Index of /Files/

advancedpenetrationtesting.pdf

applied_cryptography_protocols_algorithms_and_source_code_in_c.pdf

art_of_memory_forensics_detecting_malware_and_threats_in_windows_linux_and_mac_memory.pdf

cryptography_engineering_design_principles_and_practical_applications.pdf

investigatingcryptocurrencies.pdf

malware_analysts_cookbook_and_dvd_tools_and_techniques_for_fighting_malicious_code.pdf

practical_reverse_engineering_x86_x64_arm_windows_kernel_reversing_tools_and_obfuscation.pdf

reversing_secretsofreverseengineering.pdf

secrets_and_lies_digital_security_in_a_networked_world.pdf

security_engineering_a_guide_to_building_dependable_distributed_systems.pdf

shellcoders_handbook_discovering_and_exploiting_security_holes.pdf

threat_modeling_designing_for_security.pdf

web_application_hackers_handbook_finding_and_exploiting_security_flaws.pdf

wiresharkforsecurityprofessionals.pdf

N22_Chromebook_Modification.txt