PlxyXG48aW5zIGlkPVwiODQ1NTM0XCIgZGF0YS13aWR0aD1cIjcyOFwiIGRhdGEtaGVpZ2h0PVwiOTBcIj48XC9pbnM+XHJcbjxzY3JpcHQgdHlwZT1cInRleHRcL2phdmFzY3JpcHRcIiBkYXRhLWNmYXN5bmM9XCJmYWxzZVwiIGFzeW5jPihhZHNieWp1aWN5ID0gd2luZG93LmFkc2J5anVpY3kgfHwgW10pLnB1c2goeydhZHpvbmUnOjg0NTUzNH0pOzxcL3NjcmlwdD5cclxuPCEtLUp1aWN5QWRzIEVORC0tPiJ9XQ==
W3siaWQiOiJhZHN0X2JfTV8zMDB4NTAiLCJhZHNwb3QiOiJiX01fMzAweDUwIiwid2VpZ2h0IjoiNSIsImZjYXAiOmZhbHNlLCJzY2hlZHVsZSI6ZmFsc2UsIm1heFdpZHRoIjoiNzY4IiwibWluV2lkdGgiOmZhbHNlLCJ0aW1lem9uZSI6ZmFsc2UsImV4Y2x1ZGUiOmZhbHNlLCJkb21haW4iOmZhbHNlLCJjb2RlIjoiPHNjcmlwdCB0eXBlPVwidGV4dFwvamF2YXNjcmlwdFwiPlxyXG4gIGF0T3B0aW9ucyA9IHtcclxuICAgICdrZXknIDogJzdkMWNjMGUxYjk4MWM5NzY4ZGI3ODUxZmM1MzVhMTllJyxcclxuICAgICdmb3JtYXQnIDogJ2lmcmFtZScsXHJcbiAgICAnaGVpZ2h0JyA6IDUwLFxyXG4gICAgJ3dpZHRoJyA6IDMyMCxcclxuICAgICdwYXJhbXMnIDoge31cclxuICB9O1xyXG4gIGRvY3VtZW50LndyaXRlKCc8c2NyJyArICdpcHQgdHlwZT1cInRleHRcL2phdmFzY3JpcHRcIiBzcmM9XCJodHRwJyArIChsb2NhdGlvbi5wcm90b2NvbCA9PT0gJ2h0dHBzOicgPyAncycgOiAnJykgKyAnOlwvXC93d3cuYm5odG1sLmNvbVwvaW52b2tlLmpzXCI+PFwvc2NyJyArICdpcHQ+Jyk7XHJcbjxcL3NjcmlwdD4ifV0=
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
Mobile Design Pattern Gallery: UI Patterns for Smartphone Apps.pdf
116.73MB
Computing Handbook: Computer Science and Software Engineering 3rd Edition.pdf
24.42MB
You: For Sale, Protecting Your Personal Data and Privacy Online.pdf
2.86MB
Computer Hacking: The Essential Hacking Guide for Beginners.pdf
746.81KB
(IN)SECURE Magazine Issue 51 Hacking is the New Espionage.pdf
6.81MB
TCP-IP over Packet Radio: An Introduction to the KA9Q Network Operating System.pdf
22.08MB
How I create Growth Hacking Plans for startups for $10,000 + TOP 300 growth hacks you can put into practice right away.epub
1MB
Collaboration with Cloud Computing: Security, Social Media, and Unified Communications.pdf
11.05MB
Hacking: Become a World Class Hacker, Hack Any Password, Program or System with Proven Strategies and Tricks.pdf
468.54KB
Networking: Cisco IP Routing Fundamentals.pdf
2.2MB
Graduate Employment.pdf
2.99MB
Sed & AWK: UNIX Power Tools 2nd Edition.pdf
6.15MB
Python Forensics: A Workbench for Inventing and Sharing Digital Forensic Technology.pdf
31.93MB
Ethical Hacking and Countermeasures: Linux, Macintosh and Mobile Systems.pdf
6.44MB
Citrix XenDesktop Implementation: A Practical Guide for IT Professionals.pdf
34.54MB
THE HACKING STARTER KIT: An In-depth and Practical course for beginners to Ethical Hacking.azw3
485.09KB
Ubuntu Using Hacking.azw3
1.98MB
Pro Objective-C: Develop high-quality, professional apps on OS X and iOS with Objective-C.pdf
10.55MB
Interactive Data Visualization: for the Web.pdf
4.04MB
Ethical hacking: Basic Hacking with SQL Injection.epub
223.34KB
Windows Hacking: Crack All Cool Stuff of Windows.pdf
2.82MB
HTML5 and CSS3: Level Up with Today's Web Technologies 2nd Edition.pdf
9.53MB
Digital Forensics: Threatscape and Best Practices.pdf
7.53MB
Cryptography in C and C++ 2nd Edition.pdf
3.53MB
Computer Hacking: Learn Computer Hacking for Beginners on Everything From How to Hack, Powerful Hacking Techniques, Underground Methods, Hacking Skills, and Much More.pdf
