(EBOOK - ENG - TELECOMUNICAZIONI) Wiley - The UMTS Network and Radio Access Technology - Air Interface Techniques for Future Mobile Systems.pdf
7.72MB
(ebook pdf) Teach Yourself TCP-IP in 14 Days 2nd Edition.pdf
1.37MB
100 Linux Tips And Tricks.pdf
1.19MB
A Comparative Analysis of Methods of Defense against Buffer Overflow Attacks.pdf
52.95KB
A Little Bit about Buffer Overflows.pdf
16.77KB
Absolute Beginner's Guide to Networking, Fourth Edition.chm
7.19MB
Absolute Beginners Guide To Microsoft Windows XP, Second Edition.chm
14.25MB
Active Directory Cookbook, 2nd Edition.chm
1.97MB
Advanced Bash Shell Scripting Gude.pdf
4.6MB
Advanced SQL Injection In SQL Server Applications.pdf
291.03KB
Advanced Wireless Networks - 4G Technologies.pdf
20.93MB
Alternate Data Streams in NTFS.pdf
16.43KB
An Example of the RSA Algorithm.pdf
16.05KB
Analysis of a Telnet Session Hijack via Spoofed MAC Addresses.pdf
28.9KB
Anti-Hacker Tool Kit, Second Edition.chm
28.84MB
Apache Phrase Book - Essential Code and Commands.chm
465.42KB
Applied Microsoft .Net Framework Programming.pdf
4.22MB
Beating IT Risks.pdf
3.09MB
Blindfolded SQL Injection.pdf
299.54KB
Bluetooth Security.pdf
1.5MB
Broadband Packet Switching Technologies.pdf
14.21MB
Broadband Telecommunications Handbook.pdf
46.05MB
Buffer Overflow Attacks - Detect, Exploit, Prevent.pdf
5.38MB
Building DMZs for Enterprise Networks.pdf
11.67MB
Bulletproof Wireless Security - GSM, UMTS, 802.11, and Ad Hoc Security (Communications Engineering).pdf
3.3MB
Bypassing Firewalls Tools and Techniques.pdf
35.45KB
C# Programming Primer.pdf
4.11MB
C++ How to Program, Fifth Edition.chm
10.21MB
Cabling - The Complete Guide to Network Wiring.pdf
16.72MB
Certified Ethical Hacker Exam Prep.chm
8.25MB
Cisco - Password Recovery Procedures.pdf
23.19KB
CISSP - Certified Information Systems Security Professional Study Guide, Third Edition.pdf
14.22MB
Cleaning Windows XP For Dummies.pdf
8.47MB
CompTIA Security+ Certification.chm
1.2MB
Computer Networks, Fourth Edition.chm
8.55MB
Content Networking - Architecture, Protocols, and Practice.pdf
7.68MB
Coreldraw 12 The Official Guide.pdf
16.94MB
Cross-Site Scripting.pdf
603.76KB
Crypto - How the Code Rebels Beat the Government - Saving Privacy in the Digital Age.pdf
2.02MB
CYA - Securing Exchange Server 2003 and Outlook Web Access.pdf
9.12MB
CYA - Securing IIS 6.0.pdf
8.9MB
Cyber Terrorism - Political And Economic Implications.pdf
24.24MB
Datacom overview.pdf
396.27KB
DDOS Attack Tools.pdf
285.92KB
Defend I.T. - Security by Example.chm
1.33MB
Designing and Developing Scalable IP Networks.pdf
2.81MB
Designing Storage Area Networks - A Practical Reference for Implementing Fibre Channel and IP.chm
4.91MB
Detection Of Promiscuous Nodes Using ARP Packets.pdf
93.63KB
Digital Design with CPLD Applications %26 VHDL %28Delmar%29.pdf
8.59MB
DNS and BIND, 5th Edition.chm
2.36MB
DNS on Windows Server 2003.chm
2.69MB
Don't Click on the Blue E!.chm
3.93MB
