搜索
Pdf
磁力链接/BT种子名称
Pdf
磁力链接/BT种子简介
种子哈希:
b081ae0efad80d1cde8f705ad5b3ab42d5c55cd2
文件大小:
10.75G
已经下载:
1473
次
下载速度:
极快
收录时间:
2021-04-18
最近下载:
2025-06-13
移花宫入口
移花宫.com
邀月.com
怜星.com
花无缺.com
yhgbt.icu
yhgbt.top
磁力链接下载
magnet:?xt=urn:btih:B081AE0EFAD80D1CDE8F705AD5B3AB42D5C55CD2
推荐使用
PIKPAK网盘
下载资源,10TB超大空间,不限制资源,无限次数离线下载,视频在线观看
下载BT种子文件
磁力链接
迅雷下载
PIKPAK在线播放
世界之窗
91视频
含羞草
欲漫涩
逼哩逼哩
成人快手
51品茶
抖阴破解版
极乐禁地
91短视频
TikTok成人版
PornHub
草榴社区
91未成年
乱伦巴士
呦乐园
萝莉岛
最近搜索
ep-02
张佳佳
virtualtaboo
小杨幂
男孩流血
private movies
ジローの動画
流
酒店厕所
中年夫妻交换
漂亮人妖
天堂鸟先生
pppe097
相泽南美脚
偷拍…
九洲客
水户
+【我的枪好长】
孕
신병
裸聊一对一交流群
母子性教育
美祢藤コウ
咬兔
外国漏点
胸模 私拍
london.fields.
空姐模特
抖音 夏夏
关于我转生
文件列表
SEC542 - Web App Penetration Testing and Ethical Hacking/text/2016/SEC542_Book1.pdf
283.4 MB
FOR500 - Windows Forensic Analysis/text/2011/SANS 408.3-408.6-v2011_0208.pdf
205.4 MB
FOR572 - Advanced Network Forensics Threat Hunting, Analysis, and Incident Response/text/2017/FOR572.1.pdf
159.7 MB
SEC503 - Intrusion Detection In-Depth/Text/2015/503.5.pdf
156.0 MB
SEC573 - Automating Information Security with Python/text/2017/SEC573.3-5.pdf
151.1 MB
SEC580 - Metasploit Kung Fu for Enterprise Pen Testing/text/2016/580.2 - Metasploit Kung Fu for Enterprise Pen Testing Day 2.pdf
148.6 MB
MGT512 - SANS Security Leadership Essentials For Managers with Knowledge Compression/text/2011/day1.pdf
147.7 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/text/2016/SEC542_Book2.pdf
143.6 MB
SEC573 - Automating Information Security with Python/text/2017/SEC573.1-2.pdf
129.7 MB
SEC580 - Metasploit Kung Fu for Enterprise Pen Testing/text/2016/580.1 - Metasploit Kung Fu for Enterprise Pen Testing Day 1.pdf
129.2 MB
MGT512 - SANS Security Leadership Essentials For Managers with Knowledge Compression/text/2011/day3.pdf
128.2 MB
MGT512 - SANS Security Leadership Essentials For Managers with Knowledge Compression/text/2011/day4.pdf
126.3 MB
SEC503 - Intrusion Detection In-Depth/Text/2015/503.4.pdf
111.5 MB
MGT512 - SANS Security Leadership Essentials For Managers with Knowledge Compression/text/2011/day2.pdf
108.5 MB
SEC506 - Securing Linux-Unix/text/2017/SEC506.1-3.pdf
106.6 MB
SEC503 - Intrusion Detection In-Depth/Text/2015/503.3.pdf
103.4 MB
FOR572 - Advanced Network Forensics Threat Hunting, Analysis, and Incident Response/text/2017/FOR572.6 Workbook.pdf
101.9 MB
SEC503 - Intrusion Detection In-Depth/Text/2015/503.2.pdf
101.6 MB
SEC555 - SIEM with Tactical Analytics/text/2017/SEC555 Workbook.pdf
96.0 MB
FOR572 - Advanced Network Forensics Threat Hunting, Analysis, and Incident Response/text/2017/FOR572.2.pdf
95.7 MB
SEC505 - Securing Windows and PowerShell Automation/text/2017/SEC505.1 PowerShell Automation and Security.pdf
92.4 MB
SEC503 - Intrusion Detection In-Depth/Text/2015/503.1.pdf
92.0 MB
SEC505 - Securing Windows and PowerShell Automation/text/2017/SEC505.2 Continuous Secure Configuration Enforcement.pdf
89.8 MB
SEC505 - Securing Windows and PowerShell Automation/text/2017/SEC505.4 Administrative Compromise and Privilege Management.pdf
88.0 MB
SEC401 - Security Essentials Bootcamp Style/Text/2016/401-5-Windows Sec.pdf
87.7 MB
SEC566 - Implementing and Auditing the Critical Security Controls - In-Depth/text/2013/566.3.2013_P190.pdf
85.0 MB
SEC505 - Securing Windows and PowerShell Automation/text/2017/SEC505.6 Defensible Networking and Blue Team WMI.pdf
82.9 MB
FOR585 - Advanced Smartphone Forensics/text/2017/FOR585. Workbook.pdf
80.4 MB
SEC566 - Implementing and Auditing the Critical Security Controls - In-Depth/text/2013/566.4.2013_P234.pdf
80.2 MB
SEC401 - Security Essentials Bootcamp Style/Text/2011/401.1 Networking Concepts.pdf
78.6 MB
FOR500 - Windows Forensic Analysis/text/2017/500.Workbook.pdf
78.2 MB
FOR585 - Advanced Smartphone Forensics/text/2017/FOR585.1 Malware Forensics, Smartphone Overview, and SQLite Introduction.pdf
78.1 MB
SEC505 - Securing Windows and PowerShell Automation/text/2017/SEC505.5 Endpoint Protection and Pre-Forensics.pdf
76.7 MB
SEC505 - Securing Windows and PowerShell Automation/text/2017/SEC505.3 Windows PKI and Smart Cards.pdf
74.9 MB
SEC506 - Securing Linux-Unix/text/2017/SEC506.4-5.pdf
73.4 MB
SEC401 - Security Essentials Bootcamp Style/Text/2011/401.5 Windows Security.pdf
70.9 MB
SEC566 - Implementing and Auditing the Critical Security Controls - In-Depth/text/2013/566.2.2013_P186.pdf
67.1 MB
FOR500 - Windows Forensic Analysis/text/2011/SANS 408.1-v2011_0208.pdf
66.9 MB
SEC511 - Continuous Monitoring and Security Operations/text/2016/511.Workbook.pdf
