Datasets:
Tasks:
Text Generation
Languages:
English
Upload folder using huggingface_hub
Browse filesThis view is limited to 50 files because it contains too many changes.
See raw diff
- .gitattributes +134 -0
- Security/(Ebook - Computer) Hacking The Windows Registry.pdf +0 -0
- Security/(eBook - PDF) Hugo Cornwall - The Hacker's Handbook .pdf +0 -0
- Security/0321108957.Addison-Wesley Professional.Honeypots- Tracking Hackers.pdf +3 -0
- Security/285063-Hacker.Bibel.[278.kB_www.netz.ru].pdf +0 -0
- Security/3077366-HackerHighSchool.pdf +3 -0
- Security/731986-Hacker's Desk Reference.pdf +0 -0
- Security/Addison Wesley - Hackers Delight 2002.pdf +3 -0
- Security/Addison Wesley, The Outlook Answer Book Useful Tips Tricks And Hacks (2005) Bbl Lotb.chm +3 -0
- Security/Ahmad-Reza_Sadeghi,_David_Naccache,_Pim_Tuyls-Towards_Hardware-Intrinsic_Security__Foundations_and_Practice_(Information_Security_and_Cryptography)(2010).pdf +3 -0
- Security/Attacking the DNS Protocol.pdf +0 -0
- Security/Auerbach.Practical.Hacking.Techniques.and.Countermeasures.Nov.2006.pdf +3 -0
- Security/Auerbach.Pub.The.Hackers.Handbook.The.Strategy.Behind.Breaking.into.and.Defending.Networks.Nov.20.pdf +3 -0
- Security/Botnets - The killer web applications.pdf +3 -0
- Security/Certified Ethical Hacker (CEH) v3.0 Official Course.pdf +3 -0
- Security/Charles.C.Thomas-Document.Security.Protecting.Physical.and.Electronic.Content.2007.RETAiL.EBook.pdf +3 -0
- Security/Computer - Hackers Secrets - e-book.pdf +0 -0
- Security/Cracking_Passwords_Guide.pdf +0 -0
- Security/Credit.Card.Visa.Hack.Ucam.Cl.Tr.560.[223.kB_www.netz.ru].pdf +0 -0
- Security/Cross Site Scripting Attacks Xss Exploits and Defense.pdf +3 -0
- Security/DangerousGoogle-SearchingForSecrets.pdf +3 -0
- Security/Dummies - Hack How To Create Keygens (1).pdf +0 -0
- Security/For.Dummies.Hacking.Wireless.Networks.For.Dummies.Sep.2005.eBook-DDU.pdf +3 -0
- Security/Gray Hat Hacking~The Ethical Hacker's Handbook, 3e [2011].pdf +3 -0
- Security/Hack IT Security Through Penetration Testing.pdf +3 -0
- Security/Hack Proofing Linux A Guide to Open Source Security - Stangler, Lane - Syngress - ISBN 1-928994-34-2.pdf +3 -0
- Security/Hack Proofing Sun Solaris 8.pdf +3 -0
- Security/Hack Proofing Your E-Commerce Site.pdf +3 -0
- Security/Hack Proofing Your Network Second Edition.pdf +3 -0
- Security/Hack Proofing Your Network_First Edition.pdf +3 -0
- Security/Hack Proofing Your Web Applications.pdf +3 -0
- Security/Hack_Attacks_Revealed_A_Complete_Reference_With_Custom_Security_Hacking_Toolkit.chm +3 -0
- Security/Hack_IT_Security_Through_Penetration_Testing.chm +3 -0
- Security/Hacker Disassembling Uncovered.chm +3 -0
- Security/Hacker Linux Uncovered.chm +3 -0
- Security/Hacker Web Exploitation Uncovered.chm +0 -0
- Security/Hacker'S.Delight.chm +3 -0
- Security/HackerMonthly/hackermonthly-issue001.zip +3 -0
- Security/HackerMonthly/hackermonthly-issue002.zip +3 -0
- Security/HackerMonthly/hackermonthly-issue003.zip +3 -0
- Security/HackerMonthly/hackermonthly-issue004.zip +3 -0
- Security/HackerMonthly/hackermonthly-issue005.zip +3 -0
- Security/HackerMonthly/hackermonthly-issue006.zip +3 -0
- Security/HackerMonthly/hackermonthly-issue007.zip +3 -0
- Security/HackerMonthly/hackermonthly-issue008.zip +3 -0
- Security/HackerMonthly/hackermonthly-issue009.zip +3 -0
- Security/HackerMonthly/hackermonthly-issue010.zip +3 -0
- Security/HackerMonthly/hackermonthly-issue011.zip +3 -0
- Security/HackerMonthly/hackermonthly-issue012.zip +3 -0
- Security/HackerMonthly/hackermonthly-issue013.zip +3 -0
.gitattributes
CHANGED
@@ -2708,3 +2708,137 @@ Programming/Smalltalk/The[[:space:]]Art[[:space:]]and[[:space:]]Science[[:space:
|
|
2708 |
Programming/VB/Visual[[:space:]]Basic[[:space:]]2005[[:space:]]Express[[:space:]]Edition[[:space:]]for[[:space:]]Dummies.pdf filter=lfs diff=lfs merge=lfs -text
|
2709 |
Programming/VB/Visual[[:space:]]Basic[[:space:]]2005[[:space:]]for[[:space:]]Dummies.pdf filter=lfs diff=lfs merge=lfs -text
|
2710 |
