Monday, 13 April 2009

Hacking e-Book Collection

Name:TCPIP Network Administration - Oreilly
Link:http://www.hackerz.ir/e-books/(Ebook) Hacking - Computers - Networking - TCPIP Network Administration - Oreilly.pdf

Name:(Kernel) Windows Undocumented File Formats Source Code
Link:http://www.hackerz.ir/e-books/(Kernel) Windows Undocumented File Formats Source Code.zip

Name:(MSPress) Writing Secure Code
Link:http://www.hackerz.ir/e-books/(MSPress) Writing Secure Code.pdf

Name:How To Keygens
Link:http://www.hackerz.ir/e-books/(ebooK) - How To Keygens.pdf

Name:Phishing the Web
Link:http://www.hackerz.ir/e-books/016 Phishing the Web.pdf

Name:Next Generation Peer to Peer Systems
Link:http://www.hackerz.ir/e-books/017 Next Generation Peer to Peer Systems.pdf

Name:Addison-Wesley Professional.The Design and Implementation of the 4.4 BSD Operating System (Unix and Open Systems Series.)
Link:http://www.hackerz.ir/e-books/0201549794.Addison-Wesley Professional.The Design and Implementation of the 4.4 BSD Operating System (Unix and Open Systems Series.).pdf

Name: Protocol Reverse Engineering
Link:http://www.hackerz.ir/e-books/026 SAP R3 Protocol Reverse Engineering.pdf

Name:038 Free Software Usage in South America
Link:http://www.hackerz.ir/e-books/038 Free Software Usage in South America.pdf

Name:Firewall Piercing
Link:http://www.hackerz.ir/e-books/040 Firewall Piercing

Name:Einfuehrung in Kryptographische Methoden
Link:http://www.hackerz.ir/e-books/041 Einfuehrung in Kryptographische Methoden.pdf

Name:Cored Programming.pdf
Link:http://www.hackerz.ir/e-books/042 Cored Programming.pdf

Name: Machine Learning in Science and Engineering
Link:http://www.hackerz.ir/e-books/044 Machine Learning in Science and Engineering.pdf

Name: SUN Bloody Daft Solaris Mechanisms
Link:http://www.hackerz.ir/e-books/057 SUN Bloody Daft Solaris Mechanisms.pdf

Name:The Blinking Suspects
Link:http://www.hackerz.ir/e-books/058 The Blinking Suspects.pdf

Name: Wikipedia Sociographics
Link:http://www.hackerz.ir/e-books/059 Wikipedia Sociographics.pdf

Name:Hacking EU funding for a FOSS project
Link:http://www.hackerz.ir/e-books/062 Hacking EU funding for a FOSS project.pdf

Name:Edit This Page.pdf
Link:http://www.hackerz.ir/e-books/063 Edit This Page.pdf

Name:Trusted Computing.pdf
Link:http://www.hackerz.ir/e-books/064 Trusted Computing.pdf

Name: Bluetooth Hacking
Link:http://www.hackerz.ir/e-books/066 Bluetooth Hacking.pdf

Name:The Reality of Network Address Translators
Link:http://www.hackerz.ir/e-books/072 The Reality of Network Address Translators.pdf

Name: Weird Programming 2
Link:http://www.hackerz.ir/e-books/077 Weird Programming 2.pdf

Name:Aspects of Elliptic Curve Cryptography
Link:http://www.hackerz.ir/e-books/078 Aspects of Elliptic Curve Cryptography.pdf

Name:USB-Unbekannter Serieller Bus
Link:http://www.hackerz.ir/e-books/080 USB-Unbekannter Serieller Bus.pdf

Name: Security Nightmares 2005
Link:http://www.hackerz.ir/e-books/095 Security Nightmares 2005.pdf

Name: Portable Software-Installation with pkg source
Link:http://www.hackerz.ir/e-books/098 Portable Software-Installation with pkg source.pdf

Name: Anonymous communications
Link:http://www.hackerz.ir/e-books/100 Anonymous communications.pdf

No comments:

Post a Comment