搜索
查看: 461|回复: 0

Syngress 安全盛典 安全技术丛书

[复制链接]

1839

主题

2255

帖子

1万

积分

管理员

Rank: 9Rank: 9Rank: 9

积分
11913
发表于 2015-1-4 22:49:26 | 显示全部楼层 |阅读模式
下载地址http://pan.baidu.com/share/link? ... p;shareid=198349873
毫无疑问,这个档案库安全人员必备。

  1. Configuring and Troubleshooting Windows XP Professional.pdf
  2. 10 Cool Lego Mindstorms Robotics Invention System 2 Projects.pdf
  3. Aggressive network self-defense.(2005).pdf
  4. Application Service Provider (Isp) Configuration Handbook.pdf
  5. ASP Dot.NET Web Developers Guide.pdf
  6. ASP.NET - Web developer's guide.pdf
  7. Asterisk Hacking (2007).pdf
  8. Best Damn Firewall Book Period.pdf
  9. BizTalk Server 2000 Developers Guide for.NET (VBL).pdf
  10. Bluetooth Application Developers Guide.pdf
  11. Botnets.The.Killer.Web.App.pdf
  12. Buffer Overflow Attacks - Detect, Exploit, Prevent.pdf
  13. Building a Cisco Wireless LAN.pdf
  14. Building Cisco Networks for Win2K.pdf
  15. Building Dmzs For Enterprise Networks.pdf
  16. Building Robots With Lego Mindstorms.pdf
  17. Building Sans With Brocade Fabric Switches.pdf
  18. Business Continuity and Disaster Recovery Planning for IT Professionals.pdf
  19. C# for Java Programmers (VBL).pdf
  20. CD And Dvd Forensics Dec 2006 Ebook-Bbl.pdf
  21. Check Point NG VPN-1 FireWall-1 Advanced Configuration and Troubleshooting.pdf
  22. Check Point NG--Next Generation Security Administration.pdf
  23. Checkpoint Ng - Vpn-1 Firewall-1 - Advanced Configuration And Troubleshooting.pdf
  24. CheckPoint NG Security Administration.pdf
  25. Cisco AVVID & IP Telephony - Design & Implementation.pdf
  26. Cisco Security Specialist’s Guide to PIX Firewall.pdf
  27. Combating.Spyware.in.the.Enterprise.pdf
  28. Configuring Check Point NGX VPN-1 FireWall-1.pdf
  29. Configuring Cisco Voice Over IP Second Edition.pdf
  30. Configuring Citrix Xp.pdf
  31. Configuring Exchange Server 2007.pdf
  32. Configuring IPv6 for Cisco IOS(2002).pdf
  33. Configuring ISA Server 2000 - Building Firewalls for Windows 2000.pdf
  34. Configuring Juniper Networks Netscreen and SSG Firewalls.pdf
  35. Configuring NetScreen Firewalls - 2005 - (By Laxxuss).pdf
  36. Configuring SonicWALL Firewalls(2006).pdf
  37. Configuring Windows 2000 Server Security.pdf
  38. Consumer's Guide to Cell Phones & Wireless Services.pdf
  39. Creating Security Policies and Implementing Identity Management with Active Directory.pdf
  40. CYA Securing Exchange Server 2003 and Outlook Web Access.pdf
  41. CYA Securing IIS 6.0.pdf
  42. Cyber Adversary Characterization. Auditing the Hacker Mind.pdf
  43. Defragmentation, Recovery And Administration Field Guide.pdf
  44. Developers.Guide.to.Web.Application.Security.pdf
  45. Developing .NET Web Services with XML.pdf
  46. Dr Tom Shinder's Configuring Isa Server 2004 (2006).pdf
  47. Dr. Tom Shinder's Configuring ISA Server 2004 (2005).pdf
  48. Dr.Tom.Shinders.ISA Server 2006 Migration Guide Aug 2007 eBook-BBL.pdf
  49. Essential Computer Security (Oct 2006).pdf
  50. Ethereal Packet Sniffing.pdf
  51. Ferrari-Hempel - Building Robots With LEGO Mindstorms.pdf
  52. Game Console Hardware Hacking (Xbox, Playstation, Nintendo, Atari and Gamepark 32).pdf
  53. Google Hacking for Penetration Testers - 2005.pdf
  54. Hack Proofing Your Network.pdf
  55. Hack Proofing Linux - A Guide to Open Source Security.pdf
  56. Hack Proofing Sun Solaris 8 (2001).pdf