65.3 MB
SEC566 - Implementing and Auditing the Critical Security Controls - In-Depth/text/2013/566.5.2013_P196.pdf
64.9 MB
FOR500 - Windows Forensic Analysis/text/2014/SANS408-1.pdf
64.3 MB
FOR500 - Windows Forensic Analysis/text/2017/500.5.pdf
63.6 MB
SEC555 - SIEM with Tactical Analytics/text/2017/SEC555.4 Baselining and User Behavior Monitoring.pdf
63.2 MB
SEC401 - Security Essentials Bootcamp Style/Text/2011/401.4 Secure Communications.pdf
62.8 MB
MGT517 - Managing Security Operations Detection, Response, and Intelligence/text/2010/SEC517c2.pdf
62.5 MB
FOR500 - Windows Forensic Analysis/text/2017/500.3-4.pdf
62.2 MB
SEC555 - SIEM with Tactical Analytics/text/2017/SEC555.1 SIEM Architecture and SOF-ELK.pdf
62.2 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/text/2016/MGT514.4 - Leadership and Management Competencies.pdf
62.1 MB
FOR585 - Advanced Smartphone Forensics/text/2017/FOR585.5 Third-Party Application and Knock-Off Forensics.pdf
62.0 MB
SEC401 - Security Essentials Bootcamp Style/Text/2016/401-3-Internet Security Tech.pdf
61.4 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/text/2016/MGT514.2 - Strategic Roadmap Development.pdf
60.9 MB
FOR585 - Advanced Smartphone Forensics/text/2017/FOR585.3 Android Backups and iOS Device Forensics.pdf
60.5 MB
FOR500 - Windows Forensic Analysis/text/2011/SANS 408.2-v2011_0208.pdf
59.3 MB
SEC401 - Security Essentials Bootcamp Style/Text/2011/401.2 Defense in Depth.pdf
58.3 MB
SEC555 - SIEM with Tactical Analytics/text/2017/SEC555.3 Advanced Endpoint Analytics.pdf
58.1 MB
SEC401 - Security Essentials Bootcamp Style/Text/2016/401-1-Network Conepts.pdf
57.6 MB
SEC506 - Securing Linux-Unix/text/2009/SEC506.4&5.pdf
56.4 MB
SEC555 - SIEM with Tactical Analytics/text/2017/SEC555.5 Tactical SIEM Detection and Post-Mortem Analysis.pdf
56.3 MB
SEC401 - Security Essentials Bootcamp Style/Text/2016/401-4-Secure Communications.pdf
56.1 MB
SEC555 - SIEM with Tactical Analytics/text/2017/SEC555.2 Service Profiling with SIEM.pdf
55.9 MB
FOR585 - Advanced Smartphone Forensics/text/2017/FOR585.2 Android Forensics.pdf
55.9 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/text/2013/642.1 - Advanced Discovery and Exploitation.pdf
55.5 MB
SEC401 - Security Essentials Bootcamp Style/Text/2011/401.3 Internet SecurityTechnologies.pdf
55.3 MB
SEC401 - Security Essentials Bootcamp Style/Text/2016/401-2-Defense In-Depth.pdf
53.9 MB
FOR585 - Advanced Smartphone Forensics/text/2017/FOR585.4 iOS Backups, Windows, and BlackBerry 10 Forensics.pdf
53.8 MB
AUD507 - Auditing & Monitoring Networks, Perimeters & Systems/text/2016/AUD 507 Workbook.pdf
53.8 MB
FOR500 - Windows Forensic Analysis/text/2017/500.1-2.pdf
52.5 MB
SEC560 - Network Penetration Testing and Ethical Hacking/text/2015/560.3_1Q2015_P226.pdf
51.9 MB
SEC560 - Network Penetration Testing and Ethical Hacking/text/2015/560.2_1Q2015_P202.pdf
51.4 MB
FOR572 - Advanced Network Forensics Threat Hunting, Analysis, and Incident Response/text/2017/FOR572.4.pdf
50.9 MB
SEC560 - Network Penetration Testing and Ethical Hacking/text/2015/560.5_1Q2015_P198.pdf
50.2 MB
SEC401 - Security Essentials Bootcamp Style/Text/2016/401-6-Unix-Linux Sec.pdf
50.2 MB
SEC580 - Metasploit Kung Fu for Enterprise Pen Testing/text/2015/580.1.pdf
50.0 MB
SEC560 - Network Penetration Testing and Ethical Hacking/text/2015/560.4_1Q2015_P202.pdf
49.7 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/text/2016/MGT514.3 - Security Policy Development and Assessment.pdf
49.7 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/text/2013/642.4 - Mobile Application and Web Services.pdf
49.6 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/text/2013/642.3 - Web Application Encryption.pdf
48.7 MB
FOR572 - Advanced Network Forensics Threat Hunting, Analysis, and Incident Response/text/2017/FOR572.3.pdf
48.2 MB
SEC660 - Advanced Penetration Testing, Exploit Writing, and Ethical Hacking/text/2014/660-3.pdf
48.0 MB
SEC506 - Securing Linux-Unix/text/2009/SEC506.3.pdf
47.3 MB
SEC560 - Network Penetration Testing and Ethical Hacking/text/2016/560.5.pdf
46.7 MB
SEC660 - Advanced Penetration Testing, Exploit Writing, and Ethical Hacking/text/2014/660-1.pdf
46.6 MB
SEC660 - Advanced Penetration Testing, Exploit Writing, and Ethical Hacking/text/2012/Sans Sec 660.1 - Advanced Penetration Testing Essentials.pdf
46.6 MB
SEC503 - Intrusion Detection In-Depth/Text/2010/503.5-503.6.pdf
46.4 MB
