210798.pdf 16809994
| US Department of Justice Office of Justice Programs Special NIK Report: Investigations Involving the Internet and Computer Networks (January 2007)
| 210_ruehle.pdf 516094
| The Bomb for Beginners: A Do-It-Yourself Guide to Going Nuke in a Few Easy Steps, by Michael Ruhle. (February 2010)
| 816-4816-10.pdf 130890
| How Hackers Do It: Tricks, Tools and Techniques, by Alex Noordergraaf, Enterprise Server Products, Sun BluePrints Online (May, 2002)
| cia_fj.pdf 24829831
| The CIA "Family Jewels" - 700+ pages of previously-classified CIA documents of wrongdoing and subterfuge. (June, 2007)
| counterfeit0808.pdf 422680
| The Counterfeit Kit: Your "Expert" Guide to Counterfeit Money Detection (2007)
| demonhack.pdf 70459
| The Demonization of the Hacker, by Mihai Nadin (1994)
| fbi2006.pdf 1631226
| CSI/FBI Computer Crime and Security Survey from the Computer Security Institute by Lawrence A. Gordon, Martin P. Loeb, William Lucyshyn and Robert Richardson (2006)
| googlehackers.pdf 649522
| The Google Hacker's Guide: Understanding and Defending Against the Google Hacker, by Johnny Long (March 19, 2004)
| lsiguide.pdf 5754575
| The LSI Guide to Lockpicking: A Locksport Primer
| nisrphishing.pdf 1891643
| The Phishing Guide: Understanding and Preventing Phishing Attacks, by Gunter Ollmann, Professonal Services Director, NGSSoftware Insight Security Research (September, 2004)
| palmer.pdf 1375530
| Ethical Hacking, by C.C. Palmer, IBM Systems Journal, Volume 40, Number 3 (2001)
| thinkhacker.pdf 41818
| Thinking Like a Hacker, by Eric Schultze, Chief Security Architect, Shavlik Technologies (March 7, 2002)
| | | | | | | | | | | | |