Programming/VB/Wrox.Beginning.Microsoft.Visual.Basic.2008.May.2008.pdf filter=lfs diff=lfs merge=lfs -text
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
2708 |
Programming/VB/Visual[[:space:]]Basic[[:space:]]2005[[:space:]]Express[[:space:]]Edition[[:space:]]for[[:space:]]Dummies.pdf filter=lfs diff=lfs merge=lfs -text
|
2709 |
Programming/VB/Visual[[:space:]]Basic[[:space:]]2005[[:space:]]for[[:space:]]Dummies.pdf filter=lfs diff=lfs merge=lfs -text
|
2710 |
Programming/VB/Wrox.Beginning.Microsoft.Visual.Basic.2008.May.2008.pdf filter=lfs diff=lfs merge=lfs -text
|
2711 |
+
Security/0321108957.Addison-Wesley[[:space:]]Professional.Honeypots-[[:space:]]Tracking[[:space:]]Hackers.pdf filter=lfs diff=lfs merge=lfs -text
|
2712 |
+
Security/3077366-HackerHighSchool.pdf filter=lfs diff=lfs merge=lfs -text
|
2713 |
+
Security/Addison[[:space:]]Wesley[[:space:]]-[[:space:]]Hackers[[:space:]]Delight[[:space:]]2002.pdf filter=lfs diff=lfs merge=lfs -text
|
2714 |
+
Security/addison[[:space:]]wesley[[:space:]]-[[:space:]]web[[:space:]]hacking[[:space:]]-[[:space:]]attacks[[:space:]]and[[:space:]]defense.chm filter=lfs diff=lfs merge=lfs -text
|
2715 |
+
Security/Addison[[:space:]]Wesley,[[:space:]]The[[:space:]]Outlook[[:space:]]Answer[[:space:]]Book[[:space:]]Useful[[:space:]]Tips[[:space:]]Tricks[[:space:]]And[[:space:]]Hacks[[:space:]](2005)[[:space:]]Bbl[[:space:]]Lotb.chm filter=lfs diff=lfs merge=lfs -text
|
2716 |
+
Security/Ahmad-Reza_Sadeghi,_David_Naccache,_Pim_Tuyls-Towards_Hardware-Intrinsic_Security__Foundations_and_Practice_(Information_Security_and_Cryptography)(2010).pdf filter=lfs diff=lfs merge=lfs -text
|
2717 |
+
Security/amazon-hacks.chm filter=lfs diff=lfs merge=lfs -text
|
2718 |
+
Security/Auerbach.Practical.Hacking.Techniques.and.Countermeasures.Nov.2006.pdf filter=lfs diff=lfs merge=lfs -text
|
2719 |
+
Security/Auerbach.Pub.The.Hackers.Handbook.The.Strategy.Behind.Breaking.into.and.Defending.Networks.Nov.20.pdf filter=lfs diff=lfs merge=lfs -text
|
2720 |
+
Security/Botnets[[:space:]]-[[:space:]]The[[:space:]]killer[[:space:]]web[[:space:]]applications.pdf filter=lfs diff=lfs merge=lfs -text
|
2721 |
+
Security/bsd-hacks.pdf filter=lfs diff=lfs merge=lfs -text
|
2722 |
+
Security/ceh-official-certified-ethical-hacker-review-guide-exam-312-50.9780782144376.27422.pdf filter=lfs diff=lfs merge=lfs -text
|
2723 |
+
Security/Certified[[:space:]]Ethical[[:space:]]Hacker[[:space:]](CEH)[[:space:]]v3.0[[:space:]]Official[[:space:]]Course.pdf filter=lfs diff=lfs merge=lfs -text
|
2724 |
+
Security/Charles.C.Thomas-Document.Security.Protecting.Physical.and.Electronic.Content.2007.RETAiL.EBook.pdf filter=lfs diff=lfs merge=lfs -text
|
2725 |
+
Security/Cross[[:space:]]Site[[:space:]]Scripting[[:space:]]Attacks[[:space:]]Xss[[:space:]]Exploits[[:space:]]and[[:space:]]Defense.pdf filter=lfs diff=lfs merge=lfs -text
|
2726 |
+
Security/DangerousGoogle-SearchingForSecrets.pdf filter=lfs diff=lfs merge=lfs -text
|
2727 |
+
Security/ebay-hacks-100-industrial-strength-tips-and-tools.pdf filter=lfs diff=lfs merge=lfs -text
|
2728 |
+
Security/ebook.oreilly.-.windows.xp.hacks.sharereactor.chm filter=lfs diff=lfs merge=lfs -text
|
2729 |
+
Security/eBooks.OReilly.-.Wireless.Hacks.100.Industrial.-.Strength.Tips.and.Tools.chm filter=lfs diff=lfs merge=lfs -text
|
2730 |
+
Security/ethical[[:space:]]hacking,[[:space:]]student[[:space:]]guide.pdf filter=lfs diff=lfs merge=lfs -text
|
2731 |
+
Security/excel-hacks.chm filter=lfs diff=lfs merge=lfs -text
|
2732 |
+
Security/For.Dummies.Hacking.Wireless.Networks.For.Dummies.Sep.2005.eBook-DDU.pdf filter=lfs diff=lfs merge=lfs -text
|
2733 |
+
Security/Gray[[:space:]]Hat[[:space:]]Hacking~The[[:space:]]Ethical[[:space:]]Hacker's[[:space:]]Handbook,[[:space:]]3e[[:space:]]\[2011\].pdf filter=lfs diff=lfs merge=lfs -text
|
2734 |
+
Security/Hack[[:space:]]IT[[:space:]]Security[[:space:]]Through[[:space:]]Penetration[[:space:]]Testing.pdf filter=lfs diff=lfs merge=lfs -text
|
2735 |
+