SEC560 - Network Penetration Testing and Ethical Hacking/text/2016/560.4.pdf
46.0 MB
SEC617 - Wireless Penetration Testing and Ethical Hacking/text/2010/SANS Security 617 Wireless Ethical Hacking, Penetration Testing & Defenses (2010).pdf
45.8 MB
SEC660 - Advanced Penetration Testing, Exploit Writing, and Ethical Hacking/text/2014/660-5.pdf
45.4 MB
SEC580 - Metasploit Kung Fu for Enterprise Pen Testing/text/2015/580.2.pdf
44.9 MB
SEC660 - Advanced Penetration Testing, Exploit Writing, and Ethical Hacking/text/2014/660-2.pdf
44.8 MB
SEC506 - Securing Linux-Unix/text/2017/SEC506.6.pdf
44.8 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/text/2013/642.2 - Discovery and Exploitation for Specific Applications.pdf
44.1 MB
SEC561 - Immersive Hands-on Hacking Techniques/text/2015/SEC561.pdf
44.0 MB
SEC660 - Advanced Penetration Testing, Exploit Writing, and Ethical Hacking/text/2012/Sans Sec 660.3 - Attacking the Domain.pdf
43.3 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/text/2015/SANS 610 Day3.pdf
43.1 MB
SEC560 - Network Penetration Testing and Ethical Hacking/text/2016/560.1.pdf
43.0 MB
SEC660 - Advanced Penetration Testing, Exploit Writing, and Ethical Hacking/text/2014/660-4.pdf
42.9 MB
SEC617 - Wireless Penetration Testing and Ethical Hacking/text/2015/SEC617 - Workbook.pdf
42.7 MB
FOR572 - Advanced Network Forensics Threat Hunting, Analysis, and Incident Response/text/2017/FOR572.5.pdf
42.7 MB
SEC580 - Metasploit Kung Fu for Enterprise Pen Testing/text/2011/sans 580.1.pdf
42.6 MB
SEC660 - Advanced Penetration Testing, Exploit Writing, and Ethical Hacking/text/2012/Sans Sec 660.5 - Exploiting Windows for Penetration Testers.pdf
42.2 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/text/2016/SANS504.1.pdf
42.2 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/text/2016/SEC542_Book6.pdf
42.1 MB
SEC566 - Implementing and Auditing the Critical Security Controls - In-Depth/text/2013/566.1.2013_P168.pdf
41.8 MB
SEC760 - Advanced Exploit Development for Penetration Testers/text/2014/SANS 760 Day1.pdf
41.4 MB
SEC560 - Network Penetration Testing and Ethical Hacking/text/2015/560.1_1Q2015_P238.pdf
41.1 MB
SEC511 - Continuous Monitoring and Security Operations/text/2016/511.4.pdf
40.6 MB
SEC511 - Continuous Monitoring and Security Operations/text/2016/511.2.pdf
39.9 MB
AUD507 - Auditing & Monitoring Networks, Perimeters & Systems/text/2016/507.4.pdf
39.8 MB
SEC660 - Advanced Penetration Testing, Exploit Writing, and Ethical Hacking/text/2012/Sans Sec 660.4 - Exploiting Linux for Penetration Testers.pdf
39.6 MB
SEC503 - Intrusion Detection In-Depth/Text/2010/503.2-503.3.pdf
39.4 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/text/2015/SANS 610 WorkBook.pdf
39.3 MB
SEC506 - Securing Linux-Unix/text/2009/SEC506.2.pdf
39.0 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/text/2015/SANS 610 Day2.pdf
38.9 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/text/2016/MGT514.5 - Strategic Planning Workshop.pdf
38.6 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/text/2013/642.5 - Web Application Firewall and Filter Bypass.pdf
38.4 MB
SEC511 - Continuous Monitoring and Security Operations/text/2016/511.1.pdf
38.4 MB
SEC760 - Advanced Exploit Development for Penetration Testers/text/2016/SEC760.5 - Windows Hear Overflows and Client-Side Exploitation.pdf
38.3 MB
FOR526 - Memory Forensics In-Depth/text/2015/FOR526.4-5.pdf
38.3 MB
SEC599 - Defeating Advanced Adversaries - Implementing Kill Chain Defenses/2017/599.Workbook.pdf
37.1 MB
SEC506 - Securing Linux-Unix/text/2009/SEC506.6.pdf
37.1 MB
SEC511 - Continuous Monitoring and Security Operations/text/2016/511.5.pdf
36.9 MB
SEC760 - Advanced Exploit Development for Penetration Testers/text/2016/SEC760.4 - Windows Kernel Debugging and Exploitation.pdf
36.7 MB
SEC566 - Implementing and Auditing the Critical Security Controls - In-Depth/text/2016/566.4.pdf
36.7 MB
SEC760 - Advanced Exploit Development for Penetration Testers/text/2016/SEC760.3 - Patch Diffing One-Day Exploits and Return Oriented Shellcode.pdf
36.6 MB
SEC566 - Implementing and Auditing the Critical Security Controls - In-Depth/text/2016/566.2.pdf
36.6 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/text/2015/SANS 610 Day5.pdf
36.5 MB
SEC511 - Continuous Monitoring and Security Operations/text/2016/511.3.pdf
36.5 MB
SEC760 - Advanced Exploit Development for Penetration Testers/text/2016/SEC760.1 - Threat Modeling Reverrsing and Debugging with IDA.pdf
36.5 MB
