磁力链接

magnet:?xt=urn:btih:3B768D15EEBBC33E29572E80C3BA0E79EACB7AD7
推荐使用PIKPAK网盘下载资源,PIKPAK是目前最好用网盘,10T超大空间,不和谐任何资源,支持无限次数离线下载,视频在线观看

资源截图

API Integration

文件列表

  • Mobile Design Pattern Gallery: UI Patterns for Smartphone Apps.pdf 122.4 MB
  • Windows Operating Systems Fundamentals, Exam 98-349.pdf 91.9 MB
  • Creative Blogging: Your First Steps to a Successful Blog.pdf 70.0 MB
  • Blender Master Class: A Hands-On Guide to Modeling, Sculpting, Materials, and Rendering.pdf 51.1 MB
  • Head First Software Development.pdf 45.5 MB
  • Head First SQL.pdf 42.3 MB
  • Head First Networking.pdf 41.4 MB
  • Citrix XenDesktop Implementation: A Practical Guide for IT Professionals.pdf 36.2 MB
  • Python Forensics: A Workbench for Inventing and Sharing Digital Forensic Technology.pdf 33.5 MB
  • Absolute Beginners Guide to Computing.pdf 31.0 MB
  • Computing Handbook: Computer Science and Software Engineering 3rd Edition.pdf 25.6 MB
  • TCP-IP over Packet Radio: An Introduction to the KA9Q Network Operating System.pdf 23.2 MB
  • Microsoft Virtualization: Master Microsoft Server, Desktop, Application and Presentation Virtualization.pdf 21.6 MB
  • Understanding Operating Systems 7th Edition.pdf 19.6 MB
  • PoC or GTFO: Proof of Concepts or Get the Fuck Out (Weird Hacking Book).pdf 18.5 MB
  • Microsoft Vista for IT Security Professionals.pdf 18.5 MB
  • Crackproof Your Software: The Best Ways to Protect Your Software Against Crackers.pdf 17.2 MB
  • Making Software: What Really Works, and Why We Believe It.pdf 17.1 MB
  • Dr. Tom Shinder's ISA 2006 Migration Guide.pdf 16.9 MB
  • Asterisk: The Definitive Guide 4th Edition.pdf 16.8 MB
  • Ethical Hacking and Countermeasures: Threats and Defense Mechanisms.pdf 16.0 MB
  • Arduino Music and Audio Projects.pdf 14.5 MB
  • Text Analytics with Python: A Practical Real-World Approach to Gaining Actionable Insights from Your Data.pdf 13.6 MB
  • Digital Forensics for Network, Internet, and Cloud Computing.pdf 13.5 MB
  • Penetration Testing Basics: A Quick-Start Guide to Breaking into Systems.pdf 13.4 MB
  • Kali Linux Wireless Penetration Testing: Beginner's Guide.pdf 13.4 MB
  • Web Operations: Keeping the Data on Time.pdf 13.2 MB
  • Fundamentals of Hydrogen Safety Engineering I.pdf 12.9 MB
  • Penetration Testing: A Hands-On Introduction to Hacking.pdf 12.8 MB
  • WiMax Operator's Manual: Building 802.16 Wireless Networks.pdf 12.6 MB
  • Lean Python: Learn Just Enough Python to Build Useful Tools.pdf 12.2 MB
  • Digital Video Editing Fundamentals.pdf 12.0 MB
  • Python Descriptors.pdf 11.8 MB
  • PHP Beyond the Web: Shell Scripts, Desktop Software, System Daemon, and More without Learning a New Language.pdf 11.6 MB
  • Collaboration with Cloud Computing: Security, Social Media, and Unified Communications.pdf 11.6 MB
  • Ruby Recipes: A Problem-Solution Approach.pdf 11.5 MB
  • HTML5 Advertising.pdf 11.5 MB
  • Pro Objective-C: Develop high-quality, professional apps on OS X and iOS with Objective-C.pdf 11.1 MB
