Created
July 15, 2018 15:52
-
-
Save pqlx/7a063d6e5cead3fffbed9c274c24d0a6 to your computer and use it in GitHub Desktop.
This file has been truncated, but you can view the full file.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
[ | |
{ | |
"children": [ | |
{ | |
"children": [], | |
"name": "ALGORITHMS - ROBERT SEDGEWICK.pdf", | |
"size": "4.6M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Algorithm Design - John Kleinberg - \u00c3\u2030va Tardos.pdf", | |
"size": " 43M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Algorithms (upload by spark_plug_101).pdf", | |
"size": "1.9M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Algorithms_Nutshell .pdf", | |
"size": " 12M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Algorithms_in_C_-_Sedgewick.pdf", | |
"size": " 29M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Algorithms_in_Pascal_-_Sedgewick.pdf", | |
"size": "4.6M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Algorithms and Data Structures in C++(diamond-torrents.info).chm", | |
"size": " 14M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Algorithms in C.pdf", | |
"size": " 29M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "An Introduction to Genetic Algorithms - Melanie Mitchell.pdf", | |
"size": "6.2M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Computer Graphics - C Version, 2nd Edition.pdf", | |
"size": " 20M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Core Techniques and Algorithms in Game Programming.pdf", | |
"size": " 19M", | |
"type": "file" | |
}, | |
{ | |
"children": [ | |
{ | |
"children": [], | |
"name": "Algorithm Theory - SWAT 2002 - M. Penttonen.pdf", | |
"size": "6.8M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Algorithms and Data Structures - Niklaus Wirth.pdf", | |
"size": "1.2M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Algorithms and Data Structures The Science of Computing - Douglas Baldwin.chm", | |
"size": " 10M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Algorithms and Data Structures in CPlusPlus - Alan Parker.pdf", | |
"size": " 14M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "C++ Data Structures 3rd ed - Nell Dale.pdf", | |
"size": " 18M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "C Algorithms For Real Time DsP - Paul Embree.pdf", | |
"size": "9.9M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "CPlusPlus Plus Data Structures, 3rd Ed - Nell Dale.chm", | |
"size": "9.9M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "C and Data Structures - P.S. Deshpande.chm", | |
"size": "7.5M", | |
"type": "file" | |
} | |
], | |
"name": "Data Structure And Algorithms Books", | |
"size": "-", | |
"type": "dir" | |
}, | |
{ | |
"children": [], | |
"name": "Data Structures and Algorithms in Java, 4th Edition.pdf", | |
"size": " 15M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Data Structures and Algorithms in Java, 5th Edition.pdf", | |
"size": " 18M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Dictionaryof Algorithms and Data Structures.chm", | |
"size": "1.0M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Distributed Source Coding Theory, Algorithms and Applications~tqw~_darksiderg.pdf", | |
"size": "4.6M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Fast Transforms Algorithms, Analyses, Applications~tqw~_darksiderg.pdf", | |
"size": " 11M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Handbook of Algorithms and Data Structures In Pascal and C 2nd Ed - G.H. Gonnet.djvu", | |
"size": "3.7M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Internet Security. Cryptographic Principles, Algorithms and Protocols.pdf", | |
"size": "3.6M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Introduction to Algorithms-Cormen.pdf", | |
"size": " 13M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Introduction to Algorithms-Cormen Solution.pdf", | |
"size": "1.7M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Introduction to Algorithms 3rd Edition Sep 2010.pdf", | |
"size": "4.8M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Petascale Computing Algorithms and Applications.pdf", | |
"size": " 18M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Robert Sedgewick - Algorithms.pdf", | |
"size": "4.4M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Springer - Encyclopedia of Algorithms (2008).pdf", | |
"size": " 55M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Teach Yourself Data Structures And Algorithms In 24 hours - Robert Lafore.pdf", | |
"size": "5.6M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "The Art Of Computer Programming 2nd ed Vol3 - Donald Knuth.djvu", | |
"size": "7.7M", | |
"type": "file" | |
}, | |
{ | |
"children": [ | |
{ | |
"children": [], | |
"name": "#1.pdf", | |
"size": "712K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "#2.pdf", | |
"size": "327K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "#3.pdf", | |
"size": "826K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "#4.pdf", | |
"size": "466K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "#5.pdf", | |
"size": "657K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "#6.pdf", | |
"size": "410K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "#7.pdf", | |
"size": "441K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "#8.pdf", | |
"size": "1.2M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "#9.pdf", | |
"size": "361K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "#10.pdf", | |
"size": "196K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "#11.pdf", | |
"size": "546K", | |
"type": "file" | |
} | |
], | |
"name": "Top Ten Data Mining Algos Chapters", | |
"size": "-", | |
"type": "dir" | |
}, | |
{ | |
"children": [], | |
"name": "knuth_-_the_art_of_computer_programming_-_vol.1.djvu", | |
"size": "6.0M", | |
"type": "file" | |
} | |
], | |
"name": "Algorithms", | |
"size": "-", | |
"type": "dir" | |
}, | |
{ | |
"children": [ | |
{ | |
"children": [], | |
"name": "3D Studio Max 5 for Dummies.chm", | |
"size": " 21M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Advanced_Animation_Preston_Blair.pdf", | |
"size": " 15M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Animating_with_Stop_Motion_Pro.pdf", | |
"size": " 16M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Animation_From_Pencils_to_Pixels.pdf", | |
"size": " 59M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Animation_Mechanics_Motion.pdf", | |
"size": " 11M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Animation_Writing_Development_Script_Pitch.pdf", | |
"size": "5.4M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Cartoon Animation - Preston Blair.zip", | |
"size": " 47M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Character_Animation_2D_Skills_for_Better_3D.pdf", | |
"size": " 12M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "How_to_Make_Animated_Films_Tony_Whites_Complete_Masterclass_on_The_Traditional_Principles_of_Animation.pdf", | |
"size": " 36M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Hybrid_Animation_Integrating_2d_and_3d_Assets.pdf", | |
"size": " 19M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Stop_Motion_Passion_Process_and_Performance.pdf", | |
"size": " 28M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "The_Advanced_Art_of_Stop_Motion_Animation.pdf", | |
"size": " 22M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "The _Animator's_Survival_Kit.pdf", | |
"size": " 35M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Thinking_Animation_Bridging_Gap_2D_3D.pdf", | |
"size": " 16M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Timing_for Animation.chm", | |
"size": "4.6M", | |
"type": "file" | |
} | |
], | |
"name": "Animation", | |
"size": "-", | |
"type": "dir" | |
}, | |
{ | |
"children": [ | |
{ | |
"children": [ | |
{ | |
"children": [], | |
"name": "Dynamic Bayesian Networks Representation, Inference And Learning - Kevin Patrick Murphy.pdf", | |
"size": "1.7M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Judea Pearl - Heuristics.djvu", | |
"size": "515K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Judea Pearl - Probabilistic Reasoning in Intelligent Systems.pdf", | |
"size": " 21M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Learning Bayesian Networks - Neapolitan R. E..pdf", | |
"size": "4.6M", | |
"type": "file" | |
} | |
], | |
"name": "Bayesian networks", | |
"size": "-", | |
"type": "dir" | |
}, | |
{ | |
"children": [ | |
{ | |
"children": [], | |
"name": "Computer Modeling and Simulation Techniques for Computer Vision Problems - Ming-Chin Lu.pdf", | |
"size": "6.1M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Computer Vision - Linda Shapiro.pdf", | |
"size": " 20M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Computer Vision 2d ed - Dand h Ballard.pdf", | |
"size": "105M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Computer Vision A Modern Approach - Forsyth , Ponce.pdf", | |
"size": " 50M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Computer Vision and Applications A Guide for Students and Practitioners - Bernd Jahne.pdf", | |
"size": " 23M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Feature Extraction in Computer Vision and Image Processing - Mark S. Nixon.pdf", | |
"size": "3.8M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Fundamentals of Computer Vision - Mubarak Shah.pdf", | |
"size": "2.2M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Handbook Of Mathematical Models In Computer Vision - Nikos Paragios.pdf", | |
"size": " 97M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Handbook of Computer Vision Algorithms in Image Algebra, 2nd Ed - Gerhard X. Ritter.pdf", | |
"size": " 10M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Handbook of Computer Vision and Applications Volume 1 Sensors and Imaging - Bernd Jahne.pdf", | |
"size": " 15M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Handbook of Computer Vision and Applications Volume 2 Signal Processing and Pattern Recognition - - Bernd Jahne.pdf", | |
"size": " 19M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Handbook of Computer Vision and Applications Volume 3 Systems and Applications - Bernd Jahne.pdf", | |
"size": " 30M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Multiple View Geometry in Computer Vision 2ed - Hartley R., Zisserman A.pdf", | |
"size": " 99M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Vision with Direction A Systematic Introduction to Image Processing and Computer Vision - Josef Bigun.pdf", | |