  57. Hack Proofing Windows 2000 Server.pdf
  58. Hack Proofing XML.pdf
  59. Hack Proofing Your Network (2nd Edition).pdf
  60. Hack the Stack - Using Snort and Ethereal to Master the 8 Layers of an Insecure Network.pdf
  61. Hacking A Terror Network - The Silent Threat Of Covert Channels - 2005 - (By Laxxuss).pdf
  62. Hacking a Terror Network. The Silent Threat of Covert Channels.pdf
  63. Have.Fun.While.Voiding.Your.Warranty].Hardware.Hacking.pdf
  64. Host Integrity Monitoring - Using Osiris and Samhain - Jun 2005.pdf
  65. How to Cheat - Deploying Exchange Server 2000 with Active Directory.pdf
  66. How to Cheat at Administering Office Communicator.pdf
  67. How to Cheat at Configuring Exchange Server 2007 - Including Outlook Web, Mobile, and Voice Access.pdf
  68. How to Cheat at Configuring ISA Server 2004.pdf
  69. How to Cheat at Configuring VMware ESX Server.pdf
  70. How to Cheat at Deploying and Securing RFID.pdf
  71. How To Cheat At Installing, Configuring & Troubleshooting Windows 2000 File Systems.pdf
  72. How to Cheat at Installing, Configuring and Troubleshooting Active Directory and DNS.pdf
  73. How To Cheat At Managing Windows SBS 2003.pdf
  74. How To Cheat At Managing Windows Small Business Server 2003.pdf
  75. How To Cheat At Managing WSUS Dec2005.pdf
  76. How to Cheat at Securing a Wireless Network.ShareConnector.pdf
  77. How to Cheat at Securing Linux.pdf
  78. How to Cheat at Securing sql Server 2005.pdf
  79. How to Cheat at Securing Windows 2000 Server TCP-IP Connections.pdf
  80. How To Cheat At VoIP Security.pdf
  81. How to Cheat at Windows System Administration Using Command Line Scripts.pdf
  82. How.to.Cheat.at.Configuring.Open.Source.Security.Tools.pdf
  83. How.to.Cheat.at.Microsoft.Vista.Administration.pdf
  84. InfoSecurity 2008 Threat Analysis.pdf
  85. Insider Threat - Protecting the Enterprise from Sabotage, Spying, and Theft - 2006.pdf
  86. Intrusion Prevention and Active Response.pdf
  87. IP Addressing And Subnetting (Including IPv6).pdf
  88. IT Security Project Management Handbook.pdf
  89. Journey To The Center of the Internet.pdf
  90. Juniper Networks Secure Access SSL VPN Configuration Guide.pdf
  91. LEGO Mindstorms Masterpieces Building and Programming Advanced Robots [found via www.FileDonkey.com].pdf
  92. Lego Mindstorms Masterpieces Building And Programming Advanced Robots.pdf
  93. Linksys Wrt54G Ultimate Hacking May 2007 Ebook-Bbl.pdf
  94. Managing And.Securing A Cisco Structured Wireless Aware Network.pdf
  95. Managing Cisco Network Security 2Nd Edition.pdf
  96. MCSA MCSE Exam 70-291 Windows Server 2003 Network Infrastructure.pdf
  97. MCSA MCSE Exam 70-293 Planning & Maintaining a Windows Server 2003 Network Infrastructure.pdf
  98. MCSA.MCSE.Exam.70-292.Study.Guide.ShareReactor.pdf
  99. MCSA.MCSE.Exam.70-298 Designing Security For A Windows Server 2003 Network Study Guide - 2004.pdf
  100. MCSA_MCSE Exam 70-290.Windows Server 2003 Environment.pdf
  101. MCSA_MCSE Exam 70-294 Win Server 2003 Active Directory Infrastructure.pdf
  102. MCSA_MCSE Exam 70-296 Study Guide.pdf
  103. MCSA_MCSE Exam 70-297 Designing A Windows Server 2003 Active Directory And Network Infrastructure Study Guide.pdf
  104. Metasploit Toolkit - For Penetration Testing Exploit Development and Vulnerability Research - Sep 2007.pdf
