Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- 1,001 CCNA Routing and Switching Practice Questions for Dummies (+ Free Online Practice)
- 24 Deadly Sins of Software Security: Programming Flaws and How to Fix Them
- 25 Recipes for Getting Started With R
- 30 Arduino Projects for the Evil Genius, Second Edition
- 31 Days Before Your CCNA Security Exam: A Day-By-Day Review Guide for the IINS 210-260 Certification Exam
- A Bug Hunter's Diary: A Guided Tour Through the Wilds of Software Security
- Administering Windows Server 2012
- Advanced Android 4 Games
- Advanced Penetration Testing for Highly-Secured Environments - Second Edition
- Advanced Penetration Testing for Highly-Secured Environments: The Ultimate Security Guide
- Advanced Programming in the UNIX Environment
- Advanced Qt Programming: Creating Great Software With C++ and Qt 4
- Advanced Wireless Networks: Technology and Business Models
- Adventures in Raspberry Pi
- Agile Data
- Agile Oracle Application Express
- Agile Web Development With Rails 4
- A Guide to Kernel Exploitation: Attacking the Core
- Algorithms: Design and Analysis
- Amazing Android Apps for Dummies
- Android 3.0 Application Development Cookbook: Over 70 Working Recipes Covering Every Aspect of Android Development
- Android 6 for Programmers: An App-Driven Approach
- Android Application Development Cookbook - Second Edition
- Android Application Development for Dummies
- Android Apps for Absolute Beginners
- Android Apps for Absolute Beginners
- Android Essentials (Books for Professionals by Professionals)
- Android for Programmers: An App-Driven Approach
- Android for Work: Productivity for Professionals
- Android Hacker's Handbook
- Android: How to Program, Global Edition
- Android Recipes: A Problem-Solution Approach
- Android Security Cookbook
- Android Studio Application Development
- Android Studio New Media Fundamentals: Content Production of Digital Audio/Video, Illustration and 3D Animation
- Android Tablets Made Simple: For Motorola XOOM, Samsung Galaxy Tab, Asus, Toshiba and Other Tablets
- Android User Interface Development: Beginner's Guide
- Android User Interface Development: Beginner's Guide
- Android Wireless Application Development
- Android Wireless Application Development: Advanced Topics
- Anti-Hacker Tool Kit, Fourth Edition
- Application Security for the Android Platform: Processes, Permissions, and Other Safeguards
- Applied Cryptography: Protocols, Algorithms, and Source Code in C
- Applied Network Security Monitoring: Collection, Detection, and Analysis
- A Practical Guide to Linux Commands, Editors, and Shell Programming
- Arduino Adventures: Escape From Gemini Station
- Arduino and Kinect Projects: Design, Build, Blow Their Minds (Technology in Action)
- Arduino: A Quick-Start Guide
- Arduino Cookbook
- Arduino Cookbook Second Edition
- Arduino: curso práctico de formación
- Arduino Development Cookbook
- Arduino Internals (Technology in Action)
- Arduino Projects to Save the World
- Arduino Robotics
- Arduino Wearables
- Assessing Network Security
- BackTrack 5 Cookbook
- BackTrack 5 Wireless Penetration Testing Beginner's Guide
- Bash Pocket Reference
- Bash Pocket Reference
- BeagleBone Robotic Projects
- Beautiful Security: Leading Security Experts Explain How They Think
- Beginning Android
- Beginning Android
- Beginning Android 2
- Beginning Android 3
- Beginning Android 4
- Beginning Android 4 Games Development
- Beginning Android ADK With Arduino
- Beginning Android Application Development
- Beginning Android Games
- Beginning Android Games
- Beginning Android Tablet Games Programming
- Beginning Android Tablet Programming
- Beginning Arduino
- Beginning Arduino Programming
- Beginning C, 5th Edition
- Beginning C for Arduino: Learn C Programming for the Arduino
- Beginning HTML5 and CSS3: The Web Evolved
- Beginning iOS 3D Unreal Games Development
- Beginning iOS 5 Games Development: Using the iOS SDK for iPad, iPhone and iPod Touch
- Beginning IOS Game Development
- Beginning Perl
- Beginning Python
- Beginning Python Games Development, Second Edition: With PyGame