"size": "7.0M", | |
"type": "file" | |
} | |
], | |
"name": "Computer Vision", | |
"size": "-", | |
"type": "dir" | |
}, | |
{ | |
"children": [ | |
{ | |
"children": [], | |
"name": "Data Mining Using Grammar Based Genetic Programming and Applications - Wong, Cheung.pdf", | |
"size": "1.9M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Evolutionary Computation for Modeling and Optimization - Daniel Ashlock.pdf", | |
"size": "8.3M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Evolutionary computation, vol.1 basic algorithms and operators - Baeck T., Fogel D.B., Michalewicz Z.djvu", | |
"size": "4.2M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Evolutionary computation, vol.2 advanced algorithms and operators - Baeck T., Fogel D.B., Michalewicz Z.djvu", | |
"size": "3.2M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "FRONTIERS OF EVOLUTIONARY COMPUTATION - Anil Menon.pdf", | |
"size": "5.6M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Genetic Programming An Introduction On the Automatic Evolution of Computer Programs and its Applications - Morgan Kaufmann.pdf", | |
"size": "7.2M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Genetic Programming Theory and Practice II - John Koza.pdf", | |
"size": " 12M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Genetic programming Complex adaptive systems - Koza J.R..pdf", | |
"size": "5.3M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "The Handbook of Evolutionary Computation - Kenneth De Jong.pdf", | |
"size": " 11M", | |
"type": "file" | |
} | |
], | |
"name": "Evolutionary computation", | |
"size": "-", | |
"type": "dir" | |
}, | |
{ | |
"children": [ | |
{ | |
"children": [], | |
"name": "FLEXIBLE NEURO-FUZZY SYSTEMS Structures, Learning and Performance Evaluation - Leszek Rutkowski.pdf", | |
"size": " 27M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "FUZZY SETS AND FUZZY LOGIC Theory and Applications - GEORGE J. KLIR , BO YUAN.pdf", | |
"size": "119M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "FUZZY SETS AND THEIR APPLICATIONS TO COGNITIVE AND DECISION PROCESSES - Lotfi A. Zadeh , King-Sun Fu.pdf", | |
"size": "3.5M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Fusion Of Neural Networks, Fuzzy Systems And Genetic Algorithms - Lakhmi C. Jain , N.M. Martin.pdf", | |
"size": "6.5M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Fuzzy Control Systems Design and Analysis A Linear Matrix Inequality Approach - Kazuo Tanaka, Hua O. Wang.pdf", | |
"size": "5.4M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Fuzzy Logic in Embedded Microcomputers and Control Systems - Walter Banks.pdf", | |
"size": "1.4M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Fuzzy Sets And Fuzzy Information Granulation Theory - lotfi Zadeh.pdf", | |
"size": "5.8M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Fuzzy Sets And Systems Theory And Applications - Didier Dubois , Henri Prade.pdf", | |
"size": "9.5M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Neuro-Fuzzy and Soft Computing A Computational Approach to Learning and Machine Intelligence - Jyh-Shing Roger Jang.djvu", | |
"size": "7.0M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Simulating Continuous Fuzzy Systems - James J. Buckley.pdf", | |
"size": "4.9M", | |
"type": "file" | |
} | |
], | |
"name": "Fuzzy systems", | |
"size": "-", | |
"type": "dir" | |
}, | |
{ | |
"children": [ | |
{ | |
"children": [], | |
"name": "ARTIFICIAL INTELLIGENCE and SOFTWARE ENGINEERING Understanding the Promise of the Future - Derek Partridge.pdf", | |
"size": "2.6M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Advances in Applied Artificial Intelligence - John Fulcher.pdf", | |
"size": " 13M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Advances in Artificial Intelligence \u00e2\u20ac\u201c SBIA 2004 - Ana L.C. Bazzan , Sofiane Labidi.pdf", | |
"size": " 19M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Agent-Oriented Programming - From Prolog to Guarded Definite Clauses - Matthew M. Huntbach.pdf", | |
"size": "1.7M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Artificial Intelligence, Structures And Strategies For Complex Problem Solving 3rd ed - George F Luger.pdf", | |
"size": " 59M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Artificial Intelligence A Modern Approach - Stuart J. Russell , Peter Norvig.pdf", | |
"size": " 36M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Artificial Intelligence Applications and Innovations - Bramer Max.pdf", | |
"size": " 21M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Artificial Intelligence Strategies, Applications, and Models Through Search 2d ed - Christopher Thornton.pdf", | |
"size": "1.7M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Artificial Intelligence Through Prolog - Neil C Rowe.pdf", | |
"size": "1.1M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Artificial Intelligence Today Recent Trends and Development - Manuela Veloso.pdf", | |
"size": " 25M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Artificial Intelligence and Soft Computing Behavioral and Cognitive Modeling of the Human Brain - Konar Amit.pdf", | |
"size": "8.6M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "COMPUTATIONAL LINGUISTICSModels, Resources, Applications - Igor A. Bolshakov , Alexander Gelbukh.pdf", | |
"size": "1.6M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Computational Intelligence An Introduction - Andries P. Engelbrecht.pdf", | |
"size": " 17M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Computational Intelligence For Decision Support - Chen.pdf", | |
"size": "2.9M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Computational Intelligence In Control - Masoud Mohammadian.pdf", | |
"size": "5.7M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Computational Intelligence in Manufacturing Handbook - Jun Wang.pdf", | |
"size": " 12M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Computational Web Intelligence Intelligent Technology for Web Applications - Y.-Q. Zhang.pdf", | |
"size": " 35M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Data Mining with Computational Intelligence - Lipo Wang , Xiuju Fu.pdf", | |
"size": "4.5M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Essentials of Programming Languages 2d ed - Daniel P. FriedmanMitchell WandChristopher T. Haynes.pdf", | |
"size": "2.4M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Intelligent Information Integration for the Semantic Web - Ubbo Visser.pdf", | |
"size": "5.3M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Methods And Applications Of Artificial Intelligence - Themistoklis Panayiotopoulos.pdf", | |
"size": " 25M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Morgan.Kaufmann.Semantic.Web.for.the.Working.Ontologist.May.2008.pdf", | |
"size": "3.9M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Multiagent systems a modern approach to distributed artificial intelligence - Gerhard Weiss.pdf", | |
"size": "4.6M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "O'Reilly AI for Game Developers.chm", | |
"size": "2.8M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "PROLOG PROGRAMMING FOR ARTIFICIAL INTELLIGENCE - lvan Bratko.pdf", | |
"size": " 32M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Practical Artificial Intelligence Programming in Java - Mark Watson.pdf", | |
"size": "1.2M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "The Elements of Artificial Intelligence Using Lisp - Steven L. Tanimoto.pdf", | |
"size": " 27M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "The International Dictionary Of Artificial Intelligence - William Raynor.pdf", | |
"size": "813K", | |
"type": "file" | |
} | |
], | |
"name": "General", | |
"size": "-", | |
"type": "dir" | |
}, | |
{ | |
"children": [], | |
"name": "ISR.Encyclopedia.Of.Artificial.Intelligence.Aug.2008.eBook-ELOHiM.pdf", | |
"size": " 27M", | |
"type": "file" | |
}, | |
{ | |
"children": [ | |
{ | |
"children": [], | |
"name": "Artificial_Intelligence_-_A_Guide_to_Intelligent_Systems.pdf", | |
"size": " 12M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Hybrid architectures for intelligent systems - Lotfi A. Zadeh.chm", | |
"size": "7.2M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Intelligent Communication Systems - Nobuyoshi Terashima.pdf", | |
"size": " 15M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Intelligent Systems Fusion, Tracking, and Control - GeeWah Ng.pdf", | |
"size": "8.0M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Intelligent Systems for Engineers and Scientists 2d ed - Adrian A. Hopgood.pdf", | |
"size": "3.0M", | |
"type": "file" | |
} | |
], | |
"name": "Intelligent Systems", | |
"size": "-", | |
"type": "dir" | |
}, | |
{ | |
"children": [ | |
{ | |
"children": [], | |
"name": "Artificial Intelligence and Expert Systems for Engineers - Krishnamoorthy , S. Rajeev.pdf", | |
"size": "3.7M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Building Expert Systems in Prolog - Dennis Merritt.pdf", | |
"size": "4.0M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Fuzzy Expert Systems and Fuzzy Reasoning - William Siler.pdf", | |
"size": "3.6M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "The handbook of applied expert systems - Jay Liebowitz.pdf", | |
"size": " 31M", | |
"type": "file" | |
} | |
], | |
"name": "Knowledge-based systems", | |
"size": "-", | |
"type": "dir" | |
}, | |
{ | |
"children": [ | |
{ | |
"children": [], | |
"name": "Knowledge representation reasoning and declarative problem solving with Answer sets - Chitta Baral.pdf", | |
"size": "2.5M", | |
"type": "file" | |
} | |
], | |
"name": "Knowledge representation", | |
"size": "-", | |
"type": "dir" | |
}, | |
{ | |
"children": [ | |
{ | |
"children": [], | |
"name": "An Introduction to Support Vector Machines and Other Kernel-based Learning Methods - Nello Cristianini , John Shawe.chm", | |
"size": "3.7M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "CRC.Press-Utility.Based.Learning.from.Data.2010.RETAiL.EBook.pdf", | |
"size": "3.3M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Data Mining Practical Machine Learning Tools and Techniques 2d ed - Morgan Kaufmann.pdf", | |
"size": "7.8M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Introduction to Machine Learning - Nils J Nilsson.pdf", | |
"size": "2.6M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Machine Learning, Game Play, and Go - David Stoutamire.pdf", | |
