Forensics
Addison.Wesley.File.System.Forensic.Analysis.Mar.2005.eBook-DDU.chm
Cyber.Forensics.eBook-EEn.pdf
OReilly.Internet.Forensics.Oct.2005.chm
Virus
Addison[1].Wesley.The.Art.of.Computer.Virus.Research.and.Defense.Feb.2005.eBook-LiB.zip
GiantBlackBookVirus.rar
Web
Addison Wesley - Web Hacking Attacks and Defense.chm
McGraw.Hill.HackNotes.Web.Security.Portable.Reference.eBook-DDU.pdf
McGraw.Hill.Hacking.Exposed.Web.Applications.iNT.eBook-DDU.pdf
McGraw.Hill.Web.Services.Security.eBook-LiB.chm
OReilly - Web Security, Privacy & Commerce, 2nd Edition.chm
OReilly.Essential.PHP.Security.Oct.2005.chm
Oracle Press - 0072231300 - Effective Oracle Database 10g Security by Design - fly.chm
Oreilly.Apache.Security.Mar.2005.eBook-LiB.chm
Cracking
A.LIST.Publishing.Hacker.Disassembling.Uncovered.eBook-LiB.chm
Crackproof Your Software (2002).pdf
No.Starch.Press.The.Art.Of.Assembly.Language.eBook-LiB.chm
Springer.Reverse.Engineering.of.Object.Oriented.Code.Monographs.in.Computer.Science.eBook-kB.pdf
The Art of Disassembly.rar
Wiley.Reversing.Secrets.of.Reverse.Engineering.Apr.2005.eBook-DDU.pdf
Cryptography
Apress_-_Cryptography_in_C_and_C__.chm
Cambridge.University.Press.Advances.in.Elliptic.Curve.Cryptography.May.2005.eBook-DDU.pdf
Cambridge.University.Press.Codes.and.Ciphers.Julius.Caesar.the.Enigma.and.the.Internet.eBook-kB.pdf
John.Wiley.and.Sons.Internet.Security.Cryptographic.Principles.Algorithms.and.Protocols.eBook-DDU.pdf
John.Wiley.and.Sons.Malicious.Cryptography.Exposing.Cryptovirology.eBook-DDU.pdf
McGraw-Hill - RSA Security’s Official Guide to Cryptography - fly.pdf
crypt.rar
Hacking
A.LIST.Publishing.Hacker.Disassembling.Uncovered.eBook-LiB.chm
A_Buffer_Overflow_Study_-_Attacks_and_Defenses__2002_.pdf
Addison.Wesley.Professional.Rootkits.Subverting.the.Windows.Kernel.chm
Addison.Wesley.Pub.Exploiting.Software.How.to.Break.Code.eBook-kB.pdf
Addison Wesley - Hack I.T. Security Through Penetration Testing.chm
Cisco.Press.Penetration.Testing.and.Network.Defense.Nov.2005.FIXED.eBook-DDU.chm
Computer_Vulnerability_March_9_2000_.pdf
John.Wiley.and.Sons.The.Art.of.Intrusion.The.Real.Stories.Behind.the.Exploits.of.Hackers.Intruders.and.Deceivers.pdf
McGraw.Hill.HackNotes.Web.Security.Portable.Reference.eBook-DDU.pdf
McGraw.Hill.HackNotes.Windows.Security.Portable.Reference.eBook-DDU.pdf
McGraw.Hill.Osborne.Media.XML.Security.eBook-TLFeBOOK.pdf
OReilly - Oracle.Security.OReilly.1998.chm
Oreilly.Security.Warrior.eBook-DDU.chm
Prentice.Hall.PTR.Internet.Denial.of.Service.Attack.and.Defense.Mechanisms.Dec.2004.eBook-DDU.chm
Sams.Maximum.Security.Fourth.Edition.chm
Syngress.Practical.VoIP.Security.Mar.2006.pdf
The.Art.of.Exploitation-FOS.chm
The.Ethical.Hack.A.Framework.for.Business.Value.Penetration.Testing.eBook-EEn.pdf
The.International.Handbook.of.Computer.Security.eBook-EEn.pdf
The_Art_of_Deception_by_Kevin_Mitnick.pdf
The_Art_of_Intrusion.pdf
Wiley, The Shellcoder's Handbook Discovering and Exploiting Security (2004) spy LotB.rar
Wiley.The.CISSP.Prep.Guide.Gold.Edition.eBook-kB.pdf
tlf-spusd.pdf
windowskernel.rar
Management
Auerbach.Publications.Information.Security.Management.Handbook.5Th.Ed.pdf
CISSP Official Guide[1].rar
Cisco.Press.Cisco.Security.Agent.Jun.2005.eBook-DDU.chm
MS.Press.Microsoft.Encyclopedia.of.Security.eBook-DDU.chm
Notes_Prep_Guide.doc
OReilly.Digital.Identity.Aug.2005.chm
OReilly.Security.and.Usability.Aug.2005.chm
Springer.Privacy.Security.and.Trust.within.the.Context.of.Pervasive.Computing.Dec.2004.eBook-DDU.pdf
Wiley.The.CISSP.Prep.Guide.Gold.Edition.eBook-kB.pdf
cissp all in one third edtion.rar
Tools
Internet.and.Intranet.Security.Second.Edition-fly.chm
McGraw.Hill.Intrusion.Detection.And.Prevention.eBook-LiB.chm
OReilly.Network.Security.Tools.Apr.2005.eBook-LiB.chm
Packet.Filtering-Catching.the.Cool.Packets!-fly.chm
Prentice.Implementing.CIFS.The.Common.Internet.File.System.eBook-LiB.chm
Protect.Your.Information.with.Intrusion.Detection-fly.chm
Windows
Code.Complete.2nd.Edition.June.2004.rar
McGraw.Hill.HackNotes.Windows.Security.Portable.Reference.eBook-DDU.pdf
Writing Clean Code.rar
hbyy2ppt.zip
ms press - writing secure code.chm