Ebook - Math - Boyce, DiPrima. Elementary Differential Equations (Interactive learning edition, Wiley, 7ed., 2001)(1310s).pdf
10MB
Encryption in a Windows Environment - EFS File, 802.1x Wireless, IPSec Transport, and S-MIME Exchange.chm
1.78MB
Enterprise SOA - Designing IT for Business Innovation.chm
6.15MB
Ethereal Packet Sniffing.chm
17.12MB
Ethernet Networks - Design, Implementation, Operation, Management (Fourth Edition).pdf
5.18MB
Ethical Hacking & Countermeasures.pdf
7.06MB
Exploiting Software - How to Break Code.pdf
7.58MB
FAQ Network Intrusion Detection Systems.pdf
235.41KB
Finite Difference and Spectral Methods for Ordinary and Partial Differential Equations - Trefethen.pdf
2.77MB
Firewalking - A Traceroute-Like Analysis of IP Packet Responses to Determine Gateway Accessing.pdf
66.19KB
Fixing Windows XP Annoyances.chm
3.79MB
FreeBSD Handbook 2006.pdf
9.14MB
Freeman, 1999. Fundamentals of Telecommunications.pdf
6.79MB
Fundamentals Of Wireless Communication.pdf
9.82MB
General Guidelines On Random Query Evaluation.pdf
294.13KB
Google A Hacker's Best Friend.pdf
227.04KB
Google Hacking for Penetration Testers.pdf
32.23MB
Google Secrets - How To Get A Top 10 Ranking.pdf
1.3MB
Google Spamguide.pdf
112.18KB
GRC.com Denial Of Service Attack.pdf
131.95KB
Groupware & Security.pdf
810.94KB
Guide to Elliptic Curve Cryptography.pdf
4.37MB
Guide To Using Google Discover Google's Buried Treasure.pdf
4.91MB
Hack Attacks Revealed A Complete Reference With Custom Security Hacking Toolkit.chm
6.3MB
Hack I.T. - Security Through Penetration Testing.chm
4.58MB
Hack Proofing Linux.pdf
11.81MB
Hacker Disassembling Uncovered.chm
4.72MB
Hacker Web Exploitation Uncovered.chm
554.98KB
Hacker's Delight.chm
2.11MB
Hacker's Desk Reference.pdf
521.63KB
Hacking - The Art of Exploitation.chm
1.4MB
Hacking a Terror Network.pdf
8.45MB
Hacking Exposed Web Applications.pdf
2.63MB
Hacking Firefox - More Than 150 Hacks, Mods, and Customizations.pdf
13.61MB
Hacking Windows XP.pdf
12.15MB
Hacking Wireless Networks For Dummies.pdf
10.97MB
How To Build A Freebsd-Stable Firewall With Ipfilter.pdf
66.49KB
How to Cheat at Designing a Windows Server 2003 Active Directory Infrastructure.pdf
7.69MB
How to develop a Network Security Policy.pdf
28.7KB
How to write Buffer Overflows.pdf
33.5KB
ICMP Crafting and other uses.pdf
227.22KB
ieee_2002_vhdl_ref_manual.pdf
1.76MB
ieee_2004_vhdl_ref_manual.pdf
1.58MB
IGI.Global.Advances.in.Machine.Learning.Applications.in.Software.Engineering.Feb.2007.eBook-LinG.pdf
12.33MB
Illustrated TCPIP - A Graphic Guide to the Protocol Suite.chm
5.92MB
Illustrated Windows XP 101 Hot Tips.pdf
56.35MB
Information Security Management Handbook, Fifth Edition.pdf
42.93MB
Information Systems - The State of the Field.pdf
3.71MB
Inside Network Perimeter Security, Second Edition.chm
8.57MB
Insider Threat - Protecting The Enterprise From Sabotage, Spying, And Theft.pdf
6.67MB
Internet Denial of Service - Attack and Defense Mechanisms.chm
