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
W3siaWQiOiJqYXZfYl9NRF9CXzcyOHg5MCIsImFkc3BvdCI6ImJfTURfQl83Mjh4OTAiLCJ3ZWlnaHQiOiI1IiwiZmNhcCI6ZmFsc2UsInNjaGVkdWxlIjpmYWxzZSwibWF4V2lkdGgiOmZhbHNlLCJtaW5XaWR0aCI6Ijc2OCIsInRpbWV6b25lIjpmYWxzZSwiZXhjbHVkZSI6ZmFsc2UsImRvbWFpbiI6ZmFsc2UsImNvZGUiOiI8YSBocmVmPVwiaHR0cHM6XC9cL3RlbGxtZS5wd1wvZ29cL2phdlwiIHRhcmdldD1cIl9ibGFua1wiPjxpbWcgc3JjPVwiXC9hcHBcL2phdlwvVmlld1wvaW1nXC9iNzI4OTAuanBnXCIgd2lkdGg9XCI3MjhcIiBoZWlnaHQ9XCI5MFwiIGJvcmRlcj1cIjBcIj48XC9hPiJ9LHsiaWQiOiJqYXZ1X2JfTURfQl83Mjh4OTAiLCJhZHNwb3QiOiJiX01EX0JfNzI4eDkwIiwid2VpZ2h0IjoiNCIsImZjYXAiOmZhbHNlLCJzY2hlZHVsZSI6ZmFsc2UsIm1heFdpZHRoIjpmYWxzZSwibWluV2lkdGgiOiI3NjgiLCJ0aW1lem9uZSI6ZmFsc2UsImV4Y2x1ZGUiOmZhbHNlLCJkb21haW4iOmZhbHNlLCJjb2RlIjoiPGEgaHJlZj1cImh0dHBzOlwvXC90ZWxsbWUucHdcL2dvXC9qYXZ1XC9cIiB0YXJnZXQ9XCJfYmxhbmtcIj48aW1nIHNyYz1cIlwvYXBwXC9qYXZ1XC9WaWV3XC9pbWdcL2I3Mjg5MC5qcGdcIj48XC9hPiJ9XQ==
CompTIA IT Fundamentals Study Guide.pdf
233.12MB
CompTIA A+ Certification: Mike Meyers' Certification Passport 5th Edition.pdf
128.99MB
How to Become a Travel Ninja: Travel Hacking Anywhere in the World.pdf
294.58KB
Applied Cryptography for Cyber Security and Defense: Information Encryption and Cyphering.pdf
5.41MB
Hacking the Invisible Network: Insecurities in 802.11x.pdf
13.78MB
Trust Management.pdf
25.88MB
Attack and Defend Computer Security Set.pdf
34.42MB
Adsense: BlackHat Edition.pdf
386.89KB
Social, Managerial, and Organizational Dimensions of Enterprise Information Systems.pdf
12.39MB
Java Enterprise Design Patterns: Patterns in Java Vol.3.pdf
3.1MB
Guide to J2E: Enterprise Java.pdf
28.78MB
CompTIA Security+ Study Guide 6th Edition.epub
12.52MB
The CISM Prep Guide: Mastering the Five Domains of Information Security Management.chm
2.41MB
CompTIA Security+ Certification Bundle Exam SY0-401 2nd Edition.epub
36.95MB
Unreliable Guide To Hacking The Linux Kernel.pdf
365.21KB
Learning SaltStack: Learn how to manage your infrastructure by utilizing the power of SaltStack.pdf
1.51MB
Break into TechL LinkedIn Profile Checklist.pdf
476.26KB
A Guide to Improving Porductivity Using Barcode Readers: Techniques for Stabilizing Moving Targets for Reading Purposes.pdf
2.43MB
Hacking Digital Cameras.pdf
21.35MB
Creating Resilient Architectures on Microsoft Azure.pdf
691.38KB
Hacking Etico por Carlos Tori.pdf
59.33MB
Ethical Hacking (EC-Council Exam 312-50): Student Courseware.chm
14.15MB
Complete CompTIA A+ Guide to IT Hardware and Software 7th Edition.epub
90.18MB
Hacking Video Game Consoles.pdf
66.94MB
Waze vs. Google Maps: Which App Will Navigate Home Faster.pdf
2.12MB
CCSP: Cisco CErtified Security Professional Certification Exam Guide All-in-One.pdf
17.24MB
Hacking Movable Type.pdf
8.41MB
CompTIA A+ 220-701 and 220-702 Exam Cram 5th Edition.pdf
11.21MB
World Standards Safety Guide.pdf
3.35MB
Hacking Google Maps and Google Earth.pdf
11.28MB
Introduction to Information Systems 17th Edition.pdf
80.63MB
1D-2D Code Reader Actial Installation Examples: Electronic Device Industry Edition.pdf
1.78MB
Amazon Web Services an Overview: Expert REference Series of White Papers.pdf
222.96KB
Struts Survival Guide: Basics to Best Practices.pdf
4.47MB
CompTIA Network+ N10-005 Exam Cram 4th Edition.epub
31.04MB