- Beginning SQL Server 2012 for Developers
- Beginning the Linux Command Line, Second Edition
- Beginning Visual C# 2012 Programming
- Beginning WebGL for HTML5
- Black Hat Python: Python Programming for Hackers and Pentesters
- Boost.Asio C++ Network Programming
- Botnets: The Killer Web App
- Buffer Overflow Attacks: Detect, Exploit, Prevent
- Building a Home Security System With Raspberry Pi
- Building Android Apps With HTML, CSS, and JavaScript
- Building Arduino Projects for the Internet of Things: Experiments With Real-World Applications
- Building Cloud Apps With Microsoft Azure: Best Practices for Devops, Data Storage, High Availability, and More
- Building Hypermedia APIs With HTML5 and Node
- Building Machine Learning Systems With Python
- Building Virtual Pentesting Labs for Advanced Penetration Testing
- Build Your Own Security Lab: A Field Guide for Network Testing
- Burp Suite Essentials
- C++ 14 Quick Syntax Reference
- CCENT/CCNA ICND1 100-105 Official Cert Guide
- CCIE Routing and Switching V5.0 Official Cert Guide
- CCNA: Cisco Certified Network Associate: Fast Pass
- CCNA Cisco Certified Network Associate Study Guide
- CCNA Cloud Cldadm 210-455 Official Cert Guide
- CCNA Collaboration CICD 210-060 Official Cert Guide
- CCNA Data Center DCICN 200-150 Official Cert Guide
- CCNA Data Center DCICT 200-155 Official Cert Guide
- CCNA Routing and Switching ICND2 200-105 Official Cert Guide
- CCNA Routing and Switching Review Guide: Exams 100-101, 200-101, and 200-120
- CCNA Routing and Switching Study Guide: Exams 100-101, 200-101, and 200-120
- CCNA Security 210-260 Official Cert Guide
- CCNA Security Study Guide: Exam 640-553
- CCNA Voice Study Guide: Exam 640-460
- CCNA Wireless 640-722 Official Cert Guide
- CCNP Route 642-902 Official Certification Guide
- CCNP Routing and Switching Route 300-101 Official Cert Guide
- CCNP Routing and Switching SWITCH 300-115 Official Cert Guide
- CCNP Routing and Switching TSHOOT 300-135 Official Cert Guide
- CCNP Security VPN 642-648 Official Cert Guide (2nd Edition) (Cert Guides)
- CCSP (ISC)2 Certified Cloud Security Professional Official Study Guide
- CEH Certified Ethical Hacker All-In-One Exam Guide, Second Edition
- CEH Certified Ethical Hacker Study Guide
- CEH: Official Certified Ethical Hacker Review Guide: Exam 312-50
- C in a Nutshell: The Definitive Reference
- C++ in One Hour a Day, Sams Teach Yourself
- Circuits and Systems for Security and Privacy
- CISA: Certified Information Systems Auditor Study Guide
- Cisco ASA: All-In-One Firewall, IPS, Anti-X, and VPN Adaptive Security Appliance
- Cisco CCENT/CCNA ICND1 100-101 Official Cert Guide, Academic Edition
- Cisco Secure Firewall Services Module (FWSM)
- CISSP All-In-One Exam Guide, Seventh Edition
- CISSP: Certified Information Systems Security Professional Study Guide
- CISSP ® : Certified Information Systems Security Professional Study Guide, Third Edition
- CISSP (ISC)2 Certified Information Systems Security Professional Official Study Guide
- Cloud Essentials: CompTIA Authorized Courseware for Exam CLO-001
- Coding for Penetration Testers: Building Better Tools
- CoffeeScript: Accelerated JavaScript Development
- CoffeeScript Programming With jQuery, Rails, and Node.js
- Cómo programar en JAVA
- Compiladores e intérpretes: teoría y práctica
- CompTIA A+ Complete Study Guide: Exams 220-801 and 220-802
- CompTIA CSA+ Study Guide: Exam CS0-001
- CompTIA IT Fundamentals Study Guide: Exam FC0-U51
- CompTIA Server+ Study Guide: Exam SK0-004
- Computer Forensics and Cyber Crime: An Introduction
- Computer Forensics: Hard Disk and Operating Systems
- Computer Forensics: Investigating Network Intrusions and Cyber Crime
- Computer Forensics: Investigating Wireless Networks and Devices
- Computer Forensics With Ftk
- Computer Security Handbook, Set
- Computer Viruses, Artificial Life, and Evolution
- Computer Viruses for Dummies
- Continuous Delivery: Reliable Software Releases Through Build, Test, and Deployment Automation
- Corporate Computer Security
- C# Programming Cookbook
- C++ Programming: Program Design Including Data Structures
- C Quick Syntax Reference
