Book Courtesy of Black-Khonel &
Fast Track To Windows Registry

HTML 5 Your Visual Blueprint For Designing Rich Web

Mac For Dummies
Planning For IPv6

Programming 8 Bit PIC Microcontrollers In C

Hacker HighSchool

password: belajar-cracking.blogspot.com
Seni Internet Hacking Recoded

Exploiting Software: How To Break The Code

Embedded C Tutorial

The Art Of Assembly Language: 2nd Edition

Best Hacking Book By SAM
Part 1:
Part 2:
Debug It! Find, Prevent And Repair Your Code

Shellcoder’s Handbooks

Hacker Web Exploitation Uncovered
Professional Rootkit Subverting – The Windows Kernel
Win32 Assembler Coding For Cracker
Jasakom Collection
Computer Worm 1Computer Worm 2
Wireless Kung Fu: Network And Hacking

Cracking Code & Cryptograms
Metasploit The Penetration Tester Guide 2011

0 comments:
Posting Komentar
"Silahkan berkomentar kawan,,, karena komentar anda sangat berarti pada blog ini, semoga bermanfaat, terima kasih ~,~"