SEC560 - Network Penetration Testing and Ethical Hacking/text/2016/560.2.pdf
36.1 MB
SEC506 - Securing Linux-Unix/text/2009/SEC506.1.pdf
36.0 MB
SEC660 - Advanced Penetration Testing, Exploit Writing, and Ethical Hacking/text/2012/Sans Sec 660.2 - Network Attacks for Penetration Testers.pdf
35.6 MB
SEC560 - Network Penetration Testing and Ethical Hacking/text/2016/560.3.pdf
35.4 MB
FOR526 - Memory Forensics In-Depth/text/2015/FOR526.2.pdf
35.0 MB
SEC566 - Implementing and Auditing the Critical Security Controls - In-Depth/text/2016/566.1.pdf
34.4 MB
FOR572 - Advanced Network Forensics Threat Hunting, Analysis, and Incident Response/text/2014/FOR 572.1 - Off the Disk and Onto the Wire.pdf
33.9 MB
AUD507 - Auditing & Monitoring Networks, Perimeters & Systems/text/2016/507.5.pdf
33.8 MB
SEC566 - Implementing and Auditing the Critical Security Controls - In-Depth/text/2016/566.3.pdf
33.2 MB
SEC580 - Metasploit Kung Fu for Enterprise Pen Testing/text/2011/sans 580.2.pdf
33.0 MB
SEC566 - Implementing and Auditing the Critical Security Controls - In-Depth/text/2016/566.5.pdf
33.0 MB
SEC564 - Red Team Operations and Threat Emulation/text/2017/SANS564.1.pdf
32.9 MB
SEC760 - Advanced Exploit Development for Penetration Testers/text/2014/SANS 760 Day2.pdf
32.9 MB
AUD507 - Auditing & Monitoring Networks, Perimeters & Systems/text/2016/507.1.pdf
32.8 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/text/2015/SANS 610 Day1.pdf
32.4 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/text/2010/SANS 610.1.pdf
32.4 MB
AUD507 - Auditing & Monitoring Networks, Perimeters & Systems/text/2016/507.3.pdf
32.4 MB
SEC760 - Advanced Exploit Development for Penetration Testers/text/2014/SANS 760 Day4.pdf
32.2 MB
FOR500 - Windows Forensic Analysis/text/2014/SANS408-4-6.pdf
32.0 MB
SEC524 - Cloud Security Fundamentals/text/2012/524.2.pdf
31.4 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/text/2015/SANS 610 Day4.pdf
31.2 MB
SEC564 - Red Team Operations and Threat Emulation/text/2017/SANS564.2.pdf
31.0 MB
SEC760 - Advanced Exploit Development for Penetration Testers/text/2014/SANS 760 Day3.pdf
31.0 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/text/2016/SEC642.3 - Web Cryptography.pdf
30.4 MB
SEC501 - Advanced Security Essentials - Enterprise Defender/Text/2016/SANS SEC501.5 Malware.pdf
30.2 MB
AUD507 - Auditing & Monitoring Networks, Perimeters & Systems/text/2016/507.2.pdf
30.0 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/text/2011/sans 542-Day2.pdf
30.0 MB
SEC760 - Advanced Exploit Development for Penetration Testers/text/2014/SANS 760 Day5.pdf
29.9 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/text/2016/SEC642.1 - Advanced Attacks.pdf
29.8 MB
SEC401 - Security Essentials Bootcamp Style/Text/2011/401.6 Linux Security.pdf
29.2 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/text/2011/sans 542-Day1.pdf
28.2 MB
SEC599 - Defeating Advanced Adversaries - Implementing Kill Chain Defenses/2017/599.3.pdf
27.8 MB
SEC599 - Defeating Advanced Adversaries - Implementing Kill Chain Defenses/2017/599.4.pdf
27.8 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/text/2010/SANS-542.1.2.pdf
27.8 MB
SEC760 - Advanced Exploit Development for Penetration Testers/text/2016/SEC760.2 - Advanced Linux Exploitation.pdf
27.6 MB
FOR526 - Memory Forensics In-Depth/text/2015/FOR526.3.pdf
27.5 MB
FOR526 - Memory Forensics In-Depth/text/2013/FOR526.5 Windows_Memory_Forensics_2013.pdf
26.8 MB
SEC524 - Cloud Security Fundamentals/text/2012/524.1.pdf
26.8 MB
SEC599 - Defeating Advanced Adversaries - Implementing Kill Chain Defenses/2017/599.2.pdf
26.5 MB
FOR526 - Memory Forensics In-Depth/text/2015/FOR526.Workbook.pdf
26.5 MB
SEC599 - Defeating Advanced Adversaries - Implementing Kill Chain Defenses/2017/599.1.pdf
26.3 MB
SEC617 - Wireless Penetration Testing and Ethical Hacking/text/2015/SEC617.5 - Bluetooth, DECT and ZigBee Attacks.pdf
26.0 MB
FOR526 - Memory Forensics In-Depth/text/2013/FOR526.1 UnStructured_Memory_Analysis_2013.pdf
25.9 MB
SEC503 - Intrusion Detection In-Depth/Text/2010/workbook.pdf
25.7 MB
SEC503 - Intrusion Detection In-Depth/Text/2010/503.1.pdf
25.5 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/text/2011/sans 542-Day5.pdf.pdf
25.5 MB
FOR500 - Windows Forensic Analysis/text/2014/SANS408-ExerciseWorkbook.pdf
25.2 MB
FOR526 - Memory Forensics In-Depth/text/2015/FOR526.1.pdf
24.7 MB
FOR572 - Advanced Network Forensics Threat Hunting, Analysis, and Incident Response/text/2014/FOR 572.3 - Network Protocols and Wireless Investigations.pdf