- Creating Google Chrome Extensions
- Creating HTML5 Animations With Flash and Wallaby
- Creating Mobile Apps With Xamarin.Forms Preview Edition 2
- C Recipes: A Problem-Solution Approach
- Cryptography and Data Security
- Cryptography and Network Security: Principles and Practice
- Cryptography in C and C++
- Cryptography in C and C++
- C++ Standard Library Quick Reference
- C ++ Windows Programming
- CWNA: Certified Wireless Network Administrator Official Study Guide: Exam PW0-105
- CWSP Certified Wireless Security Professional Official Study Guide: Exam PW0-204
- CWTS: Certified Wireless Technology Specialist Official Study Guide: Exam PW0-070
- Cyber Forensics: A Field Manual for Collecting, Examining, and Preserving Evidence of Computer Crimes
- Cyber Warfare: Techniques, Tactics and Tools for Security Practitioners
- Cyber Warfare: Techniques, Tactics and Tools for Security Practitioners
- Data Algorithms: Recipes for Scaling Up With Hadoop and Spark
- Data and Computer Communications
- Data Communications and Computer Networks: A Business User's Approach
- Data Hiding: Exposing Concealed Data in Multimedia, Operating Systems, Mobile Devices and Network Protocols
- Data Structures and Algorithms in C++
- Data Structures and Algorithms in C++
- Data Structures Using C
- Data Structures Using C++
- Defense Against the Black Arts: How Hackers Do What They Do and How to Protect Against It
- Designing BSD Rootkits: An Introduction to Kernel Hacking
- Developing Android Applications With Adobe AIR
- Developing Android Applications With Flex 4.5
- Digital Forensics for Network, Internet, and Cloud Computing: A Forensic Evidence Guide for Moving Targets and Data
- Digital Forensics With Open Source Tools
- Disaster Recovery
- Dissecting the Hack: The F0rb1dd3n Network
- Electrónica de potencia: convertidores, aplicaciones y diseño
- Electronic Troubleshooting, Fourth Edition
- EnCase Computer Forensics, Includes DVD: The Official EnCE: EnCase Certified Examiner Study Guide
- Encyclopedia of Electronic Components Volume 1: Resistors, Capacitors, Inductors, Switches, Encoders, Relays, Transistors
- Encyclopedia of Electronic Components Volume 2: LEDs, LCDs, Audio, Thyristors, Digital Logic, and Amplification
- Environmental Monitoring With Arduino: Building Simple Devices to Collect Data About the World Around Us
- Essential C# 6.0 (5th Edition) (Addison-Wesley Microsoft Technology)
- Essential SNMP
- Essential System Administration: Tools and Techniques for Linux and Unix Administration
- Estructuras de datos en C++
- Ethical Hacking and Countermeasures: Attack Phases
- Ethical Hacking and Countermeasures: Linux, Macintosh and Mobile Systems
- Ethical Hacking and Countermeasures: Secure Network Infrastructures
- Ethical Hacking and Countermeasures: Threats and Defense Mechanisms
- Ethical Hacking and Countermeasures: Web Applications and Data Servers
- Ethical Hacking and Penetration Testing Guide
- Excel Hacks: Tips & Tools for Streamlining Your Spreadsheets
- Expanding Your Raspberry Pi: Storage, Printing, Peripherals, and Network Connections for Your Raspberry Pi
- Experimenting With AVR Microcontrollers
- Expert Oracle Application Express Plugins: Building Reusable Components (Expert's Voice in Oracle)
- Expert Shell Scripting
- Exploring the Raspberry Pi 2 With C++
- Ext JS 3.0 Cookbook
- Ext JS 4 Web Application Development Cookbook
- Forensic Computer Crime Investigation (International Forensic Science and Investigation)
- Foundations of Python Network Programming: The Comprehensive Guide to Building Network Applications With Python
- Functional Programming in JavaScript
- Game Programming Using Qt
- Getting Started With Arduino
- Getting Started With Arduino: The Open Source Electronics Prototyping Platform (Make)
- Getting Started With Electronic Projects
- Getting Started With GEO, CouchDB, and Node.js
- Getting Started With Meteor JavaScript Framework
- Getting Started With .NET Gadgeteer
- Getting Started With Raspberry Pi
- Getting Started With RFID
- Getting Started With Roo
- Getting Started With RStudio
