| lira.epac.to |
/DOCS-TECH/Hacking/USB |
USB Attacks - Fun with Plug and 0wn.pdf | 394.0 KB | 2019-03-07 20:09 | Documents |
| lira.epac.to |
/DOCS-TECH/Hacking/USB |
BadUSB - On Accessories that Turn Evil.pdf | 1000.0 KB | 2019-03-07 20:09 | Documents |
| lira.epac.to |
/DOCS-TECH/Hacking/USB |
Does Dropping USB Drives in Parking Lots and other places Really Work.pdf | 8.0 MB | 2019-03-07 20:09 | Documents |
| lira.epac.to |
/DOCS-TECH/Forensics/Reports |
McAfee Labs Threat Advisory - VBS.Autorun Worm.pdf | 198.0 KB | 2019-03-07 20:09 | Documents |
| lira.epac.to |
/DOCS-TECH/Engineering and Management/Management |
Six Deadly Small Business Marketing Secrets.pdf | 357.0 KB | 2019-03-07 20:08 | Documents |
| lira.epac.to |
/DOCS-TECH/Programming/UML - MDA |
Mastering UML with Rational Rose 2002.pdf | 9.2 MB | 2019-03-07 20:08 | Documents |
| lira.epac.to |
/DOCS-TECH/Forensics/Malware |
How to Remove Autorun.inf Virus.pdf | 43.0 KB | 2019-03-07 20:08 | Documents |
| lira.epac.to |
/DOCS-TECH/Hacking/Ethical Hacking |
Gray Hat Hacking - The Ethical Hackers Handbook - Third Edition.pdf | 9.5 MB | 2019-03-07 20:08 | Documents |
| lira.epac.to |
/DOCS-TECH/Hacking/USB |
The Reality of Risks from Consented use of USB Devices.pdf | 659.0 KB | 2019-03-07 20:08 | Documents |
| lira.epac.to |
/DOCS-TECH/Hacking/USB |
Botnets Die Hard - Owned and Operated.pdf | 1.6 MB | 2019-03-07 20:08 | Documents |
| lira.epac.to |
/DOCS-TECH/Hacking/USB |
Beyond Autorun - Exploiting Vulnerabilities with Removable Storage.pdf | 1.5 MB | 2019-03-07 20:08 | Documents |
| lira.epac.to |
/DOCS-TECH/Engineering and Management/Management |
Business Process Management - Strategic Integration in a Web Enabled.pdf | 1.7 MB | 2019-03-07 20:08 | Documents |
| lira.epac.to |
/DOCS-TECH/Engineering and Management/Management |
Behind Closed Doors - Secrets of Great Management.pdf | 1.6 MB | 2019-03-07 20:08 | Documents |
| lira.epac.to |
/DOCS-TECH/Engineering and Management/Management |
A Rogue Economist Explores the Hidden Side of Everything.pdf | 5.6 MB | 2019-03-07 20:08 | Documents |
| lira.epac.to |
/DOCS-TECH/Forensics/Reports |
Targeted Attack on France TV5 Monde.pdf | 675.0 KB | 2019-03-07 20:08 | Documents |
| lira.epac.to |
/DOCS-TECH/Hacking/USB |
USB Hacking.pdf | 1.2 MB | 2019-03-07 20:08 | Documents |
| lira.epac.to |
/DOCS-TECH/Engineering and Management/Management |
12 Steps To Startup.pdf | 159.0 KB | 2019-03-07 20:08 | Documents |
| lira.epac.to |
/DOCS-TECH/Hacking/USB |
URI Use and Abuse.pdf | 1.4 MB | 2019-03-07 20:08 | Documents |
| lira.epac.to |
/DOCS-TECH/Hacking/USB |
USB Hacksaw.pdf | 605.0 KB | 2019-03-07 20:08 | Documents |
| lira.epac.to |
/DOCS-TECH/Forensics/Malware |
Analyzing Malicious Code.pdf | 1.3 MB | 2019-03-07 20:08 | Documents |
| lira.epac.to |
/DOCS-TECH/Retro Archives/Historical Publications Archive/1998 |
The Development and Analysis of Intrusion Detection Algorithms (1998).pdf | 1.2 MB | 2019-03-07 18:39 | Documents |
| lira.epac.to |
/DOCS-TECH/Retro Archives/Historical Publications Archive/0000 |
Intranet Service Security - Lecture 4 - Internet Security.pdf | 75.0 KB | 2019-03-07 18:39 | Documents |
| lira.epac.to |
/DOCS-TECH/Retro Archives/Historical Publications Archive/0000 |
ARP Spoofing and IP Hijacking.pdf | 13.0 KB | 2019-03-07 18:39 | Documents |
| lira.epac.to |
/DOCS-TECH/Retro Archives/Historical Publications Archive/1999 |
Active Network Security (1999).pdf | 674.0 KB | 2019-03-07 18:39 | Documents |
| lira.epac.to |
/DOCS-TECH/Retro Archives/Historical Publications Archive/0000 |
A Database of Computer Attacks for the Evaluation of Intrusion Detection Systems.pdf | 3.8 MB | 2019-03-07 18:39 | Documents |