2.06MB
Internet Security - A Jumpstart for Systems Administrators and IT Managers.chm
3.83MB
Introduction To Algorithms 2nd Edition Solutions (Instructors.Manual).pdf
1.66MB
Intrusion Prevention Fundamentals.chm
2.11MB
IP Addressing and Subnetting, Including IPv6.chm
2.97MB
IP in Wireless Networks.chm
2.57MB
IP Storage Networking - Straight to the Core.chm
4.96MB
IPSec - The New Security Standard for the Internet, Intranets, and Virtual Private Networks.chm
1.57MB
IPSec VPN Design.chm
8.87MB
IPv6 Essentials.pdf
2.63MB
IPv6 Network Programming.pdf
3.13MB
ISDN - Integrated Services.pdf
581.9KB
John.Wiley.and.Sons.Wireless.Communications.over.MIMO.Channels.Sep.2006.pdf
5.82MB
Kerberos - The Definitive Guide.chm
1.46MB
LDAP System Administration.chm
1.11MB
Learning PHP and MySQL.chm
4.23MB
Linux Basic Commands.pdf
74.88KB
Linux Command Directory.pdf
10.39MB
Linux Complete Command Reference.pdf
10.14MB
Linux in a Nutshell, 5th Edition .chm
1.36MB
Linux Kernel Development, 2nd Edition.chm
1.29MB
Linux Network Administrator's Guide, Second Edition.pdf
1.55MB
Linux Power Tools.chm
12.06MB
Linux Quick Fix Notebook.chm
2.75MB
Linux Server Hacks.pdf
34.01MB
Linux Timesaving Techniques For Dummies.pdf
15.24MB
Linux Troubleshooting for System Administrators and Power Users.chm
4.06MB
Linux+ Certification Bible.pdf
3.6MB
Malware - Fighting Malicious Code.chm
6.34MB
Mastering Active Directory for Windows Server 2003.chm
18.9MB
McGraw-Hill Science, Engineering, Math - Digital Communications - John Proakis - 4 edition (August 15, 2000) - ISBN 0072321113a.pdf
18.66MB
Methods of Hacking - Social Engineering.pdf
15.62KB
Microsoft IIS 6.0 Administrator's Pocket Consultant.chm
8.32MB
Microsoft Internet Security and Acceleration (ISA) Server 2004 Administrator's Pocket Consultant.chm
8.98MB
Microsoft SQL Server 2005 Implementation and Maintenance.pdf
26.64MB
Microsoft Windows Scripting Self-Paced Learning Guide.pdf
5.16MB
Microsoft Windows Server 2003 Administrator's Pocket Consultant.chm
5.75MB
Microsoft Windows XP Networking Inside Out.pdf
18.58MB
Microsoft Windows XP Power Toolkit.chm
12.11MB
MIT Encyclopedia Of The Cognitive Sciences.pdf
11.51MB
Modern Cryptography - Theory and Practice.pdf
17.8MB
Moving to Linux - Kiss the Blue Screen of Death Goodbye!.chm
5.35MB
MS Press - Microsoft Encyclopedia of Security.pdf
10.45MB
MS Press Windows Server 2003 Administrators Companion 2nd Edition March 2006.pdf
21.51MB
Nagios - System and Network Monitoring.pdf
6.18MB
Nessus, Snort, & Ethereal Power Tools - Customizing Open Source Security Applications.pdf
7.13MB
Netware Hacking.pdf
129.6KB
Network Intrusion Detection, Third Edition.pdf
2.46MB
Network Management.pdf
801.8KB
Network Security Assessment.chm
1.68MB
Network Security Hacks.chm
1.63MB
Network Security with OpenSSL.pdf
2.41MB
Network Tutorial, Fifth Edition.chm
8.66MB
O'Reilly - Google Hacks 2nd Edition.chm
5.23MB
Open Source Network Administration.chm