24.6 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/text/2011/sans 542-Day3.pdf
24.4 MB
SEC617 - Wireless Penetration Testing and Ethical Hacking/text/2015/SEC617.3 - Client, Crypto, and Enterprise Attacks.pdf
24.2 MB
SEC617 - Wireless Penetration Testing and Ethical Hacking/text/2015/SEC617.2 - Wireless Tools and Information Analysis.pdf
24.0 MB
SEC617 - Wireless Penetration Testing and Ethical Hacking/text/2015/SEC617.4 - Advanced WiFi Attack Techniques.pdf
24.0 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/text/2016/SEC642.4 - Alternative Web Interfaces.pdf
23.9 MB
SEC503 - Intrusion Detection In-Depth/Text/2015/503.6.pdf
23.8 MB
SEC599 - Defeating Advanced Adversaries - Implementing Kill Chain Defenses/2017/599.5.pdf
23.4 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/text/2016/SEC642.2 - Discovery and Exploitation for Specific Applications.pdf
22.8 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/text/2016/SEC642.5 - Web Application Firewall and Filter Bypass.pdf
22.2 MB
SEC617 - Wireless Penetration Testing and Ethical Hacking/text/2015/SEC617.1 - Wireless Data Collection and WiFi MAC Analysis.pdf
22.0 MB
FOR526 - Memory Forensics In-Depth/text/2013/FOR526.2 Windows_Memory_Internals_2013.pdf
21.8 MB
SEC617 - Wireless Penetration Testing and Ethical Hacking/text/2015/SEC617.6 - Wireless Security Strategies and Implementation.pdf
21.4 MB
FOR526 - Memory Forensics In-Depth/text/2013/FOR526.3 User_Visible_Objects_2013_rev1.pdf
21.3 MB
FOR508 - Advanced Digital Forensics, Incident Response, and Threat Hunting/text/2015/508.4-5.pdf
21.3 MB
AUD507 - Auditing & Monitoring Networks, Perimeters & Systems/text/2008/SANS Audit 507.3 Network Auditing Essentials (2008).pdf
20.9 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/text/2011/sans 542-Day4.pdf
20.7 MB
AUD507 - Auditing & Monitoring Networks, Perimeters & Systems/text/2008/SANS Audit 507.1 Audit Principles, Risk Assessment & Effective Reporting (2008).pdf
20.3 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/text/2010/SANS-542.2.3.pdf
19.3 MB
SEC503 - Intrusion Detection In-Depth/Text/2010/503.4.pdf
19.2 MB
FOR572 - Advanced Network Forensics Threat Hunting, Analysis, and Incident Response/text/2014/FOR 572.4 - Logging, OPSEC, and Footprint.pdf
18.9 MB
FOR572 - Advanced Network Forensics Threat Hunting, Analysis, and Incident Response/text/2014/FOR 572.2 - NetFlow Analysis, Commercial Tools.pdf
18.4 MB
FOR508 - Advanced Digital Forensics, Incident Response, and Threat Hunting/text/2016/508.3-4.pdf
17.8 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/text/2016/SANS504.5.pdf
17.8 MB
FOR572 - Advanced Network Forensics Threat Hunting, Analysis, and Incident Response/text/2014/FOR 572.5 Encryption, Protocol Reversing and Automation.pdf
17.7 MB
SEC505 - Securing Windows and PowerShell Automation/text/2010/SANS Security 505.6 Windows PowerShell (2010).pdf
17.5 MB
SEC560 - Network Penetration Testing and Ethical Hacking/text/2009/SANS_560.1.pdf
17.2 MB
AUD507 - Auditing & Monitoring Networks, Perimeters & Systems/text/2008/SANS Audit 507.4 Web Application Auditing (2008).pdf
17.2 MB
SEC511 - Continuous Monitoring and Security Operations/text/2015/SEC511-workbook.pdf
16.3 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/text/2016/SANS504.3.pdf
16.2 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/text/2010/SANS 610.3.pdf
16.1 MB
AUD507 - Auditing & Monitoring Networks, Perimeters & Systems/text/2008/SANS Audit 507.2 Auditing the Perimeter (2008).pdf
16.0 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/text/2016/SANS504.4.pdf
15.9 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/text/2010/SANS 610.5.pdf
15.9 MB
FOR500 - Windows Forensic Analysis/text/2014/SANS408-2-3.pdf
15.9 MB
SEC560 - Network Penetration Testing and Ethical Hacking/text/2009/SANS_560.3.pdf
15.8 MB
FOR508 - Advanced Digital Forensics, Incident Response, and Threat Hunting/text/2016/508.6.pdf
15.7 MB
FOR508 - Advanced Digital Forensics, Incident Response, and Threat Hunting/text/2015/508.Workbook.pdf
15.6 MB
FOR526 - Memory Forensics In-Depth/text/2013/FOR526.4 Internal_Structures_2013.pdf
15.3 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/text/2010/SANS-542.1.4.pdf
15.2 MB
FOR518 - Mac and iOS Forensic Analysis and Incident Response/text/2015/FOR518.WB.pdf
15.0 MB
SEC560 - Network Penetration Testing and Ethical Hacking/text/2009/SANS_560.5.pdf
