http://www.4shared.com/office/hgfEATSa/SyngressCodingforPenetrationTe.html? http://www.4shared.com/office/ZfZsD2Vr/NoStarchPressPracticalMalwareA.html? http://www.4shared.com/office/2v37euNa/exploiting_software_-_how_to_b.html http://www.4shared.com/office/yoAPdf0a/Hackers_Delight.html? http://www.4shared.com/office/57s8kskt/Hackers-_Heroes_Of_The_Compute.html? http://www.4shared.com/office/BRxXUGh8/Hacking_-_The_Next_Generation.html? http://www.4shared.com/office/okDg8Z8V/McGraw_Hill_-_24_Deadly_Sins_o.html? http://www.4shared.com/zip/KH5C4ZWU/TheCrypterBluePrint.html? http://www.4shared.com/document/2aTyw5rg/Google_Hacking.html? http://www.4shared.com/document/6kKfx39M/wireless_kungfu.html? http://www.4shared.com/document/y6O6rEVv/Kingpin__How_One_Hacker_Took_O.html? http://www.4shared.com/document/G_XA72lG/misha_glenny_-_darkmarket-_cyb.html? http://www.4shared.com/document/ygQlNOv7/policing-cyber-crime.html? http://uploading.com/files/d6f2784e/No.Starch.Metasploit.Jul.2011.pdf/ http://www.4shared.com/document/ck184XVr/GhostintheWiresByKevinMitnick.html? http://www.4shared.com/document/67DjBFxQ/Kevin_Mitnick_-_The_Art_of_Dec.html? http://www.4shared.com/document/5WlwlLFg/BackTrack_5_Wireless_Penetrati.html? http://www.4shared.com/document/IalOULAp/Windows_7_Tweaks.html? http://www.4shared.com/file/m-oN-zCt/hacker_highschool_13ebooks.html? http://www.4shared.com/document/naUeu844/Hackers_Beware.html? http://www.4shared.com/document/5u6oshsO/Batch-File-Programming.html? http://www.4shared.com/document/Bp9a1Lwr/Windows_7_Bible__2009_.html? http://www.4shared.com/file/b9ajWbzq/The_hackers_Underground_Book.html? http://www.4shared.com/file/Hs5UXFIW/Hacking_for_Beginners.html? http://www.4shared.com/document/R8qYtvdj/Evolution_of_Cyber_Crime.html? http://www.4shared.com/file/sJr3dhgL/buffer_overflow_attack.html? http://www.4shared.com/file/OR6DV6eG/hacking_for_dummies.html? http://www.4shared.com/file/7-zEtAuz/ceh_prep_guide.html? http://www.4shared.com/file/F9pHoJmO/sql_injection_attack_and_defen.html? http://www.4shared.com/file/ooqOM7gU/guide_to_Computer_Forensics.html? http://www.4shared.com/file/mguQsJiP/Stealing_the_Network_how_to_ow.html? http://www.4shared.com/file/8yiqtCL5/cyber_forensics.html? http://www.hackingarticles.in/gmailhacking.zip http://www.4shared.com/file/FT-LtzMj/hacking_forensics_exposed.html? http://www.4shared.com/office/GdVtiFuE/you_tube_hacking.html? http://www.4shared.com/file/bqMb2QUI/hacking_exposed_6.html? http://www.4shared.com/document/j_5NAheQ/forensic-computer-crime-invest.html? http://www.4shared.com/file/nrcCqtDP/Window_based_Command_lINE_tOOL.html? http://www.4shared.com/file/AuQh3-kJ/hacking_gps.html? http://www.4shared.com/file/22mjVCub/gui_tools.html? http://www.mediafire.com/?b5jv5bslvhbv2or http://www.4shared.com/document/-OrKBit6/HackerCrackerAJourneyfromtheMe.html? Visit: www.calebbucker.blogspot.com