- Getting Started With Sensors: Measure the World With Electronics, Arduino, and Raspberry Pi
- Ghost in the Wires: My Adventures as the World's Most Wanted Hacker
- Git: Version Control for Everyone
- Google Hacking for Penetration Testers
- Google Hacking for Penetration Testers
- Google Hacking for Penetration Testers
- gran libro de HTML5, CSS3 y Javascript, El
- Gray Hat Hacking, Second Edition: The Ethical Hacker's Handbook
- Gray Hat Hacking the Ethical Hackers Handbook, 3rd Edition
- Gray Hat Python: Python Programming for Hackers and Reverse Engineers
- Group Policy: Fundamentals, Security, and the Managed Desktop
- Guide to Computer Forensics and Investigations
- Guitarra para dummies
- Hack Attacks Testing: How to Conduct Your Own Security Audit
- Hackers :: Heroes of the Computer Revolution. (Reloaded)
- Hacking, 2nd Edition: The Art of Exploitation
- Hacking and Penetration Testing With Low Power Devices
- Hacking and Securing iOS Applications: Stealing Data, Hijacking Software, and How to Prevent It
- Hacking a Terror Network: The Silent Threat of Covert Channels
- Hacking ético
- Hacking Exposed Computer Forensics, Second Edition: Computer Forensics Secrets & Solutions
- Hacking Exposed Linux: Linux Security Secrets and Solutions
- Hacking Exposed Mobile: Security Secrets & Solutions
- Hacking Exposed, Sixth Edition: Network Security Secrets& Solutions
- Hacking Exposed: Web Applications
- Hacking Exposed Web Applications, Third Edition
- Hacking Exposed Wireless: Wireless Security Secrets & Colutions
- Hacking Firefox: More Than 150 Hacks, Mods, and Customizations
- Hacking for Dummies
- Hacking for Dummies
- Hacking for Dummies
- Hacking GMail
- Hacking Google Maps and Google Earth
- Hacking GPS
- Hacking Point of Sale: Payment Application Secrets, Threats, and Solutions
- Hacking Politics: How Geeks, Progressives, the Tea Party, Gamers, Anarchists and Suits Teamed Up to Defeat SOPA and Save the Internet
- Hacking the Human: Social Engineering Techniques and Security Countermeasures
- Hacking: The Next Generation (Animal Guide)
- Hacking VoIP: Protocols, Attacks, and Countermeasures
- Hacking Wireless Networks for Dummies
- Hacking With Kali: Practical Penetration Testing Techniques
- Hacknotes Web Security Portable Reference
- Hack Proofing Sun Solaris 8
- Hack Proofing Your Ecommerce Site
- Hack Proofing Your Identity
- Hack Proofing Your Network
- Hack Proofing Your Network: Internet Tradecraft
- Hackproofing Your Wireless Network
- Hack the Stack
- Hands-On Programming With R: Write Your Own Functions and Simulations
- Hardening Cisco Routers
- Hello, Android: Introducing Google's Mobile Development Platform
- High Performance Computing and Applications: Third International Conference, HPCA 2015, Shanghai, China, July 26-30, 2015, Revised Selected Papers
- How Linux Works: What Every Superuser Should Know
- How to Cheat at Securing Linux
- HTML5 & CSS3 for the Real World
- HTML5 Boilerplate Web Development
- HTML5 Canvas
- HTML5 Cookbook
- HTML5 Developer's Cookbook
- HTML5 Games Development by Example: Beginner's Guide
- HTML5 Games Most Wanted: Build the Best HTML5 Games
- Html5 Mobile Development Cookbook
- HTML5: Up and Running
- HTML and CSS: Design and Build Websites
- Information Security: Principles and Practice
- Inside Cyber Warfare: Mapping the Cyber Underworld
- Instant Ember.JS Application Development: How-To
- Instant Galleria How-To
- Instant Kali Linux
- Instant Penetration Testing: Setting Up a Test Lab How-To
- Intellectual Property and Open Source: A Practical Guide to Protecting Code
- Interconnecting Cisco Network Devices, Part 1 (ICND1) Foundation Learning Guide
- Intermediate Perl
- Introducing Linux Distros
- Introducing Microsoft SQL Server 2014
- Introducing Microsoft System Center 2012 R2
- Introducing Windows 10 for IT Professionals, Preview Edition
- Introducing Windows 8.1 for IT Professionals
- Introducing Windows Azure for IT Professionals
- Introducing Windows Server 2012
- Introducing Windows Server 2012 R2
- Introducing Windows Server 2012 Rtm Edition
- Investigative Computer Forensics: The Practical Guide for Lawyers, Accountants, Investigators, and Business Executives