CompTIA Network+ Certification Exam N10-005 All-in-One Premium 5th Edition.azw3
51.48MB
Hacking Point of Sale: Payment Application Secrets, Threats, and Solutions.pdf
22.83MB
Kernel Level Vulnerabilities: Behind the Scenes of the 5th Argus Hacking Challenge.pdf
440.45KB
CASP CompTIA Advanced Security Practitioner Study Guide 2nd Edition.pdf
7.15MB
Current Security Management & Ethical Issues of Information Technology.chm
2.65MB
Security Engineering: A Guide to Building Dependable Distributed Systems 2nd Edition.pdf
5.34MB
Inside Network Security Assessment: Guarding your IT Infrastructure.chm
1.87MB
Travel Deeply: Do it Cheaply.pdf
8.4MB
CCIE Profesional Development Series Network Security Technologies and Solutions.chm
26.01MB
Windows Command Prompt A to N.pdf
2.39MB
Unmatched Protection Safety Light Curtain.pdf
7.35MB
Java SOA Cookbook: SOA Implementation Recipes, Tips, and Techniques.pdf
9.97MB
Boost Productivity With Your Smart Phone: And Run Your Business Wherever You Want.pdf
879.38KB
CompTIA A+ Certification All-in-One for Dummies.pdf
82.52MB
Hacking Cyberspace.pdf
22.68MB
Securit in Distributed and Networking Systems.pdf
9.57MB
CompTIA A+ Complete Deluxe Study Guide 2nd Edition Exam 220-801 220-802.pdf
136.39MB
CompTIA Network+ Certification Exam N10-006 All-In-One 6th Edition.pdf
50.42MB
Hacking Exposed Unified Communications & VoIP 2nd Edition.pdf
20.59MB
20 Travel Hacking Strategies.pdf
2.66MB
Applied Information Security: A Hands-on Approach.pdf
1.59MB
Vision Sensor IV Series: Quick Setup Guide.pdf
2.35MB
Poderes Locales y Globales. Un Estudio desde las Evaluaciones de Impacto Ambiental en las Toninas, Partido de la Costa, Buenos Aires, Argentina.pdf
251.59KB
7 Steps to Change Company Culture.pdf
1.31MB
How to Build A Beowulf.chm
416.17KB
CMS Security Handbook: The Comprehensive Guide for Wordpress, Joomla, Drupal, and Plone.epub
13.76MB
Inline Profile Measurement: The World's Fastest at 64000 Profile per Second.pdf
7.98MB
Hacking the Tivo.pdf
4.67MB
Data Storage Networking: Real-World Skills for the CompTIA Storage+ Certification and Beyond.pdf
4.8MB
1D-2D Code Reader Actual Installation Examples: Food, Pharmaceutical, and Cosmetics Industries Edition.pdf
1.78MB
Distributed Systems Security: Issues, Processes and Solutions.pdf
6.14MB
Data Protection Ensuring Data Availability.pdf
6.32MB
Cloud Essentials CompTIA Authorized Courseware for Exam CLO-001.epub
13.19MB
31 Days Before Your CompTIA A+ Exams 2nd Edition.pdf
1.54MB
LPIC-1 Certification Bible.pdf
7.71MB
Hacking Windows Vista ExtremeTech.chm
17.82MB
Enterprise Systems Backup and Recovery: A Corporate Insurance Policy.pdf
3.78MB
Hacking Exposed 7: Network Security Secrets & Solutions.pdf
33.03MB
Juniper SRX Series: A Comprehensive Guide to Security Services on the SRX Series.pdf
46.77MB
Rails: Novice to Ninja.pdf
12.27MB
CompTIA Cloud+ Certification Study Guide Exam CV0-001.pdf
22.33MB
CompTIA Cloud+ Study Guide.azw3
4.25MB
What is a Sensor: Sensor Basics Understanding fundamental principles and features.pdf
745.67KB
Introduction to Computer Science by Huong Nguyen.pdf
3.11MB
Blackjacking: Security Threats to BlackBerry Devices PDAs, and Cell Phones in the Eterprise.pdf
10.47MB
CompTIA Network+ Lab Manual.epub
26.58MB
Patterns in Java Vol.2.pdf
17.51MB
