banner

[Rule] Rules  [Home] Main Forum  [Portal] Portal  
[Members] Member Listing  [Statistics] Statistics  [Search] Search  [Reading Room] Reading Room 
[Register] Register  
[Login] Loginhttp  | https  ]
 
Messages posted by: tieuvinhlong  XML
Profile for tieuvinhlong Messages posted by tieuvinhlong [ number of posts not being displayed on this page: 0 ]
 
Torrent:
https://www.mediafire.com/?3t4m2i4an8b7dil
http://bitvn.org/details.php?id=5665&hit=1


  1. 101 Spy Gadgets for the Evil Genius.pdf
  2. 1337 h4x0r h4ndb00k.chm
  3. 19 Deadly Sins of Software Security - Programming Flaws & How to Fix Them.chm
  4. 22 Radio & Receiver Projects for the Evil Genius.pdf
  5. 50 Awesome Auto Projects for the Evil Genius.pdf
  6. 51 High-Tech Practical Jokes for the Evil Genius.pdf
  7. 802.11 Security.pdf
  8. A Classical Introduction to Cryptography Exercise Book.pdf
  9. A Technical Guide to IPSec Virtual Private Networks.pdf
  10. A , Network , Security Exams in a Nutshell - A Desktop Quick Reference.pdf
  11. AAA & Network Security for Mobile Access - Radius, Diameter, EAP, PKI, & IP Mobility.pdf
  12. Absolute OpenBSD - UNIX for the Practical Paranoid.chm
  13. Access Denied - The Practice & Policy of Global Internet Filtering.pdf
  14. Active Defense - A Comprehensive Guide to Network Security.pdf
  15. Administering & Securing the Apache Server.chm
  16. Advanced CISSP Prep Guide - Exam Q&A.chm
  17. Advances in Elliptic Curve Cryptography.pdf
  18. Advances in Enterprise Information Technology Security.pdf
  19. Advances in Network & Distributed Systems Security.pdf
  20. Aggressive Network Self-Defense.pdf
  21. Ajax Security.pdf
  22. Anti-Hacker Tool Kit, 2nd Ed..chm
  23. Anti-Hacker Tool Kit, 3rd Ed..chm
  24. Apache Security.chm
  25. Applied Cryptanalysis - Breaking Ciphers in the Real World.pdf
  26. Applied Cryptography & Network Security - 2nd International Conference, ACNS 2004.pdf
  27. Applied Cryptography - Protocols, Algorithms, & Source COde in C, 2nd Ed..chm
  28. Applied Security Visualization.pdf
  29. Auditor's Guide to Information Systems Auditing.pdf
  30. AVIEN Malware Defense Guide for the Enterprise.pdf
  31. Beginning Cryptography with Java.chm
  32. BigNum Math - Implementing Cryptographic Multiple Precision Arithmetic.pdf
  33. Biometrics & Network Security.chm
  34. Black Hat Physical Device Security - Exploiting Hardware & Software.pdf
  35. Blackjacking - Security Threats to BlackBerry Devices, PDAs, & Cell Phones in the Enterprise.pdf
  36. Bluetooth Security.pdf
  37. Botnet Detection - Countering the Largest Security Threat.pdf
  38. Botnets - The Killer Web App.pdf
  39. Brute Force - Cracking the Data Encryption Standard.pdf
  40. Buffer Overflow Attacks - Detect, Exploit, Prevent.pdf
  41. Building an Effective Information Security Policy Architecture.pdf
  42. Building DMZs for Enterprise Networks.pdf
  43. Building Internet Firewalls, 2nd Ed..pdf
  44. Building Secure Servers with Linux.chm
  45. Building Secure Servers with Linux.pdf
  46. Building Secure Wireless Networks with 802.11.pdf
  47. Bulletproof Wireless Security - GSM, UMTS, 802.11, & Ad Hoc Security.pdf
  48. CCNA Security Official Exam Certification Guide [Exam 640-553] .pdf
  49. CCSP Cisco Secure PIX Firewall Advanced Exam Certification Guide.pdf
  50. CD & DVD Forensics.pdf
  51. CD Cracking Uncovered - Protection Against Unsanctioned CD Copying.chm
  52. CEH - Official Certified Ethical Hacker Review Guide [Exam 312-50] .pdf
  53. CEH Official Certified Ethical Hacker Review Guide.pdf
  54. Certified Ethical Hacker Exam Prep [Exam 312-50] .chm
  55. Certified Ethical Hacking Official Course Material [Exam 312-50] .chm
  56. Cisco ASA, PIX, & FWSM Firewall Handbook, 2nd Ed..pdf