Security/Hack[[:space:]]Proofing[[:space:]]Linux[[:space:]]A[[:space:]]Guide[[:space:]]to[[:space:]]Open[[:space:]]Source[[:space:]]Security[[:space:]]-[[:space:]]Stangler,[[:space:]]Lane[[:space:]]-[[:space:]]Syngress[[:space:]]-[[:space:]][[:space:]]ISBN[[:space:]]1-928994-34-2.pdf filter=lfs diff=lfs merge=lfs -text
|
2736 |
+
Security/Hack[[:space:]]Proofing[[:space:]]Sun[[:space:]]Solaris[[:space:]]8.pdf filter=lfs diff=lfs merge=lfs -text
|
2737 |
+
Security/Hack[[:space:]]Proofing[[:space:]]Your[[:space:]]E-Commerce[[:space:]]Site.pdf filter=lfs diff=lfs merge=lfs -text
|
2738 |
+
Security/Hack[[:space:]]Proofing[[:space:]]Your[[:space:]]Network[[:space:]]Second[[:space:]]Edition.pdf filter=lfs diff=lfs merge=lfs -text
|
2739 |
+
Security/Hack[[:space:]]Proofing[[:space:]]Your[[:space:]]Network_First[[:space:]]Edition.pdf filter=lfs diff=lfs merge=lfs -text
|
2740 |
+
Security/Hack[[:space:]]Proofing[[:space:]]Your[[:space:]]Web[[:space:]]Applications.pdf filter=lfs diff=lfs merge=lfs -text
|
2741 |
+
Security/Hack_Attacks_Revealed_A_Complete_Reference_With_Custom_Security_Hacking_Toolkit.chm filter=lfs diff=lfs merge=lfs -text
|
2742 |
+
Security/Hack_IT_Security_Through_Penetration_Testing.chm filter=lfs diff=lfs merge=lfs -text
|
2743 |
+
Security/Hacker[[:space:]]Disassembling[[:space:]]Uncovered.chm filter=lfs diff=lfs merge=lfs -text
|
2744 |
+
Security/hacker[[:space:]]ethic.pdf filter=lfs diff=lfs merge=lfs -text
|
2745 |
+
Security/Hacker[[:space:]]Linux[[:space:]]Uncovered.chm filter=lfs diff=lfs merge=lfs -text
|
2746 |
+
Security/Hacker'S.Delight.chm filter=lfs diff=lfs merge=lfs -text
|
2747 |
+
Security/hacker-disassembling-uncovered.9781931769228.20035.chm filter=lfs diff=lfs merge=lfs -text
|
2748 |
+
Security/Hackers[[:space:]]Beware.pdf filter=lfs diff=lfs merge=lfs -text
|
2749 |
+
Security/Hacking[[:space:]]-[[:space:]]Firewalls[[:space:]]And[[:space:]]Networks[[:space:]]How[[:space:]]To[[:space:]]Hack[[:space:]]Into[[:space:]]Remote[[:space:]]Computers.pdf filter=lfs diff=lfs merge=lfs -text
|
2750 |
+
Security/Hacking[[:space:]]Exposed[[:space:]]-[[:space:]]Network[[:space:]]Security[[:space:]]Secrets[[:space:]]&[[:space:]]Solutions,[[:space:]]2nd[[:space:]]Edition.pdf filter=lfs diff=lfs merge=lfs -text
|
2751 |
+
Security/Hacking[[:space:]]Exposed[[:space:]]Network[[:space:]]Security[[:space:]]Secrets[[:space:]]&[[:space:]]Solutions,[[:space:]]Third[[:space:]]Edition[[:space:]]ch1.pdf filter=lfs diff=lfs merge=lfs -text
|
2752 |
+
Security/Hacking[[:space:]]Exposed-Network[[:space:]]Security[[:space:]]-[[:space:]]Secrets[[:space:]]&[[:space:]]Solutions,[[:space:]]2nd[[:space:]]Ed..pdf filter=lfs diff=lfs merge=lfs -text
|
2753 |
+
Security/Hacking[[:space:]]Exposed-Network[[:space:]]Security[[:space:]]-[[:space:]]Secrets[[:space:]]&[[:space:]]Solutions,[[:space:]]3rd[[:space:]]Ed..pdf filter=lfs diff=lfs merge=lfs -text
|
2754 |
+
Security/Hacking[[:space:]]Exposed-Network[[:space:]]Security[[:space:]]-[[:space:]]Secrets[[:space:]]&[[:space:]]Solutions,[[:space:]]5th[[:space:]]Ed..chm filter=lfs diff=lfs merge=lfs -text
|
2755 |
+
Security/Hacking[[:space:]]Exposed-VoIP[[:space:]]-[[:space:]]Voice[[:space:]]over[[:space:]]IP[[:space:]]Security,[[:space:]]Secrets,[[:space:]]&[[:space:]]Solutions.chm filter=lfs diff=lfs merge=lfs -text
|
2756 |
+
Security/Hacking[[:space:]]Exposed-Web[[:space:]]2.0[[:space:]]-[[:space:]]Web[[:space:]]2.0[[:space:]]Security[[:space:]]Secrets[[:space:]]&[[:space:]]Solutions.pdf filter=lfs diff=lfs merge=lfs -text
|
2757 |
+
Security/Hacking[[:space:]]Exposed-Windows[[:space:]]-[[:space:]]Windows[[:space:]]Security[[:space:]]Secrets[[:space:]]&[[:space:]]Solutions,[[:space:]]3rd[[:space:]]Ed..pdf filter=lfs diff=lfs merge=lfs -text
|
2758 |
+
Security/Hacking[[:space:]]Exposed-Wireless[[:space:]]-[[:space:]]Wireless[[:space:]]Security[[:space:]]Secrets[[:space:]]&[[:space:]]Solutions.chm filter=lfs diff=lfs merge=lfs -text
|
2759 |
+
Security/Hacking[[:space:]]for[[:space:]]Dummies[[:space:]](2004).pdf filter=lfs diff=lfs merge=lfs -text
