Friday, November 18, 2005

Security Links

SEARCHING in FTP links and open directories...please be patient
(70-220) MCSE Training Kit--Designing Microsoft Windows 2000 Network Security.CHM
Microsoft Press - MCSA-MSCE Implementing and Administering S.chm
Maximum_security.zip
maximum_wireless_security.chm
nist__computer_security_incident_handling_guide.pdf
Security_in_VoIP_Telephony_Systems.pdf
US Air Force - Security Forces Use of Force AFMAN 31-222 (PDF).zip
US Army - Physical Security FM 3-19.30 (PDF).zip
US Army course - Communications Security (COMSEC) SS0137 (PDF and doc).zip
US DoD - Design Guidelines for Physical Security of Facilities MIL-HDBK-1013 1a (PDF).zip
US Navy course - Information Systems Technician Training Series Module 1?Administration and Security NAVEDTRA 14222 (PDF).zip
Osprey - (Warrior 061) - German Security And Police Soldier 1939-45 (PDF).zip
US Army course - Computer Security IT0772 (PDF).zip
US Army course - Operations Security (OPSEC) IT0464 (PDF).zip
US Army MP course - Area Security MP1002 (PDF and doc).zip
US Army MP course - Physical Security MP1001 (DOC).zip
US Army MP course - Physical Security Planning MP1000 (DOC).zip
ftp://4guest:4guest@81.176.65.96/epuki/AddisonWesley/Addison.Wesley.Professional.The.Tao.of.Network.Security.Monitoring.Beyond.Intrusion.Detection.Jul.2004.eBook-DDU/
ftp://4guest:4guest@81.176.65.96/epuki/AddisonWesley/Addison-Wesley.Professional.The.dot.NET.Developers.Guide.to.Windows.Security.Sep.2004.eBook-DDU/
ftp://4guest:4guest@81.176.65.96/epuki/Неразобранное/John.Wiley.and.Sons.Network.Security.Bible.Jan.2005.eBook-DDU/
ftp://4guest:4guest@81.176.65.96/epuki/Неразобранное/Reuters.Business.Insights.The.Enterprise.Security.Outlook.Nov.2004.eBook-TLFeBOOK/
ftp://4guest:4guest@81.176.65.96/epuki/JohnWiley/John.Wiley.and.Sons.Innocent.Code.A.Security.Wake.Up.Call.for.Web.Programmers.eBook-kB/
ftp://4guest:4guest@81.176.65.96/epuki/Other/Butterworth.Heinemann.Trojans.Worms.and.Spyware.A.Computer.Security.Professionals.Guide.to.Malicious.Code.Aug.2004.eBook-DDU/
ftp://4guest:4guest@81.176.65.96/epuki/Other/IRM.Press.Information.Security.And.Ethics.Social.And.Organizational.Issues.eBook-TLFeBOOK/
ftp://4guest:4guest@81.176.65.96/epuki/Other/Kluwer.Academic.Publishers.The.Information.Security.Dictionary.Aug.2004.eBook-DDU/
ftp://4guest:4guest@81.176.65.96/epuki/Sybex/Sybex.MCSA.MCSE.Windows.Server.2003.Network.Security.Administration.Study.Guide.70-299.Jul.2004.eBook-DDU/
ftp://4guest:4guest@81.176.65.96/epuki/Sybex/Sybex.Security.Plus.Fast.Pass.Sep.2004.eBook-DDU/
ftp://4guest:4guest@81.176.65.96/epuki/Syngress/Syngress.Programmers.Ultimate.Security.Deskref.eBook-TLFeBOOK/
ftp://4guest:4guest@81.176.65.96/upload/0Day/wrz.net/2005-03/0328/Cisco.Press.Network.Security.Fundamentals.Sep.2004.eBook-LiB/