"size": "2.0M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Machine Learning, Neural And Statistical Classification - Michie , Spiegelhalter , Taylor.pdf", | |
"size": " 20M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Machine Learning - Tom Mitchell.pdf", | |
"size": " 37M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Machine Learning And Its Applications - Georgios Paliouras.pdf", | |
"size": " 18M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Machine Learning in Computer Vision - N. SEBE.pdf", | |
"size": "6.5M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "PROBLEM SOLVING WITH REINFORCEMENT LEARNING - Gavin Adrian Rummery.pdf", | |
"size": "1.1M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Reinforcement Learning An Introduction - Richard S. Sutton , Andrew G. Barto.pdf", | |
"size": "3.6M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Statistical Machine Learning For Information Retrieval - Adam Berger.pdf", | |
"size": "1.4M", | |
"type": "file" | |
} | |
], | |
"name": "Machine learning", | |
"size": "-", | |
"type": "dir" | |
}, | |
{ | |
"children": [ | |
{ | |
"children": [], | |
"name": "Formal Syntax and Semantics of Programming Languages - Kenneth Slonneger.pdf", | |
"size": "1.6M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Foundations of Statistical Natural Language Processing - Christopher D. Manning.pdf", | |
"size": "6.5M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Natural Language Processing for Online Applications Text Retrieval,Extraction and Categorization - Peter Jackson , Isabelle Moulinier.pdf", | |
"size": "1.3M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Ontological Semantics - Sergei Nirenburg , Victor Raskin.pdf", | |
"size": "3.3M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Speech and Language Processing An Introduction to Natural Language Processing, Computational Linguistics and Speech Recognition - D.djvu", | |
"size": "5.5M", | |
"type": "file" | |
} | |
], | |
"name": "Natural Language Processing", | |
"size": "-", | |
"type": "dir" | |
}, | |
{ | |
"children": [ | |
{ | |
"children": [], | |
"name": "An Introduction to Neural Networks - Patrick van der Smagt.pdf", | |
"size": "1.3M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Analysis And Applications Of Artificial Neural Networks - LPG Veelenturf.pdf", | |
"size": " 12M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Artificial Neural Networks - Colin Fyfe.pdf", | |
"size": "2.5M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Artificial Neural Networks in Real-life Applications - Juan R. Rabunal.pdf", | |
"size": "8.8M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "C++ Neural Networks and Fuzzy Logic - Valluru B. Rao.pdf", | |
"size": "2.4M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Foundations of Neural Networks, Fuzzy Systems, and Knowledge Engineering - Nikola Kazabov.pdf", | |
"size": "5.2M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Fusion of Neural Networks, Fuzzy Systems and Genetic Algorithms Industrial Applications - Lakhmi C. Jain , N.M. Martin.pdf", | |
"size": "6.5M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Kalman Filtering and Neural Networks - Simon Haykin.pdf", | |
"size": "5.9M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Machine Learning, Neural And Statistical Classification - Cc Taylor.pdf", | |
"size": "1.7M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Methods and Procedures for the Verification and Validation of Artificial Neural Networks - Brian J. Taylor.pdf", | |
"size": " 19M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Neural Networks - A Comprehensive Foundation - Simon Haykin.pdf", | |
"size": " 40M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Neural Networks Algorithms, Applications,and Programming Techniques - James A. Freeman.pdf", | |
"size": " 10M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Programming Neural Networks in Java - JeffHeaton.pdf", | |
"size": "1.6M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "RECENT ADVANCES IN ARTIFICIAL NEURAL NETWORKS Design and Applications - Lakhmi Jain.pdf", | |
"size": "3.2M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Recurrent Neural Networks Design And Applications - L.R. Medsker.pdf", | |
"size": "5.6M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Static and Dynamic Neural Networks From Fundamentals to Advanced Theory - Madan M. Gupta, Liang Jin, Noriyasu Homma.pdf", | |
"size": " 24M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "The Handbook Of Brain Theory And Neural Networks 2Nd Ed - Michael A Arbib.pdf", | |
"size": " 32M", | |
"type": "file" | |
} | |
], | |
"name": "Neural networks", | |
"size": "-", | |
"type": "dir" | |
}, | |
{ | |
"children": [ | |
{ | |
"children": [], | |
"name": "An Introduction to Pattern Recognition - Michael Alder.pdf", | |
"size": "4.4M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Evolutionary Synthesis of Pattern Recognition Systems - Bir Bhanu.pdf", | |
"size": " 15M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Introduction to Statistical Pattern Recognition 2nd Ed - Keinosuke Fukunaga.pdf", | |
"size": " 13M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Particle Swarm Optimization Methods for Pattern Recognition and Image Processing - Mahamed G. H. Omran.pdf", | |
"size": "4.6M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Pattern Recognition in Speech and Language Processing - WU CHOU.pdf", | |
"size": "4.4M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Pattern Recognition with Neural Networks in C++ - Abhijit S. Pandya, Robert B. Macy.chm", | |
"size": " 12M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Pattern recognition and image preprocessing 2nd ed -Sing T. Bow.pdf", | |
"size": " 37M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Statistical Pattern Recognition 2nd Ed - Andrew R. Webb.pdf", | |
"size": "3.0M", | |
"type": "file" | |
} | |
], | |
"name": "Pattern recognition", | |
"size": "-", | |
"type": "dir" | |
}, | |
{ | |
"children": [ | |
{ | |
"children": [], | |
"name": "Foundations Of Soft Case-based Reasoning - SANKAR K. PAL.pdf", | |
"size": "3.6M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Intelligent Control Systems Using Soft Computing Methodologies - Ali Zilouchian.pdf", | |
"size": " 11M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Learning And Soft Computing - Support Vector Machines, Neural Networks, And Fuzzy Logic Models - Vojislav Kecman.pdf", | |
"size": " 68M", | |
"type": "file" | |
} | |
], | |
"name": "Soft Computing", | |
"size": "-", | |
"type": "dir" | |
}, | |
{ | |
"children": [ | |
{ | |
"children": [], | |
"name": "Swarm intelligence - James Kennedy.pdf", | |
"size": "9.0M", | |
"type": "file" | |
} | |
], | |
"name": "Swarm Intelligence", | |
"size": "-", | |
"type": "dir" | |
} | |
], | |
"name": "Artificial Intelligence", | |
"size": "-", | |
"type": "dir" | |
}, | |
{ | |
"children": [ | |
{ | |
"children": [], | |
"name": "Jurafsky_Martin-Speech_and_Language_Processing_draft.zip", | |
"size": " 10M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "LeipzigGlossingRules.pdf", | |
"size": "134K", | |
"type": "file" | |
}, | |
{ | |
"children": [ | |
{ | |
"children": [], | |
"name": "Bod-AllSubtreesApproachUP.pdf", | |
"size": " 45K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Bod-UDOP.pdf", | |
"size": " 42K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Carroll_Charniak-DependencyGrammar.pdf", | |
"size": "434K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Goodman-efficient_parsing_of_DOP.pdf", | |
"size": "233K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Hearne-DOT_thesis__goodmanreductions.pdf", | |
"size": "1.6M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Klein-thesis_Unsupervised_Learning.pdf", | |
"size": "652K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Klein_and_Manning-factored_syntactic_induction.pdf", | |
"size": " 79K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Klein_and_Manning-generative_induction.pdf", | |
"size": "140K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Mitchell-Machine_Learning_Mc-Graw_Hill-1997.pdf", | |
"size": " 17M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Och_Ney-Comparison_MT_alignment.pdf", | |
"size": "294K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Pereira_and_Schabes-Inside-Outside.pdf", | |
"size": "646K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Prescher-Expectation_Maximation_tutorial.pdf", | |
"size": "479K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Way-LFG_DOP.pdf", | |
"size": "329K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "brown-statisticalMT.pdf", | |
"size": "422K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "brown1990sam.pdf", | |
"size": "658K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "brown1993msm.pdf", | |
"size": "2.7M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "hearne2008ccd.pdf", | |
"size": " 67K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "koehn2003spb.pdf", | |
"size": "127K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "lari_young-insideoutsidealgorithm.pdf", | |
"size": "1.3M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "riezler2006gmt.pdf", | |
"size": "558K", | |
"type": "file" | |
} | |
], | |
"name": "Machine_Learning_Unsupervised_parsing_and_MT", | |
"size": "-", | |
"type": "dir" | |
}, | |
{ | |
"children": [ | |
{ | |
"children": [], | |
"name": "Help or help to- what do corpora have to say_.pdf", | |
"size": "305K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Unit 1 Corpus linguistics- the basics.pdf", | |
"size": " 45K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Unit 2 Representativeness, balance and sampling.pdf", | |
"size": "217K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Unit 3 Corpus markup .pdf", | |
"size": "116K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Unit 4 Corpus annotation.pdf", | |
"size": " 73K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Unit 5 Multilingual corpora.pdf", | |
"size": " 39K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Unit 6 Making statistical claims.pdf", | |
"size": " 72K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Unit 7 Extended Well-known and influential corpora.pdf", | |
"size": "390K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Unit 8 Going solo- DIY corpora.pdf", | |
"size": " 31K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Unit 10 Corpora and language studies pt1_3.pdf", | |