  57. Cisco IOS Access Lists.pdf
  58. Cisco NAC Appliance - Enforcing Host Security with Clean Access.pdf
  59. Cisco Network Security Little Black Book.pdf
  60. Cisco Router Firewall Security.chm
  61. Cisco Secure Firewall Services Module (FWSM).pdf
  62. Cisco Secure Internet Security Solutions.pdf
  63. Cisco Security Agent.chm
  64. Cisco Security Professional's Guide to Secure Intrusion Detection Systems.pdf
  65. Cisco Wireless LAN Security.chm
  66. CISSP - Certified Information Systems Security Professional Study Guide, 3rd Ed..pdf
  67. CISSP - Certified Information Systems Security Professional Study Guide, 4th Ed..pdf
  68. CISSP Certification All-in-One Exam Guide, 4th Ed..pdf
  69. CISSP for Dummies, 2nd Ed..chm
  70. Codes & Ciphers - Julius Caesar, the Enigma, & the Internet.pdf
  71. Codes - The Guide to Secrecy from Ancient to Modern Times.pdf
  72. Combating Spyware in the Enterprise.pdf
  73. Complete Guide to CISM Certification.pdf
  74. Complexity & Cryptography - An Introduction.pdf
  75. CompTIA A Exam Prep [Exams A Essentials, 220-602, 220-603, & 220-604] .chm
  76. CompTIA Security Study Guide & Practice Exam, 2nd Ed. [Exam JK0-010] .pdf
  77. Computer & Intrusion Forensics.pdf
  78. Computer Network Security.pdf
  79. Computer Security & Cryptography.pdf
  80. Computer Security Basics, 2nd Ed..chm
  81. Computer Security, Privacy, & Politics - Current Issues, Challenges, & Solutions.pdf
  82. Computer Viruses & Malware.pdf
  83. Computer Viruses - From Theory to Applications.pdf
  84. Computer Viruses for Dummies.pdf
  85. Configuring Juniper Networks NetScreen & SSG Firewalls.pdf
  86. Configuring NetScreen Firewalls.pdf
  87. Configuring SonicWALL Firewalls.pdf
  88. Contemporary Cryptography.pdf
  89. Core Security Patterns - Best Practices & Strategies for J2EE, Web Services, & Identity Management.chm
  90. Covert Java - Techniques for Decompiling, Patching, & Reverse Engineering.pdf
  91. Crackproof Your Software - Protect Your Software Against Crackers.pdf
  92. Crimeware - Understanding New Attacks & Defenses.chm
  93. Critical Incident Management.chm
  94. Cryptography & Network Security, 4th Ed..chm
  95. Cryptography & Security Services - Mechanisms & Applications.pdf
  96. Cryptography - A Very Short Introduction.chm
  97. Cryptography for Developers.pdf
  98. Cryptography for Dummies.chm
  99. Cryptography in C & C .chm
  100. Cryptology Unlocked.pdf
  101. Cyber Crime Investigator's Field Guide.pdf
  102. Cyber Forensics - A Field Manual for Collecting, Examining, & Preserving Evidence of Computer Crimes.pdf
  103. Cyber Spying - Tracking Your Family's (Sometimes) Secret Online Lives.pdf
  104. Cyber Warfare & Cyber Terrorism.pdf
  105. Decrypted Secrets - Methods & Maxims of Cryptology, 4th, Revised & Extended Ed..pdf
  106. Defend I.T. - Security by Example.chm
  107. Defense & Detection Strategies against Internet Worms.pdf
  108. Deploying Secure 802.11 Wireless Networks with Microsoft Windows.chm
  109. Designing BSD Rootkits - An Introduction to Kernel Hacking.pdf
  110. Developer's Guide to Web Application Security.pdf
  111. Digital Evidence & Computer Crime - Forensic Science, Computers, & the Internet, 2nd Ed..chm
  112. Disassembling Code - IDA Pro & SoftICE.chm
  113. Effective Oracle Database 10g Security by Design.chm
  114. Electronic Gadgets for the Evil Genius - 28 Build-It-Yourself Projects.pdf
  115. EnCase Computer Forensics - The Official EnCE-EnCase Certified Examiner Study Guide, 2nd Ed..pdf
  116. Encyclopedia of Cryptology.chm
  117. End-to-End Network Security - Defense-in-Depth.pdf
  118. Enemy at the Water Cooler - Real-Life Stories of Insider Threats & Enterprise Security Management Countermeasures.pdf
