Guest User

Untitled

a guest
Jan 18th, 2018
421
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 31.66 KB | None | 0 0
  1. 1,001 CCNA Routing and Switching Practice Questions for Dummies (+ Free Online Practice)
  2. 24 Deadly Sins of Software Security: Programming Flaws and How to Fix Them
  3. 25 Recipes for Getting Started With R
  4. 30 Arduino Projects for the Evil Genius, Second Edition
  5. 31 Days Before Your CCNA Security Exam: A Day-By-Day Review Guide for the IINS 210-260 Certification Exam
  6. A Bug Hunter's Diary: A Guided Tour Through the Wilds of Software Security
  7. Administering Windows Server 2012
  8. Advanced Android 4 Games
  9. Advanced Penetration Testing for Highly-Secured Environments - Second Edition
  10. Advanced Penetration Testing for Highly-Secured Environments: The Ultimate Security Guide
  11. Advanced Programming in the UNIX Environment
  12. Advanced Qt Programming: Creating Great Software With C++ and Qt 4
  13. Advanced Wireless Networks: Technology and Business Models
  14. Adventures in Raspberry Pi
  15. Agile Data
  16. Agile Oracle Application Express
  17. Agile Web Development With Rails 4
  18. A Guide to Kernel Exploitation: Attacking the Core
  19. Algorithms: Design and Analysis
  20. Amazing Android Apps for Dummies
  21. Android 3.0 Application Development Cookbook: Over 70 Working Recipes Covering Every Aspect of Android Development
  22. Android 6 for Programmers: An App-Driven Approach
  23. Android Application Development Cookbook - Second Edition
  24. Android Application Development for Dummies
  25. Android Apps for Absolute Beginners
  26. Android Apps for Absolute Beginners
  27. Android Essentials (Books for Professionals by Professionals)
  28. Android for Programmers: An App-Driven Approach
  29. Android for Work: Productivity for Professionals
  30. Android Hacker's Handbook
  31. Android: How to Program, Global Edition
  32. Android Recipes: A Problem-Solution Approach
  33. Android Security Cookbook
  34. Android Studio Application Development
  35. Android Studio New Media Fundamentals: Content Production of Digital Audio/Video, Illustration and 3D Animation
  36. Android Tablets Made Simple: For Motorola XOOM, Samsung Galaxy Tab, Asus, Toshiba and Other Tablets
  37. Android User Interface Development: Beginner's Guide
  38. Android User Interface Development: Beginner's Guide
  39. Android Wireless Application Development
  40. Android Wireless Application Development: Advanced Topics
  41. Anti-Hacker Tool Kit, Fourth Edition
  42. Application Security for the Android Platform: Processes, Permissions, and Other Safeguards
  43. Applied Cryptography: Protocols, Algorithms, and Source Code in C
  44. Applied Network Security Monitoring: Collection, Detection, and Analysis
  45. A Practical Guide to Linux Commands, Editors, and Shell Programming
  46. Arduino Adventures: Escape From Gemini Station
  47. Arduino and Kinect Projects: Design, Build, Blow Their Minds (Technology in Action)
  48. Arduino: A Quick-Start Guide
  49. Arduino Cookbook
  50. Arduino Cookbook Second Edition
  51. Arduino: curso práctico de formación
  52. Arduino Development Cookbook
  53. Arduino Internals (Technology in Action)
  54. Arduino Projects to Save the World
  55. Arduino Robotics
  56. Arduino Wearables
  57. Assessing Network Security
  58. BackTrack 5 Cookbook
  59. BackTrack 5 Wireless Penetration Testing Beginner's Guide
  60. Bash Pocket Reference
  61. Bash Pocket Reference
  62. BeagleBone Robotic Projects
  63. Beautiful Security: Leading Security Experts Explain How They Think
  64. Beginning Android
  65. Beginning Android
  66. Beginning Android 2
  67. Beginning Android 3
  68. Beginning Android 4
  69. Beginning Android 4 Games Development
  70. Beginning Android ADK With Arduino
  71. Beginning Android Application Development
  72. Beginning Android Games
  73. Beginning Android Games
  74. Beginning Android Tablet Games Programming
  75. Beginning Android Tablet Programming
  76. Beginning Arduino
  77. Beginning Arduino Programming
  78. Beginning C, 5th Edition
  79. Beginning C for Arduino: Learn C Programming for the Arduino
  80. Beginning HTML5 and CSS3: The Web Evolved
  81. Beginning iOS 3D Unreal Games Development
  82. Beginning iOS 5 Games Development: Using the iOS SDK for iPad, iPhone and iPod Touch
  83. Beginning IOS Game Development
  84. Beginning Perl
  85. Beginning Python
  86. Beginning Python Games Development, Second Edition: With PyGame
