- | An Introduction to Mathematical Cryptography (2014) - Hoffstein, Pipher, Silverman.pdf | 5955520 | | pdf | 2025-08-15 18:40:14 |
- | Bruce Schneier: Applied Cryptography.pdf | 2922467 | | pdf | 2025-08-15 18:40:14 |
- | Bug Bounty Bootcamp The Guide to Finding and Reporting Web Vulnerabilities by Vickie Li.pdf | 10792668 | | pdf | 2025-08-15 18:40:14 |
- | Cybersecurity Survival Guide 6.pdf | 7066957 | | pdf | 2025-08-15 18:40:14 |
- | David Burns - Feeling Good.pdf | 10038705 | | pdf | 2025-08-15 18:40:14 |
- | Intel® 64 and IA-32 Architectures Software Developer’s Manual.pdf | 26193258 | | pdf | 2025-08-15 18:40:14 |
- | Katsushi Ikeuchi - Computer Vision (2021, Springer) [10.1007_978-3-030-63416-2] - libgen.li.pdf | 52464743 | | pdf | 2025-08-15 18:40:14 |
- | PALO ALTO NETWORKS PCCET STUDY GUIDE.PDF | 6157862 | | PDF | 2025-08-15 18:40:14 |
- | Practical Reverse Engineering.pdf | 5461505 | | pdf | 2025-08-15 18:40:14 |
- | [Chapman & Hall_CRC Cryptography and Network Security Series] Jonathan Katz, Yehuda Lindell - Introduction to Modern Cryptography (2020, CRC Press).pdf | 18120118 | | pdf | 2025-08-15 18:40:14 |
- | kent-beck-test-driven-development-by-example.pdf | 3540082 | | pdf | 2025-08-15 18:40:14 |