- IOS Sensor Apps With Arduino: Wiring the IPhone and IPad Into the Internet of Things
- IPad and IPhone Kung Fu: Tips, Tricks, Hints, and Hacks for IOS 7
- IPv6 Network Administration
- Java 9 Recipes: A Problem-Solution Approach
- Java Deep Learning Essentials
- Java EE Development With Eclipse - Second Edition
- JavaFX Developer's Guide
- JavaScript Cookbook
- JavaScript Enlightenment
- Juniper and Cisco Routing: Policy and Protocols for Multivendor IP Networks
- Kali Linux 2: Windows Penetration Testing
- Kali Linux: Assuring Security by Penetration Testing
- Kali Linux Cookbook
- Kali Linux CTF Blueprints
- Kali Linux Network Scanning Cookbook
- Kali Linux Social Engineering
- Kali Linux Web Penetration Testing Cookbook
- Kali Linux Wireless Penetration Testing Beginner's Guide
- Kali Linux Wireless Penetration Testing Essentials
- Killer Game Programming in Java
- Kinect Hacks
- Knoppix Hacks: Tips and Tools for Hacking, Repairing, and Enjoying Your PC
- Learn Electronics With Arduino
- Learning Android: Develop Mobile Apps Using Java and Eclipse
- Learning JavaScript Data Structures and Algorithms
- Learning Metasploit Exploitation and Development
- Learning Object-Oriented Programming
- Learning Pentesting for Android
- Learning Pentesting for Android Devices
- Learning Python
- Learning Reactive Programming With Java 8
- Learn Java for Android Development
- Learn PHP 7: Object Oriented Modular Programming Using HTML5, CSS3, JavaScript, XML, JSON, and MySQL
- Learn Python the Hard Way: A Very Simple Introduction to the Terrifyingly Beautiful World of Computers and Code
- Learn Raspberry Pi With Linux
- Lifehacker: 88 Tech Tricks to Turbocharge Your Day
- Linux Bible
- Linux Bible 2010 Edition: Boot Up to Ubuntu, Fedora, KNOPPIX, Debian, openSUSE, and 13 Other Distributions
- Linux Command Line and Shell Scripting Bible
- Linux Command Line and Shell Scripting Bible
- Linux Essentials
- Linux Kernel Development
- Linux Networking Cookbook
- Linux Shell Scripting Cookbook
- Linux Shell Scripting Cookbook, Second Edition
- Linux System Programming: Talking Directly to the Kernel and C Library
- Linux Utilities Cookbook
- Low-Level Programming: C, Assembly, and Program Execution on Intel® 64 Architecture
- LPIC-2: Linux Professional Institute Certification Study Guide: Exam 201 and Exam 202
- Machine Learning for Hackers
- Macintosh Terminal Pocket Guide
- Make a Mind-Controlled Arduino Robot: Use Your Brain as a Remote
- Make an Arduino-Controlled Robot
- Make: Arduino Bots and Gadgets: Six Embedded Projects With Open Source Hardware and Software
- Make: Electronics (Learning by Discovery)
- Making Android Accessories With IOIO
- Making Passwords Secure: Fixing the Weakest Link in Cybersecurity
- Malicious Bots: An Inside Look Into the Cyber-Criminal Underground of the Internet
- Malicious Cryptography: Exposing Cryptovirology
- Malware Forensics Field Guide for Linux Systems
- Manage Partitions With Gparted (How-To)
- Managing Agile Open-Source Software Projects With Visual Studio Online
- Mastering JavaScript Design Patterns - Essential Solutions for Effective JavaScript Web Design
- Mastering Kali Linux for Advanced Penetration Testing
- Mastering Kali Linux Wireless Pentesting
- Mastering Linux Network Administration
- Mastering Linux Shell Scripting
- Mastering Media With the Raspberry Pi: Media Centers, Music, High End Audio, Video, and Ultimate Movie Nights
- Mastering Metasploit
- Mastering Metasploit - Second Edition
- Mastering Python Regular Expressions
- Mastering the Nmap Scripting Engine
- Mastering Windows 8 C++ App Development
- Mastering Wireless Penetration Testing for Highly Secured Environments
- MATLAB Deep Learning: With Machine Learning, Neural Networks and Artificial Intelligence
- Matplotlib for Python Developers: Build Remarkable Publication Quality Plots the Easy Way
- MCSA Microsoft Windows 10 Study Guide: Exam 70-697
- MCSA Windows Server 2012 R2 Installation and Configuration Study Guide: Exam 70-410
- Metasploit Penetration Testing Cookbook