  87. Beginning SQL Server 2012 for Developers
  88. Beginning the Linux Command Line, Second Edition
  89. Beginning Visual C# 2012 Programming
  90. Beginning WebGL for HTML5
  91. Black Hat Python: Python Programming for Hackers and Pentesters
  92. Boost.Asio C++ Network Programming
  93. Botnets: The Killer Web App
  94. Buffer Overflow Attacks: Detect, Exploit, Prevent
  95. Building a Home Security System With Raspberry Pi
  96. Building Android Apps With HTML, CSS, and JavaScript
  97. Building Arduino Projects for the Internet of Things: Experiments With Real-World Applications
  98. Building Cloud Apps With Microsoft Azure: Best Practices for Devops, Data Storage, High Availability, and More
  99. Building Hypermedia APIs With HTML5 and Node
  100. Building Machine Learning Systems With Python
  101. Building Virtual Pentesting Labs for Advanced Penetration Testing
  102. Build Your Own Security Lab: A Field Guide for Network Testing
  103. Burp Suite Essentials
  104. C++ 14 Quick Syntax Reference
  105. CCENT/CCNA ICND1 100-105 Official Cert Guide
  106. CCIE Routing and Switching V5.0 Official Cert Guide
  107. CCNA: Cisco Certified Network Associate: Fast Pass
  108. CCNA Cisco Certified Network Associate Study Guide
  109. CCNA Cloud Cldadm 210-455 Official Cert Guide
  110. CCNA Collaboration CICD 210-060 Official Cert Guide
  111. CCNA Data Center DCICN 200-150 Official Cert Guide
  112. CCNA Data Center DCICT 200-155 Official Cert Guide
  113. CCNA Routing and Switching ICND2 200-105 Official Cert Guide
  114. CCNA Routing and Switching Review Guide: Exams 100-101, 200-101, and 200-120
  115. CCNA Routing and Switching Study Guide: Exams 100-101, 200-101, and 200-120
  116. CCNA Security 210-260 Official Cert Guide
  117. CCNA Security Study Guide: Exam 640-553
  118. CCNA Voice Study Guide: Exam 640-460
  119. CCNA Wireless 640-722 Official Cert Guide
  120. CCNP Route 642-902 Official Certification Guide
  121. CCNP Routing and Switching Route 300-101 Official Cert Guide
  122. CCNP Routing and Switching SWITCH 300-115 Official Cert Guide
  123. CCNP Routing and Switching TSHOOT 300-135 Official Cert Guide
  124. CCNP Security VPN 642-648 Official Cert Guide (2nd Edition) (Cert Guides)
  125. CCSP (ISC)2 Certified Cloud Security Professional Official Study Guide
  126. CEH Certified Ethical Hacker All-In-One Exam Guide, Second Edition
  127. CEH Certified Ethical Hacker Study Guide
  128. CEH: Official Certified Ethical Hacker Review Guide: Exam 312-50
  129. C in a Nutshell: The Definitive Reference
  130. C++ in One Hour a Day, Sams Teach Yourself
  131. Circuits and Systems for Security and Privacy
  132. CISA: Certified Information Systems Auditor Study Guide
  133. Cisco ASA: All-In-One Firewall, IPS, Anti-X, and VPN Adaptive Security Appliance
  134. Cisco CCENT/CCNA ICND1 100-101 Official Cert Guide, Academic Edition
  135. Cisco Secure Firewall Services Module (FWSM)
  136. CISSP All-In-One Exam Guide, Seventh Edition
  137. CISSP: Certified Information Systems Security Professional Study Guide
  138. CISSP ® : Certified Information Systems Security Professional Study Guide, Third Edition
  139. CISSP (ISC)2 Certified Information Systems Security Professional Official Study Guide
  140. Cloud Essentials: CompTIA Authorized Courseware for Exam CLO-001
  141. Coding for Penetration Testers: Building Better Tools
  142. CoffeeScript: Accelerated JavaScript Development
  143. CoffeeScript Programming With jQuery, Rails, and Node.js
  144. Cómo programar en JAVA
  145. Compiladores e intérpretes: teoría y práctica
  146. CompTIA A+ Complete Study Guide: Exams 220-801 and 220-802
  147. CompTIA CSA+ Study Guide: Exam CS0-001
  148. CompTIA IT Fundamentals Study Guide: Exam FC0-U51
  149. CompTIA Server+ Study Guide: Exam SK0-004
  150. Computer Forensics and Cyber Crime: An Introduction
  151. Computer Forensics: Hard Disk and Operating Systems
  152. Computer Forensics: Investigating Network Intrusions and Cyber Crime
  153. Computer Forensics: Investigating Wireless Networks and Devices
  154. Computer Forensics With Ftk
  155. Computer Security Handbook, Set
  156. Computer Viruses, Artificial Life, and Evolution
  157. Computer Viruses for Dummies
  158. Continuous Delivery: Reliable Software Releases Through Build, Test, and Deployment Automation
  159. Corporate Computer Security
  160. C# Programming Cookbook
  161. C++ Programming: Program Design Including Data Structures
  162. C Quick Syntax Reference