462.13KB
Hacking: The Beginners Guide to Master The Art of Hacking In No Time.pdf
1.37MB
Hacking: The Ultimate Beginner's Guide to learn Hacking effectively AND Hacking: Tips and Tricks to learn Hacking quickly and efficiently.pdf
564.27KB
NTP Security: A Quick-Start Guide.pdf
1.03MB
The Hacking Bible: The Dark Secrets of the Hacking World How You Can Become a Hacking Monster, Undetected and In the Best Way.pdf
767.35KB
No Place to Hide: you are being watched.pdf
6.18MB
Become the Ultimate Hacker: What is hacking, why you should care, and how to do it.pdf
370.88KB
Stealing The Network: How To Own The Box.pdf
4.67MB
Kali Linux Wireless Penetration Testing: Beginner's Guide.pdf
12.76MB
Expert Android: Custom components to mobile clouds: An Advanced Guide for Impactful Mobile Applications.pdf
5.75MB
Hacking: An Unofficial Anonymous Guide Windows and Internet.pdf
4.04MB
Practical Statistics for Data Scientists: 50 Essential Concepts.pdf
2.59MB
Hacking University Senior Edition: Linux Optimal Beginner's Guide.pdf
168.6KB
Hacking Ultimate Hacking Guide Hacking For Beginners And Tor Browser.azw3
240.73KB
Hacking: Basic Hacking, Basic Hacking Tools Hacking with Python Bitcoin, Tor.pdf
1.99MB
Hacking: 17 Most Dangerous Hacking Attacks Vol.4.epub
1.05MB
Learn Python: Learn Just Enough Python to Build Useful Tools.pdf
6.34MB
Hacking: Simple and Effective Strategies to learn Hacking.pdf
508.28KB
JMP 12 Scripting Guide SAS Institute.pdf
4.61MB
Text Analytics with Python: A Practical Real-World Approach to Gaining Actionable Insights from Your Data.pdf
13.01MB
PHP Beyond the Web: Shell Scripts, Desktop Software, System Daemon, and More without Learning a New Language.pdf
11.08MB
Head First Software Development.pdf
43.35MB
Penetration Testing Basics: A Quick-Start Guide to Breaking into Systems.pdf
12.8MB
Cryogenic Engineering: Software Solutions Vol II B.pdf
7.69MB
Practical MongoDB: Architecting, Developing, and Administering MongoDB.pdf
9.52MB
Embedded Systems: Introduction to ARM Cortex-M Microcontrollers Vol. 1 5th Edition.pdf
9.01MB
Head First SQL.pdf
40.29MB
The Complete FreeBSD: Documentation from the Source 4th Edition.pdf
10.09MB
Introduction to Vectors.pdf
4.24MB
Head First Networking.pdf
39.46MB
Code Simplicity: The Science of Software Development.pdf
5.76MB
WiMax Operator's Manual: Building 802.16 Wireless Networks.pdf
12.05MB
PCs: The Missing Manual.pdf
8.69MB
Digital Video Editing Fundamentals.pdf
11.41MB
Pro Apache Hadoop.pdf
7.02MB
Migrating to Swift from Android.pdf
6.92MB
Python Descriptors.pdf
11.23MB
Arduino Music and Audio Projects.pdf
13.85MB
Exploring C++ 11 2nd Edition.pdf
3.99MB
Blender Master Class: A Hands-On Guide to Modeling, Sculpting, Materials, and Rendering.pdf
48.71MB
Creating Google Chrome Extensions.pdf
8.34MB
Windows Operating Systems Fundamentals, Exam 98-349.pdf
87.63MB
Making Software: What Really Works, and Why We Believe It.pdf
16.33MB
Swift Game Programming for Absolute Beginners.pdf
5.04MB
Essential Study Skills.pdf
6.45MB
Penetration Testing: A Hands-On Introduction to Hacking.pdf
12.2MB
Elementary Mathematics for Engineers.pdf