|
2760 |
+
Security/Hacking[[:space:]]the[[:space:]]Code[[:space:]]-[[:space:]]ASP.NET[[:space:]]Web[[:space:]]Application[[:space:]]Security[[:space:]]Cookbook[[:space:]](2004)[[:space:]].chm filter=lfs diff=lfs merge=lfs -text
|
2761 |
+
Security/Hacking[[:space:]]Windows[[:space:]]XP.pdf filter=lfs diff=lfs merge=lfs -text
|
2762 |
+
Security/Hacking-Hacker's[[:space:]]Guide.pdf filter=lfs diff=lfs merge=lfs -text
|
2763 |
+
Security/Hacking.For.Dummies.Access.To.Other.People's.System.Made.Simple.pdf filter=lfs diff=lfs merge=lfs -text
|
2764 |
+
Security/Hacking.Guide.V3.1.pdf filter=lfs diff=lfs merge=lfs -text
|
2765 |
+
Security/John[[:space:]]Wiley[[:space:]]&[[:space:]]Sons[[:space:]]-[[:space:]]Hacking[[:space:]]For[[:space:]]Dummies.pdf filter=lfs diff=lfs merge=lfs -text
|
2766 |
+
Security/John[[:space:]]Wiley[[:space:]]and[[:space:]]Sons.Hacking[[:space:]]GMail[[:space:]](ExtremeTech).pdf filter=lfs diff=lfs merge=lfs -text
|
2767 |
+
Security/John.Wiley.and.Sons.The.Art.of.Intrusion.The.Real.Stories.Behind.the.Exploits.of.Hackers.Intruders.and.Deceivers.Feb.2005.ISBN0764569597.pdf filter=lfs diff=lfs merge=lfs -text
|
2768 |
+
Security/Jon.Erickson.Hacking.The.Art.Of.Exploitation.No.Starch.Press.2003.chm filter=lfs diff=lfs merge=lfs -text
|
2769 |
+
Security/linux-server-hacks.pdf filter=lfs diff=lfs merge=lfs -text
|
2770 |
+
Security/Linux-Server.Hacks-OReilly.pdf filter=lfs diff=lfs merge=lfs -text
|
2771 |
+
Security/little_black_book_oc_computer_viruses.pdf filter=lfs diff=lfs merge=lfs -text
|
2772 |
+
Security/mac-os-hacks.chm filter=lfs diff=lfs merge=lfs -text
|
2773 |
+
Security/McGraw[[:space:]]Hill[[:space:]]-[[:space:]]Web[[:space:]]Applications[[:space:]](Hacking[[:space:]]Exposed).pdf filter=lfs diff=lfs merge=lfs -text
|
2774 |
+
Security/McGraw-Hill[[:space:]]-[[:space:]]Hacking[[:space:]]Exposed,[[:space:]]3rd[[:space:]]Ed[[:space:]]-[[:space:]]Hacking[[:space:]]Exposed[[:space:]]Win2.pdf filter=lfs diff=lfs merge=lfs -text
|
2775 |
+
Security/McGraw-Hill[[:space:]]-[[:space:]]Linux[[:space:]]and[[:space:]]Unix[[:space:]]Security[[:space:]]Portable[[:space:]]Reference.pdf filter=lfs diff=lfs merge=lfs -text
|
2776 |
+
Security/McGraw.Hacking.Exposed.Cisco.Networks.chm filter=lfs diff=lfs merge=lfs -text
|
2777 |
+
Security/McGraw.Hill.HackNotes.Linux.and.Unix.Security.Portable.Reference.eBook-DDU.pdf filter=lfs diff=lfs merge=lfs -text
|
2778 |
+
Security/McGraw.Hill.HackNotes.Network.Security.Portable.Reference.eBook-DDU.pdf filter=lfs diff=lfs merge=lfs -text
|
2779 |
+
Security/McGraw.Hill.HackNotes.Web.Security.Portable.Reference.eBook-DDU.pdf filter=lfs diff=lfs merge=lfs -text
|
2780 |
+
Security/McGraw.Hill.HackNotes.Windows.Security.Portable.Reference.eB.pdf filter=lfs diff=lfs merge=lfs -text
|
2781 |
+
Security/Mind[[:space:]]Hacks[[:space:]]-[[:space:]]Tips[[:space:]]&[[:space:]]Tricks[[:space:]]for[[:space:]]Using[[:space:]]Your[[:space:]]Brain.chm filter=lfs diff=lfs merge=lfs -text
|
2782 |
+
Security/No[[:space:]]Starch[[:space:]]Press[[:space:]]-[[:space:]]Hacking[[:space:]]The[[:space:]]Art[[:space:]]of[[:space:]]Exploitation[[:space:]]2nd[[:space:]]Edition.chm filter=lfs diff=lfs merge=lfs -text
|
2783 |
+
Security/No[[:space:]]Starch[[:space:]]Press[[:space:]]-[[:space:]]PGP[[:space:]]and[[:space:]]GPG[[:space:]]Email[[:space:]]for[[:space:]]the[[:space:]]Practical[[:space:]]Paranoid.pdf filter=lfs diff=lfs merge=lfs -text
|
2784 |
+
Security/O'Reilly[[:space:]]-[[:space:]]Online[[:space:]]Investing[[:space:]]Hacks.chm filter=lfs diff=lfs merge=lfs -text
|
2785 |
+
Security/O'Reilly[[:space:]]Security[[:space:]]and[[:space:]]Usability[[:space:]]Designing[[:space:]]Secure[[:space:]]Systems[[:space:]]that[[:space:]]People[[:space:]]Can[[:space:]]Use.chm filter=lfs diff=lfs merge=lfs -text
|
2786 |
+
Security/O'Reilly[[:space:]]Security[[:space:]]Power[[:space:]]Tools.pdf filter=lfs diff=lfs merge=lfs -text
|
2787 |
+
Security/O'Reilly.-.Network.Security.Hacks.chm filter=lfs diff=lfs merge=lfs -text
