Skocz do zawartości

Aktywacja nowych użytkowników
Zakazane produkcje

Znajdź zawartość

Wyświetlanie wyników dla tagów 'offensive' .



Więcej opcji wyszukiwania

  • Wyszukaj za pomocą tagów

    Wpisz tagi, oddzielając je przecinkami.
  • Wyszukaj przy użyciu nazwy użytkownika

Typ zawartości


Forum

  • DarkSiders
    • Regulamin
    • Dołącz do Ekipy forum jako
    • Ogłoszenia
    • Propozycje i pytania
    • Szukam
    • Help
    • Poradniki / Tutoriale
    • Wszystko o nas
  • Hydepark
    • Newsy
    • Niezwykłe zjawiska
    • Rozrywka
    • Rozmowy...
    • hakerskie nowinki
    • Hardware
    • Webmasters
    • Grafika
    • Telefony i Komunikacja
    • Sport
    • Kulinaria
    • Forum Lady
    • Ciekawe Strony
  • DSTeam no Limits (serwery bez limitów!)
    • FILMY
    • GRY
    • MUZYKA
    • PROGRAMY
    • Ebooki
  • Download
  • Archiwum

Szukaj wyników w...

Znajdź wyniki, które zawierają...


Data utworzenia

  • Od tej daty

    Do tej daty


Ostatnia aktualizacja

  • Od tej daty

    Do tej daty


Filtruj po ilości...

