显示
资源信息
一些关于黑客安防、密码学、取证类等等的电子书,是英文版的哈,英文好的或者需要的可以下载。
资源目录
Advanced Penetration Testing.pdf
Applied Cryptography Protocols Algorithms.pdf
Art of Memory Forensics.pdf
Cryptography Apocalypse.pdf
Cryptography Engineering Design.pdf
CybAsecurity Blueteam Toaikit.pdf
Investigating Cryptocurrencies.pdf
Kali Linux Revealed 1st.pdf
Malware Analysis Cookbook.pdf
Practical Reverse Engineering ×86 x64.pdf
Secrets and Lies.pdf
Secrets of Reverse Engineering.pdf
security_engineering_a_guide_to_ building_dependable_distributed_systems.pdf
shellcoders_handbook_discovering_and _exploiting_security_holes.pdf
socialengineering_thescienceofhumanhacking_2ndedition.pdf
threat_modeling_designing_for_security.pdf tribeofhackers_cybersecurityadvicefronthebesthackersintheworld.pdf
tribeofhackersredteam_ tribalknowledgefrornthebestinoffensivecybersecurity.pdf
web_application_hackers _handbook_ finding_and_exploiting_security_flaws.pdf
wehaveroot_evenmoreadvicefromschneieronsecurity.pdf
wiresharkforsecurityprofessionals.pdf
安防黑客、密码学、取证类电子书资源下载
anonfiles:https://anonfiles.com/14W2nbv3u7/eBooks_7z
阿里云盘备份:https://www.aliyundrive.com/s/og6LuxJ983e
原文:https://www.fooliji.com/23189
本文链接:https://www.fooliji.com/23189/
- 转载请保留原文链接谢谢!
- 本站所有资源文章出自互联网收集整理,本站不参与制作,如果侵犯了您的合法权益,请联系本站我们会及时删除。
- 本站发布资源来源于互联网,可能存在水印或者引流等信息,请用户擦亮眼睛自行鉴别,做一个有主见和判断力的用户。
- 本站资源仅供研究、学习交流之用,若使用商业用途,请购买正版授权,否则产生的一切后果将由下载用户自行承担。
- 联系方式(#替换成@):feedback#abskoop.com