"size": " 81K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Unit 10 Corpora and language studies pt2_3.pdf", | |
"size": "313K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Unit 10 Corpora and language studies pt3_3.pdf", | |
"size": " 80K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "cbls_bib.pdf", | |
"size": "213K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "contents.pdf", | |
"size": "129K", | |
"type": "file" | |
} | |
], | |
"name": "McEnery_Xiao_Tono-Corpus_Based_Language_Studies", | |
"size": "-", | |
"type": "dir" | |
}, | |
{ | |
"children": [], | |
"name": "Paul_Graham-on_lisp.pdf", | |
"size": "1.0M", | |
"type": "file" | |
}, | |
{ | |
"children": [ | |
{ | |
"children": [], | |
"name": "Trueswell_et_al-Kindergarten_Path.pdf", | |
"size": "1.3M", | |
"type": "file" | |
} | |
], | |
"name": "Psycholinguistics", | |
"size": "-", | |
"type": "dir" | |
}, | |
{ | |
"children": [ | |
{ | |
"children": [], | |
"name": "Ide, Nancy & Yorick Wilks-Making Sense about Sense, WSDbook.pdf", | |
"size": "377K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Lakoff-1987-Women-Fire-and-Dangerous-Things.pdf", | |
"size": "3.5M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Lambalgen_Hamm-Proper_Treatment_of_Events.pdf", | |
"size": "2.0M", | |
"type": "file" | |
} | |
], | |
"name": "Semantics", | |
"size": "-", | |
"type": "dir" | |
}, | |
{ | |
"children": [ | |
{ | |
"children": [], | |
"name": "Baayen2008-analyzing_linguistic_data_with_R-draft.pdf", | |
"size": "5.1M", | |
"type": "file" | |
}, | |
{ | |
"children": [ | |
{ | |
"children": [], | |
"name": "1fundamentals.pdf", | |
"size": "460K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "2patterns.pdf", | |
"size": "356K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "3phonetics.pdf", | |
"size": "324K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "4psycholinguistics.pdf", | |
"size": "339K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "5sociolinguistics.pdf", | |
"size": "383K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "6historical.pdf", | |
"size": "521K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "7syntax.pdf", | |
"size": "506K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "A_R_getting_started.pdf", | |
"size": " 60K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "frontmatter.pdf", | |
"size": "115K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "references.pdf", | |
"size": " 78K", | |
"type": "file" | |
} | |
], | |
"name": "johnson2008-quantitative_methods_in_linguistics", | |
"size": "-", | |
"type": "dir" | |
} | |
], | |
"name": "Statistics", | |
"size": "-", | |
"type": "dir" | |
}, | |
{ | |
"children": [ | |
{ | |
"children": [], | |
"name": "Bod-ch.3_Prob_grammars.pdf", | |
"size": " 82K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Bresnan_Mchombo-Lexical_Integrity.pdf", | |
"size": "4.3M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Dalrymple-LFG.pdf", | |
"size": "527K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Dalrymple-LFG_encyclopedia_entry.pdf", | |
"size": "281K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Goldberg-CG.pdf", | |
"size": "1.0M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Joshi-TAG.pdf", | |
"size": "471K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Kaplan_Maxwell-grammar_writers_workbench_lfg_manual.pdf", | |
"size": "1.2M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Levine_Meurers-HPSG_encyclopedia_entry.pdf", | |
"size": "319K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Pullum_Scholz-Model_Theoretic_syntax.pdf", | |
"size": "317K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Pullum_Zwicky-Cliticization_Inflection.pdf", | |
"size": "299K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Sag_Manning-ARGST_vs_SEM.pdf", | |
"size": "285K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Sells-Syntax_book.pdf", | |
"size": " 64M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "austin-LFG_intro.pdf", | |
"size": " 43K", | |
"type": "file" | |
} | |
], | |
"name": "Syntactic_theory", | |
"size": "-", | |
"type": "dir" | |
} | |
], | |
"name": "Computational Linguistics", | |
"size": "-", | |
"type": "dir" | |
}, | |
{ | |
"children": [ | |
{ | |
"children": [], | |
"name": "Advanced Computer Architecture and Parallel Processing.pdf", | |
"size": "4.7M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Computer.Organization.and.Design.The.Hardware.Software.Interface.3rd.Ed.2004.iso", | |
"size": "439M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Computer.Organization.and.Design.The.Hardware.Software.Interface.3rd.Ed.2004.pdf", | |
"size": " 50M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Computer Organization and Design -The Hardware Software Interface 3rd ed solutions.pdf", | |
"size": "2.4M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Computer_Organization_5th_Edition.pdf", | |
"size": " 26M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Fundamentals of Computer Organization and Architecture.pdf", | |
"size": "3.4M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Jones & Bartlett, The Essentials of Computer Organization and Architecture -2003.chm", | |
"size": " 14M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Modern_Operating_Systems_2ndEd_by_Tanenbaum_Prentice_Hall.chm", | |
"size": "4.6M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Morgan Kaufmann Computer Architecture, A Quantitative Approach 3rd edition 2002.pdf", | |
"size": " 18M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "PointersAndMemory.pdf", | |
"size": " 62K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Principles of Computer Architecture - 1999.pdf", | |
"size": "2.8M", | |
"type": "file" | |
}, | |
{ | |
"children": [ | |
{ | |
"children": [], | |
"name": "A-list CD Cracking Uncovered - Protection Against Unsanctioned CD Copying.chm", | |
"size": "9.0M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Covert Java Techniques for Decompiling, Patching,and Reverse Engineering.pdf", | |
"size": "3.8M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Introduction To Software Reverse Engineering 2003.pdf", | |
"size": "333K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Reverse Engineering of Object Oriented Code.pdf", | |
"size": "5.8M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Reversing - Secrets of Reverse Engineering.pdf", | |
"size": "8.6M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Static And Dynamic Reverse Engineering Techniques For Java Software Sysytems.pdf", | |
"size": "1.1M", | |
"type": "file" | |
} | |
], | |
"name": "Reverse Engeniering", | |
"size": "-", | |
"type": "dir" | |
}, | |
{ | |
"children": [], | |
"name": "computer_org_design_patterson.pdf", | |
"size": "4.8M", | |
"type": "file" | |
} | |
], | |
"name": "Computer Architecture", | |
"size": "-", | |
"type": "dir" | |
}, | |
{ | |
"children": [ | |
{ | |
"children": [], | |
"name": "Fundamentals of Computer Graphics -- Peter Shirley.pdf", | |
"size": " 38M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Mathematics for 3D Game Programming and Computer Graphics - Eric Lengyel.zip", | |
"size": " 12M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "OpenGL Programming Guide, 7th Edition.pdf", | |
"size": " 10M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Packt.-.3D.Graphics.with.XNA.Game.Studio.4.0.pdf", | |
"size": " 13M", | |
"type": "file" | |
} | |
], | |
"name": "Computer Graphics", | |
"size": "-", | |
"type": "dir" | |
}, | |
{ | |
"children": [ | |
{ | |
"children": [], | |
"name": "Apple Confidential 2.0 The Definitive History of the World's Most Colorful Company.pdf", | |
"size": "6.5M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Apple Confidential 2.0 msword.zip", | |
"size": " 22M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Dealers of Lightning - Michael Hiltzik.epub", | |
"size": "2.3M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Edstrom & Eller - Barbarians Led by Bill Gates - Microsoft from the Inside - How the World's Richest Corporation Wields Its Power (1999).pdf", | |
"size": "1.1M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Game Over_ How Nintendo Conquered the Wo - David Sheff.epub", | |
"size": "665K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Inside Steve's Brain - Leander Kahney.epub", | |
"size": "221K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Paul Allen - Idea Man_ A Memoir by the Cofo_oft (v5.0).epub", | |
"size": "430K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Racing_the_Beam_-_The_Atari_Video_Computer_System.pdf", | |
"size": "2.1M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Return to the Little Kingdom-Steve Jobs, the Creation of Apple, & How it Changed the World, 2e [2009].epub", | |
"size": "383K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Steve Wozniak - iWoz (epub).epub", | |
"size": "4.0M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "TheUltimateHistoryOfVideoGames_Revisited.zip", | |
"size": " 35M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Tracy_Kidder-The_Soul_of_A_New_Machine-Back_Bay_Books(2000).epub", | |
"size": "277K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Walter Isaacson - Steve Jobs (v5.0).epub", | |
"size": "4.1M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "ZAP - Story of atari.epub", | |
"size": "121K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "iCon Steve Jobs_ The Greatest Second Act - Jeffrey S. Young.epub", | |
"size": "381K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "iWoz - Steve Wozniak.epub", | |
"size": "748K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "stevejobs 1996_Wired.pdf", | |
"size": " 96K", | |
"type": "file" | |
} | |
], | |
"name": "Computer History", | |
"size": "-", | |
"type": "dir" | |
}, | |
{ | |
"children": [ | |
{ | |
"children": [], | |
"name": "(eBook) Bruce Schneier - Applied Cryptography, Second Edition - John Wiley & Sons [ISBN0471128457].pdf", | |
"size": "8.3M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "A Course In Number Theory And Cryptography 2d ed - Neal Koblitz.djvu", | |
"size": "3.2M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Algebraic Aspects of Cryptography - Neal Koblitz.djvu", | |
"size": "2.4M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Beginning Cryptography with Java - David Hook.chm", | |
"size": "2.4M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Complexity and Cryptography An Introduction - JOHN TALBOT.pdf", | |