  • Best Damn Cybercrime and Digital Forensics Book Period.pdf 11.0 MB
  • Programming Amazon EC2: Survive Your Success.pdf 10.9 MB
  • The Complete FreeBSD: Documentation from the Source 4th Edition.pdf 10.6 MB
  • HTML5 and CSS3: Level Up with Today's Web Technologies 2nd Edition.pdf 10.0 MB
  • Practical MongoDB: Architecting, Developing, and Administering MongoDB.pdf 10.0 MB
  • A First Course in Fluid Mechanics for Engineers.pdf 9.8 MB
  • Stack Frames: A Look from Inside.pdf 9.7 MB
  • Embedded Systems: Introduction to ARM Cortex-M Microcontrollers Vol. 1 5th Edition.pdf 9.5 MB
  • Wireless Hacks.pdf 9.4 MB
  • PCs: The Missing Manual.pdf 9.1 MB
  • MySQL for the Internet of Things: Data Management for Sensors and Connected Devices.pdf 9.0 MB
  • Creating Google Chrome Extensions.pdf 8.7 MB
  • Beginning JSF 2 APIs and JBoss Seam.pdf 8.5 MB
  • Cryogenic Engineering: Software Solutions Vol II B.pdf 8.1 MB
  • Digital Forensics: Threatscape and Best Practices.pdf 7.9 MB
  • Packet Guide to Routing and Switching: Exploring the Network Layer.pdf 7.8 MB
  • Learn to Program with Python.pdf 7.7 MB
  • Pro Apache Hadoop.pdf 7.4 MB
  • Migrating to Swift from Android.pdf 7.3 MB
  • (IN)SECURE Magazine Issue 51 Hacking is the New Espionage.pdf 7.1 MB
  • Elementary Mathematics for Engineers.pdf 7.0 MB
  • Essential Study Skills.pdf 6.8 MB
  • Ethical Hacking and Countermeasures: Linux, Macintosh and Mobile Systems.pdf 6.7 MB
  • Learn Python: Learn Just Enough Python to Build Useful Tools.pdf 6.6 MB
  • No Place to Hide: you are being watched.pdf 6.5 MB
  • Sed & AWK: UNIX Power Tools 2nd Edition.pdf 6.4 MB
  • Code Simplicity: The Science of Software Development.pdf 6.0 MB
  • Expert Android: Custom components to mobile clouds: An Advanced Guide for Impactful Mobile Applications.pdf 6.0 MB
  • Cloud Security and Privacy: An Enterprise Perspective on Risks and Compliance.pdf 5.7 MB
  • Natural Language Processing with Python: Analyzing Text with the Natural Language Toolkit.pdf 5.4 MB
  • Objective-C: Programmer's Reference.pdf 5.4 MB
  • Better Business Decisions from Data: Statistical Analysis for Professional Success.pdf 5.3 MB
  • Swift Game Programming for Absolute Beginners.pdf 5.3 MB
  • An introduction to partial differential equations.pdf 5.2 MB
  • Stealing The Network: How To Own The Box.pdf 4.9 MB
  • JMP 12 Scripting Guide SAS Institute.pdf 4.8 MB
  • Hacking: How to Hack The Ultimate Hacking Guide.pdf 4.6 MB
  • Introduction to Vectors.pdf 4.4 MB
  • Hacking: An Unofficial Anonymous Guide Windows and Internet.pdf 4.2 MB
  • Interactive Data Visualization: for the Web.pdf 4.2 MB
  • Exploring C++ 11 2nd Edition.pdf 4.2 MB
  • Building SANs with Brocade Fabric Switches.pdf 3.9 MB
  • Pro Apache Beehive.pdf 3.7 MB
  • Cryptography in C and C++ 2nd Edition.pdf 3.7 MB
  • How to Hack: Hacking Secrets Exposed: A Beginner's Guide.pdf 3.7 MB
  • Pro Django.pdf 3.7 MB
  • Chemical Engineering Vocabulary.pdf 3.6 MB
  • Graduate Employment.pdf 3.1 MB