Management of Information Security.pdf
15.41MB
X-SHELL: A Guide Towards Windows Prompt Accesses.pdf
2.34MB
Sensor and Safety Line up.pdf
930.85KB
Security Assessment in Vehicular Networks.pdf
1020.79KB
PCI Compliance: Understand and Implement Effective PCI Data Security Standard Compliance.pdf
6.34MB
Linux Administrator Street Smarts: A Real World Guide to Linux Certification Skills.pdf
9.04MB
Breaking into Computer Networks from the Internet.djvu
787.06KB
Flexible, Reliable Software: Using Patterns and Agile Development.pdf
3.51MB
CompTIA Project+ Practice Tests.pdf
2.18MB
The Best Books in your Pocket.pdf
2.31MB
Cisco Security Professional's Guide to Secure Intrusion Detection Systems.pdf
13.11MB
CompTIA Security+ SY0-301 Authorized Cert Guide.epub
18.75MB
Information technology Security techniques: Code of practice for information security management.pdf
1.36MB
Practical Hacking Techniques and Countermeasures.pdf
143.97MB
ID Code Handbook 2-D Code Basic Guide.pdf
328.72KB
Hacking Leopard: Tools and Techniques for Attacking the Newest Mac OS X.pdf
2.13MB
Black Hats and the White Hats: The Effect of Organizational Culture and Institutional Identity on the Twenty-third Air Force.pdf
3.92MB
IT Security Interviews Exposed: Secrets to Landing Your Next Information Security Job.pdf
2.45MB
All-in-One CompTIA Mobility+ Certification Exam Guide MB0-001.epub
4.65MB
Be Hacker Vol.1.pdf
1.99MB
Underground - hacking, madness and obsession on the electronic frontier.pdf
1.48MB
The Tools For Continuous Delivery.pdf
171.15KB
Pro Open Source Mail: Building an Enterprise Mail Solution.pdf
7.16MB
CV-X Series Version 4 Power Meets Simplicity.pdf
10.51MB
Risk Propagation Assessment for Network Security.pdf
1.82MB
CompTIA Network+ Certification Study Guide 6th Edition Exam N10-006 50+ Practice Exam Question.pdf
73.84MB
Hardware Hacking Projects for Geeks.pdf
15.03MB
Extreme Exploits: Advanced Defenses Against Harcore Hacks.chm
10.62MB
I Wear The Black Hat: Grappling with Villains (Real and Imagined).epub
3.41MB
Linux Toys II Are you Game: Set Up a Gaming Server for a BZFlag battle.pdf
9.09MB
Identity Theft: The Other you has Stolen Your Identity How to Stop Him.pdf
2.22MB
ID Code Handbook Bar Code Type Selection Guide.pdf
1.17MB
Hacking RSS and Atom.pdf
14.94MB
Essential Computer Security: Everyone's Guide to E-Mail, Internet, and Wireless Security.pdf
11.72MB
Quantitative Security Risk Assessment of Enterprise Networks.pdf
803.59KB
Vision System Beginner's Guide.pdf
2.1MB
W3siaWQiOiJhZHN0X2JfTV8zMDB4NTAiLCJhZHNwb3QiOiJiX01fMzAweDUwIiwid2VpZ2h0IjoiNSIsImZjYXAiOmZhbHNlLCJzY2hlZHVsZSI6ZmFsc2UsIm1heFdpZHRoIjoiNzY4IiwibWluV2lkdGgiOmZhbHNlLCJ0aW1lem9uZSI6ZmFsc2UsImV4Y2x1ZGUiOmZhbHNlLCJkb21haW4iOmZhbHNlLCJjb2RlIjoiPHNjcmlwdCB0eXBlPVwidGV4dFwvamF2YXNjcmlwdFwiPlxyXG4gIGF0T3B0aW9ucyA9IHtcclxuICAgICdrZXknIDogJzdkMWNjMGUxYjk4MWM5NzY4ZGI3ODUxZmM1MzVhMTllJyxcclxuICAgICdmb3JtYXQnIDogJ2lmcmFtZScsXHJcbiAgICAnaGVpZ2h0JyA6IDUwLFxyXG4gICAgJ3dpZHRoJyA6IDMyMCxcclxuICAgICdwYXJhbXMnIDoge31cclxuICB9O1xyXG4gIGRvY3VtZW50LndyaXRlKCc8c2NyJyArICdpcHQgdHlwZT1cInRleHRcL2phdmFzY3JpcHRcIiBzcmM9XCJodHRwJyArIChsb2NhdGlvbi5wcm90b2NvbCA9PT0gJ2h0dHBzOicgPyAncycgOiAnJykgKyAnOlwvXC93d3cuYm5odG1sLmNvbVwvaW52b2tlLmpzXCI+PFwvc2NyJyArICdpcHQ+Jyk7XHJcbjxcL3NjcmlwdD4ifV0=