zhongziso
搜索
zhongziso
首页
首页
功能
磁力转BT
BT转磁力
关于
使用教程
免责声明
磁力助手
The Black Packet - Tech Info - Volume 2 - Hacking The System (DVD Master)
magnet:?xt=urn:btih:94D2008B54DF8FCE20408B4FDF70F188FFE867BF&dn=The Black Packet - Tech Info - Volume 2 - Hacking The System (DVD Master)
磁力链接详情
文件列表详情
94D2008B54DF8FCE20408B4FDF70F188FFE867BF
infohash:
50
文件数量
4.29 GB
文件大小
2015-7-25 19:14
创建日期
2024-11-30 15:27
最后访问
相关分词
The
Black
Packet
-
Tech
Info
-
Volume
2
-
Hacking
The
System
DVD
Master
00 - How it's Made - Microprocessors, Circuit Boards, Compact Discs, Computers and more.avi 287.27 MB
00 - In The Realm Of The Hackers (Electron).avi 350.61 MB
00 - Sonic Outlaws (1995).avi 635.25 MB
01 - Thinking Machines - The Creation of the Computer.avi 351.31 MB
02 - Triumph of The Nerds - The Rise of Accidental Empires - Part 1 (1996).avi 499.96 MB
03 - How Internet Traffic works (Warriors of the Net).avi 81.47 MB
04 - Tactical Exploitation-WP.pdf 193.5 KB
04 - Tactical Exploitation.m4v 66.06 MB
04 - Tactical Exploitation.pdf 143.39 KB
05 - Dangerous Minds - The Art of Guerrilla Data Mining-wp.pdf 229.67 KB
05 - Dangerous Minds - The Art of Guerrilla Data Mining.m4v 139.72 MB
05 - Dangerous Minds - The Art of Guerrilla Data Mining.pdf 1.99 MB
06 - Boomstick Fu - The Fundamentals of Physical Security.m4v 92.03 MB
06 - Boomstick Fu - The Fundamentals of Physical Security.pdf 306.06 KB
07 - Biometric and Token Based Access Control - Your Protected by 2 Screws.m4v 94.78 MB
07 - Biometric and Token Based Access Control - Your Protected by 2 Screws.pdf 1.42 MB
08 - Pen Testing WIFI.m4v 33.63 MB
08 - Pen Testing WIFI.pdf 1.37 MB
09 - How To Be A Wifi Ninja.m4v 85.57 MB
10 - Shifting The Focus of WIFI Security - Beyond Cracking Your Neighbors WEP Key.m4v 147.58 MB
10 - Shifting The Focus of WIFI Security - Beyond Cracking Your Neighbors WEP Key.pdf 212.85 KB
11 - WiFish Finder Who Will Bite the Bait.m4v 74.37 MB
11 - WiFish Finder Who Will Bite the Bait.pdf 586.39 KB
12 - Attacks Against 2wire Residential Gateway Routers.m4v 55.71 MB
12 - Attacks Against 2wire Residential Gateway Routers.pdf 2.4 MB
13 - Hacking Iraq.m4v 81.71 MB
14 - Picking Electronic Locks-wp.pdf 94.7 KB
14 - Picking Electronic Locks.m4v 39.19 MB
14 - Picking Electronic Locks.pdf 741.89 KB
15 - Hacking with the iPod Touch, iPhone, or iPad.m4v 150.24 MB
15 - Hacking with the iPod Touch, iPhone, or iPad.pdf 1.81 MB
16 - Is Your iPhone Pwned - Auditing, Attacking and Defending Mobile Devices.m4v 178.28 MB
16 - Is Your iPhone Pwned - Auditing, Attacking and Defending Mobile Devices.pdf 168.35 KB
17 - Side Channel Attacks Using Optical Sampling of Mechanical Energy and Power Line Leakage-wp.pdf 69.02 KB
17 - Side Channel Attacks Using Optical Sampling of Mechanical Energy and Power Line Leakage.m4v 154.74 MB
17 - Side Channel Attacks Using Optical Sampling of Mechanical Energy and Power Line Leakage.pdf 6.02 MB
18 - Hacking the Smart Grid WP.pdf 31.09 KB
18 - Hacking the Smart Grid.m4v 64.69 MB
18 - Hacking the Smart Grid.pdf 136.36 KB
19 - Hacking the Smart Parking Meter.m4v 181.6 MB
19 - Hacking the Smart Parking Meter.pdf 409.56 KB
20 - The Science of Social Engineering.m4v 34.87 MB
20 - The Science of Social Engineering.pdf 83.54 KB
21 - Satellite Imagery Analysis.m4v 80.08 MB
21 - Satellite Imagery Analysis.pdf 7.13 MB
22 - Thinking Outside the Console Box.m4v 62.16 MB
22 - Thinking Outside the Console Box.pdf 5.14 MB
23 - RFID Mythbusting.m4v 131.98 MB
24 - High Security - Locks Lies and Liability.m4v 203.23 MB
24 - High Security - Locks Lies and Liability.pdf 1.34 MB
其他位置