  • Introduction to Operating System Design and Implementation: The OSP 2 Approach.pdf 3.1 MB
  • You: For Sale, Protecting Your Personal Data and Privacy Online.pdf 3.0 MB
  • Windows Hacking: Crack All Cool Stuff of Windows.pdf 3.0 MB
  • Introduction to Probability.pdf 2.7 MB
  • Practical Statistics for Data Scientists: 50 Essential Concepts.pdf 2.7 MB
  • More Joel on Software.pdf 2.3 MB
  • Networking: Cisco IP Routing Fundamentals.pdf 2.3 MB
  • Developing B2B Social Communities: Keys to Growth, Innovation, and Customer Loyalty.pdf 2.2 MB
  • Modern Tkinter for Busy Python Developers.pdf 2.2 MB
  • Managing IMAP.pdf 2.1 MB
  • Hacking: Basic Hacking, Basic Hacking Tools Hacking with Python Bitcoin, Tor.pdf 2.1 MB
  • Ubuntu Using Hacking.azw3 2.1 MB
  • Hackers & Painters: Big Ideas from the Computer Age.pdf 1.9 MB
  • Control Your Retirement Destiny.pdf 1.6 MB
  • Abstract Hacktivism: The Making of a Hacker Culture.pdf 1.6 MB
  • Hacking: The Beginners Guide to Master The Art of Hacking In No Time.pdf 1.4 MB
  • Python and Hacking Made Simple: Full Beginner's Bundle To Master Python & Hacking.epub 1.4 MB
  • Hacking: 17 Most Dangerous Hacking Attacks Vol.4.epub 1.1 MB
  • NTP Security: A Quick-Start Guide.pdf 1.1 MB
  • Hacking University: Learn Python Computer Programming and the Linux Operating Command Line 2 Manuscript Bundle.pdf 1.1 MB
  • How I create Growth Hacking Plans for startups for $10,000 + TOP 300 growth hacks you can put into practice right away.epub 1.0 MB
  • The Hacking Bible: The Dark Secrets of the Hacking World How You Can Become a Hacking Monster, Undetected and In the Best Way.pdf 785.8 kB
  • Computer Hacking: The Essential Hacking Guide for Beginners.pdf 764.7 kB
  • Hacking: The Ultimate Beginner's Guide to learn Hacking effectively AND Hacking: Tips and Tricks to learn Hacking quickly and efficiently.pdf 577.8 kB
  • Hacking: Simple and Effective Strategies to learn Hacking.pdf 520.5 kB
  • THE HACKING STARTER KIT: An In-depth and Practical course for beginners to Ethical Hacking.azw3 496.7 kB
  • Hacking: Become a World Class Hacker, Hack Any Password, Program or System with Proven Strategies and Tricks.pdf 479.8 kB
  • Computer Hacking: Learn Computer Hacking for Beginners on Everything From How to Hack, Powerful Hacking Techniques, Underground Methods, Hacking Skills, and Much More.pdf 473.2 kB
  • Wireless Hacking: How to Hack Wireless Networks Beginner's Guide.pdf 461.1 kB
  • Become the Ultimate Hacker: What is hacking, why you should care, and how to do it.pdf 379.8 kB
  • Hacking the Future: Privacy, Identity, and Anonymity on the Web.mobi 355.4 kB
  • Hacking Ultimate Hacking Guide Hacking For Beginners And Tor Browser.azw3 246.5 kB
  • Ethical hacking: Basic Hacking with SQL Injection.epub 228.7 kB
  • Hacking University Senior Edition: Linux Optimal Beginner's Guide.pdf 172.7 kB

温馨提示

本站不存储任何资源内容,只收集BT种子元数据(例如文件名和文件大小)和磁力链接(BT种子标识符),并提供查询服务,是一个完全合法的搜索引擎系统。网站不提供种子下载服务,用户可以通过第三方链接或磁力链接获取到相关的种子资源。本站也不对BT种子真实性及合法性负责,请用户注意甄别!