Владелец
Только чтение
Чтение и запись

premiaçoẽs

от B3L0V$KY 988,110 KB • 224 файлов

Сообщить о нарушениях
Скачать в формате Zip
Добавить в мой аккаунт
 
Имя Размер Дата добавления Добавить в аккаунт
12978-exploiting-buffer-overflows.pdf
12979-mem---jacking.pdf
12982-a-post-mortem-of-yahoo!-account-security.pdf
12984-[spanish]-como-navegar-anonimamente-en-internet.pdf
12985-arp-spoofing.pdf
12986-short-review-of-modern-vulnerability-research.pdf
12988-w3af-userguide-french.pdf
12993-reverse-engineering-microsoft-f.pdf
13010-fuzzing-a-useful-approach-to-finding-bugs.pdf
13021-assault-on-oracle-plsql---injection.pdf
13022-targeting-voip.pdf
13023-introduction-to-sql-injection.pdf
13027-client-side-security..-more-severe-than-it-seems....pdf
13033-data-mining-with-sql-injection-and-inference.pdf
13035-reverse-engineering-smashing-the-signature.pdf
13039-simple-web-hacking-techniques.pdf
13040-auditing-mailing-scripts-for-web-app-pentesters.pdf
13041-reverse-engineering-anti-cracking-techniques.pdf
13042-coode-magazine-nr3.pdf
13113-moab-comic-1.pdf
13135-vulnerability-enumeration-for-penetration-testing.pdf
13173-web-application-auditing-and-exploitation.pdf
13196-format-string-vulnerability-i-&-ii.pdf
13209-tutorial-about-format-bugs.pdf
13226-steganography-faq.pdf

Посмотрите файлы 30 office в моей папке 4shared premiaçoẽs

We Use Cookies. 4shared uses cookies and other tracking technologies to understand where our visitors are coming from and improve your browsing experience on our Website. By using our Website, you consent to our use of cookies and other tracking technologies. Change my preferences
I Agree