- Metasploit Penetration Testing Cookbook: Second Edition
- Metasploit: The Penetration Tester's Guide
- Metasploit Toolkit for Penetration Testing, Exploit Development, and Vulnerability Research
- Microsoft Access 2013 Step by Step
- Microsoft Azure Essentials Azure Automation
- Microsoft Azure Essentials Azure Machine Learning
- Microsoft Azure Essentials Azure Web Apps for Developers
- Microsoft Azure Essentials - Fundamentals of Azure
- Microsoft SQL Server 2008: A Beginner's Guide
- Microsoft System Center Building a Virtualized Network Solution
- Microsoft System Center: Cloud Management With App Controller
- Microsoft System Center: Configuration Manager Field Experience
- Microsoft System Center Data Protection for the Hybrid Cloud
- Microsoft System Center Deploying Hyper-V With Software-Defined Storage & Networking
- Microsoft System Center Designing Orchestrator Runbooks (Introducing)
- Microsoft System Center Extending Operations Manager Reporting
- Microsoft System Center Integrated Cloud Platform (Introducing)
- Microsoft System Center Introduction to Microsoft Automation Solutions
- Microsoft System Center Network Virtualization and Cloud Computing
- Microsoft System Center Operations Manager Field Experience
- Microsoft System Center: Optimizing Service Manager
- Microsoft System Center Software Update Management Field Experience
- Microsoft System Center: Troubleshooting Configuration Manager
- MIMO-OFDM for LTE, WiFi and WiMAX: Coherent Versus Non-Coherent and Cooperative Turbo Transceivers (Wiley - IEEE)
- MintDuino: Building an Arduino-Compatible Breadboard Microcontroller
- Modulation and Coding Techniques in Wireless Communications
- More iOS 6 Development: Further Explorations of the iOS SDK
- MOS 2013 Study Guide for Microsoft Access
- Multimobile Development: Building Applications for the IPhone and Android
- Murach's SQL Server 2012 for Developers
- Netcat Power Tools
- Netcat Starter Guide
- Network Analysis Using Wireshark Cookbook
- Network and System Security
- Network Defense: Perimeter Defense Mechanisms
- Network Forensics: Tracking Hackers Through Cyberspace
- Network Safety
- Network Security Assessment: Know Your Network
- Network Security Essentials: Applications and Standards, International Edition: Applications and Standards
- Network Security Foundations: Technology Fundamentals for IT Success
- Network Security Hacks
- Network Security Portable Reference
- Network Security Through Data Analysis: Building Situational Awareness
- Network Warrior
- Next-Generation Firewalls for Dummies
- Ninja Hacking: Unconventional Penetration Testing Tactics and Techniques
- Nmap 6: Network Exploration and Security Auditing Cookbook
- Nmap Cookbook: The Fat-Free Guide to Network Scanning
- Nmap in the Enterprise: Your Guide to Network Scanning
- Node.js for PHP Developers
- Object-Oriented JavaScript
- Official (ISC)2® Guide to the CISSP®-ISSMP® CBK®, Second Edition
- Ogre 3D 1.7 Application Development Cookbook
- Oracle Application Express 4.0 With Ext Js
- Oracle Application Express 4 Recipes
- OSPF: A Network Routing Protocol
- Penetration Testing: A Hands-On Introduction to Hacking
- Penetration Testing Basics: A Quick-Start Guide to Breaking Into Systems
- Penetration Testing: Communication Media Testing
- Penetration Testing: Procedures & Methodologies
- Penetration Testing With BackBox
- Penetration Testing With Raspberry Pi
- Penetration Testing With the Bash Shell
- Phonegap 2 Mobile Application Development Hotshot
- PowerShell 3. 0 Advanced Administration Handbook
- PowerShell Deep Dives
- Powershell in Depth
- PowerShell in Depth: An Administrator's Guide
- Practical Android 4 Games Development
- Practical Android Projects
- Practical Arduino: Cool Projects for Open Source Hardware
- Practical Arduino Engineering
- Practical AVR Microcontrollers: Games, Gadgets, and Home Automation With the Microcontroller Used in the Arduino
- Practical Lock Picking: A Physical Penetration Tester's Training Guide
- Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software
- Practical Reverse Engineering: X86, X64, ARM, Windows Kernel, Reversing Tools, and Obfuscation