  119. Enterprise Information Systems Assurance & System Security - Managerial & Technical Issues.pdf
  120. Enterprise Java Security - Building Secure J2EE Applications.chm
  121. Essential Computer Security - Everyone's Guide to Email, Internet, & Wireless Security.pdf
  122. Essential PHP Security.chm
  123. Ethereal Packet Sniffing.chm
  124. Expert Web Services Security in the .NET Platform.chm
  125. Exploiting Software - How to Break Code.pdf
  126. Fast Track to Security.pdf
  127. File System Forensic Analysis.chm
  128. Firewall Fundamentals.chm
  129. Firewall Policies & VPN Configurations.pdf
  130. Firewalls & Internet Security - Repelling the Wily Hacker, 2nd Ed..pdf
  131. Firewalls - Jumpstart for Network & Systems Administrators.pdf
  132. Firewalls for Dummies, 2nd Ed..pdf
  133. Forensic Computer Crime Investigation.pdf
  134. Forensic Computing - A Practitioner's Guide, 2nd Ed..pdf
  135. Foundations of Computer Security.pdf
  136. Foundations of Cryptography - A Primer.pdf
  137. Foundations of Cryptography - Vol. 1, Basic Tools.pdf
  138. Foundations of Mac OS X Leopard Security.pdf
  139. Foundations of Security - What Every Programmer Needs to Know.pdf
  140. Fundamentals of Cryptology - A Professional Reference & Interactive Tutorial.pdf
  141. Fuzzing - Brute Force Vulnerability Discovery.pdf
  142. Google Hacking for Penetration Testers, Vol. 2.pdf
  143. Google Hacking for Penetration Testers.pdf
  144. Gray Hat Hacking - The Ethical Hacker's Handbook, 2nd Ed..pdf
  145. Grid Computing Security.pdf
  146. Guide to Elliptic Curve Cryptography.pdf
  147. Hack Attacks Revealed - A Complete Reference with Custom Security Hacking Toolkit.chm
  148. Hack I.T. - Security through Penetration Testing.chm
  149. Hack Proofing ColdFusion - The Only Way to Stop a Hacker Is to Think Like One.pdf
  150. Hack Proofing Linux - Your Guide to Open Source Security.pdf
  151. Hack Proofing Sun Solaris 8 - Protect Your Solaris Network from Attack.pdf
  152. Hack Proofing Windows 2000 Server.pdf
  153. Hack Proofing XML - The Only Way to Stop a Hacker Is to Think Like One.pdf
  154. Hack Proofing Your E-Commerce Site - The Only Way to Stop a Hacker Is to Think Like One.pdf
  155. Hack Proofing Your Identity in the Information Age - Protect Your Family on the Internet!.pdf
  156. Hack Proofing Your Network, 2nd Ed. - The Only Way to Stop a Hacker Is to Think Like One.pdf
  157. Hack Proofing Your Network.pdf
  158. Hack Proofing Your Web Applications - The Only Way to Stop a Hacker Is to Think Like One.pdf
  159. Hack Proofing Your Wireless Network - Protect Your Wireless Network from Attack.pdf
  160. Hack the Stack - Using Snort & Ethereal to Master the 8 Layers of an Insecure Network.pdf
  161. Hacker Debugging Uncovered.chm
  162. Hacker Disassembling Uncovered.chm
  163. Hacker Linux Uncovered.chm
  164. Hacker Web Exploitation Uncovered.chm
  165. Hacker's Challenge - Test Your Incident Response Skills Using 20 Scenarios.pdf
  166. Hacker's Delight.chm
  167. Hackers - Heroes of the Computer Revolution.pdf
  168. Hackers Beware - Defending Your Network from the Wiley Hacker.pdf
  169. Hacking - The Art of Exploitation, 2nd Ed..chm
  170. Hacking - The Art of Exploitation.chm
  171. Hacking a Terror Network - The Silent Threat of Covert Channels.pdf
  172. Hacking Exposed, 2nd Ed. - Network Security Secrets & Solutions.pdf
  173. Hacking Exposed-Cisco Networks - Cisco Security Secrets & Solutions.chm
  174. Hacking Exposed-Linux - Linux Security Secrets & Solutions, 3rd Ed..pdf
  175. Hacking Exposed-Linux - Linux Security Secrets & Solutions.pdf
  176. Hacking Exposed-Network Security - Secrets & Solutions, 2nd Ed..pdf
