WEB目录:
Addison Wesley - Web Hacking Attacks and Defense.chm
McGraw.Hill.HackNotes.Web.Security.Portable.Reference.eBook-DDU.pdf
McGraw.Hill.Hacking.Exposed.Web.Applications.iNT.eBook-DDU.pdf
McGraw.Hill.Web.Services.Security.eBook-LiB.chm
OReilly - Web Security, Privacy & Commerce, 2nd Edition.chm
OReilly.Essential.PHP.Security.Oct.2005.chm
Oracle Press - 0072231300 - Effective Oracle Database 10g Security by Design - fly.chm
Oreilly.Apache.Security.Mar.2005.eBook-LiB.chm
CRACKING目录:
A.LIST.Publishing.Hacker.Disassembling.Uncovered.eBook-LiB.chm
Crackproof Your Software (2002).pdf
No.Starch.Press.The.Art.Of.Assembly.Language.eBook-LiB.chm
Springer.Reverse.Engineering.of.Object.Oriented.Code.Monographs.in.Computer.Science.eBook-kB.pdf
The Art of Disassembly.rar
Wiley.Reversing.Secrets.of.Reverse.Engineering.Apr.2005.eBook-DDU.pdf
Crypt 目录:
Apress_-_Cryptography_in_C_and_C__.chm
Cambridge.University.Press.Advances.in.Elliptic.Curve.Cryptography.May.2005.eBook-DDU.pdf
Cambridge.University.Press.Codes.and.Ciphers.Julius.Caesar.the.Enigma.and.the.Internet.eBook-kB.pdf
John.Wiley.and.Sons.Internet.Security.Cryptographic.Principles.Algorithms.and.Protocols.eBook-DDU.pdf
John.Wiley.and.Sons.Malicious.Cryptography.Exposing.Cryptovirology.eBook-DDU.pdf
McGraw-Hill - RSA Security’s Official Guide to Cryptography - fly.pdf
crypt.rar
Hacking目录:
(MSPress) Writing Secure Code.pdf
1931769494.A-List Publishing.Hacker Web Exploitation Uncovered.chm
1931769508.A-List Publishing.Hacker Linux Uncovered.chm
A.LIST.Publishing.Hacker.Disassembling.Uncovered.eBook-LiB.chm
A_Buffer_Overflow_Study_-_Attacks_and_Defenses__2002_.pdf
Addison.Wesley,.Advanced.Programming.in.the.UNIX.Environment.(2005),.2Ed.BBL.LotB.chm
Addison.Wesley,.Software.Security.Building.Security.In.(2006).BBL.chm
Addison.Wesley.Advanced.Programming.In.The.Unix.Environment.(2005).2Ed.pdf
Addison.Wesley.Professional.Rootkits.Subverting.the.Windows.Kernel.chm
Addison.Wesley.Pub.Exploiting.Software.How.to.Break.Code.eBook-kB.pdf
Addison Wesley - Hack I.T. Security Through Penetration Testing.chm
Art.of.Software.Security.Assessment.chm
Auerbach.Publications,.The.Security.Risk.Assessment.Handbook.(2005).DDU.LotB.pdf
Cisco.Press.Penetration.Testing.and.Network.Defense.Nov.2005.FIXED.eBook-DDU.chm
Code_Complete.A_Practical_Handbook_of_Software_Construction.2ndEditionDraft.McConnell.pdf
Computer Security Art And Science.chm
Computer_Vulnerability_March_9_2000_.pdf
Ebook - Windows - Programming .NET Security.chm
John.Wiley.and.Sons.The.Art.of.Intrusion.The.Real.Stories.Behind.the.Exploits.of.Hackers.Intruders.and.Deceivers.pdf
McGraw.Hill.HackNotes.Web.Security.Portable.Reference.eBook-DDU.pdf
McGraw.Hill.HackNotes.Windows.Security.Portable.Reference.eBook-DDU.pdf
McGraw.Hill.Osborne.Media.XML.Security.eBook-TLFeBOOK.pdf
Microsoft.Press.Hunting.Security.Bugs.ebook-Spy.chm
Microsoft.Press.Improving.Web.Application.Security.Threats.and.Countermeasures.eBook-LiB.chm
Microsoft.Press.The.Security.Development.Lifecycle.Jun.2006.chm
OReilly - Oracle.Security.OReilly.1998.chm
Oreilly.Security.Warrior.eBook-DDU.chm
Prentice.Hall.PTR.Internet.Denial.of.Service.Attack.and.Defense.Mechanisms.Dec.2004.eBook-DDU.chm
Sams.Inside.Network.Security.Assessment.Guarding.Your.IT.Infrastructure.Nov.2005.chm
Sams.Maximum.Security.Fourth.Edition.chm
Secure Coding Principles and Practices.pdf
Software Vulnerability Analysis.pdf
Strengthening Network Security With Web-Based Vulnerability Assessment.pdf
THE SHELLCODER'S HANDBOOK.pdf
The.Art.of.Exploitation-FOS.chm
The.Ethical.Hack.A.Framework.for.Business.Value.Penetration.Testing.eBook-EEn.pdf
The.International.Handbook.of.Computer.Security.eBook-EEn.pdf
The Art Of Computer Virus Research And Defense.chm
The_Art_of_Deception_by_Kevin_Mitnick.pdf
The_Art_of_Intrusion.pdf
The_ Assembly_ Programming_ Master_ Book.chm
Wiley, The Shellcoder's Handbook Discovering and Exploiting Security (2004) spy LotB.rar
Wiley - How Debuggers Work.djvu
Wiley.The.CISSP.Prep.Guide.Gold.Edition.eBook-kB.pdf
[eBook] Addison Wesley - Enterprise Java 2 Security Building Secure and Robust J2EE Applications (2004).chm
ebook - Designing and Writing Secure Application Code.pdf
programing - Windows.System.Programming.Third.Edition.chm
tlf-spusd.pdf
windowskernel.rar
Management目录:
Auerbach.Publications.Information.Security.Management.Handbook.5Th.Ed.pdf
CISSP Official Guide[1].rar
Cisco.Press.Cisco.Security.Agent.Jun.2005.eBook-DDU.chm
MS.Press.Microsoft.Encyclopedia.of.Security.eBook-DDU.chm
Notes_Prep_Guide.doc
OReilly.Digital.Identity.Aug.2005.chm
OReilly.Security.and.Usability.Aug.2005.chm
Springer.Privacy.Security.and.Trust.within.the.Context.of.Pervasive.Computing.Dec.2004.eBook-DDU.pdf
Wiley.The.CISSP.Prep.Guide.Gold.Edition.eBook-kB.pdf
cissp all in one third edtion.rar