  163. Creating Google Chrome Extensions
  164. Creating HTML5 Animations With Flash and Wallaby
  165. Creating Mobile Apps With Xamarin.Forms Preview Edition 2
  166. C Recipes: A Problem-Solution Approach
  167. Cryptography and Data Security
  168. Cryptography and Network Security: Principles and Practice
  169. Cryptography in C and C++
  170. Cryptography in C and C++
  171. C++ Standard Library Quick Reference
  172. C ++ Windows Programming
  173. CWNA: Certified Wireless Network Administrator Official Study Guide: Exam PW0-105
  174. CWSP Certified Wireless Security Professional Official Study Guide: Exam PW0-204
  175. CWTS: Certified Wireless Technology Specialist Official Study Guide: Exam PW0-070
  176. Cyber Forensics: A Field Manual for Collecting, Examining, and Preserving Evidence of Computer Crimes
  177. Cyber Warfare: Techniques, Tactics and Tools for Security Practitioners
  178. Cyber Warfare: Techniques, Tactics and Tools for Security Practitioners
  179. Data Algorithms: Recipes for Scaling Up With Hadoop and Spark
  180. Data and Computer Communications
  181. Data Communications and Computer Networks: A Business User's Approach
  182. Data Hiding: Exposing Concealed Data in Multimedia, Operating Systems, Mobile Devices and Network Protocols
  183. Data Structures and Algorithms in C++
  184. Data Structures and Algorithms in C++
  185. Data Structures Using C
  186. Data Structures Using C++
  187. Defense Against the Black Arts: How Hackers Do What They Do and How to Protect Against It
  188. Designing BSD Rootkits: An Introduction to Kernel Hacking
  189. Developing Android Applications With Adobe AIR
  190. Developing Android Applications With Flex 4.5
  191. Digital Forensics for Network, Internet, and Cloud Computing: A Forensic Evidence Guide for Moving Targets and Data
  192. Digital Forensics With Open Source Tools
  193. Disaster Recovery
  194. Dissecting the Hack: The F0rb1dd3n Network
  195. Electrónica de potencia: convertidores, aplicaciones y diseño
  196. Electronic Troubleshooting, Fourth Edition
  197. EnCase Computer Forensics, Includes DVD: The Official EnCE: EnCase Certified Examiner Study Guide
  198. Encyclopedia of Electronic Components Volume 1: Resistors, Capacitors, Inductors, Switches, Encoders, Relays, Transistors
  199. Encyclopedia of Electronic Components Volume 2: LEDs, LCDs, Audio, Thyristors, Digital Logic, and Amplification
  200. Environmental Monitoring With Arduino: Building Simple Devices to Collect Data About the World Around Us
  201. Essential C# 6.0 (5th Edition) (Addison-Wesley Microsoft Technology)
  202. Essential SNMP
  203. Essential System Administration: Tools and Techniques for Linux and Unix Administration
  204. Estructuras de datos en C++
  205. Ethical Hacking and Countermeasures: Attack Phases
  206. Ethical Hacking and Countermeasures: Linux, Macintosh and Mobile Systems
  207. Ethical Hacking and Countermeasures: Secure Network Infrastructures
  208. Ethical Hacking and Countermeasures: Threats and Defense Mechanisms
  209. Ethical Hacking and Countermeasures: Web Applications and Data Servers
  210. Ethical Hacking and Penetration Testing Guide
  211. Excel Hacks: Tips & Tools for Streamlining Your Spreadsheets
  212. Expanding Your Raspberry Pi: Storage, Printing, Peripherals, and Network Connections for Your Raspberry Pi
  213. Experimenting With AVR Microcontrollers
  214. Expert Oracle Application Express Plugins: Building Reusable Components (Expert's Voice in Oracle)
  215. Expert Shell Scripting
  216. Exploring the Raspberry Pi 2 With C++
  217. Ext JS 3.0 Cookbook
  218. Ext JS 4 Web Application Development Cookbook
  219. Forensic Computer Crime Investigation (International Forensic Science and Investigation)
  220. Foundations of Python Network Programming: The Comprehensive Guide to Building Network Applications With Python
  221. Functional Programming in JavaScript
  222. Game Programming Using Qt
  223. Getting Started With Arduino
  224. Getting Started With Arduino: The Open Source Electronics Prototyping Platform (Make)
  225. Getting Started With Electronic Projects
  226. Getting Started With GEO, CouchDB, and Node.js
  227. Getting Started With Meteor JavaScript Framework
  228. Getting Started With .NET Gadgeteer
  229. Getting Started With Raspberry Pi
  230. Getting Started With RFID
  231. Getting Started With Roo
  232. Getting Started With RStudio
  233. Getting Started With Sensors: Measure the World With Electronics, Arduino, and Raspberry Pi