ftp://4guest:4guest@81.176.65.96/upload/0Day/wrz.net/2005-03/0331/Addison.Wesley.Introduction.to.Computer.Security.Oct.2004.eBook-LiB/
ftp://4guest:4guest@81.176.65.96/upload/0Day/wrz.net/2005-04/0403/Oreilly.Linux.Server.Security.2nd.edition.Feb.2005.eBook-LiB/
ftp://4guest:4guest@81.176.65.96/upload/0Day/wrz.net/2005-04/0409/Oreilly.Apache.Security.Mar.2005.eBook-LiB/
ftp://4guest:4guest@81.176.65.96/upload/0Day/wrz.net/2005-04/0416/Elsevier.Computer.and.Fraud.Security.March.2005.Retail.eBook-FMR/
ftp://4guest:4guest@81.176.65.96/upload/0Day/wrz.net/2005-04/0416/Elsevier.Network.Security.March.2005.Retail.eBook-FMR/
ftp://4guest:4guest@81.176.65.96/upload/0Day/wrz.net/2005-05/0511/APress.Expert.Web.Services.Security.in.the.Dot.NET.Platform.2005.eBook-TLFeBOOK/
ftp://4guest:4guest@81.176.65.96/upload/0Day/wrz.net/2005-05/0520/Idea.Group.Publishing.Multimedia.Security.Steganography.and.Digital.Watermarking.Techniques.for.Protection.of.Intellectual.Property.eBook-YYePG/
ftp://4guest:4guest@81.176.65.96/upload/0Day/wrz.net/2005-05/0527/John.Wiley.and.Sons.UMTS.Security.eBook-kB/
(ebook pdf) - Internet Firewall and Network Security.zip
http://bonso.mine.nu/book/(ebook pdf) - Internet Firewall and Network Security/
CHECKPOINT_NG_SECURITY_ADMI.PDF
_EBOOK__LINUX_SECURITY_AND_.PDF
http://eng.ui.ac.ir/rzafarani/downloads/index.php?dir=Ebooks/Computer E-Books/New E-Books CD/Internet.and.Intranet.Security.Second.Edition/
http://eng.ui.ac.ir/rzafarani/downloads/index.php?dir=Ebooks/Computer E-Books/New E-Books CD/MS.PRESS.ENCYCLOPEDIA.OF.SECURITY-JGT/
http://eng.ui.ac.ir/rzafarani/downloads/index.php?dir=Ebooks/Computer E-Books/New E-Books CD/McGraw.Hill.Hacking.Exposed.-.Network.Security.Secrets.&.Edition/
http://eng.ui.ac.ir/rzafarani/downloads/index.php?dir=Ebooks/Computer E-Books/New E-Books CD/Oreilly Security Warrior/
http://eng.ui.ac.ir/rzafarani/downloads/index.php?dir=Ebooks/Computer E-Books/New E-Books CD/Prentice - Real World Linux Security/
http://eng.ui.ac.ir/rzafarani/downloads/index.php?dir=Ebooks/Computer E-Books/06- Useful e-Books and e-Papers/Wireless Network Security/
http://eng.ui.ac.ir/rzafarani/downloads/index.php?dir=Ebooks/Computer E-Books/Certifications,Trainings/MSCE Traning Guide70-220 (Windows 2000 Network Security Design)/
60_minute_network_security_guide.pdf
[Developer Shed Network] Server Side - Administration - Webserver Security (Part I).pdf
[Developer Shed Network] Server Side - Administration - Webserver Security (Part II).pdf
cisco wireless network security guide.pdf
Complete WAP security.pdf
Elliptic Curve Cryptography, Future Resiliency and High Security Systems.pdf
macromedia flash mx security.pdf
nsa router security guide.pdf
O'Reilly - Practical UNIX and Internet Security 3rd Edition.chm
On The Security of the RC5 Encryption Algorithm.pdf
OS Theory - CH9 System Security.pdf
Security Comparison of Bluetooth vs WiFi.pdf