|
2788 |
+
Security/O_Reilly_-_Windows_XP_Hacks.chm filter=lfs diff=lfs merge=lfs -text
|
2789 |
+
Security/Oded_Goldreich-Foundations_of_Cryptography__Volume_2,_Basic_Applications(2009).pdf filter=lfs diff=lfs merge=lfs -text
|
2790 |
+
Security/Oded_Goldreich-Foundations_of_Cryptography__Volume_2,_Basic_Applications-Cambridge_University_Press(2009).pdf filter=lfs diff=lfs merge=lfs -text
|
2791 |
+
Security/OReilly[[:space:]][[:space:]]Google[[:space:]]Hacks,[[:space:]]1st[[:space:]]Edition2003.pdf filter=lfs diff=lfs merge=lfs -text
|
2792 |
+
Security/OReilly[[:space:]]-[[:space:]]Flickr[[:space:]]Hacks[[:space:]]Tips[[:space:]]and[[:space:]]Tools[[:space:]]for[[:space:]]Sharing[[:space:]]Photos[[:space:]]Online[[:space:]](Feb[[:space:]]2006).chm filter=lfs diff=lfs merge=lfs -text
|
2793 |
+
Security/Oreilly[[:space:]]Access[[:space:]]Hacks[[:space:]]Apr[[:space:]]2005.chm filter=lfs diff=lfs merge=lfs -text
|
2794 |
+
Security/Oreilly,[[:space:]]Paypal[[:space:]]Hacks[[:space:]](2004)[[:space:]]Ddu.chm filter=lfs diff=lfs merge=lfs -text
|
2795 |
+
Security/OReilly,.Digital.Video.Hacks.(2005).DDU.LotB.chm filter=lfs diff=lfs merge=lfs -text
|
2796 |
+
Security/OReilly,.IRC.Hacks.(2004).DDU.chm filter=lfs diff=lfs merge=lfs -text
|
2797 |
+
Security/oreilly,.visual.studio.hacks.(2005).ddu.lotb.chm filter=lfs diff=lfs merge=lfs -text
|
2798 |
+
Security/oreilly.firefox.hacks.ebook-lib.chm filter=lfs diff=lfs merge=lfs -text
|
2799 |
+
Security/OReilly.Google.Hacks.2nd.Edition.Dec.2004.ISBN0596008570.chm filter=lfs diff=lfs merge=lfs -text
|
2800 |
+
Security/OReilly.Google.Maps.Hacks.Jan.2006.chm filter=lfs diff=lfs merge=lfs -text
|
2801 |
+
Security/OReilly.Linux.Security.Cookbook.pdf filter=lfs diff=lfs merge=lfs -text
|
2802 |
+
Security/OReilly.Linux.Server.Hacks.Volume.Two.Dec.2005.chm filter=lfs diff=lfs merge=lfs -text
|
2803 |
+
Security/OReilly.PC.Hacks.Oct.2004.eBook-DDU.chm filter=lfs diff=lfs merge=lfs -text
|
2804 |
+
Security/OReilly.Skype.Hacks.Tips.and.Tools.for.Cheap.Fun.Innovative.Phone.Service.Dec.2005.chm filter=lfs diff=lfs merge=lfs -text
|
2805 |
+
Security/OReilly.SQL.Hacks.Nov.2006.chm filter=lfs diff=lfs merge=lfs -text
|
2806 |
+
Security/OReilly.Statistics.Hacks.May.2006.chm filter=lfs diff=lfs merge=lfs -text
|
2807 |
+
Security/OReilly.Ubuntu.Hacks.Tips.and.Tools.for.Exploring.Using.and.Tuning.Linux.Jun.2006.chm filter=lfs diff=lfs merge=lfs -text
|
2808 |
+
Security/OReilly.VoIP.Hacks.Tips.and.Tools.for.Internet.Telephony.Dec.2005.chm filter=lfs diff=lfs merge=lfs -text
|
2809 |
+
Security/oreilly.windows.xp.hacks.2nd.edition.feb.2005.lib.chm filter=lfs diff=lfs merge=lfs -text
|
2810 |
+
Security/OReilly.Word.Hacks.Oct.2004.eBook-DDU.chm filter=lfs diff=lfs merge=lfs -text
|
2811 |
+
Security/OSB.Ethical.Hacking.and.Countermeasures.EC.Council.Exam.312.50.Student.Courseware.eBook-LiB.chm filter=lfs diff=lfs merge=lfs -text
|
2812 |
+
Security/Que.Certified.Ethical.Hacker.Exam.Prep.Apr.2006.chm filter=lfs diff=lfs merge=lfs -text
|
2813 |
+
Security/Security[[:space:]]and[[:space:]]Hacking[[:space:]]-[[:space:]]Anti-Hacker[[:space:]]Tool[[:space:]]Kit[[:space:]]Second[[:space:]]Edition.chm filter=lfs diff=lfs merge=lfs -text
|
2814 |
+
Security/SoTayHacker1.0.chm filter=lfs diff=lfs merge=lfs -text
|
2815 |
+
Security/spidering-hacks.chm filter=lfs diff=lfs merge=lfs -text
|
2816 |
+
Security/Springer.Insider.Attack.and.Cyber.Security.Beyond.the.Hacker.Apr.2008.eBook-DDU.pdf filter=lfs diff=lfs merge=lfs -text
|
2817 |
+
Security/Springer.Networked.RFID.Systems.and.Lightweight.Cryptography.Dec.2007.pdf filter=lfs diff=lfs merge=lfs -text
|
2818 |
+
Security/Springer.Open.Source.Systems.Security.Certification.Nov.2008.eBook-DDU.pdf filter=lfs diff=lfs merge=lfs -text
|
2819 |
+
Security/SQL[[:space:]]Injection[[:space:]]Attacks[[:space:]]and[[:space:]]Defense.pdf filter=lfs diff=lfs merge=lfs -text
|
2820 |
+
Security/Stamp[[:space:]]M.,[[:space:]]Low[[:space:]]R.M.[[:space:]]Applied[[:space:]]cryptanalysis...pdf filter=lfs diff=lfs merge=lfs -text
|
2821 |
+
Security/Syngress[[:space:]]-[[:space:]]Hack[[:space:]]Proofing[[:space:]]Linux[[:space:]](2001).pdf filter=lfs diff=lfs merge=lfs -text
|
2822 |
+
Security/Syngress[[:space:]]-[[:space:]]Hacking[[:space:]]a[[:space:]]Terror[[:space:]]Network.[[:space:]]The[[:space:]]Silent[[:space:]]Threat[[:space:]]of[[:space:]]Covert[[:space:]]Channels.pdf filter=lfs diff=lfs merge=lfs -text
|
2823 |
+
Security/Syngress[[:space:]]--[[:space:]]Hack[[:space:]]Proofing[[:space:]]Your[[:space:]]Wireless[[:space:]]Network.pdf filter=lfs diff=lfs merge=lfs -text
|
2824 |
+
Security/Syngress[[:space:]]Hack[[:space:]]Proofing[[:space:]]Your[[:space:]]Identity[[:space:]]in[[:space:]]the[[:space:]]Information[[:space:]]Age.pdf filter=lfs diff=lfs merge=lfs -text
|
2825 |
+
Security/Syngress.Buffer.Overflow.Attacks.Dec.2004.eBook-DDU.pdf filter=lfs diff=lfs merge=lfs -text
|
2826 |
+
Security/Syngress.Coding.for.Penetration.Testers.Oct.2011.pdf filter=lfs diff=lfs merge=lfs -text
|
2827 |
+
Security/Syngress.Hack.the.Stack.Oct.2006.pdf filter=lfs diff=lfs merge=lfs -text
|
2828 |
+
Security/Syngress.Hacking.a.Terror.Network.Nov.2004.ISBN1928994989.pdf filter=lfs diff=lfs merge=lfs -text
|
2829 |
+
Security/Syngress.Penetration.Testers.Open.Source.Toolkit.3rd.Edition.Aug.2011.pdf filter=lfs diff=lfs merge=lfs -text
|
2830 |
+
Security/Syngress.The.Basics.of.Hacking.and.Penetration.Testing.Aug.2011.pdf filter=lfs diff=lfs merge=lfs -text
|
2831 |
+
Security/The_Business_of_Cybercrime.pdf filter=lfs diff=lfs merge=lfs -text
|
2832 |
+
Security/tivo-hacks.100-industrial-strength-tips-and-tools.pdf filter=lfs diff=lfs merge=lfs -text
|
2833 |
+
Security/u23_Wiley[[:space:]]-[[:space:]]Hacking[[:space:]]GPS[[:space:]]-[[:space:]]2005[[:space:]]-[[:space:]](By[[:space:]]Laxxuss).pdf filter=lfs diff=lfs merge=lfs -text
|
2834 |
+
Security/Websters.New.World.Websters.New.World.Hacker.Dictionary.Sep.2006.pdf filter=lfs diff=lfs merge=lfs -text
|
2835 |
+
Security/Wiley-Principles.of.Computer.Security.2010.RETAiL.EBook.pdf filter=lfs diff=lfs merge=lfs -text
|
2836 |
+
Security/Wiley.Hacking.Firefox.More.Than.150.Hacks.Mods.and.Customizations.Jul.2005.eBook-DDU.pdf filter=lfs diff=lfs merge=lfs -text
|
2837 |
+
Security/Wiley.Hacking.Google.Maps.and.Google.Earth.Jul.2006.pdf filter=lfs diff=lfs merge=lfs -text
|
2838 |
+
Security/Wiley.Hacking.GPS.Mar.2005.ISBN0764598805.pdf filter=lfs diff=lfs merge=lfs -text
|
2839 |
+
Security/Wiley.Implementing.Email.and.Security.Tokens.May.2008.pdf filter=lfs diff=lfs merge=lfs -text
|
2840 |
+
Security/Wiley.Lifehacker.Dec.2006.pdf filter=lfs diff=lfs merge=lfs -text
|
2841 |
+
Security/Wiley.Secure.Computer.and.Network.Systems.Modeling.Analysis.and.Design.Mar.2008.pdf filter=lfs diff=lfs merge=lfs -text
|
2842 |
+
Security/Wiley.The.Database.Hackers.Handbook.Defending.Database.Servers.chm filter=lfs diff=lfs merge=lfs -text
|
2843 |
+
Security/Windows[[:space:]]Server[[:space:]]Hacks.chm filter=lfs diff=lfs merge=lfs -text
|
2844 |
+
Security/Yahoo.Hacks.Oct.2005.chm filter=lfs diff=lfs merge=lfs -text
|
Security/(Ebook - Computer) Hacking The Windows Registry.pdf
ADDED
Binary file (227 kB). View file
|
|
Security/(eBook - PDF) Hugo Cornwall - The Hacker's Handbook .pdf
ADDED
Binary file (285 kB). View file
|
|
Security/0321108957.Addison-Wesley Professional.Honeypots- Tracking Hackers.pdf
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:4da0b5c8c9a95384c54e289fa9bda1e6e2d73663aabdb71148f4b97d46ba844d
|
3 |
+
size 2239424
|
Security/285063-Hacker.Bibel.[278.kB_www.netz.ru].pdf
ADDED
Binary file (285 kB). View file
|
|
Security/3077366-HackerHighSchool.pdf
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:aacc59b474017f6c70140f2587d1dcf4ee492b49750a2a0f75786a406eb03702
|
3 |
+
size 3077366
|
Security/731986-Hacker's Desk Reference.pdf
ADDED
Binary file (732 kB). View file
|
|
Security/Addison Wesley - Hackers Delight 2002.pdf