  105. Microsoft Log Parser Toolkit [2005].pdf
  106. Microsoft.Forefront.Security.Administration.Guide.Jan.2008.pdf
  107. Mission Critical Internet Security.pdf
  108. Nessus Network Auditing (2004).pdf
  109. Nessus Snort and Ethereal Power Tools 2005.pdf
  110. Network Security Assessment, From Vulnerability To Patch - [Syngress, 2007].pdf
  111. Nokia Network Security Solutions Handbook.pdf
  112. Open Source Fuzzing Tools.pdf
  113. PCI DSS Compliance-Understand Implement Effective PCI Data Security Standard Compliance.pdf
  114. Penetration Tester's Open Source Toolkit (2006).pdf
  115. Perl Scripting for IT Security Dec 2007.eBook-BBL.pdf
  116. PIX Firewall Access Lists.pdf
  117. Practical Oracle Security Aug 2007 eBook-BBL.pdf
  118. Practical VoIP Security.pdf
  119. Projects for Wi-Fi Enthusiasts.pdf
  120. RFID plus Study Guide and Practice(2007).pdf
  121. RFID Security.pdf
  122. Ruby Developer'S Guide - 2002 - (By Laxxuss).pdf
  123. Sarbanes.Oxley.IT.Compliance.Using.COBIT.and.Open.Source.Tools..pdf
  124. Scene of the Cybercrime - Computer Forensics Handbook.pdf
  125. Scripting Vmware Power Tools Oct 2006.pdf
  126. Secrets of Network Cartography - A Comprehensive Guide to Nmap - Complete.pdf
  127. Secure Your Network for Free Using.pdf
  128. Securing Exchange Server and Outlook Web Access.pdf
  129. Security Assessment Case Studies for Implementing.pdf
  130. Security Log Management - Identifying Patterns in the Chaos (2005).pdf
  131. Security+ StudyGuide.pdf
  132. Sniffer Pro - Network Optimization And Troubleshooting Handbook.pdf
  133. Snort 2.1 Intrusion Detection Second Edition 2004.pdf
  134. Snort IDS and IPS Toolkit [Caswell,Beale,Baker].pdf
  135. Sockets Shellcode Porting and Coding, Reverse Engineering Exploits and Tool Coding for Security Professionals.pdf
  136. Stealing the Network - How to Own the Box (2003).pdf
  137. Techno Security’s Guide to Managing Risks for IT Managers, Auditors, and Investigators - 2007.pdf
  138. The Best Damn Exchange SQL and IIS Book Period.pdf
  139. The Best Damn Firewall Book Period 2Nd Edition Nov 2007 Ebook-Bbl.pdf
  140. The Best Damn Server Virtualization Book Period.pdf
  141. The Official CHFI Study Guide Exam.pdf
  142. VB.NET Developers guide 2001.pdf
  143. Video Conferencing over IP Configure Secure and Troubleshoo(2006).pdf
  144. Virtualization With Vmware Esx Server (2008).pdf
  145. Virtualization.with.Xen.May.2007.eBook-BBL.pdf
  146. Vista for IT Security Professionals.pdf
  147. WarDriving and Wireless Penetration Testing (2007).pdf
  148. Web Application Vulnerabilities Detect, Exploit, Prevent.pdf
  149. Web Services With Java.pdf
  150. Webmasters Guide To The Wireless Internet.pdf
  151. Windows 2000 Active Directory Second Edition.pdf
  152. Windows Forensic Analysis DVD Toolkit.pdf
  153. Winternals - Defragmentation, Recovery and Administration Field Guide.pdf
  154. Wireless Hacking. Projects for Wi-Fi Enthusiasts.pdf
  155. Wireshark & Ethereal Network Protocol Analyzer Toolkit.2007.pdf
  156. Writing Security Tools And Exploits (2006) Ddu.pdf
  157. xss Attacks - Cross Site Scripting Exploits And Defense.pdf
  158. Zero-Day Exploit - Countdown to Darkness.pdf
  159. Net Mobile Web Developer's Guide (VBL).pdf
复制代码
过段时间可能会取消签到功能了
您需要登录后才可以回帖 登录 | Join BUC

本版积分规则

Powered by Discuz!

© 2012-2015 Baiker Union of China.

快速回复 返回顶部 返回列表