  177. Hacking Exposed-Network Security - Secrets & Solutions, 3rd Ed..pdf
  178. Hacking Exposed-VoIP - Voice Over IP Security Secrets & Solutions.chm
  179. Hacking Exposed-Web 2.0 - Web 2.0 Security Secrets & Solutions.pdf
  180. Hacking Exposed-Web Applications - Web Application Security Secrets & Solutions.pdf
  181. Hacking Exposed-Windows - Windows Security Secrets & Solutions, 3rd Ed..pdf
  182. Hacking Exposed-Wireless - Wireless Security Secrets & Solutions.chm
  183. Hacking for Dummies, 2nd Ed..pdf
  184. Hacking for Dummies.pdf
  185. Hacking the Cable Modem - What Cable Companies Don't Want You to Know.pdf
  186. Hacking Wireless Networks for Dummies.pdf
  187. HackNotes - Linux & Unix Security Portable Reference.pdf
  188. HackNotes - Network Security Portable Reference.pdf
  189. HackNotes - Web Security Portable Reference.pdf
  190. HackNotes - Windows Security Portable Reference.pdf
  191. Halting the Hacker - A Practical Guide to Computer Security, 2nd Ed..chm
  192. Handbook of Database Security - Applications & Trends.pdf
  193. Handbook of Digital & Multimedia Forensic Evidence.pdf
  194. Handbook of Research on Wireless Security.pdf
  195. Hardening Apache.chm
  196. Hardening Linux.chm
  197. Hardening Linux.pdf
  198. Hardening Network Infrastructure.chm
  199. Hardening Windows Systems.chm
  200. Hardening Windows, 2nd Ed..pdf
  201. Hardening Windows.chm
  202. High-Assurance Design - Architecting Secure & Reliable Enterprise Applications.chm
  203. Home Network Security Simplified.chm
  204. Honeypots - Tracking Hackers.chm
  205. Honeypots for Windows.chm
  206. How to Cheat at Configuring Open Source Security Tools - The Perfect Reference for the Multitasked SysAdmin.pdf
  207. How to Cheat at Deploying & Securing RFID.pdf
  208. How to Cheat at Designing Security for a Windows Server 2003 Network.pdf
  209. How to Cheat at Managing Information Security.pdf
  210. How to Cheat at Securing a Wireless Network.pdf
  211. How to Cheat at Securing Linux - The Perfect Reference for the Multitasked SysAdmin.pdf
  212. How to Cheat at VolP Security.pdf
  213. How to Cheat at Windows System Administration Using Command Line Scripts.pdf
  214. IM Instant Messaging Security.pdf
  215. Implementing Email Security & Tokens - Current Standards, Tools, & Practices.pdf
  216. Implementing NAP & NAC Security Technologies - The Complete Guide to Network Access Control.pdf
  217. Implementing SSH - Strategies for Optimizing the Secure Shell.pdf
  218. Incident Response & Computer Forensics, 2nd Ed..pdf
  219. Incident Response - A Strategic Guide to Handling System & Network Security Breaches.chm
  220. Incident Response - Computer Forensics Toolkit.pdf
  221. Information Security - Principles & Practice.pdf
  222. Information Security Management Handbook, 5th Ed..pdf
  223. Information Security Policies & Actions in Modern Integrated Systems.chm
  224. Information Security Policies & Procedures - A Practitioner's Reference, 2nd Ed..pdf
  225. Information Technology Security - Advice from Experts.chm
  226. InfoSec Career Hacking - Sell Your Skillz, Not Your Soul.pdf
  227. InfoSecurity 2008 Threat Analysis.pdf
  228. Inside Java 2 Platform Security, 2nd Ed. - Architecture, API Design, & Implementation.chm
  229. Inside Network Perimeter Security, 2nd Ed..chm
  230. Inside the Spam Cartel - Trade Secrets from the Dark Side.chm
  231. Insider Attack & Cyber Security - Beyond the Hacker.pdf
  232. Insider Threat - Protecting the Enterprise from Sabotage, Spying, & Theft.pdf
  233. Internet & Intranet Security Management - Risks & Solutions.pdf
  234. Internet & Intranet Security.chm
  235. Internet Denial of Service - Attack & Defense Mechanisms.chm
  236. Internet Forensics.chm