6.69MB
Cloud Security and Privacy: An Enterprise Perspective on Risks and Compliance.pdf
5.44MB
Developing B2B Social Communities: Keys to Growth, Innovation, and Customer Loyalty.pdf
2.12MB
Crackproof Your Software: The Best Ways to Protect Your Software Against Crackers.pdf
16.41MB
More Joel on Software.pdf
2.22MB
A First Course in Fluid Mechanics for Engineers.pdf
9.34MB
Asterisk: The Definitive Guide 4th Edition.pdf
15.99MB
Stack Frames: A Look from Inside.pdf
9.24MB
Control Your Retirement Destiny.pdf
1.57MB
Introduction to Operating System Design and Implementation: The OSP 2 Approach.pdf
2.93MB
Fundamentals of Hydrogen Safety Engineering I.pdf
12.3MB
Objective-C: Programmer's Reference.pdf
5.16MB
Abstract Hacktivism: The Making of a Hacker Culture.pdf
1.5MB
Better Business Decisions from Data: Statistical Analysis for Professional Success.pdf
5.05MB
Dr. Tom Shinder's ISA 2006 Migration Guide.pdf
16.09MB
Packet Guide to Routing and Switching: Exploring the Network Layer.pdf
7.39MB
Understanding Operating Systems 7th Edition.pdf
18.73MB
Absolute Beginners Guide to Computing.pdf
29.6MB
Natural Language Processing with Python: Analyzing Text with the Natural Language Toolkit.pdf
5.18MB
Lean Python: Learn Just Enough Python to Build Useful Tools.pdf
11.64MB
Microsoft Vista for IT Security Professionals.pdf
17.64MB
Best Damn Cybercrime and Digital Forensics Book Period.pdf
10.46MB
Ruby Recipes: A Problem-Solution Approach.pdf
10.98MB
HTML5 Advertising.pdf
10.93MB
Microsoft Virtualization: Master Microsoft Server, Desktop, Application and Presentation Virtualization.pdf
20.57MB
Pro Apache Beehive.pdf
3.54MB
Hackers & Painters: Big Ideas from the Computer Age.pdf
1.79MB
Web Operations: Keeping the Data on Time.pdf
12.54MB
Beginning JSF 2 APIs and JBoss Seam.pdf
8.15MB
Building SANs with Brocade Fabric Switches.pdf
3.76MB
Creative Blogging: Your First Steps to a Successful Blog.pdf
66.8MB
An introduction to partial differential equations.pdf
4.96MB
Digital Forensics for Network, Internet, and Cloud Computing.pdf
12.87MB
MySQL for the Internet of Things: Data Management for Sensors and Connected Devices.pdf
8.6MB
Introduction to Probability.pdf
2.6MB
Chemical Engineering Vocabulary.pdf
3.46MB
Programming Amazon EC2: Survive Your Success.pdf
10.38MB
Learn to Program with Python.pdf
7.34MB
PoC or GTFO: Proof of Concepts or Get the Fuck Out (Weird Hacking Book).pdf
17.65MB
Modern Tkinter for Busy Python Developers.pdf
2.07MB
How to Hack: Hacking Secrets Exposed: A Beginner's Guide.pdf
3.52MB
Hacking the Future: Privacy, Identity, and Anonymity on the Web.mobi
347.06KB
Wireless Hacking: How to Hack Wireless Networks Beginner's Guide.pdf
450.25KB
Python and Hacking Made Simple: Full Beginner's Bundle To Master Python & Hacking.epub
1.34MB
Hacking: How to Hack The Ultimate Hacking Guide.pdf
4.39MB
Hacking University: Learn Python Computer Programming and the Linux Operating Command Line 2 Manuscript Bundle.pdf
1.01MB
Ethical Hacking and Countermeasures: Threats and Defense Mechanisms.pdf
15.24MB
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