种子简介
种子名称:
The Black Packet - Tech Info - Volume 2 - Hacking The System (DVD Master)
文件类型:
文件数目:
50个文件
文件大小:
4.29 GB
收录时间:
2015-7-25 19:14
已经下载:
3次
资源热度:
164
最近下载:
2024-11-30 11:53
下载BT种子文件
下载Torrent文件(.torrent)
立即下载
磁力链接下载
magnet:?xt=urn:btih:94D2008B54DF8FCE20408B4FDF70F188FFE867BF&dn=The Black Packet - Tech Info - Volume 2 - Hacking The System (DVD Master)
复制链接到迅雷、QQ旋风进行下载,或者使用百度云离线下载。
喜欢这个种子的人也喜欢
种子包含的文件
The Black Packet - Tech Info - Volume 2 - Hacking The System (DVD Master).torrent
00 - How it's Made - Microprocessors, Circuit Boards, Compact Discs, Computers and more.avi287.27MB
00 - In The Realm Of The Hackers (Electron).avi350.61MB
00 - Sonic Outlaws (1995).avi635.25MB
01 - Thinking Machines - The Creation of the Computer.avi351.31MB
02 - Triumph of The Nerds - The Rise of Accidental Empires - Part 1 (1996).avi499.96MB
03 - How Internet Traffic works (Warriors of the Net).avi81.47MB
04 - Tactical Exploitation-WP.pdf193.5KB
04 - Tactical Exploitation.m4v66.06MB
04 - Tactical Exploitation.pdf143.39KB
05 - Dangerous Minds - The Art of Guerrilla Data Mining-wp.pdf229.67KB
05 - Dangerous Minds - The Art of Guerrilla Data Mining.m4v139.72MB
05 - Dangerous Minds - The Art of Guerrilla Data Mining.pdf1.99MB
06 - Boomstick Fu - The Fundamentals of Physical Security.m4v92.03MB
06 - Boomstick Fu - The Fundamentals of Physical Security.pdf306.06KB
07 - Biometric and Token Based Access Control - Your Protected by 2 Screws.m4v94.78MB
07 - Biometric and Token Based Access Control - Your Protected by 2 Screws.pdf1.42MB
08 - Pen Testing WIFI.m4v33.63MB
08 - Pen Testing WIFI.pdf1.37MB
09 - How To Be A Wifi Ninja.m4v85.57MB
10 - Shifting The Focus of WIFI Security - Beyond Cracking Your Neighbors WEP Key.m4v147.58MB
10 - Shifting The Focus of WIFI Security - Beyond Cracking Your Neighbors WEP Key.pdf212.85KB
11 - WiFish Finder Who Will Bite the Bait.m4v74.37MB
11 - WiFish Finder Who Will Bite the Bait.pdf586.39KB
12 - Attacks Against 2wire Residential Gateway Routers.m4v55.71MB
12 - Attacks Against 2wire Residential Gateway Routers.pdf2.4MB
13 - Hacking Iraq.m4v81.71MB
14 - Picking Electronic Locks-wp.pdf94.7KB
14 - Picking Electronic Locks.m4v39.19MB
14 - Picking Electronic Locks.pdf741.89KB
15 - Hacking with the iPod Touch, iPhone, or iPad.m4v150.24MB
15 - Hacking with the iPod Touch, iPhone, or iPad.pdf1.81MB
16 - Is Your iPhone Pwned - Auditing, Attacking and Defending Mobile Devices.m4v178.28MB
16 - Is Your iPhone Pwned - Auditing, Attacking and Defending Mobile Devices.pdf168.35KB
17 - Side Channel Attacks Using Optical Sampling of Mechanical Energy and Power Line Leakage-wp.pdf69.02KB
17 - Side Channel Attacks Using Optical Sampling of Mechanical Energy and Power Line Leakage.m4v154.74MB
17 - Side Channel Attacks Using Optical Sampling of Mechanical Energy and Power Line Leakage.pdf6.02MB
18 - Hacking the Smart Grid WP.pdf31.09KB
18 - Hacking the Smart Grid.m4v64.69MB
18 - Hacking the Smart Grid.pdf136.36KB
19 - Hacking the Smart Parking Meter.m4v181.6MB
19 - Hacking the Smart Parking Meter.pdf409.56KB
20 - The Science of Social Engineering.m4v34.87MB
20 - The Science of Social Engineering.pdf83.54KB
21 - Satellite Imagery Analysis.m4v80.08MB
21 - Satellite Imagery Analysis.pdf7.13MB
22 - Thinking Outside the Console Box.m4v62.16MB
22 - Thinking Outside the Console Box.pdf5.14MB
23 - RFID Mythbusting.m4v131.98MB
24 - High Security - Locks Lies and Liability.m4v203.23MB
24 - High Security - Locks Lies and Liability.pdf1.34MB