  237. Internet Security - A Jumpstart for Systems Administrators & IT Managers.chm
  238. Internet Security - Cryptographic Principles, Algorithms, & Protocols.pdf
  239. Introduction to Communication Electronic Warfare Systems.pdf
  240. Introduction to Cryptography - Principles & Applications, 2nd Ed..pdf
  241. Intrusion Detection & Prevention.chm
  242. Intrusion Prevention & Active Response - Deploying Network & Host IPS.pdf
  243. Intrusion Prevention Fundamentals.chm
  244. Investigating Computer-Related Crime - A Handbook for Corporate Investigators.pdf
  245. Investigative Data Mining for Security & Criminal Detection.chm
  246. IPSec - The New Security Standard for the Internet, Intranets, & Virtual Private Networks, 2nd Ed..chm
  247. IPSec VPN Design.chm
  248. IPTV Security - Protecting High-Value Digital Contents.pdf
  249. IT Auditing - Using Controls to Protect Information Assets.chm
  250. IT Security Interviews Exposed - Secrets to Landing Your Next Information Security Job.pdf
  251. J2EE Security for Servlets, EJBs, & Web Services.chm
  252. Jeff Duntemann's Drive-By Wi-Fi Guide.chm
  253. Juniper Networks Field Guide & Reference.chm
  254. Juniper Networks Secure Access SSL VPN Configuration Guide.pdf
  255. Kismet Hacking.pdf
  256. LAN Switch Security - What Hackers Know About Your Switches.pdf
  257. Linux Firewalls - Attack Detection & Response with iptables, psad, & fwsnort.pdf
  258. Linux Network Security.chm
  259. Linux Security Cookbook.chm
  260. Mac OS X Maximum Security.chm
  261. Mac OS X Security.chm
  262. Mainframe Basics for Security Professionals - Getting Started with RACF.pdf
  263. Malicious Cryptography - Exposing Cryptovirology.pdf
  264. Malware - Fighting Malicious Code.chm
  265. Malware Detection.pdf
  266. Malware Forensics - Investigating & Analyzing Malicious Code.pdf
  267. Managing Cisco Network Security.pdf
  268. Managing Security with Snort & IDS Tools.chm
  269. Mastering FreeBSD & OpenBSD Security.chm
  270. Mastering Network Security.pdf
  271. Mastering Windows Network Forensics & Investigation.chm
  272. Maximum Linux Security, 2nd Ed..pdf
  273. Maximum Security, 4th Ed..chm
  274. Maximum Wireless Security.chm
  275. MCSA-MCSE Implementing & Administering Security in a Microsoft Windows Server 2003 Network Self-Paced Training Kit [Exam 70-299] .pdf
  276. MCSE Core Elective Exams in a Nutshell - A Desktop Quick Reference.chm
  277. MCSE Designing Security for a Microsoft Windows Server 2003 Network Self-Paced Training Kit [Exam 70-298] .chm
  278. MCSE Implementing & Administering Security in a Windows 2003 Network Exam Cram 2 [Exam 70-299] .chm
  279. Metasploit Toolkit for Penetration Testing, Exploit Development, & Vulnerability Research.pdf
  280. Microsoft Encyclopedia of Security.pdf
  281. Microsoft Forefront Security Administration Guide.pdf
  282. Microsoft Log Parser Toolkit.pdf
  283. Microsoft Windows Security Inside Out for Windows XP & Windows 2000.chm
  284. Microsoft Windows Server 2003 PKI & Certificate Security.pdf
  285. Mission Critical! Internet Security.pdf
  286. Mobile & Wireless Network Security & Privacy.pdf
  287. Mobility, Data Mining, & Privacy - Geographic Knowledge Discovery.pdf
  288. Modern Cryptography - Theory & Practice.pdf
  289. MORE Electronic Gadgets for the Evil Genius - 40 New Build-It-Yourself Projects.pdf
  290. Multicast & Group Security.pdf
  291. Multimedia Forensics & Security.pdf
  292. Multimedia Security Technologies for Digital Rights Management.pdf
  293. Nessus Network Auditing, 2nd Ed..pdf
  294. Nessus, Snort, & Ethereal Power Tools - Customizing Open Source Security Applications.pdf
  295. Netcat Power Tools.pdf
  296. Network Administrator Street Smarts - A Real World Guide to CompTIA Network Skills.pdf
