Data Communications and Networking 5E – Forouzan

Data Communications and Networking 5E – Forouzan
English | Size: 860.26 MB
Category: Networking

The fifth edition of Behrouz Forouzan’s Data Communications and Networking presents a comprehensive and accessible approach to data communications and networking that has made this book a favorite with students and professionals alike. More than 830 figures and 150 tables accompany the text and provide a visual and intuitive opportunity for understanding the material. This unique approach minimizes the need for heavy math content, allowing normally complicated topics to unfold graphically and visually rather than through the presentation of complex formulas.

Graphic Audio – L E Modesitt Jr – The Saga of Recluce Complete to date

Graphic Audio – L E Modesitt Jr – The Saga of Recluce Complete to date on IPT – The Saga Of Recluce [03] The Magic Engineer and [04] The Order War (MP3)
English | Size: 2.27 GB
Category: Tutorial

SAGA OF RECLUCE 3 : The Magic Engineer (1 of 2)
SAGA OF RECLUCE 3 : The Magic Engineer (2 of 2)
SAGA OF RECLUCE 4 : The Order War (1 of 2)
SAGA OF RECLUCE 4 : The Order War (2 of 2)

New Masters Academy – Linear Perspective Master Course – Level 3 [17-21] – Erik Olson

New Masters Academy – Linear Perspective Master Course – Level 3 [17-21] – Erik Olson
English | Size: 7.25 GB
Category: E-learning | others

Linear Perspective Master Course
In the most comprehensive video course on linear perspective ever created, Erik Olson will teach you how to use this traditional system of drawing tools to transform your drawings and unleash your creative ideas. Although many artists avoid learning perspective, Erik will show you how it can empower you to create figures and environments from imagination as well as giving you the knowledge to change your references.

Web Application Penetration Testing Training Course – WAPT

Web Application Penetration Testing Training Course – WAPT
English | Size: 827.69 MB
Category: Tutorial

Start from the very basics, all the way to advanced post-exploitation activities
Wide coverage of OWASP’s TOP 10
Master Burp Suite
In-depth Web application analysis, information gathering and enumeration
XSS & SQL Injection