Displaying only first 60 results, please be MORE specific or use the (-) MINUS option (read FAQ !!!!)


Rapidshare and other submitted by users links:
IT Security magazine and Homeland Defense Journal October 2005
Cisco Access Control Security AAA Administration Services May 2004
Cisco Access Control Security AAA Administration Services May 2004
Cisco Access Control Security AAA Administration Services May 2004
Core Security Patterns Best Practices and Strategies for J2EE Web Services and Identity Management
Core Security Patterns Best Practices and Strategies for J2EE Web Services and Identity Management
Core Security Patterns Best Practices and Strategies for J2EE Web Services and Identity Management
Trojans Worms andSpyware A Computer Security Professional's Guide to Malicious Code PASSWORD: www.2baksa.net
Trojans Worms and Spyware A Computer Security Professional's Guide to Malicious Code
Cisco ASA All in One Firewall IPS and VPN Adaptive Security Appliance PASSWORD: www.Chipollo.Info
Cisco ASA All in One Firewall IPS and VPN Adaptive Security Appliance PASSWORD: www.Chipollo.Info
Addison Wesley Introduction to Computer Security Oct 2004 eBook LiB
Bluetooth vs WiFi
O'Reilly Oracle Security PASSWORD: ebooksclub.org
Wiley Mastering Web Services Security
Core.Security.Patterns.rar.html
IPSec The New Security Standard for the Internet Intranets and Virtual Private Networks
CCIE Security Exam Certification Guide CCIE Self Study 2nd Edition Cisco Pres PASSWORD: http://www.blueportal.org
The Practice Of Network Security Deployment Strategies For Production Environments
Computer Internet Network System Security PASSWORD: synergy
Managing Security with Snort and IDS Tools OReilly isbn 0596006616
Prentice Hall PTR Solaris Security isbn 0130960535
TCP IP Architcture Protocols and Implementation With Ipv6 and Ip Security Mcgraw Hill isbn 0070220697
Cisco Access Control Security AAA Administration Services Hardcover
Expert Web Services Security in the NET Platform APress PASSWORD: http://www.blueportal.org
Essential PHP Security OReilly PASSWORD: pass: ebooksclub.org
Essential PHP Security OReilly PASSWORD: password : www.blueportal.org
Inside Network Security Assessment Guarding Your IT Infrastructure Nov 2005
Cisco Security Agent Cisco Press PASSWORD: http://www.blueportal.org
Windows Server 2003 PKI and Certificate Security
Business Case for Network Security Cisco Press PASSWORD: http://www.blueportal.org
Solaris Environment Security
Cisco ASA All in One Firewall IPS and VPN Adaptive Security Appliance Oct 2005
Cisco ASA All in One Firewall IPS and VPN Adaptive Security Appliance Oct 2005
Cisco ASA All in One Firewall IPS and VPN Adaptive Security Appliance Oct 2005
MCGraw Hill Osborne HackNotes Linux and Unix Security Portable Reference pdf
Essential PHP Security Oct 2005
Essential PHP Security Oct 2005
Essential PHP Security Oct 2005
Cisco.Access.Control.Security.AAA.Administration.Services.rar.html PASSWORD: ebooksatkoobe
Cisco Press Cisco Access Control Security AAA Administration Services
Security Controls for Sarbanes Oxley Section 404 IT Compliance Authorization Authentication and Access PASSWORD: password : www.avaxhome.ru
Inside Network Security Assessment Guarding Your IT Infrastructure Nov 2005
Inside Network Security Assessment Guarding Your IT Infrastructure Nov 2005
Inside Network Security Assessment Guarding Your IT Infrastructure Nov 2005
Hack IT Security Through Penetration Testing Addison Wesley PASSWORD: http://www.blueportal.org
Security Controls for Sarbanes Oxley Section 404 IT Compliance Authorization Authentication and Access
IRM.Press.Web.And.Information.Security.Oct.2005.eBook-DDU.rar.html
IRM.Press.Web.And.Information.Security.Oct.2005.eBook-DDU.www.AVAXHOME.ru.rar.html PASSWORD: Password: www.AvaxHome.ru
Sun Certified Securit Administrator for Solaris 9 and 10 Study Guide
Sun Certified Security Administrator for Solaris 9 10 Study Guide
Wiley.Security.Controls.for.Sarbanes-Oxley.Section.404.IT.Compliance.Oct.2005.eBook-DDU.rar.html PASSWORD: ebooksatkoobe
Computers.and.Security.Volume.24.Issue.7.October.2005.eBook-EEn.rar.html
Computers.and.Security.Volume.24.Issue.6.September.2005.eBook-EEn.rar.html
Designing.Network.Security-Cisco.rar.html
Linux_Security_-_HOW_TO.rar.html
http rapidshare de files 7112220 Wiley Security Controls for Sarbanes Oxley Section 404 IT Compliance Oct 2005 eBook DDU pdf html
The CISM Prep Guide Mastering the Five Domains of Information Security Management PASSWORD: password: ebooksclub.org
Sun Certified Security Administrator for Solaris 9 10 Study Guide PASSWORD: avax
architects Guide to PHP Security

No comments: