pack1.5
File List
- Fundamentals of Web Development.pdf 103.7 MB
- Holistic Game Development with Unity: An All-in-One Guide to Implementing Game Mechanics, Art, Design and Programming 2nd Edition.pdf 89.8 MB
- Distributed Operating Systems: Concepts and Design.pdf 82.3 MB
- Interactive Computer Graphics: A Top-Down Approach Using OpenGL.djvu 80.7 MB
- Integrating Python with Leading Computer Forensics Platforms.epub 58.0 MB
- Head First Ajax.pdf 49.5 MB
- Game Art: Art from 40 Video Games and Interviews with Their Creators.pdf 46.2 MB
- Handbook of Computer Aided Geometric Design.pdf 45.5 MB
- Inside Jokes: Using Humor to Reverse-Engineer the Mind.pdf 44.2 MB
- Drones For Dummies.epub 39.0 MB
- Investigating Internet Crimes.pdf 32.7 MB
- Java EE 7 Development with NetBeans 8.epub 27.3 MB
- How to Cheat at Securing Linux.pdf 27.0 MB
- Identity and Access Management.epub 26.0 MB
- Interaction Design for 3D User Interfaces The World of Modern Input Devices for Research, Applications, and Game Development.pdf 23.2 MB
- How to Use Objects.azw3 23.0 MB
- Foundations of Modern Networking: SDN, NFV, QoE, IoT, and Cloud.mobi 22.1 MB
- Foundation of Game Design with HTML5 & Javascript.pdf 20.3 MB
- Guide to Parallel Operating Systems with Windows 7 and Linux 2nd Edition.pdf 20.2 MB
- Electronic Commerce: A Managerial and Social Networks Perspective.pdf 19.4 MB
- Hacking: Computer Hacking, Security TEsting, Penetration Testing and Basic Security.pdf 19.4 MB
- Firewall Policies and VPN Configurations.pdf 19.3 MB
- Expert Oracle Exadata.pdf 17.3 MB
- Expert Hadoop Administration: Managing, Tuning, and Securing Spark, YARN, and HDFS.pdf 16.5 MB
- Enterprise Mac Security: Securing El Capitan in the enterprise and beyond.pdf 16.0 MB
- Gradle in Action.pdf 16.0 MB
- High-Performance Java Persistence: Get the most out of your persistence layer.pdf 15.6 MB
- Hacking Web Apps: Detecting and Preventing Web Application Security Problems.pdf 14.7 MB
- Graphics & Visualization: Principles and Algorithms.pdf 13.5 MB
- Java EE and HTML5 Enterprise Application Development.pdf 13.3 MB
- Essential Mathematics for Games and Interactive Applications 3rd Edition.pdf 13.2 MB
- Effective Python: 59 Specific Ways to Write Better Python.pdf 12.3 MB
- Identyfing Malicious Code Through Reverse Engineering.pdf 12.2 MB
- Eclipse IDE Handbook: Hot Recipes for Eclipse IDE.pdf 12.2 MB
- Fundamentals of Construction Management.pdf 12.1 MB
- How to Break Web Software: Functional and Security Testing of Web Applications and Web Services.chm 12.0 MB
- Graphics Shaders: Theory and Practice 2nd Edition.pdf 12.0 MB
- Essential Mobile Interaction Design: Perfecting Interface Design in Mobile Apps.pdf 11.0 MB
- Introducing Java EE 7: A Look at What's New.pdf 10.9 MB
- Hardware Hacking: Have Fun While Voiding your Warranty.djvu 10.1 MB
- JavaFX Programming Cookbook: Hot Recipes for JavaFX Development.pdf 10.0 MB
- Discrete Dynamical Systems.pdf 9.8 MB
- iOS Penetration Testing A Definitive Guide to iOS Security.pdf 9.6 MB
- Javascript Frameworks for Modern Web Dev.pdf 9.6 MB
- Java for Data Science.pdf 8.8 MB
- Java Programming Learn Advanced Skills from a Java Expert [repost].pdf 8.7 MB
- Domain-Driven Design Distilled.pdf 8.4 MB
- Hacking For Dummies 5th Edition.pdf 8.1 MB
- Hack Proofing your Identity in the Information Age.pdf 8.0 MB
- Java 8 Recipes.pdf 7.8 MB
- Java SE 8 for the Really Impatient.pdf 7.7 MB
- Java Performance Companion.pdf 7.0 MB
- Introductory Maths for Chemists.pdf 6.9 MB
- Hacking a Terror Network: The Silent Threat of Covert Channels.pdf 6.8 MB
- GWT Programming Cookbook: Hot Recipes for GWT Development.pdf 6.8 MB
- IntelliJ IDEA Handbook: Hot Recipes for the IntelliJ IDEA IDE.pdf 6.5 MB
- Expert Oracle and Java Security.pdf 6.3 MB
- DOM Scripting: Web Design with Javascript and the Document Object Model.pdf 6.3 MB
- Javascript Recipes: A Problem-Solution Approach.pdf 6.1 MB
- Inside the SPAM Cartel: Trade Secrets from the Dark Side.chm 6.0 MB
- Java All-in-One 5th Edition.pdf 5.9 MB
- Endpoint Security.pdf 5.8 MB
- Hacking articles: Gmail Hacking Beta.pdf 5.7 MB
- JavaServer Faces: Introduction by Example.pdf 5.5 MB
- Javascript Fundamental: An Introduction to Javascript Programming.pdf 5.5 MB
- FISMA Compliance Handbook.epub 5.5 MB
- Fuzzy Logic for Image Processing A Gentle Introduction Using Java.pdf 5.4 MB
- JavaScript for Sound Artists: Learn to Code with the Web Audio API.pdf 5.2 MB
- Java 9 Recipes: A Problem-Solution Approach 3rd Edition.pdf 5.0 MB
- Javascript & DHTML Cookbook 2nd Edition.pdf 4.9 MB
- Hacking the Code: ASP.NET WEb Application Security.chm 4.8 MB
- Hacking with React: Get started with React, React Router, Jest, Webpack, ES6 and more with this hands-on guide.pdf 4.7 MB
- Hiding in Plain Sight: Putin's War in Ukraine.pdf 4.6 MB
- Java 9 Revealed: For Early Adoption and Migration.pdf 4.6 MB
- Internet of Things with JavaScript.epub 4.5 MB
- Implementing SSL and TLS: Using Cryptography and PKI.pdf 4.5 MB
- Hacking articles: Footprinting.pdf 4.5 MB
- Gradle Build Automation Handbook: Hot Recipes for Gradle Automation.pdf 4.5 MB
- From Mathematics to Generic Programming.epub 4.4 MB
- Java EE 6 Pocket Guide.pdf 4.3 MB
- Essential Electromagnetism: Solutions.pdf 3.9 MB
- Expect Us: Online Communities and Political Mobilization.pdf 3.9 MB
- How to Cheat at Windows System Administration: Using Command Line Scripts.pdf 3.7 MB
- Java Design Patterns: Reusable Solutions to Common Problems.pdf 3.5 MB
- Hacking Growth: How Today's Fastest Growing Companies Drive Breakout Success.epub 3.4 MB
- Examples of General Elementary Series.pdf 3.2 MB
- Java Internationalization.pdf 3.2 MB
- Inside the Windows 95 Registry.epub 3.0 MB
- Host Integrity Monitoring Using Osiris and Samhain.pdf 3.0 MB
- Ghost in the Wires: My Adventures as the World's Most Wanted Hacker.pdf 2.8 MB
- Foundations of Java for ABAP Programmers.pdf 2.7 MB
- Freaks, Geeks, and Cool Kids: American Teenagers, Schools, and the Culture of Consumption.pdf 2.6 MB
- Foundations of Coding: Compression, Encryption, Error Correction.pdf 2.5 MB
- Docker Containerization Cookbook: Hot Recipes for Docker Automation.pdf 2.5 MB
- eBusiness Essentials 2nd Edition.pdf 2.4 MB
- Groovy Programming Cookbook: Hot Recipes for Groovy Development.pdf 2.4 MB
- Enterprise Security: The Manager's Defense Guide.pdf 2.4 MB
- GROWTH HACKING Silicon Valley’s Best Kept Secret.epub 2.3 MB
- Explaining Social Behavior: More Nuts and Bolts for the Social Sciences.pdf 2.2 MB
- Git Tutorial: The Ultimate Guide.pdf 2.1 MB
- Java Concurrency Essentials: Concurrent Programming Demystified.pdf 2.1 MB
- Fundamentals of Wireless Sensor Networks: Theory and Practice.pdf 2.0 MB
- Java: JVM Troubleshooting Guide.pdf 2.0 MB
- Java Message Service 2nd Edition.pdf 1.9 MB
- Effective Python Penetration Testing.azw3 1.9 MB
- Gradle Essentials.pdf 1.7 MB
- Inside the Windows 95 FIle System.epub 1.5 MB
- Intel Threading Building Blocks.pdf 1.4 MB
- Hibernate Tutorial: The Ultimate Guide.pdf 1.2 MB
- Implementing, Managing, and Maintaining a Windows Server 2003: Network Infrastructure Guide.ppt 1011.5 KB
- Facelets Essentials: Guide to JavaServer Faces View Definition Framework.pdf 1007.1 KB
- HACKING: Learn Hacking FAST! Ultimate Course Book for Beginners.pdf 909.3 KB
- Introducing Regular Expressions: Javascript and Typescript.pdf 889.9 KB
- Java Interview Questions and Answers.pdf 877.7 KB
- Java Persistence API Mini Book.pdf 739.8 KB
- Java Reflection Tutorial: The Ultimate Guide.pdf 721.2 KB
- Entering the cloud fray.pdf 663.4 KB
- Java Annotations Tutorial: The Ultimate Guide.pdf 637.7 KB
- HACKING THE NO-NONSENSE GUIDE Learn Ethical Hacking Within 12 Hours!.epub 594.9 KB
- How to Become an Alpha Male: Attract Women and Become Succesful at Seduction.pdf 491.4 KB
- Java 8 Features: The Ultimate Guide.pdf 465.5 KB
- Hacking: Easy Hacking for Beginners How to Hack Computers, Penetration Testing and Cracking Security.azw3 381.1 KB
- Hacking: Guide to Basic Security, Penetration Testing and Everything Else Hacking.mobi 158.4 KB
- How Streams Work In Java 8 - Van Nguyen.epub 123.8 KB
Download Torrent
Related Resources
Copyright Infringement
If the content above is not authorized, please contact us via activebusinesscommunication[AT]gmail.com. Remember to include the full url in your complaint.