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:d1ca4f349b2edc9507266f56e14109e17be5d16f00f92e005aa8fae0ddfd2879
|
3 |
+
size 6355478
|
Security/Addison Wesley, The Outlook Answer Book Useful Tips Tricks And Hacks (2005) Bbl Lotb.chm
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:d96e57046a21d8a3c51b7d1bd0c68e557734cf4de0c328c4ba96271526be82bf
|
3 |
+
size 14848935
|
Security/Ahmad-Reza_Sadeghi,_David_Naccache,_Pim_Tuyls-Towards_Hardware-Intrinsic_Security__Foundations_and_Practice_(Information_Security_and_Cryptography)(2010).pdf
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:1326774aa4811c56306e37ed24969f7fc0083de61c132437946330bdac920ecb
|
3 |
+
size 8355940
|
Security/Attacking the DNS Protocol.pdf
ADDED
Binary file (330 kB). View file
|
|
Security/Auerbach.Practical.Hacking.Techniques.and.Countermeasures.Nov.2006.pdf
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:c6a0a407b25a9851adc6de44dd2b31d6f8b8a3ee562e957f72f213ca0c5dc762
|
3 |
+
size 150959943
|
Security/Auerbach.Pub.The.Hackers.Handbook.The.Strategy.Behind.Breaking.into.and.Defending.Networks.Nov.20.pdf
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:6c59de7e094691167df230cf0e662e12d47310ae9398b97c8a3630ad83c1984c
|
3 |
+
size 18949650
|
Security/Botnets - The killer web applications.pdf
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:b590da6fb1e933c750b961d4540e2ad324f42e763ee44a55c532cf7b232d9646
|
3 |
+
size 7318417
|
Security/Certified Ethical Hacker (CEH) v3.0 Official Course.pdf
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:5468ba4dcb6f047dd8f1800044e1cff279ec453b4ddba0cdabacf1f94b648903
|
3 |
+
size 27144726
|
Security/Charles.C.Thomas-Document.Security.Protecting.Physical.and.Electronic.Content.2007.RETAiL.EBook.pdf
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:80c66adf2b455ab057bd914f2e8e16ff77359a50be2da4000170f831a733ca1b
|
3 |
+
size 1397278
|
Security/Computer - Hackers Secrets - e-book.pdf
ADDED
Binary file (504 kB). View file
|
|
Security/Cracking_Passwords_Guide.pdf
ADDED
Binary file (278 kB). View file
|
|
Security/Credit.Card.Visa.Hack.Ucam.Cl.Tr.560.[223.kB_www.netz.ru].pdf
ADDED
Binary file (229 kB). View file
|
|
Security/Cross Site Scripting Attacks Xss Exploits and Defense.pdf
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:7f0e6872e20523232805eea516b10b433c2b304b29afcc81d878a8eac9a8cfa8
|
3 |
+
size 7696778
|
Security/DangerousGoogle-SearchingForSecrets.pdf
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:d0ebe99f6fe8ebb6a5d1ac234476d11424ad83651a48408496464f7561f7435e
|
3 |
+
size 2210027
|
Security/Dummies - Hack How To Create Keygens (1).pdf
ADDED
Binary file (9.83 kB). View file
|
|
Security/For.Dummies.Hacking.Wireless.Networks.For.Dummies.Sep.2005.eBook-DDU.pdf
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:bdd453401f2dc342f04371a6968cd16a0453f8aab30bcaffd0cfe829f67ea15c
|
3 |
+
size 11501893
|
Security/Gray Hat Hacking~The Ethical Hacker's Handbook, 3e [2011].pdf
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:976ee6efc98b807ceee03c2e79bdc27e58ab9d0ab6e70944ed53d941574263a2
|
3 |
+
size 12800878
|
Security/Hack IT Security Through Penetration Testing.pdf
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:a0c7da704604ac6d78e0252b4701e9a872875dd80dde936177b9b1909f641305
|
3 |
+
size 12864873
|
Security/Hack Proofing Linux A Guide to Open Source Security - Stangler, Lane - Syngress - ISBN 1-928994-34-2.pdf
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:33c5e8e2d796e68e8810ec385ec86089dcaca7dfb4fe66f431a2a98b7964050e
|
3 |
+
size 12388348
|
Security/Hack Proofing Sun Solaris 8.pdf
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:4e70bd69db70c42d541ad8b9f0332ba3991e739931d3ae3b5c35c2326cce1324
|
3 |
+
size 7125013
|
Security/Hack Proofing Your E-Commerce Site.pdf
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:e3c1100004cde4a49f6ad47e367cc980d3faea87c24c413e03871b4fed767018
|
3 |
+
size 7697336
|
Security/Hack Proofing Your Network Second Edition.pdf
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:296a38af7874c121869343267630dbf56380f77153448f67132c97a4984c5b4e