  234. Ghost in the Wires: My Adventures as the World's Most Wanted Hacker
  235. Git: Version Control for Everyone
  236. Google Hacking for Penetration Testers
  237. Google Hacking for Penetration Testers
  238. Google Hacking for Penetration Testers
  239. gran libro de HTML5, CSS3 y Javascript, El
  240. Gray Hat Hacking, Second Edition: The Ethical Hacker's Handbook
  241. Gray Hat Hacking the Ethical Hackers Handbook, 3rd Edition
  242. Gray Hat Python: Python Programming for Hackers and Reverse Engineers
  243. Group Policy: Fundamentals, Security, and the Managed Desktop
  244. Guide to Computer Forensics and Investigations
  245. Guitarra para dummies
  246. Hack Attacks Testing: How to Conduct Your Own Security Audit
  247. Hackers :: Heroes of the Computer Revolution. (Reloaded)
  248. Hacking, 2nd Edition: The Art of Exploitation
  249. Hacking and Penetration Testing With Low Power Devices
  250. Hacking and Securing iOS Applications: Stealing Data, Hijacking Software, and How to Prevent It
  251. Hacking a Terror Network: The Silent Threat of Covert Channels
  252. Hacking ético
  253. Hacking Exposed Computer Forensics, Second Edition: Computer Forensics Secrets & Solutions
  254. Hacking Exposed Linux: Linux Security Secrets and Solutions
  255. Hacking Exposed Mobile: Security Secrets & Solutions
  256. Hacking Exposed, Sixth Edition: Network Security Secrets& Solutions
  257. Hacking Exposed: Web Applications
  258. Hacking Exposed Web Applications, Third Edition
  259. Hacking Exposed Wireless: Wireless Security Secrets & Colutions
  260. Hacking Firefox: More Than 150 Hacks, Mods, and Customizations
  261. Hacking for Dummies
  262. Hacking for Dummies
  263. Hacking for Dummies
  264. Hacking GMail
  265. Hacking Google Maps and Google Earth
  266. Hacking GPS
  267. Hacking Point of Sale: Payment Application Secrets, Threats, and Solutions
  268. Hacking Politics: How Geeks, Progressives, the Tea Party, Gamers, Anarchists and Suits Teamed Up to Defeat SOPA and Save the Internet
  269. Hacking the Human: Social Engineering Techniques and Security Countermeasures
  270. Hacking: The Next Generation (Animal Guide)
  271. Hacking VoIP: Protocols, Attacks, and Countermeasures
  272. Hacking Wireless Networks for Dummies
  273. Hacking With Kali: Practical Penetration Testing Techniques
  274. Hacknotes Web Security Portable Reference
  275. Hack Proofing Sun Solaris 8
  276. Hack Proofing Your Ecommerce Site
  277. Hack Proofing Your Identity
  278. Hack Proofing Your Network
  279. Hack Proofing Your Network: Internet Tradecraft
  280. Hackproofing Your Wireless Network
  281. Hack the Stack
  282. Hands-On Programming With R: Write Your Own Functions and Simulations
  283. Hardening Cisco Routers
  284. Hello, Android: Introducing Google's Mobile Development Platform
  285. High Performance Computing and Applications: Third International Conference, HPCA 2015, Shanghai, China, July 26-30, 2015, Revised Selected Papers
  286. How Linux Works: What Every Superuser Should Know
  287. How to Cheat at Securing Linux
  288. HTML5 & CSS3 for the Real World
  289. HTML5 Boilerplate Web Development
  290. HTML5 Canvas
  291. HTML5 Cookbook
  292. HTML5 Developer's Cookbook
  293. HTML5 Games Development by Example: Beginner's Guide
  294. HTML5 Games Most Wanted: Build the Best HTML5 Games
  295. Html5 Mobile Development Cookbook
  296. HTML5: Up and Running
  297. HTML and CSS: Design and Build Websites
  298. Information Security: Principles and Practice
  299. Inside Cyber Warfare: Mapping the Cyber Underworld
  300. Instant Ember.JS Application Development: How-To
  301. Instant Galleria How-To
  302. Instant Kali Linux
  303. Instant Penetration Testing: Setting Up a Test Lab How-To
  304. Intellectual Property and Open Source: A Practical Guide to Protecting Code
  305. Interconnecting Cisco Network Devices, Part 1 (ICND1) Foundation Learning Guide
  306. Intermediate Perl
  307. Introducing Linux Distros
  308. Introducing Microsoft SQL Server 2014
  309. Introducing Microsoft System Center 2012 R2
  310. Introducing Windows 10 for IT Professionals, Preview Edition
  311. Introducing Windows 8.1 for IT Professionals
  312. Introducing Windows Azure for IT Professionals
  313. Introducing Windows Server 2012
  314. Introducing Windows Server 2012 R2
  315. Introducing Windows Server 2012 Rtm Edition
  316. Investigative Computer Forensics: The Practical Guide for Lawyers, Accountants, Investigators, and Business Executives
  317. IOS Sensor Apps With Arduino: Wiring the IPhone and IPad Into the Internet of Things
  318. IPad and IPhone Kung Fu: Tips, Tricks, Hints, and Hacks for IOS 7
  319. IPv6 Network Administration
  320. Java 9 Recipes: A Problem-Solution Approach
  321. Java Deep Learning Essentials
  322. Java EE Development With Eclipse - Second Edition
  323. JavaFX Developer's Guide
  324. JavaScript Cookbook
  325. JavaScript Enlightenment
  326. Juniper and Cisco Routing: Policy and Protocols for Multivendor IP Networks
  327. Kali Linux 2: Windows Penetration Testing
  328. Kali Linux: Assuring Security by Penetration Testing
  329. Kali Linux Cookbook
  330. Kali Linux CTF Blueprints
  331. Kali Linux Network Scanning Cookbook
  332. Kali Linux Social Engineering
  333. Kali Linux Web Penetration Testing Cookbook
  334. Kali Linux Wireless Penetration Testing Beginner's Guide
  335. Kali Linux Wireless Penetration Testing Essentials
  336. Killer Game Programming in Java
  337. Kinect Hacks
  338. Knoppix Hacks: Tips and Tools for Hacking, Repairing, and Enjoying Your PC
  339. Learn Electronics With Arduino
  340. Learning Android: Develop Mobile Apps Using Java and Eclipse
  341. Learning JavaScript Data Structures and Algorithms
  342. Learning Metasploit Exploitation and Development
  343. Learning Object-Oriented Programming
  344. Learning Pentesting for Android
  345. Learning Pentesting for Android Devices
  346. Learning Python
  347. Learning Reactive Programming With Java 8
  348. Learn Java for Android Development
  349. Learn PHP 7: Object Oriented Modular Programming Using HTML5, CSS3, JavaScript, XML, JSON, and MySQL
  350. Learn Python the Hard Way: A Very Simple Introduction to the Terrifyingly Beautiful World of Computers and Code
  351. Learn Raspberry Pi With Linux
  352. Lifehacker: 88 Tech Tricks to Turbocharge Your Day
  353. Linux Bible
  354. Linux Bible 2010 Edition: Boot Up to Ubuntu, Fedora, KNOPPIX, Debian, openSUSE, and 13 Other Distributions
  355. Linux Command Line and Shell Scripting Bible
  356. Linux Command Line and Shell Scripting Bible
  357. Linux Essentials
  358. Linux Kernel Development
  359. Linux Networking Cookbook
  360. Linux Shell Scripting Cookbook
  361. Linux Shell Scripting Cookbook, Second Edition
  362. Linux System Programming: Talking Directly to the Kernel and C Library
  363. Linux Utilities Cookbook
  364. Low-Level Programming: C, Assembly, and Program Execution on Intel® 64 Architecture
  365. LPIC-2: Linux Professional Institute Certification Study Guide: Exam 201 and Exam 202
  366. Machine Learning for Hackers
  367. Macintosh Terminal Pocket Guide
  368. Make a Mind-Controlled Arduino Robot: Use Your Brain as a Remote
  369. Make an Arduino-Controlled Robot
  370. Make: Arduino Bots and Gadgets: Six Embedded Projects With Open Source Hardware and Software
  371. Make: Electronics (Learning by Discovery)
  372. Making Android Accessories With IOIO
  373. Making Passwords Secure: Fixing the Weakest Link in Cybersecurity
  374. Malicious Bots: An Inside Look Into the Cyber-Criminal Underground of the Internet
  375. Malicious Cryptography: Exposing Cryptovirology
  376. Malware Forensics Field Guide for Linux Systems
  377. Manage Partitions With Gparted (How-To)
  378. Managing Agile Open-Source Software Projects With Visual Studio Online
  379. Mastering JavaScript Design Patterns - Essential Solutions for Effective JavaScript Web Design
  380. Mastering Kali Linux for Advanced Penetration Testing
  381. Mastering Kali Linux Wireless Pentesting
  382. Mastering Linux Network Administration
  383. Mastering Linux Shell Scripting
  384. Mastering Media With the Raspberry Pi: Media Centers, Music, High End Audio, Video, and Ultimate Movie Nights
  385. Mastering Metasploit
  386. Mastering Metasploit - Second Edition
  387. Mastering Python Regular Expressions
  388. Mastering the Nmap Scripting Engine
  389. Mastering Windows 8 C++ App Development
  390. Mastering Wireless Penetration Testing for Highly Secured Environments
  391. MATLAB Deep Learning: With Machine Learning, Neural Networks and Artificial Intelligence
  392. Matplotlib for Python Developers: Build Remarkable Publication Quality Plots the Easy Way
  393. MCSA Microsoft Windows 10 Study Guide: Exam 70-697
  394. MCSA Windows Server 2012 R2 Installation and Configuration Study Guide: Exam 70-410
  395. Metasploit Penetration Testing Cookbook
  396. Metasploit Penetration Testing Cookbook: Second Edition
  397. Metasploit: The Penetration Tester's Guide
  398. Metasploit Toolkit for Penetration Testing, Exploit Development, and Vulnerability Research
  399. Microsoft Access 2013 Step by Step
  400. Microsoft Azure Essentials Azure Automation
  401. Microsoft Azure Essentials Azure Machine Learning
  402. Microsoft Azure Essentials Azure Web Apps for Developers
  403. Microsoft Azure Essentials - Fundamentals of Azure
  404. Microsoft SQL Server 2008: A Beginner's Guide
  405. Microsoft System Center Building a Virtualized Network Solution
  406. Microsoft System Center: Cloud Management With App Controller
  407. Microsoft System Center: Configuration Manager Field Experience
  408. Microsoft System Center Data Protection for the Hybrid Cloud
  409. Microsoft System Center Deploying Hyper-V With Software-Defined Storage & Networking
  410. Microsoft System Center Designing Orchestrator Runbooks (Introducing)
  411. Microsoft System Center Extending Operations Manager Reporting
  412. Microsoft System Center Integrated Cloud Platform (Introducing)
  413. Microsoft System Center Introduction to Microsoft Automation Solutions
  414. Microsoft System Center Network Virtualization and Cloud Computing
  415. Microsoft System Center Operations Manager Field Experience
  416. Microsoft System Center: Optimizing Service Manager
  417. Microsoft System Center Software Update Management Field Experience
  418. Microsoft System Center: Troubleshooting Configuration Manager
  419. MIMO-OFDM for LTE, WiFi and WiMAX: Coherent Versus Non-Coherent and Cooperative Turbo Transceivers (Wiley - IEEE)
  420. MintDuino: Building an Arduino-Compatible Breadboard Microcontroller
  421. Modulation and Coding Techniques in Wireless Communications
  422. More iOS 6 Development: Further Explorations of the iOS SDK
  423. MOS 2013 Study Guide for Microsoft Access
  424. Multimobile Development: Building Applications for the IPhone and Android
  425. Murach's SQL Server 2012 for Developers
  426. Netcat Power Tools
  427. Netcat Starter Guide
  428. Network Analysis Using Wireshark Cookbook
  429. Network and System Security
  430. Network Defense: Perimeter Defense Mechanisms
  431. Network Forensics: Tracking Hackers Through Cyberspace
  432. Network Safety
  433. Network Security Assessment: Know Your Network
  434. Network Security Essentials: Applications and Standards, International Edition: Applications and Standards
  435. Network Security Foundations: Technology Fundamentals for IT Success
  436. Network Security Hacks
  437. Network Security Portable Reference
  438. Network Security Through Data Analysis: Building Situational Awareness
  439. Network Warrior
  440. Next-Generation Firewalls for Dummies
  441. Ninja Hacking: Unconventional Penetration Testing Tactics and Techniques
  442. Nmap 6: Network Exploration and Security Auditing Cookbook
  443. Nmap Cookbook: The Fat-Free Guide to Network Scanning
  444. Nmap in the Enterprise: Your Guide to Network Scanning
  445. Node.js for PHP Developers
  446. Object-Oriented JavaScript
  447. Official (ISC)2® Guide to the CISSP®-ISSMP® CBK®, Second Edition
  448. Ogre 3D 1.7 Application Development Cookbook
  449. Oracle Application Express 4.0 With Ext Js
  450. Oracle Application Express 4 Recipes
  451. OSPF: A Network Routing Protocol
  452. Penetration Testing: A Hands-On Introduction to Hacking
  453. Penetration Testing Basics: A Quick-Start Guide to Breaking Into Systems
  454. Penetration Testing: Communication Media Testing
  455. Penetration Testing: Procedures & Methodologies
  456. Penetration Testing With BackBox
  457. Penetration Testing With Raspberry Pi
  458. Penetration Testing With the Bash Shell
  459. Phonegap 2 Mobile Application Development Hotshot
  460. PowerShell 3. 0 Advanced Administration Handbook
  461. PowerShell Deep Dives
  462. Powershell in Depth
  463. PowerShell in Depth: An Administrator's Guide
  464. Practical Android 4 Games Development
  465. Practical Android Projects
  466. Practical Arduino: Cool Projects for Open Source Hardware
  467. Practical Arduino Engineering
  468. Practical AVR Microcontrollers: Games, Gadgets, and Home Automation With the Microcontroller Used in the Arduino
  469. Practical Lock Picking: A Physical Penetration Tester's Training Guide
  470. Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software
  471. Practical Reverse Engineering: X86, X64, ARM, Windows Kernel, Reversing Tools, and Obfuscation
  472. Pro Access 2010 Development
  473. Pro Android
  474. Pro Android 2
  475. Pro Android 3
  476. Pro Android Flash
  477. Pro Android Games
  478. Pro Android Media: Developing Graphics, Music, Video, and Rich Media Apps for Smartphones and Tablets
  479. Pro Android Python With SL4A
  480. Pro Android Wearables: Building Apps for Smartwatches
  481. Pro Android Web Apps: Develop for Android Using HTML5, CSS3 & JavaScript
  482. Pro Bash Programming: Scripting the Linux Shell
  483. Problem Solving and Program Design in C, Global Edition
  484. Procedural Content Generation for C++ Game Development
  485. Professional Android 2 Application Development
  486. Professional Android 4 Application Development
  487. Professional Android Application Development
  488. Professional Android Open Accessory Programming With Arduino
  489. Professional Flash Mobile Development: Creating Android and iPhone Applications
  490. Professional Node.js: Building Javascript Based Scalable Software
  491. Professional Penetration Testing: Creating and Operating a Formal Hacking Lab
  492. Professional Python Frameworks: Web 2.0 Programming With Django and Turbogears (Programmer to Programmer)
  493. Pro Git
  494. PROGRAMACION Y RESOLUCION DE PROBLEMAS CON C++
  495. Programmable Logic Controllers: A Practical Approach to IEC 61131-3 Using CoDeSys
  496. Programming Android
  497. Programming Android
  498. Programming Clojure
  499. Programming in C
  500. Programming Interactivity
  501. Programming Linux Hacker Tools Uncovered: Exploits, Backdoors, Scanners, Sniffers, Brute-Forcers, Rootkits
  502. Programming Projects in C for Students of Engineering, Science, and Mathematics
  503. Programming Python
  504. Programming Windows Store Apps With HTML, CSS, and JavaScript (Developer Reference)
  505. Programming With ANSI C++
  506. Programming Your Home: Automate With Arduino, Android, and Your Computer
  507. Pro HTML5 and CSS3 Design Patterns
  508. Pro HTML5 Games
  509. Pro HTML5 Performance (Expert's Voice in Web Development)
  510. Pro Java 8 Games Development
  511. Pro OpenGL ES for Android
  512. Pro Oracle Application Express 4
  513. Pro PowerShell for Microsoft Azure
  514. Pro Smartphone Cross-Platform Development: iPhone, Blackberry, Windows Mobile and Android Development and Distribution
  515. Pro SQL Server 2012 Relational Database Design and Implementation
  516. Python for Data Analysis: Data Wrangling With Pandas, NumPy, and IPython
  517. Python for Kids: A Playful Introduction to Programming
  518. Python for Secret Agents
  519. Python for Unix and Linux System Administration
  520. Python Geospatial Analysis Cookbook
  521. Python GUI Programming Cookbook
  522. Python Network Programming Cookbook
  523. Python Parallel Programming Cookbook
  524. Python Penetration Testing Essentials
  525. Qt5 C++ GUI Programming Cookbook
  526. Raspberry Pi: A Quick-Start Guide
  527. Raspberry Pi Blueprints
  528. Raspberry Pi Computer Architecture Essentials
  529. Raspberry Pi Computer Vision Programming
  530. Raspberry Pi Cookbook
  531. Raspberry Pi Cookbook for Python Programmers
  532. Raspberry Pi for Secret Agents
  533. Raspberry Pi for Secret Agents - Second Edition
  534. Raspberry Pi Gaming Second Edition
  535. Raspberry Pi Home Automation With Arduino
  536. Raspberry Pi IoT Projects: Prototyping Experiments for Makers
  537. Raspberry Pi LED Blueprints
  538. Raspberry Pi Networking Cookbook
  539. Raspberry Pi Robotic Projects
  540. Raspberry Pi Robotics Projects - Second Edition
  541. R Cookbook
  542. Red Hat Linux Certification Study Guide, (Exams EX200 & EX300)
  543. Red Hat Linux Networking and System Administration
  544. Red Hat Linux Pocket Administrator
  545. Red Hat Rhce/Rhcsa 7 Cert Guide: Red Hat Enterprise Linux 7 (Ex200 and Ex300)
  546. Rethinking Enterprise Storage: A Hybrid Cloud Model
  547. Reversing: Secrets of Reverse Engineering
  548. Rootkits for Dummies
  549. Rtfm: Red Team Field Manual
  550. Secrets of Network Cartography: A Comprehensive Guide to nmap
  551. Securing VoIP Networks: Threats, Vulnerabilities, and Countermeasures
  552. Security Power Tools
  553. Seguridad informática
  554. Seven Deadliest Network Attacks
  555. Seven Deadliest USB Attacks (Seven Deadliest Attacks)
  556. Simple Steps to Data Encryption: A Practical Guide to Secure Computing
  557. Sistemas digitales: principios y aplicaciones
  558. Smart Home Automation With Linux
  559. Snort Intrusion Detection and Prevention Toolkit