14.6 MB
FOR508 - Advanced Digital Forensics, Incident Response, and Threat Hunting/text/2015/508.1.pdf
14.5 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/text/2016/SEC542_Book5.pdf
14.4 MB
FOR508 - Advanced Digital Forensics, Incident Response, and Threat Hunting/text/2015/508.2.pdf
14.1 MB
SEC560 - Network Penetration Testing and Ethical Hacking/text/2009/SANS_560.2.pdf
14.0 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/text/2016/SANS504.2.pdf
14.0 MB
FOR508 - Advanced Digital Forensics, Incident Response, and Threat Hunting/text/2016/508.2.pdf
13.9 MB
MGT514 - Security Strategic Planning, Policy, and Leadership/text/2016/MGT514.1 - Strategic Planning Foundations.pdf
13.7 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/text/2010/SANS 610.4.pdf
13.7 MB
SEC560 - Network Penetration Testing and Ethical Hacking/text/2009/SANS_560.4.pdf
13.6 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/text/2016/SEC542_Book3.pdf
13.6 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/text/2010/SANS Security 504.5.pdf
13.3 MB
SEC550 - Active Defense, Offensive Countermeasures and Cyber Deception/text/2016/SANS550 - 2016.pdf
13.2 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/text/2010/SANS Security 504.1.pdf
12.3 MB
SEC573 - Automating Information Security with Python/text/2017/SEC573.6.pdf
12.2 MB
SEC501 - Advanced Security Essentials - Enterprise Defender/Text/2016/SANS SEC501.1 Defensive Network Infrastructure.pdf
12.1 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/text/2016/SEC542_Book4.pdf
12.1 MB
AUD507 - Auditing & Monitoring Networks, Perimeters & Systems/text/2008/SANS Audit 507.5 Advanced Windows Auditing (2008).pdf
12.0 MB
FOR518 - Mac and iOS Forensic Analysis and Incident Response/text/2015/FOR518.4.pdf
11.7 MB
SEC505 - Securing Windows and PowerShell Automation/text/2010/SANS Security 505.4 Windows Firewalls, IPSec, Wireless & VPN's (2010).pdf
11.6 MB
SEC501 - Advanced Security Essentials - Enterprise Defender/Text/2016/SANS SEC501.3 Pentest.pdf
11.6 MB
SEC501 - Advanced Security Essentials - Enterprise Defender/Text/2016/SANS SEC501.4 First Responder.pdf
11.5 MB
SEC501 - Advanced Security Essentials - Enterprise Defender/Text/2016/SANS SEC501.2 Packet Analysis.pdf
11.4 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/text/2010/SANS-542.2.2.pdf
11.2 MB
FOR508 - Advanced Digital Forensics, Incident Response, and Threat Hunting/text/2016/508.5.pdf
11.2 MB
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques/text/2010/SANS 610.2.pdf
11.1 MB
FOR518 - Mac and iOS Forensic Analysis and Incident Response/text/2015/FOR518.5.pdf
10.6 MB
AUD507 - Auditing & Monitoring Networks, Perimeters & Systems/text/2008/SANS Audit 507.6 Auditing Unix Systems (2008).pdf
10.6 MB
SEC505 - Securing Windows and PowerShell Automation/text/2010/SANS Security 505.5 Securing IIS 7.0 (2010).pdf
10.5 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/text/2010/SANS Security 504.3.pdf
10.2 MB
FOR518 - Mac and iOS Forensic Analysis and Incident Response/text/2015/FOR518.2.pdf
9.9 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/text/2010/SANS Security 504.2.pdf
9.7 MB
SEC501 - Advanced Security Essentials - Enterprise Defender/Text/2016/SANS SEC501.6 Data Loss Prevention.pdf
9.7 MB
FOR518 - Mac and iOS Forensic Analysis and Incident Response/text/2015/FOR518.1.pdf
9.5 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/text/2010/SANS Security 504.4.pdf
9.3 MB
FOR518 - Mac and iOS Forensic Analysis and Incident Response/text/2015/FOR518.3.pdf
9.1 MB
FOR508 - Advanced Digital Forensics, Incident Response, and Threat Hunting/text/2015/508.3.pdf
8.9 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/text/2010/SANS-542.3.1.pdf
8.6 MB
SEC511 - Continuous Monitoring and Security Operations/text/2015/SEC511-4.pdf
8.5 MB
SEC560 - Network Penetration Testing and Ethical Hacking/text/2012/560.1-2012.pdf
8.4 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/text/2010/SANS-542.5.1.pdf
8.4 MB
SEC505 - Securing Windows and PowerShell Automation/text/2010/SANS Security 505.1 Securing Active Directory & DNS (2010).pdf
8.3 MB
FOR508 - Advanced Digital Forensics, Incident Response, and Threat Hunting/text/2016/508.1.pdf
8.3 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/text/2012/542.1 - The Attacker's View of the Web.pdf
8.3 MB
SEC511 - Continuous Monitoring and Security Operations/text/2016/511.6.pdf
8.1 MB
