Name | Last modified | Size | Description | |
---|---|---|---|---|
Parent Directory | - | |||
Imad M. Abbadi - Cloud Management and Security.pdf | 2017-02-28 09:18 | 13M | ||
Interactive Computer Graphics - A Top-Down Appr. 6th ed. - E. Angel, et al., (Pearson, 2012) BBS.pdf | 2017-02-28 09:31 | 13M | ||
Pro Git 2nd edition.pdf | 2014-11-08 16:45 | 12M | ||
Game Engine Architecture.pdf | 2017-02-28 09:37 | 12M | ||
Practical_Malware_Analysis.pdf | 2017-02-28 09:18 | 9.4M | ||
The.IDA.Pro.Book.2nd.Edition.Jun.2011.pdf | 2017-02-28 09:18 | 9.2M | ||
Herlihy, Shavit - The art of multiprocessor programming.pdf | 2017-02-28 09:19 | 4.4M | ||
Hacker Disassembling Uncovered.pdf | 2017-02-28 09:19 | 3.8M | ||
virtualization-2edition.pdf | 2017-02-28 09:37 | 859K | ||
Securing_Wireless_Networks_from_ARP_Cache_Poisoning.pdf | 2017-02-28 09:18 | 747K | ||
zfs_snapshots.pdf | 2017-02-28 09:37 | 207K | ||
X86_Win32_Reverse_Engineering_Cheat_Sheet.pdf | 2017-02-28 09:18 | 100K | ||