| lira.epac.to |
/DOCS-TECH/Big Data |
Learning Hadoop.pdf | 2.4 MB | 2019-03-07 13:07 | Documents |
| lira.epac.to |
/DOCS-TECH/Big Data/Hadoop |
Hadoop Application Architectures.pdf | 19.0 MB | 2019-03-07 13:07 | Documents |
| lira.epac.to |
/DOCS-TECH/Big Data |
Technology Decisions.pdf | 43.0 MB | 2019-03-07 13:09 | Documents |
| lira.epac.to |
/DOCS-TECH/Big Data |
Statistics for Big Data for Dummies.pdf | 7.3 MB | 2019-03-07 13:09 | Documents |
| lira.epac.to |
/DOCS-TECH/Big Data |
Smart Cities - Big Data, Civic Hackers and the Quest for a New Utopia (2014).pdf | 302.0 MB | 2019-03-07 13:09 | Documents |
| lira.epac.to |
/DOCS-TECH/Hacking/BlackHat |
Caffeine Monkey - Automated Collection, Detection and Analysis of Malicious JavaScript.pdf | 390.0 KB | 2019-03-07 13:10 | Documents |
| lira.epac.to |
/DOCS-TECH/Hacking/BlackHat |
CrowdSource - Applying machine learning to web technical documents to automatically identify malware capabilities.pdf | 2.6 MB | 2019-03-07 13:10 | Documents |
| lira.epac.to |
/DOCS-TECH/Hacking/BlackHat |
Deactivate the Rootkit: Attacks on BIOS anti-theft Technologies.pdf | 164.0 KB | 2019-03-07 13:10 | Documents |
| lira.epac.to |
/DOCS-TECH/Hacking/BlackHat |
How to Get Your Website Found.pdf | 1.1 MB | 2019-03-07 13:10 | Documents |
| lira.epac.to |
/DOCS-TECH/Hacking/BlackHat |
Defending your DNS in a post-Kaminsky World.pdf | 2.6 MB | 2019-03-07 13:10 | Documents |
| lira.epac.to |
/DOCS-TECH/Hacking/BlackHat |
Hacking Without Re-Inventing the Wheel.pdf | 222.0 KB | 2019-03-07 13:10 | Documents |
| lira.epac.to |
/DOCS-TECH/Hacking/BlackHat |
Defending BlackBox Web Applications.pdf | 882.0 KB | 2019-03-07 13:10 | Documents |
| lira.epac.to |
/DOCS-TECH/Hacking/BlackHat |
Physical Memory Forensics.pdf | 446.0 KB | 2019-03-07 13:10 | Documents |
| lira.epac.to |
/DOCS-TECH/Hacking/BlackHat/BlackHole Exploit Kit |
Inside A BlackHole.pdf | 443.0 KB | 2019-03-07 13:10 | Documents |
| lira.epac.to |
/DOCS-TECH/Hacking/BlackHat |
Finding the Linchpins of the Dark Web: A Study on Topologically Dedicated Hosts on Malicious Web Infrastructures.pdf | 1000.0 KB | 2019-03-07 13:10 | Documents |
| lira.epac.to |
/DOCS-TECH/Hacking/BlackHat |
PDF Attack - A Journey from the Exploit Kit to the Shellcode.pdf | 1.2 MB | 2019-03-07 13:10 | Documents |
| lira.epac.to |
/DOCS-TECH/Health Information Technology/Bio Informatics |
Bioinfomatics for Geneticists.pdf | 5.7 MB | 2019-03-07 13:10 | Documents |
| lira.epac.to |
/DOCS-TECH/Hacking/BlackHat |
Exploring the NFC Attack Surface.pdf | 5.6 MB | 2019-03-07 13:10 | Documents |
| lira.epac.to |
/DOCS-TECH/Health Information Technology/Bio Informatics |
Bioinformatics Computing.pdf | 5.2 MB | 2019-03-07 13:10 | Documents |
| lira.epac.to |
/DOCS-TECH/Health Information Technology/Bio Informatics |
Developing Bioinformatics Computer Skills.pdf | 2.8 MB | 2019-03-07 13:10 | Documents |
| lira.epac.to |
/DOCS-TECH/Hacking/BlackHat/BlackHole Exploit Kit |
Blackhole Exploit Kit - Rise & Evolution.pdf | 2.1 MB | 2019-03-07 13:10 | Documents |
| lira.epac.to |
/DOCS-TECH/Hacking/BlackHat |
Deobfuscator - An Automated Approach to the Identification and Removal of Code Obfuscation.pdf | 2.7 MB | 2019-03-07 13:10 | Documents |
| lira.epac.to |
/DOCS-TECH/Hacking/BlackHat |
Gizmo - A Lightweight Open Source Web Proxy.pdf | 335.0 KB | 2019-03-07 13:10 | Documents |
| lira.epac.to |
/DOCS-TECH/Hacking/BlackHat |
Universal DDoS Mitigation Bypass.pdf | 4.2 MB | 2019-03-07 13:10 | Documents |
| lira.epac.to |
/DOCS-TECH/Big Data |
The Patient Revolution.pdf | 4.0 MB | 2019-03-07 13:10 | Documents |