"size": "3.3M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Contemporary Cryptography - Rolf Oppliger.pdf", | |
"size": "7.7M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Cryptography For Dummies - Chey Cobb.chm", | |
"size": "4.0M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Cryptography Theory And Practice - Douglas Stinson.pdf", | |
"size": " 17M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Cryptography and Network Security Principles and Practices, 4th Ed - William Stallings.pdf", | |
"size": " 53M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Cryptography for Developers - Simon Johnson.pdf", | |
"size": "5.0M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Cryptography in C and C++ - Michael Welschenbach.chm", | |
"size": "3.5M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Encryption in a Windows Environment EFS File, 802.1x Wireless, IPSec Transport, and SMIME Exchange - Rand Morimoto.chm", | |
"size": "1.8M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Foundations of Cryptography A Primer - Oded Goldreich.pdf", | |
"size": "2.1M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Guide to Elliptic Curve Cryptography - Darrel Hankerson.pdf", | |
"size": "4.4M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Handbook of Applied Cryptography (Crc Press Series on Discrete Mathematics and Its Applications) 5th Edition.pdf", | |
"size": "5.5M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Handbook of Applied Cryptography - Alfred J. Menezes.pdf", | |
"size": "4.6M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "INTRODUCTION TO CRYPTOGRAPHY WITH JAVA APPLETS - DAVID BISHOP.pdf", | |
"size": "9.7M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Image and Video Encryption From Digital Rights Management to Secured Personal Communication - Sushil Jajodia.pdf", | |
"size": "7.7M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Java Cryptography - Jonathan B. Knudsen.pdf", | |
"size": "1.5M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Learn Encryption Techniques with BASIC and C++ - Gil Held.chm", | |
"size": "2.8M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Malicious Cryptography Exposing Cryptovirology - Adam Young.pdf", | |
"size": " 29M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Military Cryptanalysis.pdf", | |
"size": " 48M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Modern Cryptography Theory and Practice - Wenbo Mao.chm", | |
"size": "3.2M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Modern Cryptography Theory and Practice - Wenbo Mao.pdf", | |
"size": " 18M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "PROGRESS ON CRYPTOGRAPHY 25 Years of Cryptography in China - Kefei Chen.pdf", | |
"size": "5.0M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "The CodeBreakers - Kahn David.pdf", | |
"size": "1.4M", | |
"type": "file" | |
} | |
], | |
"name": "Cryptography", | |
"size": "-", | |
"type": "dir" | |
}, | |
{ | |
"children": [ | |
{ | |
"children": [], | |
"name": "Addison, P.S., The Illustrated Wavelet Transform Handbook, IOP, 2002.djvu", | |
"size": " 13M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Girod, B., Rabenstein, R., Stenger, A., Signals and Systems, Wiley, 2001.djvu", | |
"size": " 22M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Gonzales, R.C., Woods, R.E., Digital Image Processing, 2ed, Prentice Hall, 2002.djvu", | |
"size": " 28M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Hayes, M.H., Schaum's Outline of Digital Signal Processing, McGraw-Hill, 1999.pdf", | |
"size": " 13M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Haykin, S., Neural Networks, 2ed, Pearson, 1999.djvu", | |
"size": " 41M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Haykin, S., Veen, B.V., Signals And Systems, Wiley, 1999 [Incomplete] [To Chapter 7].djvu", | |
"size": " 19M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Hsu, H., Schaum's Outline in Theory and Problems of Signals and Systems, McGraw-Hill, 1995.pdf", | |
"size": "6.3M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Lyons, R., Understanding Digital Signal Processing, 2ed, Prentice Hall, 2004.chm", | |
"size": " 13M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Meyer-Baese, U., Digital Signal Processing with Field Programmable Gate Arrays, Springer, 2001.djvu", | |
"size": " 33M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Meyer-Baese, U., Digital Signal Processing with Field Programmable Gate Arrays, Springer, 2001.pdf", | |
"size": " 65M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Oppenheim, A., Discrete-Time Signal Processing, Prentice Hall.djvu", | |
"size": " 21M", | |
"type": "file" | |
} | |
], | |
"name": "DSP-Collection", | |
"size": "-", | |
"type": "dir" | |
}, | |
{ | |
"children": [ | |
{ | |
"children": [], | |
"name": "Data Analysis and Decision Making 4th Edition by Albright, Winston and Zappe.pdf", | |
"size": " 32M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Wiley.Symbolic.Data.Analysis.and.the.SODAS.Software.Mar.2008.pdf", | |
"size": "8.4M", | |
"type": "file" | |
} | |
], | |
"name": "Data Analysis", | |
"size": "-", | |
"type": "dir" | |
}, | |
{ | |
"children": [ | |
{ | |
"children": [], | |
"name": "Advanced Data Mining Techniques_Olson DS (2008).pdf", | |
"size": "1.1M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Applied Data Mining-Statistical Methods for Business and Industry_Giudici P (2003).pdf", | |
"size": "4.0M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Applied Data Mining For Business And Industry_Paolo Giudici (2009).pdf", | |
"size": "2.0M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Data Mining-A Heuristic Approach_Abbass HA (2002).pdf", | |
"size": "1.8M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Data Mining-Foundations And Practice_Tsau Young Lin (2008).pdf", | |
"size": " 10M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Data Mining-Know It All_Soumen Chakrabarti (2009).pdf", | |
"size": "6.6M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Data Mining Concepts And Techniques_Jiawei Han-Micheline Kamber (2000).pdf", | |
"size": "3.4M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Data Mining Cookbook_Robert Elliot (2001).pdf", | |
"size": "5.8M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Data Mining Methods And Models_Larose DT (2006).pdf", | |
"size": "6.2M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Data Mining Patterns-New Methods And Applications_Pascal Poncelet (2008).pdf", | |
"size": "7.8M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Data Mining Practical Machine Learning Tools and Techniques 3rd Edition-Mantesh.pdf", | |
"size": "6.9M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Dunham - Data Mining.pdf", | |
"size": " 17M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "ISR.Encyclopedia.Of.Data.Warehousing.And.Mining.2nd.Edition.Sep.2008.eBook-ELOHiM.pdf", | |
"size": " 18M", | |
"type": "file" | |
} | |
], | |
"name": "Data Mining", | |
"size": "-", | |
"type": "dir" | |
}, | |
{ | |
"children": [ | |
{ | |
"children": [], | |
"name": "CPlusPlus Plus Data Structures, 3rd Ed - Nell Dale.chm", | |
"size": " 32M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "DATA STRUCTURES AND ALGORITHMS USING VISUAL BASIC.NET - MICHAEL MCMILLAN.pdf", | |
"size": "3.6M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "DATA STRUCTURES IN JAVA A Laboratory Course - Sandra Andersen.pdf", | |
"size": "2.9M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Data Structure And Algorithms In C++ 2nd ed - Adam Drozdek.djvu", | |
"size": "3.9M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Data Structure And Algorithms In Java - Mitchel Waite.pdf", | |
"size": "6.1M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Data Structure For Game Programers - Ron Penton.pdf", | |
"size": " 20M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Data Structures, Algorithms and Program Style Using C - James F. Korsh.chm", | |
"size": "2.7M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Data Structures And Problem Solving Using C++ 2nd ed - Mark Weiss.pdf", | |
"size": " 63M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Data Structures and Algorithm Analysis in C - Mark Allen Weiss.chm", | |
"size": "2.3M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Data Structures and Algorithms - Alfred V. Aho.pdf", | |
"size": "6.6M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Data Structures and Algorithms 3 Multi-dimensional Searching and Computational Geometry - Kurt Mehlhorn.djvu", | |
"size": "2.0M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Data Structures and Algorithms in Java - Robert Lafore.pdf", | |
"size": "2.8M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Data Structures and Algorithms with Object-Oriented Design Patterns in CPlusPlus - Bruno R. Preiss.chm", | |
"size": " 11M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Data Structures and Algorithms with Object-Oriented Design Patterns in CSharp - Bruno R. Preiss.chm", | |
"size": "3.0M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Data Structures and Program Design in C++ - Robert L. Kruse.pdf", | |
"size": "5.8M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Fundamentals of Data Structures - Ellis Horowitz.chm", | |
"size": "2.4M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Fundamentals of OOP and Data Structures in Java - Richard Wiener.pdf", | |
"size": " 11M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Object-Oriented Data Structures Using Java - Nell Dale.pdf", | |
"size": " 15M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "The Design And Analysis Of Spatial Data Structures - Hanan Samet.pdf", | |
"size": " 27M", | |
"type": "file" | |
} | |
], | |
"name": "Data Structures", | |
"size": "-", | |
"type": "dir" | |
}, | |
{ | |
"children": [ | |
{ | |
"children": [], | |
"name": "Access Database Design & Programming, 3rd Ed 2002.pdf", | |
"size": "5.8M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Access Database Design & Programming, Ed 2 1999.pdf", | |
"size": "1.8M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Access Database Design & Programming-2Nd Ed-O'reilly-Php And Mysql-Stevenroman-1999.chm", | |
"size": "1.4M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Advanced DBA Certification Guide And Reference For DB2 Universal Database V8 For Linux UNIX And Windows 2004.chm", | |