- Pro Access 2010 Development
- Pro Android
- Pro Android 2
- Pro Android 3
- Pro Android Flash
- Pro Android Games
- Pro Android Media: Developing Graphics, Music, Video, and Rich Media Apps for Smartphones and Tablets
- Pro Android Python With SL4A
- Pro Android Wearables: Building Apps for Smartwatches
- Pro Android Web Apps: Develop for Android Using HTML5, CSS3 & JavaScript
- Pro Bash Programming: Scripting the Linux Shell
- Problem Solving and Program Design in C, Global Edition
- Procedural Content Generation for C++ Game Development
- Professional Android 2 Application Development
- Professional Android 4 Application Development
- Professional Android Application Development
- Professional Android Open Accessory Programming With Arduino
- Professional Flash Mobile Development: Creating Android and iPhone Applications
- Professional Node.js: Building Javascript Based Scalable Software
- Professional Penetration Testing: Creating and Operating a Formal Hacking Lab
- Professional Python Frameworks: Web 2.0 Programming With Django and Turbogears (Programmer to Programmer)
- Pro Git
- PROGRAMACION Y RESOLUCION DE PROBLEMAS CON C++
- Programmable Logic Controllers: A Practical Approach to IEC 61131-3 Using CoDeSys
- Programming Android
- Programming Android
- Programming Clojure
- Programming in C
- Programming Interactivity
- Programming Linux Hacker Tools Uncovered: Exploits, Backdoors, Scanners, Sniffers, Brute-Forcers, Rootkits
- Programming Projects in C for Students of Engineering, Science, and Mathematics
- Programming Python
- Programming Windows Store Apps With HTML, CSS, and JavaScript (Developer Reference)
- Programming With ANSI C++
- Programming Your Home: Automate With Arduino, Android, and Your Computer
- Pro HTML5 and CSS3 Design Patterns
- Pro HTML5 Games
- Pro HTML5 Performance (Expert's Voice in Web Development)
- Pro Java 8 Games Development
- Pro OpenGL ES for Android
- Pro Oracle Application Express 4
- Pro PowerShell for Microsoft Azure
- Pro Smartphone Cross-Platform Development: iPhone, Blackberry, Windows Mobile and Android Development and Distribution
- Pro SQL Server 2012 Relational Database Design and Implementation
- Python for Data Analysis: Data Wrangling With Pandas, NumPy, and IPython
- Python for Kids: A Playful Introduction to Programming
- Python for Secret Agents
- Python for Unix and Linux System Administration
- Python Geospatial Analysis Cookbook
- Python GUI Programming Cookbook
- Python Network Programming Cookbook
- Python Parallel Programming Cookbook
- Python Penetration Testing Essentials
- Qt5 C++ GUI Programming Cookbook
- Raspberry Pi: A Quick-Start Guide
- Raspberry Pi Blueprints
- Raspberry Pi Computer Architecture Essentials
- Raspberry Pi Computer Vision Programming
- Raspberry Pi Cookbook
- Raspberry Pi Cookbook for Python Programmers
- Raspberry Pi for Secret Agents
- Raspberry Pi for Secret Agents - Second Edition
- Raspberry Pi Gaming Second Edition
- Raspberry Pi Home Automation With Arduino
- Raspberry Pi IoT Projects: Prototyping Experiments for Makers
- Raspberry Pi LED Blueprints
- Raspberry Pi Networking Cookbook
- Raspberry Pi Robotic Projects
- Raspberry Pi Robotics Projects - Second Edition
- R Cookbook
- Red Hat Linux Certification Study Guide, (Exams EX200 & EX300)
- Red Hat Linux Networking and System Administration
- Red Hat Linux Pocket Administrator
- Red Hat Rhce/Rhcsa 7 Cert Guide: Red Hat Enterprise Linux 7 (Ex200 and Ex300)
- Rethinking Enterprise Storage: A Hybrid Cloud Model
- Reversing: Secrets of Reverse Engineering
- Rootkits for Dummies
- Rtfm: Red Team Field Manual
- Secrets of Network Cartography: A Comprehensive Guide to nmap
- Securing VoIP Networks: Threats, Vulnerabilities, and Countermeasures
- Security Power Tools
- Seguridad informática
- Seven Deadliest Network Attacks
- Seven Deadliest USB Attacks (Seven Deadliest Attacks)
- Simple Steps to Data Encryption: A Practical Guide to Secure Computing
- Sistemas digitales: principios y aplicaciones
- Smart Home Automation With Linux
- Snort Intrusion Detection and Prevention Toolkit