  297. Network Intrusion Detection, 3rd Ed..pdf
  298. Network Perimeter Security - Building Defense In-Depth.chm
  299. Network Security - Know It All.pdf
  300. Network Security Assessment - From Vulnerability to Patch.pdf
  301. Network Security Assessment - Know Your Network, 2nd Ed..pdf
  302. Network Security Assessment - Know Your Network.chm
  303. Network Security Bible.pdf
  304. Network Security Hacks - 100 Industrial-Strength Tips & Tools.chm
  305. Network Security Hacks - Tips & Tools for Protecting Your Privacy, 2nd Ed..chm
  306. Network Security Illustrated.pdf
  307. Network Security JumpStart.pdf
  308. Network Security Technologies & Solutions.chm
  309. Network Security Tools - Writing, Hacking, & Modifying Security Tools.chm
  310. Network Security with OpenSSL.pdf
  311. Network Warrior.pdf
  312. Networking with Microsoft Windows Vista - Your Guide to Easy & Secure Windows Vista Networking.pdf
  313. Nmap in the Enterprise - Your Guide to Network Scanning.pdf
  314. No Tech Hacking - A Guide to Social Engineering, Dumpster Diving, & Shoulder Surfing.pdf
  315. Official (ISC)2 Guide to the CISSP Exam.pdf
  316. Online Business Security Systems.pdf
  317. Open Source Fuzzing Tools.pdf
  318. Open Source Security Tools - A Practical Guide to Security Applications.chm
  319. Oracle Security.chm
  320. OS X Exploits & Defense.pdf
  321. OS X for Hackers at Heart - The Apple of Every Hacker's Eye.pdf
  322. OSSEC Host-Based Intrusion Detection Guide.pdf
  323. PCI Compliance - Understand & Implement Effective PCI Data Security Standard Compliance.pdf
  324. Penetration Tester's Open Source Toolkit, Vol. 2.pdf
  325. Penetration Tester's Open Source Toolkit.pdf
  326. Penetration Testing & Network Defense.chm
  327. Perfect Passwords - Selection, Protection, Authentication.pdf
  328. Perl Scripting for Windows Security - Live Response, Forensic Analysis, & Monitoring.pdf
  329. PGP & GPG - Email for the Practical Paranoid.pdf
  330. Phishing - Cutting the Identity Theft Line.pdf
  331. Phishing Exposed.pdf
  332. PHP Oracle Web Development - Data processing, Security, Caching, XML, Web Services, & AJAX.pdf
  333. Physical & Logical Security Convergence - Powered By Enterprise Security Management.pdf
  334. Practical Guide for Implementing Secure Intranets & Extranets.chm
  335. Practical Hacking Techniques & Countermeasures.pdf
  336. Practical Oracle Security - Your Unauthorized Guide to Relational Database Security.pdf
  337. Practical Packet Analysis - Using Wireshark to Solve Real-World Network Problems.pdf
  338. Practical Unix & Internet Security, 3rd Ed..chm
  339. Practical VoIP Security.pdf
  340. Preventing Web Attacks with Apache.chm
  341. Privacy Defended - Protecting Yourself Online.chm
  342. Privacy Preserving Data Mining.pdf
  343. Privacy Protection & Computer Forensics, 2nd Ed..pdf
  344. Privacy, Security, & Trust within the Context of Pervasive Computing.pdf
  345. Probabilistic & Statistical Methods in Cryptology - An Introduction by Selected Topics.pdf
  346. Professional Rootkits.chm
  347. Professional Windows Desktop & Server Hardening.chm
  348. Real 802.11 Security - Wi-Fi Protected Access & 802.11i.chm
  349. Reverse Engineering Code with IDA Pro.pdf
  350. Reverse Engineering of Object Oriented Code.pdf
  351. Reversing - Secrets of Reverse Engineering.pdf
  352. RFID Handbook - Applications, Technology, Security, & Privacy.pdf
  353. RFID Security.pdf
  354. Rootkits - Subverting the Windows Kernel.chm
  355. Rootkits for Dummies.pdf
  356. Router Security Strategies - Securing IP Network Traffic Planes.pdf
  357. RSA Security's Official Guide to Cryptography.pdf