527.97KB
Open-Source Security Testing Methodology Manual.pdf
436.3KB
PC Disaster and Recovery.chm
25.06MB
PC Hardware in a Nutshell, Second Edition.chm
7.29MB
PC Upgrade and Repair Bible Desktop Edition.pdf
19.75MB
Peer to Peer - Harnessing the Power of Disruptive Technologies.pdf
2.12MB
Penetration Testing Templates.pdf
645.38KB
Perl Medic - Transforming Legacy Code.chm
1.19MB
Placing Backdoors Through Firewalls.pdf
25.38KB
Practical VoIP Security.pdf
9.68MB
Pro DNS and BIND.pdf
3.14MB
Programming Applications for Microsoft Windows, Fourth Edition.chm
5.75MB
Programming the Microsoft Windows Driver Model, Second Edition.chm
2.58MB
Programming with Microsoft Visual C++ .NET, Sixth Edition.chm
14.25MB
Python in A Nutshell, 2nd Edition.chm
1.15MB
Real 802.11 Security - Wi-Fi Protected Access and 802.11i.chm
2.93MB
Red Hat Fedora 5 Unleashed.chm
16.1MB
Red Hat Linux Networking and System Administration.pdf
7.82MB
Red Hat Linux Security and Optimization.pdf
5.13MB
Reversing - Secrets of Reverse Engineering.pdf
8.37MB
RHCE Red Hat Certified Engineer Linux Study Guide (Exam RH302), Fourth Edition.chm
10.07MB
Routers and Networking.pdf
1.46MB
RSA Encryption Algorithm, a simple example.pdf
34.79KB
Sams Teach Yourself HTML in 10 Minutes, Fourth Edition.chm
6.47MB
Sams Teach Yourself Microsoft SQL Server 2005 Express in 24 Hours.chm
30.11MB
Sarbanes-Oxley - IT Compliance Using COBIT and Open Source Tools.chm
1.62MB
Securing Linux Servers for Service Providers.pdf
1.02MB
Security and Usability - Designing Secure Systems that People Can Use.chm
7.59MB
Security Assessment - Case Studies for Implementing the NSA IAM.pdf
4.96MB
Security Patterns - Integrating Security and Systems Engineering.pdf
14.32MB
Security Warrior.chm
4.51MB
Skinning Windows XP.chm
17.58MB
Skype - The Definitive Guide.chm
5.39MB
Sniffer Pro - Network Optimization and Troubleshooting Handbook.pdf
8.02MB
Snort 2.1 - Intrusion Detection, Second Edition.pdf
12.13MB
Social Engineering – A Real Story in a Multi-national Company.pdf
210.08KB
Software Abstractions - Logic, Language, and Analysis.pdf
4.94MB
Software Fortresses - Modeling Enterprise Architectures.chm
3.16MB
Software Piracy Exposed.pdf
6.23MB
Software Requirements, Second Edition.chm
5.41MB
Solaris 10 System Administration Exam Prep.chm
5.87MB
Special Ops - Host and Network Security for Microsoft, UNIX, and Oracle.pdf
16.94MB
Spring Into Linux.chm
18.36MB
SQL Injection, Are Your Web Applications Vulnerable.pdf
529.77KB
SSL and TLS Essentials - Securing the Web.pdf
1.36MB
Steal This Computer Book 3 - What They Won't Tell You About the Internet.chm
13.74MB
Steal This File Sharing Book - What They Won't Tell You About File Sharing.chm
16.89MB
Stealing the Network - How to Own a Continent.chm
2.74MB
Stealing The Network - How To Own The Box.pdf
4.59MB
Storage Networking Protocol Fundamentals.chm
6.7MB
Strategic Information Security.chm
824.71KB
Switching to VoIP.chm
3.43MB