- Software Engineering: A Methodical Approach
- Software Testing: Concepts and Operations
- SQL for Dummies
- SQL Injection Attacks and Defense
- SSCP (ISC)2 Systems Security Certified Practitioner Official Study Guide
- SSCP Systems Security Certified Practitioner All-In-One Exam Guide, Second Edition
- Starting Out With Python
- Stealing the Network: How to Own an Identity
- TCP/IP Illustrated
- TCP/IP Network Administration
- TCP/IP Sockets in C: Practical Guide for Programmers
- TCP/IP Sockets in C#: Practical Guide for Programmers
- TCP/IP Sockets in Java: Practical Guide for Programmers
- Telecommunications and Data Communications Handbook
- Telecommunications Technologies Reference
- The Android Developer's Cookbook: Building Applications With the Android SDK
- The Android Developer's Cookbook: Building Applications With the Android SDK
- The Antivirus Hacker's Handbook
- The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers
- The Art of Memory Forensics: Detecting Malware and Threats in Windows, Linux, and Mac Memory
- The Basics of Hacking and Penetration Testing: Ethical Hacking and Penetration Testing Made Easy (Syngress Basics Series)
- The Basics of Information Security: Understanding the Fundamentals of InfoSec in Theory and Practice
- The Basics of Web Hacking: Tools and Techniques to Attack the Web
- The Book of GNS3
- The Browser Hacker's Handbook
- The Business of Android Apps Development: Making and Marketing Apps That Succeed
- The Busy Coder's Guide to Android Development, Version 1.0
- The CEH Prep Guide: The Comprehensive Guide to Certified Ethical Hacking
- The C# Programmer’s Study Guide (MCSD): Exam: 70-483
- The CS Detective: An Algorithmic Tale of Crime, Conspiracy, and Computation
- The C++ Standard Library: A Tutorial and Reference
- The Definitive Guide to HTML5 WebSocket
- The Linux Command Line: A Complete Introduction
- The Little Black Book of Computer Viruses: The Basic Technology
- The Official CHFI Exam 312-49 Study Guide: For Computer Hacking Forensics Investigators
- The Official (ISC)2 Guide to the CCSP CBK
- The Practice of Network Security Monitoring: Understanding Incident Detection and Response
- The Rootkit Arsenal: Escape and Evasion
- The State of the Art in Intrusion Prevention and Detection
- The TCP/IP Guide: A Comprehensive, Illustrated Internet Protocols Reference
- The Web Application Hacker's Handbook: Discovering and Exploiting Security Flaws
- The Web Application Hacker's Handbook: Finding and Exploiting Security Flaws
- Todd Lammle's CCNA/CCENT IOS Commands Survival Guide: Exams 100-101, 200-101, and 200-120
- Twitter Bootstrap Web Development
- Ubuntu Linux Toolbox: 1000+ Commands for Ubuntu and Debian Power Users
- Unauthorised Access: Physical Penetration Testing for IT Security Teams
- Understanding IPv6 (3rd Edition)
- Understanding IPv6, Second Edition 2nd Edition by Davies, Joseph (2008) Paperback
- Unix and Linux Forensic Analysis DVD Toolkit
- USB System Architecture
- Violent Python: A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers
- Web Application Development With Yii 2 and PHP
- Web Penetration Testing With Kali Linux
- Web Penetration Testing With Kali Linux - Second Edition
- Web Security: A WhiteHat Perspective
- Windows 7 Bible
- Windows 7 Tweaks: A Comprehensive Guide on Customizing, Increasing Performance, and Securing Microsoft Windows 7
- Windows Forensic Analysis: DVD Toolkit
- Windows Forensic Analysis DVD Toolkit 2E: DVD-ROM
- Windows Forensic Analysis Toolkit: Advanced Analysis Techniques for Windows 7
- Windows Internals
- Windows Internals
- Windows PowerShell 3.0 First Steps
- Windows PowerShell 3.0 Step by Step
- Windows Registry Forensics: Advanced Digital Forensic Analysis of the Windows Registry
- Windows Security Portable Reference
- Wireless and Mobile Network Security
- Wireshark Certified Network Analyst Exam Prep Guide (Second Edition)
- Wireshark Essentials
- Wireshark Starter
- Writing Security Tools and Exploits
- XSS Attacks: Cross-Site Scripting Exploits and Defense
- Yii Rapid Application Development Hotshot
Add Comment
Please, Sign In to add comment