  560. Software Engineering: A Methodical Approach
  561. Software Testing: Concepts and Operations
  562. SQL for Dummies
  563. SQL Injection Attacks and Defense
  564. SSCP (ISC)2 Systems Security Certified Practitioner Official Study Guide
  565. SSCP Systems Security Certified Practitioner All-In-One Exam Guide, Second Edition
  566. Starting Out With Python
  567. Stealing the Network: How to Own an Identity
  568. TCP/IP Illustrated
  569. TCP/IP Network Administration
  570. TCP/IP Sockets in C: Practical Guide for Programmers
  571. TCP/IP Sockets in C#: Practical Guide for Programmers
  572. TCP/IP Sockets in Java: Practical Guide for Programmers
  573. Telecommunications and Data Communications Handbook
  574. Telecommunications Technologies Reference
  575. The Android Developer's Cookbook: Building Applications With the Android SDK
  576. The Android Developer's Cookbook: Building Applications With the Android SDK
  577. The Antivirus Hacker's Handbook
  578. The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers
  579. The Art of Memory Forensics: Detecting Malware and Threats in Windows, Linux, and Mac Memory
  580. The Basics of Hacking and Penetration Testing: Ethical Hacking and Penetration Testing Made Easy (Syngress Basics Series)
  581. The Basics of Information Security: Understanding the Fundamentals of InfoSec in Theory and Practice
  582. The Basics of Web Hacking: Tools and Techniques to Attack the Web
  583. The Book of GNS3
  584. The Browser Hacker's Handbook
  585. The Business of Android Apps Development: Making and Marketing Apps That Succeed
  586. The Busy Coder's Guide to Android Development, Version 1.0
  587. The CEH Prep Guide: The Comprehensive Guide to Certified Ethical Hacking
  588. The C# Programmer’s Study Guide (MCSD): Exam: 70-483
  589. The CS Detective: An Algorithmic Tale of Crime, Conspiracy, and Computation
  590. The C++ Standard Library: A Tutorial and Reference
  591. The Definitive Guide to HTML5 WebSocket
  592. The Linux Command Line: A Complete Introduction
  593. The Little Black Book of Computer Viruses: The Basic Technology
  594. The Official CHFI Exam 312-49 Study Guide: For Computer Hacking Forensics Investigators
  595. The Official (ISC)2 Guide to the CCSP CBK
  596. The Practice of Network Security Monitoring: Understanding Incident Detection and Response
  597. The Rootkit Arsenal: Escape and Evasion
  598. The State of the Art in Intrusion Prevention and Detection
  599. The TCP/IP Guide: A Comprehensive, Illustrated Internet Protocols Reference
  600. The Web Application Hacker's Handbook: Discovering and Exploiting Security Flaws
  601. The Web Application Hacker's Handbook: Finding and Exploiting Security Flaws
  602. Todd Lammle's CCNA/CCENT IOS Commands Survival Guide: Exams 100-101, 200-101, and 200-120
  603. Twitter Bootstrap Web Development
  604. Ubuntu Linux Toolbox: 1000+ Commands for Ubuntu and Debian Power Users
  605. Unauthorised Access: Physical Penetration Testing for IT Security Teams
  606. Understanding IPv6 (3rd Edition)
  607. Understanding IPv6, Second Edition 2nd Edition by Davies, Joseph (2008) Paperback
  608. Unix and Linux Forensic Analysis DVD Toolkit
  609. USB System Architecture
  610. Violent Python: A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers
  611. Web Application Development With Yii 2 and PHP
  612. Web Penetration Testing With Kali Linux
  613. Web Penetration Testing With Kali Linux - Second Edition
  614. Web Security: A WhiteHat Perspective
  615. Windows 7 Bible
  616. Windows 7 Tweaks: A Comprehensive Guide on Customizing, Increasing Performance, and Securing Microsoft Windows 7
  617. Windows Forensic Analysis: DVD Toolkit
  618. Windows Forensic Analysis DVD Toolkit 2E: DVD-ROM
  619. Windows Forensic Analysis Toolkit: Advanced Analysis Techniques for Windows 7
  620. Windows Internals
  621. Windows Internals
  622. Windows PowerShell 3.0 First Steps
  623. Windows PowerShell 3.0 Step by Step
  624. Windows Registry Forensics: Advanced Digital Forensic Analysis of the Windows Registry
  625. Windows Security Portable Reference
  626. Wireless and Mobile Network Security
  627. Wireshark Certified Network Analyst Exam Prep Guide (Second Edition)
  628. Wireshark Essentials
  629. Wireshark Starter
  630. Writing Security Tools and Exploits
  631. XSS Attacks: Cross-Site Scripting Exploits and Defense
  632. Yii Rapid Application Development Hotshot
Add Comment
Please, Sign In to add comment