"size": "2.8M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Beginning Database Design 2006.pdf", | |
"size": " 11M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Beginning Database Design Solutions.pdf", | |
"size": "6.3M", | |
"type": "file" | |
}, | |
{ | |
"children": [ | |
{ | |
"children": [], | |
"name": "DB2 XE-9.7.pdf", | |
"size": "5.4M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Prentice Hall - Advanced Dba Certification Guide & Reference For Db2 - 2003 - (By Laxxuss).chm", | |
"size": "2.8M", | |
"type": "file" | |
} | |
], | |
"name": "DB2", | |
"size": "-", | |
"type": "dir" | |
}, | |
{ | |
"children": [], | |
"name": "DB2 Universal Database V8 For Linux UNIX And Windows Database Administration Certification Guide 5th Ed 2003.chm", | |
"size": "8.0M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "DB2 Universal Database V8 Handbook For Windows UNIX And Linux 2003.chm", | |
"size": "3.3M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "DB2 Universal Database for OS390 v7 1 Application Certification Guide 2003.chm", | |
"size": "2.0M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "DB2 Universal Database for OS390 v7 1 Certification Guide 2002.chm", | |
"size": "2.4M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Database Design Know It All.pdf", | |
"size": "7.8M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Database Design Manual Using Mysql for Windows 2004.pdf", | |
"size": "7.2M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Databases A Beginners Guide.pdf", | |
"size": "9.1M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Designing Relational Database Systems 1999.chm", | |
"size": "6.2M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "First_Course_in_Database_Systems_-_Jeffrey_Ullman_Jennifer_Widom.pdf", | |
"size": " 82M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Fundamentals_of_Database_Systems,_6th_Edition_(0136086209).pdf", | |
"size": "135K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Idea Group - Advanced Topics In Database Research Vol 2.chm", | |
"size": "5.6M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Kimball & Ross - The Data Warehouse Toolkit 2nd Ed [Wiley 2002].pdf", | |
"size": "4.5M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Microsoft Access Tutorial.pdf", | |
"size": "1.0M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Molina,Ullman - Database Systems The Complete Book.pdf", | |
"size": " 51M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "O'Reilly Access 2003 Personal Trainer.chm", | |
"size": "9.1M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "O'Reilly Access 2007 The Missing Manual.chm", | |
"size": " 16M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "O'Reilly Access Cookbook (2nd Edition).chm", | |
"size": "7.1M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "O'Reilly Access Database Design & Programming (3rd Edition).pdf", | |
"size": "5.8M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "O'Reilly Head First SQL.pdf", | |
"size": " 48M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "O'Reilly Mastering Oracle SQL (2nd Edition).chm", | |
"size": "712K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "O'Reilly Practical PostgreSQL.chm", | |
"size": "617K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "OCP Oracle Database 11g Administrator Certified Professional Study Guide.pdf", | |
"size": " 12M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "OReilly - SQL and Relational Theory How to Write Accurate SQL Code.chm", | |
"size": "1.2M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "OReilly.Refactoring.SQL.Applications.Aug.2008.eBook-BBL.chm", | |
"size": "4.8M", | |
"type": "file" | |
}, | |
{ | |
"children": [ | |
{ | |
"children": [], | |
"name": "Crystal Reports 9 On Oracle 2003.chm", | |
"size": " 10M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Documenting Oracle Databases Complete Oracle Database Schema Auditing 2003.pdf", | |
"size": "2.4M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Guerrilla Oracle 2003.chm", | |
"size": "9.5M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "IBM Oracle to DB2 Udb Conversion Guide Dec 2003.chm", | |
"size": "7.3M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Java Programming with Oracle ODBC 2002.pdf", | |
"size": "1.4M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Mastering Oracle SQL 2nd ed 2004.chm", | |
"size": "712K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Mastering Oracle SQL 2002.chm", | |
"size": "323K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "OCA Oracle 10g Administration I Study Guide 1Z0-042 2005.pdf", | |
"size": " 18M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "OCP Oracle Database 10g New Features for Administrators 2004.pdf", | |
"size": " 12M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Oracle 8i Interal Service 1999.pdf", | |
"size": "383K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Oracle 9i DBA JumpStart 2003.chm", | |
"size": "7.9M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Oracle 9i R2 Data Warehousing 2003.chm", | |
"size": " 16M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Oracle 10G By Examples 2004.zip", | |
"size": " 36M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Oracle 10g 2Day Training 2003.pdf", | |
"size": "2.1M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Oracle 11i E-Business Suite From The Front Lines 2004.chm", | |
"size": "7.1M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Oracle Application Server 10g Administration Handbook 2004.pdf", | |
"size": " 13M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Oracle Application Server 10g Essentials 2004.chm", | |
"size": "1.1M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Oracle DBA Guide to Data Warehousing and Star Schemas 2003.chm", | |
"size": "1.5M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Oracle DBA Made Simple Oracle Database Administration Techniques 2003.pdf", | |
"size": "3.0M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Oracle DBA SQL Quick Reference 2003.chm", | |
"size": "4.5M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Oracle DBA Scripting Quick Reference 2004.chm", | |
"size": "187K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Oracle Data Warehouse Management 2003.pdf", | |
"size": "1.4M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Oracle Database 10G - Automatic Sga Memory Management.pdf", | |
"size": "344K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Oracle Database 10G - Automatic Storage Management.pdf", | |
"size": " 80K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Oracle Database 10G - The Complete Reference 2004.pdf", | |
"size": "7.6M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Oracle Database 10g, A Beginner's Guide.chm", | |
"size": "2.4M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Oracle Database 10g - DBA.pdf", | |
"size": "3.6M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Oracle Database 10g - New Features.pdf", | |
"size": "1.7M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Oracle Database 10g - Proactive Space & Schema Object Management 2003.pdf", | |
"size": "693K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Oracle Database 10g - SQLAccess Advisor.pdf", | |
"size": "917K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Oracle Database 10g High Availability with RAC Flashback and Data Guard 2004.chm", | |
"size": "9.3M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Oracle Database 10g New Features.chm", | |
"size": "1.6M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Oracle Database 10g SQL 2004.chm", | |
"size": "849K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Oracle Database 10g XML and SQL Design Build and Manage XML Applications in Java C C++ and PL SQL 2004.chm", | |
"size": "4.5M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Oracle Database Foundations 2004.pdf", | |
"size": "8.8M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Oracle Essentials Oracle Database 10g 3rd ed 2004.chm", | |
"size": "1.8M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Oracle High Performance Tuning for 9i & 10g 2004.chm", | |
"size": " 10M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Oracle Index Management Secrets Top Oracle Experts Discuss Index Management Techniques 2003.pdf", | |
"size": "1.1M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Oracle Net8 Configuration and Troubleshooting 2001.chm", | |
"size": "2.0M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Oracle PL SQL Best Practices 2001.pdf", | |
"size": "503K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Oracle PL SQL By Example 3rd Ed 2004.chm", | |
"size": "1.1M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Oracle PLSQL Interactive Workbook, 2nd ed 2003.chm", | |
"size": "1.0M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Oracle PL SQL Language Pocket Reference 2nd ed 2003.chm", | |
"size": "195K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Oracle PLSQL Programming Guide to Oracle 8i Features 1999.chm", | |
"size": "769K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Oracle RAC 10g Best Practices.pdf", | |
"size": "824K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Oracle Real Application Clusters 2004.chm", | |
"size": " 13M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Oracle SQL Internals Handbook 2003.pdf", | |
"size": "2.9M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Oracle Security 1998.chm", | |
"size": "1.3M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Oracle Space Management Handbook 2003.pdf", | |
"size": "2.5M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Oracle Wait Interface A Practical Guide to Performance Diagnostics and Tuning 2004.chm", | |
"size": "2.5M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Oracle Web Applications PLSQL Developer's Introduction 1999.chm", | |
"size": "1.2M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Oracle XSQL 2003.pdf", | |
"size": "6.7M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Oracle sql loader 2001.pdf", | |
"size": "5.1M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Professional Oracle Programming 2005.pdf", | |
"size": " 24M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Programming Oracle Triggers And Stored Procedures 3rd ed 2004.chm", | |
"size": "1.2M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Tuning Third-party Vendor Oracle Systems 2003.pdf", | |