|
3 |
+
size 9195049
|
Security/Hack Proofing Your Network_First Edition.pdf
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:419b202b033da7760768fefcbbb6bcdab4c7700ce8d69278b2210d69b03d42c6
|
3 |
+
size 3091540
|
Security/Hack Proofing Your Web Applications.pdf
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:efc26d1b92256bbbbc69b23a49c6372ce609ca0ed004f5c6cc5fc866d32efa2a
|
3 |
+
size 9024080
|
Security/Hack_Attacks_Revealed_A_Complete_Reference_With_Custom_Security_Hacking_Toolkit.chm
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:87185f0e8fb89637609ed7ccf0e8eaf84a1013e3d61f9d7ce13e14f71c2136b8
|
3 |
+
size 6605780
|
Security/Hack_IT_Security_Through_Penetration_Testing.chm
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:ae58ce52a8a8ef3c86db16b71c8d010a6ac27258bbe5452d5b867ddb9e9f0b1f
|
3 |
+
size 4801725
|
Security/Hacker Disassembling Uncovered.chm
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:6e2aea62c5c5aaf27c10acd2c94477d781a547080baa7d5677212ab5c923186f
|
3 |
+
size 4950673
|
Security/Hacker Linux Uncovered.chm
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:90a868bc1fd4631dbf738999ae2e75818f49e32a7e1f67f8261207a3cd93f56e
|
3 |
+
size 4681808
|
Security/Hacker Web Exploitation Uncovered.chm
ADDED
Binary file (568 kB). View file
|
|
Security/Hacker'S.Delight.chm
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:4b35c50c579092f84b1715b2664240d4ac643cd5fca6b0254e3abba1bbf790c6
|
3 |
+
size 2212948
|
Security/HackerMonthly/hackermonthly-issue001.zip
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:3f02e6022bda0d770b4d08a17a1fa7bfcfe9a4bf6b685b1ed0cce3b259a61eeb
|
3 |
+
size 3625524
|
Security/HackerMonthly/hackermonthly-issue002.zip
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:396c114db087473e8c552c4a8012fa25f53c6d3dae821ea29c6cbf2418b583f8
|
3 |
+
size 4679178
|
Security/HackerMonthly/hackermonthly-issue003.zip
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:8646061c50a322b44a9fa4008aac2132c6ec6dc0011e2a1801b941714771977e
|
3 |
+
size 3464440
|
Security/HackerMonthly/hackermonthly-issue004.zip
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:31f2f8cf77c8f56df673cacddd2b8d2deef60cc13af426ae0bf5dfb05e203435
|
3 |
+
size 8043047
|
Security/HackerMonthly/hackermonthly-issue005.zip
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:eeb87cea61fe84ce7dc89fc3f37127ad6ad69a6b76aeeffbeb1f45554ff93a01
|
3 |
+
size 4281970
|
Security/HackerMonthly/hackermonthly-issue006.zip
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:9d8f667620787a38ba6971757e336264c6b1492893053f595715f64045125141
|
3 |
+
size 4668462
|
Security/HackerMonthly/hackermonthly-issue007.zip
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:ddedd5b84bebef62b7f78dd3c7cf48828cf50f384ca6edd32f8c9ed4411c3c3b
|
3 |
+
size 6182658
|
Security/HackerMonthly/hackermonthly-issue008.zip
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:504ce8db482ca31e664ebfceb2cc507e3d3ee3f5d39979f0954a478decb7dd0f
|
3 |
+
size 7283366
|
Security/HackerMonthly/hackermonthly-issue009.zip
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:c6c3b0921a090f0aa6ef5cf5804adeaaf6244ba726d7983ae2bf31b430b8a55c
|
3 |
+
size 12729320
|
Security/HackerMonthly/hackermonthly-issue010.zip
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:007ada42fe68be178bdc4928d93556c8f551b39176a3c701116f307de0383bc6
|
3 |
+
size 8453236
|
Security/HackerMonthly/hackermonthly-issue011.zip
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:514be8447ff2369c837961f124c0a61e016c5529c0974868037472f47a0888c4
|
3 |
+
size 15527961
|
Security/HackerMonthly/hackermonthly-issue012.zip
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:6af863b01c23e6f13dc46855f2d2116a89d3b00304a447422e442e666726cec1
|
3 |
+
size 6781563
|
Security/HackerMonthly/hackermonthly-issue013.zip
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:773577048e3ebf8c2fa0f7360bb2b59abd918f2754d114555fc5d8ff1df51094
|
3 |
+
size 4249689
|