SysAdmin - Security Tools in FreeBSD.pdf
183.69KB
TCP IP Foundations.pdf
6.81MB
TDD-CDMA for Wireless Communications by Riaz Esmailzadeh Masao Nakagawa.pdf
2.37MB
Teach Yourself The C# Language in 21 Days.pdf
8.11MB
Terminal Services for Microsoft Windows Server 2003 - Advanced Technical Design Guide.chm
4.55MB
The A+ Certification and PC Repair Handbook.chm
27.55MB
The A+ Exams Guide - (Exam 220-301, 220-302) (TestTaker's Guide Series).chm
7.84MB
The Art of Computer Virus Research and Defense.chm
6.71MB
The Best Damn Firewall Book Period.pdf
21.58MB
The Best Damn Windows Server 2003 Book Period.pdf
21.4MB
The BitTorrent Bible.pdf
495.54KB
The Database Hacker's Handbook - Defending Database Servers.chm
1.13MB
The Ethical Hack - A Framework for Business Value Penetration Testing.pdf
3.91MB
The Everyday Internet All-In-One Desk Reference For Dummies.pdf
16.98MB
The Hacker Ethic.pdf
13.26MB
The Internet and its applications.pdf
3.05MB
The Practical Guide to HIPAA Privacy and Security Compliance.chm
1.05MB
The Shellcoder's Handbook - Discovering and Exploiting Security Holes.chm
2.1MB
The SMB Man-In-The-Middle Attack.pdf
24.13KB
The Tao of Network Security Monitoring - Beyond Intrusion Detection.chm
15.47MB
The XP Files - Windows' Hidden Tools for Secure Sharing, Communication, and Collaboration.pdf
3.99MB
Tripwire_exploit_poster.pdf
749.22KB
Understanding IPv6.chm
1.16MB
UNIX Power Tools, Third Edition.chm
2.24MB
Upgrading and Repairing Networks, Fourth Edition.chm
11.65MB
Upgrading and Repairing Pcs, 17th Edition.chm
23.82MB
Upgrading and Repairing Servers.chm
16.58MB
VHDL Beginners Book.pdf
8MB
VHDL examples.pdf
334.88KB
VHDL Reference Manual.pdf
1.4MB
Video Conferencing Over IP - Configure, Secure, and Troubleshoot.pdf
10.07MB
Voice Over 802.11.pdf
1.89MB
WAN, Wide Area Networks.pdf
1.02MB
WarDriving Drive, Detect, Defend - A Guide to Wireless Security.chm
37.08MB
Website Secrets Unleash the Power of, Google, Amazon, eBay & more.pdf
15.63MB
Well Known Trojans and Their Ports.pdf
15.05KB
Why Wireless Data.pdf
315.11KB
Wi-Foo - The Secrets of Wireless Hacking.chm
6.73MB
Windows Forensics and Incident Recovery.chm
7.18MB
Windows NT File System Internals - A Developers Guide.pdf
11.83MB
Windows Server 2003 Security Cookbook.chm
828.48KB
Windows Server 2003 Security Infrastructures - Core Security Features.chm
26.81MB
Windows XP Bible.pdf
16.02MB
Windows XP for Power Users - Power Pack.pdf
12.56MB
Windows XP Services That Can Be Disabled.pdf
160.88KB
Winternals - Defragmentation, Recovery, and Administration Field Guide.pdf
10.44MB
Wireless and Mobile Data.pdf
444.4KB
Wireless Communications by Andrea Goldmsith.pdf
3.38MB
Wireless Communications.pdf
48.48MB
Wireless Hacking - The Invisible Network.pdf
328.31KB
Wireless Technologies.pdf
452KB
Wireless WAN System.pdf
609.29KB
wireless-communication-technologies.pdf
205.37KB
XP Tips & Tweaks.pdf
505.5KB
[ ITA ] Nozioni fondamentali sui router.pdf
212.54KB