"size": "2.2M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Using Oracle SQL Stored Outlines and Optimizer Plan Stability 2003.pdf", | |
"size": "570K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Using the Oracle oradebug Utility Debugging Oracle Applications 2002.pdf", | |
"size": "565K", | |
"type": "file" | |
} | |
], | |
"name": "Oracle", | |
"size": "-", | |
"type": "dir" | |
}, | |
{ | |
"children": [ | |
{ | |
"children": [], | |
"name": "Apress - Oracle 9i PL SQL, A Developer's Guide.chm", | |
"size": "4.3M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Apress.Expert.Oracle9i.Database.Administration.eBook-LiB.chm", | |
"size": "9.8M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Apress_-_Mastering_Oracle_SQL_and_SQLPlus.pdf", | |
"size": "3.4M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "McGraw-Hill.Osborne.Oracle.Database.10g.SQL.eBook-LiB.chm", | |
"size": "849K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "McGraw.Hill-Oracle.Wait.Interface.A.Practical.Guide.to.Performance.Diagnostics.and.Tuning.(2004).chm", | |
"size": "2.5M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "McGraw.Hill.Crystal.Reports.9.On.Oracle.eBook-LiB.chm", | |
"size": " 10M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "McGraw.Hill.Oracle.Database.11g.DBA.Handbook.Dec.2007.pdf", | |
"size": "9.2M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "McGraw.Hill.Oracle.Database.11g.New.Features.Nov.2007.eBook-BBL.pdf", | |
"size": "7.0M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "McGraw.Hill.Osborne.Media.OCA.Oracle.Database.11g.SQL.Fundamentals.I.Exam.Guide.Exam.1Z0-051.May..pdf", | |
"size": " 38M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "McGraw.Hill.Osborne.Media.Oracle.Database.11g.The.Complete.Reference.Dec.2008.eBook-DDU.pdf", | |
"size": "8.9M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "McGraw.Hill.Osborne.Media.Oracle.Enterprise.Manager.10g.Grid.Control.Implementation.Guide.Nov.200.pdf", | |
"size": " 23M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "McGraw.Hill.Osborne.Oracle.Wait.Interface.A.Practical.Guide.to.Performance.Diagnostics.and.Tuning.chm", | |
"size": "2.5M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "McGraw Hill - Oracle Database 10g, A Beginner's Guide.chm", | |
"size": "2.4M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Mcgraw Hill - Oracle Database 10G, A Beginner's Guide.pdf", | |
"size": "1.3M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Mcgraw Hill Oracle Application Server 10G Administration.pdf", | |
"size": " 13M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Mcgraw Hill Osborne, Oracle Database 10g Xml And Sql Design Build And Manage Xml Applications In .pdf", | |
"size": " 11M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "O'Reilly - Learning Oracle Plsql (2001).chm", | |
"size": "1.5M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "O'Reilly - Oracle Essentials - Oracle Database 10g, 3rd Edition - 2004.02.chm", | |
"size": "1.8M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "O'Reilly - The Oracle Pl-Sql Cd Bookshelf (7 Books).chm", | |
"size": "6.8M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "O'reilly - Oracle Pl.sql Language Pocket Reference. 2nd Ed.chm", | |
"size": "195K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "O'reilly - Oracle Sql Plus, The Definitive Guide.chm", | |
"size": "2.0M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "OReilly,.Oracle.Application.Server.10g.Essentials.(2004).DDU.chm", | |
"size": "1.1M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "OReilly.Mastering.Oracle.SQL.2nd.Edition.Jun.2004.eBook-DDU.chm", | |
"size": "712K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Oracle.Press.-.Effective.Oracle.Database.10g.Security.by.Design.chm", | |
"size": "3.0M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Oracle9.2.pdf", | |
"size": "1.3M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Oracle9i SQL-Slide & Guide-I.pdf", | |
"size": " 13M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Oracle9i SQL-Slide & Guide-II.pdf", | |
"size": " 11M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Oracle 10G - Develop PLSQL Program Units - Volume 1 - Student Guide.pdf", | |
"size": "2.5M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Oracle 10G Pl-Sql Programming Student Workbook.pdf", | |
"size": "830K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Oracle 10g PLSQL Packages and Types Reference.pdf", | |
"size": " 18M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Oracle Database 10g - The Complete Reference - Mcgraw Hill Osborne.pdf", | |
"size": "7.6M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Oracle Database 10g SQL - Master SQL and PL SQL.chm", | |
"size": "849K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Oracle Database 10g XML & SQL.chm", | |
"size": "4.5M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Oracle On Solaries.pdf", | |
"size": "735K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Oracle PL-SQL Best Practices [OReilly 2001].pdf", | |
"size": "2.0M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Oracle PL SQL Best Practices.chm", | |
"size": "3.0M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Oracle PLSQL by Example 4th Ed-759p-2009-Prentice.Hall.pdf", | |
"size": "3.1M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Oracle Plsql Best Practices And Tuning.pdf", | |
"size": "713K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Oracle database 11g new features for DBAs and developers.pdf", | |
"size": "7.3M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Oracle database xe - 2 day plus PHP developer guide.pdf", | |
"size": "3.2M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Oreilly - Oracle Pl-Sql Programming.chm", | |
"size": "2.0M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Oreilly.Mastering.Oracle.SQL.eBook-LiB.chm", | |
"size": "323K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Oreilly Oracle Essentials Oracle Database 10G 3Rd Edition.chm", | |
"size": "1.8M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Oreilly Oracle Regular Expressions Pocket Reference Ebook-Lib.chm", | |
"size": "114K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Perl.for.Oracle.DBAs -[UNIX].OReilly.chm", | |
"size": "2.1M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Prentice.Hall.Oracle.DBA.SQL.Quick.Reference.eBook-LiB.chm", | |
"size": "4.5M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Prentice.Java.Oracle.Database.Development.eBook-LiB.chm", | |
"size": "748K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Prentice.Programming.Oracle.Triggers.And.Stored.Procedures.3rd.Edition.eBook-LiB.chm", | |
"size": "1.2M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Prentice Hall - Oracle PL-SQL by Example. 3rd Edition.chm", | |
"size": "1.1M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Pro Oracle Database 10g RAC on Linux. Installation, Administration and Performance.pdf", | |
"size": " 22M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Pro Oracle Database 10igi RAC on Linux Installation, Administration, and Performance (Ex.pdf", | |
"size": " 11M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Reallyusefulebooks 0470080221 Wiley The Oracle Hackers Handbook Jan 2007 Ebook-Bbl.chm", | |
"size": "484K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Sams - Oracle Perfomance Tuning And Optimization.chm", | |
"size": "4.3M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Sybex.Oracle.Database.Foundations.ISBN0782143725.chm", | |
"size": " 11M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "TestKing - OCP 1Z0-007 - Oracle 9i Intro to PLSQL - v2.0.pdf", | |
"size": "378K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Top 200 Oracle PLSQL Tips for Tuning.pdf", | |
"size": "113K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Websphere MQ - Administration and Programming Examples.pdf", | |
"size": "3.0M", | |
"type": "file" | |
} | |
], | |
"name": "Oracle 9i", | |
"size": "-", | |
"type": "dir" | |
}, | |
{ | |
"children": [ | |
{ | |
"children": [ | |
{ | |
"children": [], | |
"name": "ORACLE 1Z0-047 - I.pdf", | |
"size": " 25M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "ORACLE 1Z0-047 - II.pdf", | |
"size": "5.7M", | |
"type": "file" | |
} | |
], | |
"name": "Mock", | |
"size": "-", | |
"type": "dir" | |
}, | |
{ | |
"children": [], | |
"name": "Oracle10gAS Config.pdf", | |
"size": "1.3M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Oracle10gAS Report.pdf", | |
"size": "238K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Oracle 10g DBA Workshop-I.pdf", | |
"size": "5.7M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Oracle 10g DBA Workshop-II.pdf", | |
"size": "4.7M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Oracle 10g Forms.pdf", | |
"size": "8.9M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Oracle 10g SQL Funda-I.pdf", | |
"size": "5.2M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Oracle 10g SQL Funda-II.pdf", | |
"size": "2.9M", | |
"type": "file" | |
} | |
], | |
"name": "Oracle 10g", | |
"size": "-", | |
"type": "dir" | |
}, | |
{ | |
"children": [], | |
"name": "Oreilly Sql Cookbook (2005) Bbl.chm", | |
"size": "674K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Postgresql Vs Mysql Vs Db2 Vs Mssql Vs Oracle.pdf", | |
"size": " 35K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "ReallyUsefulEbooks.com_0321305965_Addison.Wesley.Introduction.to.SQL.Mastering.the.Relational.Dat.chm", | |
"size": "4.5M", | |
"type": "file" | |
}, | |
{ | |
"children": [ | |
{ | |
"children": [], | |
"name": "Addison Wesley - The Guru'S Guide To Sql Server Architecture And Internals - 2003 - Ken Henderson.chm", | |
"size": "1.6M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "ISBN_1590592875_Apress.Sql Server 2000 Stored Procedures Handbook - 2003.chm", | |
"size": "2.9M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Inside.Microsoft.SQL.Server.2005.T-SQL.Querying.Mar.2006.pdf", | |
"size": " 10M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Inside Microsoft SQL Server 2005 TSQL Querying.pdf", | |
"size": " 10M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "MCITP.Microsoft.SQL.Server.2005.Data.Access.Design.and.Optimization.Study.Guide.Exam.70-442.Apr.2.chm", | |
"size": "5.7M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "MSSQL - Querying Microsoft SQL Server 2000 with Transact-SQL.pdf", | |