SEC617 - Wireless Penetration Testing and Ethical Hacking/text/2007/617_2_wireless_networks.pdf
8.1 MB
SEC617 - Wireless Penetration Testing and Ethical Hacking/text/2007/617_3_wireless_networks.pdf
8.1 MB
SEC505 - Securing Windows and PowerShell Automation/text/2010/SANS Security 505.3 Windows PKI, EFS & Bitlocker (2010).pdf
8.0 MB
SEC560 - Network Penetration Testing and Ethical Hacking/text/2012/560.2-2012.pdf
8.0 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/text/2010/SANS-542.5.2.pdf
7.8 MB
SEC511 - Continuous Monitoring and Security Operations/text/2015/SEC511-5.pdf
7.8 MB
SEC560 - Network Penetration Testing and Ethical Hacking/text/2012/560.3-2012.pdf
7.8 MB
SEC505 - Securing Windows and PowerShell Automation/text/2010/SANS Security 505.2 Enforcing Critical Controls with Group Policy (2010).pdf
7.8 MB
SEC617 - Wireless Penetration Testing and Ethical Hacking/text/2007/617_5_wireless_networks.pdf
7.7 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/text/2012/542.2 - Reconnaissance and Mapping.pdf
7.6 MB
SEC511 - Continuous Monitoring and Security Operations/text/2015/SEC511-3.pdf
7.5 MB
SEC617 - Wireless Penetration Testing and Ethical Hacking/text/2007/617_6_wireless_networks.pdf
7.5 MB
SEC511 - Continuous Monitoring and Security Operations/text/2015/SEC511-1.pdf
7.5 MB
SEC560 - Network Penetration Testing and Ethical Hacking/text/2012/560.5-2012.pdf
7.4 MB
SEC617 - Wireless Penetration Testing and Ethical Hacking/text/2007/617_4_wireless_networks.pdf
7.3 MB
SEC560 - Network Penetration Testing and Ethical Hacking/text/2012/560.4-2012.pdf
7.2 MB
SEC511 - Continuous Monitoring and Security Operations/text/2015/SEC511-2.pdf
7.0 MB
SEC617 - Wireless Penetration Testing and Ethical Hacking/text/2007/617_1_wireless_networks.pdf
7.0 MB
SEC555 - SIEM with Tactical Analytics/text/2017/SEC555.6 Capstone Design, Detect, Defend.pdf
6.9 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/text/2010/SANS-542.4.1.pdf
6.8 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/text/2010/SANS-542.3.2.pdf
6.7 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/text/2010/SANS-542.4.2.pdf
6.6 MB
SEC560 - Network Penetration Testing and Ethical Hacking/text/2016/560.6.pdf
6.1 MB
SEC560 - Network Penetration Testing and Ethical Hacking/text/2015/560.6_1Q2015_P34.pdf
5.4 MB
SEC617 - Wireless Penetration Testing and Ethical Hacking/text/2007/617_workbook_wireless_networks.pdf
5.3 MB
SEC599 - Defeating Advanced Adversaries - Implementing Kill Chain Defenses/2017/599.6.pdf
5.0 MB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/text/2013/642.6 - Capture the Flag.pdf
3.7 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/text/2012/542.5 - Exploitation.pdf
3.7 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/text/2012/542.3 - Server-Side Discovery.pdf
3.7 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/text/2016/SANS504.6.pdf
3.6 MB
FOR526 - Memory Forensics In-Depth/text/2013/FOR526_Workbook_2013.pdf
3.5 MB
SEC617 - Wireless Penetration Testing and Ethical Hacking/text/2007/617_bootcamp_wireless_networks.pdf
3.3 MB
SEC542 - Web App Penetration Testing and Ethical Hacking/text/2012/542.4 - Client-Side Discovery.pdf
3.0 MB
ICS410 - ICS SCADA Security Essentials/text/2016/410.4.pdf
2.7 MB
ICS410 - ICS SCADA Security Essentials/text/2016/410.3.pdf
2.6 MB
ICS410 - ICS SCADA Security Essentials/text/2016/410.5.pdf
2.5 MB
SEC506 - Securing Linux-Unix/text/2000/SANS Securing Linux.pdf
2.4 MB
SEC511 - Continuous Monitoring and Security Operations/text/2015/SEC511-6.pdf
2.3 MB
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling/text/2010/SANS Security 504.6.pdf
2.2 MB
ICS410 - ICS SCADA Security Essentials/text/2016/410.2.pdf
2.2 MB
ICS410 - ICS SCADA Security Essentials/text/2016/410.1.pdf
2.1 MB
SEC503 - Intrusion Detection In-Depth/Text/2003/3.1.6 - IP Behavior V - DNS.pdf
2.0 MB
SEC503 - Intrusion Detection In-Depth/Text/2003/3.4.12 - Appendix - Log File Analysis Intro.pdf
1.9 MB
SEC503 - Intrusion Detection In-Depth/Text/2003/3.2.1 - Introduction to tcpdump.pdf
1.7 MB
SEC503 - Intrusion Detection In-Depth/Text/2003/3.1.8 - IPSec.pdf
1.7 MB
SEC503 - Intrusion Detection In-Depth/Text/2003/3.2.0 - tcpdump Exercises.pdf
1.7 MB
SEC503 - Intrusion Detection In-Depth/Text/2003/3.1.1 - TCP.IP Refresher.pdf
1.7 MB
SEC503 - Intrusion Detection In-Depth/Text/2003/3.1.7 - IP Routing.pdf
1.6 MB
SEC503 - Intrusion Detection In-Depth/Text/2003/3.1.4 - IP Behavior III - Stimulus and Response.pdf
1.6 MB