  358. Sarbanes-Oxley IT Compliance Using COBIT & Open Source Tools.chm
  359. Sarbanes-Oxley IT Compliance Using Open Source Tools, 2nd Ed..pdf
  360. Secrets Stolen, Fortunes Lost - Preventing Intellectual Property Theft & Economic Espionage in the 21st Century.pdf
  361. Secure Coding - Principles & Practices.chm
  362. Secure Communicating Systems - Design, Analysis, & Implementation.pdf
  363. Secure Computer & Network Systems - Modeling, Analysis, & Design.pdf
  364. Secure Data Management in Decentralized Systems.pdf
  365. Secure Programming Cookbook for C & C .chm
  366. Secure Programming with Static Analysis.pdf
  367. Securing & Optimizing Linux - The Hacking Solution.pdf
  368. Securing IM & P2P Applications for the Enterprise.pdf
  369. Securing the Information Infrastructure.pdf
  370. Securing VoIP Networks - Threats, Vulnerabilities, & Countermeasures.pdf
  371. Securing Web Services with WS-Security - Demystifying WS-Security, WS-Policy, SAML, XML Signature, & XML Encryption.chm
  372. Securing Windows Server 2003.chm
  373. Securing Windows Server 2008 - Prevent Attacks from Outside & Inside Your Organization.pdf
  374. Securing Your Business with Cisco ASA & PIX Firewalls.chm
  375. Security & Quality of Service in Ad Hoc Wireless Networks.pdf
  376. Security & Usability - Designing Secure Systems that People Can Use.chm
  377. Security for Microsoft Visual Basic .NET.chm
  378. Security for Wireless Ad Hoc Networks.pdf
  379. Security in Computing, 3rd Ed..chm
  380. Security in Computing, 4th Ed..chm
  381. Security in Distributed, Grid, Mobile, & Pervasive Computing.pdf
  382. Security in Wireless LANs & MANs.pdf
  383. Security Log Management - Identifying Patterns in the Chaos.pdf
  384. Security Power Tools.pdf
  385. Security Technologies for the World Wide Web, 2nd Ed..pdf
  386. Security Warrior.chm
  387. Security Study Guide, 2nd Ed. [SYO-101] .pdf
  388. Security, Privacy, & Trust in Modern Data Management.pdf
  389. Self-Defending Networks - The Next Generation of Network Security.pdf
  390. SELinux - NSA's Open Source Security Enhanced Linux.chm
  391. SELinux by Example - Using Security Enhanced Linux.chm
  392. Shellcoder's Programming Uncovered.chm
  393. Simple Computer Security - Disinfect Your PC.pdf
  394. Snort 2.1 Intrusion Detection, 2nd Ed..pdf
  395. Snort Cookbook.chm
  396. Snort IDS & IPS Toolkit.pdf
  397. Sockets, Shellcode, Porting, & Coding - Reverse Engineering Exploits & Tool Coding for Security Professionals.pdf
  398. Software Piracy Exposed.pdf
  399. Special Ops - Host & Network Security for Microsoft, UNIX, & Oracle.pdf
  400. SSH, The Secure Shell - The Definitive Guide.pdf
  401. SSL & TLS Essentials - Securing the Web.pdf
  402. SSL Remote Access VPNs.pdf
  403. Static & Dynamic Reverse Engineering Techniques for Java Software Systems.pdf
  404. Static & Dynamic Reverse Engineering Techniques for Java Software Sytems.pdf
  405. Steal This Computer Book 3 - What They Won't Tell You About the Internet.chm
  406. Stealing the Network - How to Own a Continent.chm
  407. Stealing the Network - How to Own a Shadow.pdf
  408. Stealing the Network - How to Own an Identity.pdf
  409. Stealing the Network - How to Own the Box.pdf
  410. Strategic Information Security.chm
  411. Surveillance & Security - Technological Politics & Power in Everyday Life.pdf
  412. Syngress Force Emerging Threat Analysis - From Mischief to Malicious.pdf
  413. Tangled Web - Tales of Digital Crime from the Shadows of Cyberspace.pdf
  414. The Apache Modules Book - Application Development with Apache.pdf
  415. The Art of Computer Virus Research & Defense.chm
  416. The Art of Deception - Controlling the Human Element of Security.pdf
