Thursday, 25 February 2016

Penetration Testing with the Bash Shell
https://drive.google.com/file/d/0BznXDQp5lD3Sc3BScGNiaEI3a2s/view?usp=sharing
Cybersecurity and Cyberwar CookBook
https://drive.google.com/file/d/0BznXDQp5lD3ScldQZThJOEtvWjg/view?usp=sharing
Cyber Warfare
https://drive.google.com/file/d/0BznXDQp5lD3SZzI2UHItaG44ajg/view?usp=sharing
Cyber Threat Cook Book
https://drive.google.com/file/d/0BznXDQp5lD3SQnJkbWdiaC1hWnc/view?usp=sharing
Core software security
https://drive.google.com/file/d/0BznXDQp5lD3SSHFWMWlmUmtuZDg/view?usp=sharing
Computer Architecture and Security
https://drive.google.com/file/d/0BznXDQp5lD3SeUY0UUxlSlhvcUE/view?usp=sharing
Theory and Practice of Cryptography and Network 
Security Protocols and Technologies
https://drive.google.com/file/d/0BznXDQp5lD3SMmNxZHRaSWxPakk/view?usp=sharing
Web Application Defender's Cookbook
https://drive.google.com/file/d/0BznXDQp5lD3SR0c0X2dpMnlRcXc/view?usp=sharing