SEC503 - Intrusion Detection In-Depth/Text/2003/3.1.3 - IP Behavior II - ICMP.pdf
1.6 MB
SEC503 - Intrusion Detection In-Depth/Text/2003/3.1.5 - IP Behavior IV - Microsoft Networking.pdf
1.5 MB
SEC503 - Intrusion Detection In-Depth/Text/2003/3.4.8 - Intrusion Detection Patterns I.pdf
1.4 MB
SEC503 - Intrusion Detection In-Depth/Text/2003/3.4.10 - Network Mapping and Information Gathering.pdf
1.3 MB
SEC503 - Intrusion Detection In-Depth/Text/2003/3.1.2 - IP Behavior I - Fragmentation.pdf
1.3 MB
SEC503 - Intrusion Detection In-Depth/Text/2003/3.4.7 - Traffic Analysis II.pdf
1.2 MB
SEC503 - Intrusion Detection In-Depth/Text/2003/3.2.5 - Examination of Datagram Fields III.pdf
1.2 MB
SEC503 - Intrusion Detection In-Depth/Text/2003/3.4.4 - Basic Analysis.pdf
1.2 MB
SEC503 - Intrusion Detection In-Depth/Text/2003/3.4.5 - Indications and Warnings.pdf
1.2 MB
SEC503 - Intrusion Detection In-Depth/Text/2003/3.2.7 - Real World Examples.pdf
1.1 MB
SEC503 - Intrusion Detection In-Depth/Text/2003/3.2.8 - Advanced Analysis.pdf
1.1 MB
SEC503 - Intrusion Detection In-Depth/Text/2003/3.3.0 - Snort Exercises.pdf
1.1 MB
SEC503 - Intrusion Detection In-Depth/Text/2003/3.2.6 - Beginning Analysis.pdf
1.1 MB
AUD507 - Auditing & Monitoring Networks, Perimeters & Systems/text/2016/AUD 507 Tools Quickreference.pdf
1.0 MB
SEC503 - Intrusion Detection In-Depth/Text/2003/3.4.2 - Interoperability and Signatures.pdf
984.5 kB
SEC503 - Intrusion Detection In-Depth/Text/2003/3.3.3 - Snort III.pdf
980.8 kB
SEC503 - Intrusion Detection In-Depth/Text/2003/3.3.6 - Snort VI.pdf
925.8 kB
SEC503 - Intrusion Detection In-Depth/Text/2003/3.3.4 - Snort IV.pdf
899.6 kB
SEC503 - Intrusion Detection In-Depth/Text/2003/3.4.3 - SYN Floods and TCP Sequence Numbers.pdf
873.1 kB
SEC503 - Intrusion Detection In-Depth/Text/2003/3.4.11 - Coordinated Attacks and Correlation.pdf
871.6 kB
SEC503 - Intrusion Detection In-Depth/Text/2003/3.4.1 - Terminology and Firewalls.pdf
842.7 kB
SEC503 - Intrusion Detection In-Depth/Text/2003/3.4.6 - Traffic Analysis I.pdf
764.0 kB
SEC503 - Intrusion Detection In-Depth/Text/2003/3.4.9 - Intrusion Detection Patterns II.pdf
737.1 kB
SEC503 - Intrusion Detection In-Depth/Text/2003/3.2.3 - Examination of Datagram Fields I.pdf
728.1 kB
SEC503 - Intrusion Detection In-Depth/Text/2003/3.3.1 - Snort I.pdf
727.6 kB
SEC503 - Intrusion Detection In-Depth/Text/2003/3.2.4 - Examination of Datagram Fields II.pdf
710.1 kB
SEC542 - Web App Penetration Testing and Ethical Hacking/text/2010/SANS-542.1.3.pdf
659.7 kB
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques/text/2016/SEC642.6 - Capture the Flag.pdf
609.8 kB
SEC503 - Intrusion Detection In-Depth/Text/2003/3.2.2 - Writing tcpdump Filters.pdf
560.8 kB
FOR526 - Memory Forensics In-Depth/text/2013/FOR526_20131006_OnDemand_Release_Notes_Rev131028.pdf
528.5 kB
SEC503 - Intrusion Detection In-Depth/Text/2003/3.2.9 - Appendix - Hexidecimal Refresher.pdf
472.4 kB
AUD507 - Auditing & Monitoring Networks, Perimeters & Systems/text/2016/IOS IPv4 Access Lists.pdf
443.3 kB
FOR526 - Memory Forensics In-Depth/text/2013/FOR526_HANDOUT_APT-ANSWERS.pdf
407.6 kB
AUD507 - Auditing & Monitoring Networks, Perimeters & Systems/text/2016/Web Application Audit Checklist.pdf
402.4 kB
SEC503 - Intrusion Detection In-Depth/Text/2003/3.3.5 - Snort V.pdf
396.7 kB
AUD507 - Auditing & Monitoring Networks, Perimeters & Systems/text/2016/regularexpressions.pdf
370.7 kB
SEC503 - Intrusion Detection In-Depth/Text/2003/3.3.2 - Snort II.pdf
346.7 kB
AUD507 - Auditing & Monitoring Networks, Perimeters & Systems/text/2016/Active Directory Cheat Sheet.pdf
344.2 kB
AUD507 - Auditing & Monitoring Networks, Perimeters & Systems/text/2016/Active Directory Cheat Sheet_1.pdf
298.3 kB
SEC560 - Network Penetration Testing and Ethical Hacking/text/2015/560SampleReport.pdf
239.7 kB
SEC542 - Web App Penetration Testing and Ethical Hacking/text/2010/SANS-542.1.1.pdf
208.8 kB
SEC542 - Web App Penetration Testing and Ethical Hacking/text/2010/SANS-542.2.1.pdf
194.2 kB
FOR526 - Memory Forensics In-Depth/text/2013/FOR526_HANDOUT_Cheatsheet.pdf
149.5 kB
SEC503 - Intrusion Detection In-Depth/Text/2003/3.2.0 - Reference Material.pdf
140.5 kB
SEC401 - Security Essentials Bootcamp Style/Text/2004/Section 1.0 - Security Essentials Introduction/SANS Security Essentials Introduction.pdf
35.8 kB
随机展示
相关说明
本站不存储任何资源内容,只收集BT种子元数据(例如文件名和文件大小)和磁力链接(BT种子标识符),并提供查询服务,是一个完全合法的搜索引擎系统。 网站不提供种子下载服务,用户可以通过第三方链接或磁力链接获取到相关的种子资源。本站也不对BT种子真实性及合法性负责,请用户注意甄别!
>