  417. The Art of Intrusion - The Real Stories Behind the Exploits of Hackers, Intruders, & Deceivers.pdf
  418. The Art of Software Security Assessment - Identifying & Preventing Software Vulnerabilities.chm
  419. The Best Damn Firewall Book Period, 2nd Ed..pdf
  420. The Best Damn Firewall Book Period.pdf
  421. The Best Damn IT Security Management Book Period.pdf
  422. The Book of PF - A No-Nonsense Guide to the OpenBSD Firewall.pdf
  423. The Business Case for Network Security - Advocacy, Governance, & ROI.chm
  424. The CISSP & CAP Prep Guide - Platinum Ed..chm
  425. The CISSP Prep Guide - Gold Ed..pdf
  426. The CISSP Prep Guide - Mastering the Ten Domains of Computer Security.pdf
  427. The Complete Idiot's Guide to Protecting Yourself Online.pdf
  428. The Craft of System Security.chm
  429. The Database Hacker's Handbook - Defending Database Servers.chm
  430. The Ethical Hack - A Framework for Business Value Penetration Testing.pdf
  431. The Giant Black Book of Computer Viruses.pdf
  432. The International Handbook of Computer Security.pdf
  433. The IT Regulatory & Standards Compliance Handbook - How to Survive an Information Systems Audit & Assessments.pdf
  434. The Naked Employee - How Technology Is Compromising Workplace Privacy.chm
  435. The Official CHFI Study Guide for Computer Hacking Forensics Investigators [Exam 312-49] .pdf
  436. The Oracle Hacker's Handbook - Hacking & Defending Oracle.chm
  437. The Shellcoder's Handbook - Discovering & Exploiting Security Holes.chm
  438. The Tao of Network Security Monitoring - Beyond Intrusion Detection.chm
  439. The Web Application Hacker's Handbook - Discovering & Exploiting Security Flaws.pdf
  440. Understanding Forensic Digital Imaging.pdf
  441. UNIX & Linux Forensic Analysis DVD Toolkit.pdf
  442. Virtual Honeypots - From Botnet Tracking to Intrusion Detection.chm
  443. WAP, Bluetooth, & 3G Programming - Cracking the Code.pdf
  444. Wardriving & Wireless Penetration Testing.pdf
  445. WarDriving-Drive, Detect, Defend - A Guide to Wireless Security.chm
  446. Web Application Vulnerabilities - Detect, Exploit, Prevent.pdf
  447. Web Hacking - Attacks & Defense.chm
  448. Web Security & Commerce.pdf
  449. Web Security, Privacy, & Commerce, 2nd Ed..chm
  450. Web Services Security & E-Business.pdf
  451. Web Services Security.chm
  452. Webster's New World Hacker Dictionary.pdf
  453. Wi-Foo - The Secrets of Wireless Hacking.chm
  454. Windows Forensic Analysis.pdf
  455. Windows Forensics & Incident Recovery.chm
  456. Windows Server 2003 Security Guide.pdf
  457. Windows Server 2008 Networking & Network Access Protection (NAP).pdf
  458. Windows Server 2008 Security Resource Kit.pdf
  459. Windows Vista Security - Securing Vista Against Malicious Attacks.chm
  460. Windows XP Hacks & Mods For Dummies.pdf
  461. Wireless Network Hacks & Mods for Dummies.pdf
  462. Wireless Operational Security.chm
  463. Wireless Personal Area Networks - Performance, Interconnection, & Security with IEEE 802.15.4.pdf
  464. Wireless Security Handbook.pdf
  465. Wireshark & Ethereal Network Protocol Analyzer Toolkit.pdf
  466. Writing Secure Code for Windows Vista.chm
  467. Writing Secure Code, 2nd Ed..chm
  468. Writing Secure Code.pdf
  469. Writing Security Tools & Exploits.pdf
  470. XSS Attacks - Cross Site Scripting Exploits & Defense.pdf
  471. Zero-Day Exploit - Countdown to Darkness.pdf




Về căn bản là vậy nhưng có ai biết key đó được sinh ra thê nào. Cơ chế quản lý ra sao, xác thực kiểu gì không. Ai là người đúng ra quản lý, đứng ra xác thực. Liệu có sự giả mạo nào có thể diễn ra ở đây không?
 

Powered by JForum - Extended by HVAOnline
 hvaonline.net  |  hvaforum.net  |  hvazone.net  |  hvanews.net  |  vnhacker.org
1999 - 2013 © v2012|0504|218|