Dołączył

  • Od tej daty

    Do tej daty


Grupa podstawowa


AIM


MSN


Website URL


ICQ


Yahoo


Jabber


Skype


AIM


MSN


Website URL


ICQ


Yahoo


Jabber


Skype


Gadu Gadu


Skąd


Interests


Interests


Polecający

Znaleziono 3 wyniki

  1. Offensive Computer Security (CIS4930 - CIS5930) Spring 2014 Lectures & Videos English | mp4 | H264 1126x720 | AAC 2 ch | PDF, pptx | 7.14 Gb Genre: eLearning The primary incentive for an attacker to exploit a vulnerability, or series of vulnerabilities is to achieve a return on an investment (his/her time usually). This return need not be strictly monetary-an attacker may be interested in obtaining access to data, identities, or some other commodity that is valuable to them. The field of penetration testing involves authorized auditing and exploitation of systems to assess actual system security in order to protect against attackers. This requires thorough knowledge of vulnerabilities and how to exploit them. Thus, this course provides an introductory but comprehensive coverage of the fundamental methodologies, skills, legal issues, and tools used in white hat penetration testing, secure system administration, and incident response. DOWNLOAD http://rapidgator.net/file/990006918c459fa2992c2e6ccb41fd0d/Spring.part1.rar.html http://rapidgator.net/file/37a4d15b7514b1994b5bdab892aa1e47/Spring.part2.rar.html http://rapidgator.net/file/934f46da61943da28e3e6f6f44b4688b/Spring.part3.rar.html http://rapidgator.net/file/c2f35ad763701c69049c5a375f6c4495/Spring.part4.rar.html http://rapidgator.net/file/0d909d8e3964f77b791f5763ace56f2f/Spring.part5.rar.html http://rapidgator.net/file/ba8478c7208ccf67e1ced34b602ad20b/Spring.part6.rar.html http://rapidgator.net/file/9e65e66b4e46ee2602cf5984d43f8e04/Spring.part7.rar.html http://rapidgator.net/file/7b7ec18474dd87bf5c0f90ee7db8dbcc/Spring.part8.rar.html http://uploaded.net/file/1ozfxoms/Spring.part1.rar http://uploaded.net/file/xf6u7loa/Spring.part2.rar http://uploaded.net/file/rz41zmor/Spring.part3.rar http://uploaded.net/file/h11rytn0/Spring.part4.rar http://uploaded.net/file/h6y8js86/Spring.part5.rar http://uploaded.net/file/6599d3ef/Spring.part6.rar http://uploaded.net/file/ldhkoMbf/Spring.part7.rar http://uploaded.net/file/ehsuqi9d/Spring.part8.rar http://www.uploadable.ch/file/v7wvEFynxc3f/Spring.part1.rar http://www.uploadable.ch/file/mE5st6pFp3rs/Spring.part2.rar http://www.uploadable.ch/file/AhqpuV9t9Nmr/Spring.part3.rar http://www.uploadable.ch/file/ups4r8DQzsHn/Spring.part4.rar http://www.uploadable.ch/file/7mtBmk5bMkFK/Spring.part5.rar http://www.uploadable.ch/file/vtDvjpu6ewbT/Spring.part6.rar http://www.uploadable.ch/file/UpQmtmr8j6Fn/Spring.part7.rar http://www.uploadable.ch/file/SysC3jvmeQnd/Spring.part8.rar
  2. Offensive Computer Security (CIS4930 - CIS5930) Spring 2014 Lectures & Videos English | mp4 | H264 1126x720 | AAC 2 ch | pdf, pptx | 7.14 GB eLearning The primary incentive for an attacker to exploit a vulnerability, or series of vulnerabilities is to achieve a return on an investment (his/her time usually). This return need not be strictly monetary-an attacker may be interested in obtaining access to data, identities, or some other commodity that is valuable to them. The field of penetration testing involves authorized auditing and exploitation of systems to assess actual system security in order to protect against attackers. This requires thorough knowledge of vulnerabilities and how to exploit them. Thus, this course provides an introductory but comprehensive coverage of the fundamental methodologies, skills, legal issues, and tools used in white hat penetration testing, secure system administration, and incident response. Download From Uploaded http://uploaded.net/file/dk5xe6dw/xidau123_spring2014lv.part01.rar http://uploaded.net/file/grpp5s0e/xidau123_spring2014lv.part02.rar http://uploaded.net/file/6rg3y84a/xidau123_spring2014lv.part03.rar http://uploaded.net/file/fwqf75w5/xidau123_spring2014lv.part04.rar http://uploaded.net/file/fcxjt7xq/xidau123_spring2014lv.part05.rar http://uploaded.net/file/m11np8uf/xidau123_spring2014lv.part06.rar http://uploaded.net/file/joopxhuz/xidau123_spring2014lv.part07.rar http://uploaded.net/file/ojjejq1r/xidau123_spring2014lv.part08.rar http://uploaded.net/file/5yiejgp4/xidau123_spring2014lv.part09.rar Download From NitroFlare http://www.nitroflare.com/view/C60ACFD80FB1643/xidau123_spring2014lv.part01.rar http://www.nitroflare.com/view/F687BBBC12F82BA/xidau123_spring2014lv.part02.rar http://www.nitroflare.com/view/CCFC5309B13ADDE/xidau123_spring2014lv.part03.rar http://www.nitroflare.com/view/A7E7A77FC700078/xidau123_spring2014lv.part04.rar http://www.nitroflare.com/view/A9BB90461778C21/xidau123_spring2014lv.part05.rar http://www.nitroflare.com/view/9E8903996F5E9C4/xidau123_spring2014lv.part06.rar http://www.nitroflare.com/view/0C5B3107BB9AA92/xidau123_spring2014lv.part07.rar http://www.nitroflare.com/view/361EE78B73EDC96/xidau123_spring2014lv.part08.rar http://www.nitroflare.com/view/406C62385D41BC8/xidau123_spring2014lv.part09.rar Download From Rapidgator http://rapidgator.net/file/9f464d1e5f0c16305e2a1869530f890b/xidau123_spring2014lv.part01.rar.html http://rapidgator.net/file/6ea68a3f7e3c0fd3582c775292aa010f/xidau123_spring2014lv.part02.rar.html http://rapidgator.net/file/7c50b70dc0c9de47ea1b7c866dbc8ef6/xidau123_spring2014lv.part03.rar.html http://rapidgator.net/file/69f71c721806ee4dc7479c4345b6d862/xidau123_spring2014lv.part04.rar.html http://rapidgator.net/file/da4ef3889a48d6fc0bb40779c3167d5f/xidau123_spring2014lv.part05.rar.html http://rapidgator.net/file/e0486db960cf7fa5b9cdb6aaaa25c624/xidau123_spring2014lv.part06.rar.html http://rapidgator.net/file/f8ea3910de29ff91a420fc0d4002da3e/xidau123_spring2014lv.part07.rar.html http://rapidgator.net/file/5a77640307cf33bf57715c260893c971/xidau123_spring2014lv.part08.rar.html http://rapidgator.net/file/7c66583a276d4a1e628f05ccfd53d4f8/xidau123_spring2014lv.part09.rar.html
  3. John Jackson Miller - Overdraft: The Orion Offensive Unabridged AudioBook | 2013 | Genre: Science Fiction | English | ISBN-13: 9781477807521 | MP3 64Kb | Length: 11 hrs and 26 mins | 314.99 MB After an egotistical stock trader for one of the twenty-second century's biggest corporations gets greedy and loses his employer a fortune, he has two options: go to jail or make the money back before anyone notices. Unfortunately, the only place such profits can be found is the galactic frontier, a region so dangerous it'll take an uneasy alliance with a crew of rugged mercenaries to keep him alive and in the black. You'd have to be insane to trade with the violent denizens of the Orion Arm, but with just one hundred days to recoup $100 billion, Jamie Sturm is feeling a little crazy. Standing between Jamie and a variety of agonizing deaths is Surge Team Sigma, the squad of power-armored mercenaries tasked with protecting him. Their last job ended in disaster thanks to Jamie's scheming, and, led by the implacable Bridget Yang, the team is determined to keep the hapless Jamie alive long enough to fix their reputation. That is, assuming they can ignore their own growing desire to flush the annoying tagalong out of the nearest airlock. Download Link http://rapidgator.net/file/571943146ad0592ec351f9f05a5d1850/Overdraft.part1.rar.html http://rapidgator.net/file/20cfda7ee04118045f85de6f245849ae/Overdraft.part2.rar.html http://rapidgator.net/file/7bc5ab9425f4759c31ceab2a81ce67e9/Overdraft.part3.rar.html http://rapidgator.net/file/2629bafb29affc9a52c14e4a7d3065bd/Overdraft.part4.rar.html
×
×
  • Dodaj nową pozycję...

Powiadomienie o plikach cookie

Korzystając z tej witryny, wyrażasz zgodę na nasze Warunki użytkowania.