"size": "9.4M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "MSSQL - SQL Server DBA Survival Guide.pdf", | |
"size": " 20M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "MSSQL - SQL_Server_2005.pdf", | |
"size": "4.7M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "McGraw.Hill.Microsoft.SQL.Server.2005.Stored.Procedure.Programming.in.T-SQL.and.dot.NET.3rd.Editi.chm", | |
"size": " 19M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Microsoft SQL Server 2005 Stored Procedure Programming In T-SQL.and.NET, 3rd Ed.2006.chm", | |
"size": "2.5M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Microsoft SQL Server 2008. T-SQL Fundamentals (Microsoft Press 2008).chm", | |
"size": "1.9M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "SQLServer2005_TSQL.chm", | |
"size": "2.6M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "TSQL.Transact-SQL Desk Reference.chm", | |
"size": "1.8M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "TSQL querying.chm", | |
"size": "8.2M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "The Guru's Guide to SQL Server Stored Procedures, XML, and HTML.chm", | |
"size": "2.7M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Wrox.Professional.SQL.Server.2005.Integration.Services.Feb.2006.chm", | |
"size": " 25M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Wrox.Professional.SQL.Server.2005.Reporting.Services.Mar.2006.pdf", | |
"size": " 23M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Wrox Press - Professional SQL Server 2005 Administration (2007).chm", | |
"size": " 18M", | |
"type": "file" | |
} | |
], | |
"name": "SQL Server", | |
"size": "-", | |
"type": "dir" | |
}, | |
{ | |
"children": [], | |
"name": "SQL Tuning - Nov 2003 - OReilly - eBook.chm", | |
"size": "1.0M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "STL Cheatsheet.pdf", | |
"size": " 30K", | |
"type": "file" | |
}, | |
{ | |
"children": [ | |
{ | |
"children": [], | |
"name": "Project Management JumpStart_ Kim Heldman (Sybex, 2003).chm", | |
"size": "2.6M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Sybex - Windows Administration at the Command Line for Windows 2003 Windows XP and Windows 2000 I.pdf", | |
"size": " 15M", | |
"type": "file" | |
} | |
], | |
"name": "Sybex", | |
"size": "-", | |
"type": "dir" | |
}, | |
{ | |
"children": [], | |
"name": "The Guru's Guide To Sql Server Stored Procedures, Xml, And Html.chm", | |
"size": "2.7M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Wiley - Wrox Beginning - Database Design (2010).pdf", | |
"size": " 12M", | |
"type": "file" | |
}, | |
{ | |
"children": [ | |
{ | |
"children": [], | |
"name": "A Developers Guide to SQL Server 2005.chm", | |
"size": " 18M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Advanced SQL Database Programmers Handbook 2003.pdf", | |
"size": "1.6M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Advanced SQL Database Programming - 2003.pdf", | |
"size": "675K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Apress.Beginning.SQL.Server.2008.for.Developers.From.Novice.to.Professional.Jul.2008.pdf", | |
"size": " 17M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Apress.SQL.Server.2008.Transact.SQL.Recipes.Jul.2008.pdf", | |
"size": "6.8M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Beginning SQL 2005.pdf", | |
"size": "8.9M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Beginning SQL Server 2005 For Developers.pdf", | |
"size": " 18M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Beginning SQL Server 2005 Programming 2006.pdf", | |
"size": " 11M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Inside SQL Server 2000.chm", | |
"size": "7.6M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Microsoft SQL Server 2005 For Dummies 2006.pdf", | |
"size": " 11M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Portable DBA SQL Server 2004.chm", | |
"size": "4.6M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Pro SQL Server 2005.pdf", | |
"size": " 22M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Pro SQL Server 2005 Reporting Services 2006.pdf", | |
"size": " 18M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Professional SQL Server 2005 XML.pdf", | |
"size": " 12M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Programming SQL Server 2005.chm", | |
"size": "5.0M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "SQL Bible - 2003.chm", | |
"size": "5.5M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "SQL Cookbook 2005.chm", | |
"size": "674K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "SQL In Nutshell 2001.pdf", | |
"size": "2.7M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "SQL Performance Tuning - Sep 2002.chm", | |
"size": "1.4M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "SQL Programming Style - Apr 2005.pdf", | |
"size": "1.7M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "SQL Server 7 Backup & Recovery 2000.pdf", | |
"size": " 11M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "SQL Server 2000 For Experienced DBAs 2003.chm", | |
"size": "7.3M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "SQL Server 2000 Stored Procedure and XML Programming 2nd Ed 2003.pdf", | |
"size": " 14M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "SQL Server 2000 Stored Procedures Handbook 2003.chm", | |
"size": "2.9M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "SQL Server 2005 Express Edition Starter Kit (example files)2006.zip", | |
"size": "3.1M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "SQL Server 2005 Express Edition Starter Kit 2006.pdf", | |
"size": "8.1M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "SQL Server Security Distilled 2nd Ed 2003.chm", | |
"size": "2.4M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "SQL Tips and Techniques - 2002.chm", | |
"size": " 53M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "SQL Tuning 2004.chm", | |
"size": "1.0M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "SQL Visual QuickStart Guide 2nd Ed 2005.chm", | |
"size": "9.2M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "SQL for Dummies 5th Edition - 2003.pdf", | |
"size": "5.9M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "SQL in a Nutshell, 2nd Edition - 2004.chm", | |
"size": "1.1M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Teach Yourself SQL in 10 Minutes 3rd ed 2004.chm", | |
"size": "333K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Teach Yourself SQL in 24 Hours, 3rd ed 2003.chm", | |
"size": "1.0M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "The Gurus Guide To SQL Server Architecture And Internals 2004.chm", | |
"size": "1.6M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "The Gurus Guide To Transact SQL - 2000.pdf", | |
"size": "2.7M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "The Programmer's Guide to SQL - 2003.chm", | |
"size": "3.4M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Transact-SQL Cookbook - 2002.chm", | |
"size": "377K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Wrox.Beginning.Microsoft.SQL.Server.2008.Administration.Apr.2009.pdf", | |
"size": " 17M", | |
"type": "file" | |
} | |
], | |
"name": "mssql", | |
"size": "-", | |
"type": "dir" | |
}, | |
{ | |
"children": [ | |
{ | |
"children": [], | |
"name": "Databases (Mysql,Postgresql,Firebird) Backup Tutorials And Scripts.pdf", | |
"size": " 53K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Ebook Sams-Mysql Second Edition.chm", | |
"size": "1.9M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "High Performance MySQL (2004).chm", | |
"size": "1.0M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "How To Do Everything With PHP & MySQL 2005.pdf", | |
"size": " 18M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "JDBC Metadata MySQL and Oracle Recipes A Problem Solution Approach 2006.pdf", | |
"size": "6.3M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "John Wiley & Sons - MySQL Enterprise Solutions.pdf", | |
"size": "2.6M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Managing & Using Mysql (Php,Perl,Python,C,Java) (2002,2E).chm", | |
"size": "914K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Managing And Using MySQL.zip", | |
"size": "3.6M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Mastering MySQL 4 2003.chm", | |
"size": "1.9M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "MySQL - Essential Skills 2004.chm", | |
"size": " 14M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "MySQL.Press,.MySQL.Clustering.(2006).BBL.(0672328550).LotB.chm", | |
"size": "728K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "MySQL 2nd Ed.chm", | |
"size": "1.9M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "MySQL 5 Certification Study Guide (2nd Edition).chm", | |
"size": "1.6M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "MySQL Certification Study Guide (2004).chm", | |
"size": "1.2M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "MySQL Certification Study Guide 2004.chm", | |
"size": "1.2M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "MySQL Cookbook.pdf", | |
"size": "4.7M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "MySQL Cookbook 2002.chm", | |
"size": "1.4M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "MySQL Enterprise Solutions.pdf", | |
"size": "2.8M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "MySQL PHP Database Applications 2nd Ed 2004.pdf", | |
"size": "5.5M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "MySQL PHP Database Applications 2001.pdf", | |
"size": "3.5M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "MySQL Pocket Reference 2003.chm", | |
"size": "146K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "MySQL Press MySQL Administrators Guide 2004.chm", | |
"size": "1.1M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "MySQL Tutorial 2003.chm", | |
"size": "639K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "MySQL_Stored_Procedures.pdf", | |
"size": "418K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "MySQL and Java Developers Guide.pdf", | |
"size": "4.1M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Mysql - Oreilly - Mysql Stored Procedure Programming 2006.pdf", | |
"size": " 12M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "O'Reilly-MySQL.Cookbook.eBook-iNTENSiTY.pdf", | |
"size": "4.7M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "O'Reilly - MySQL Cookbook.chm", | |
"size": "1.4M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "O'Reilly - MySQL Stored Procedure Procedure Programming - Guy Harrison - Mar 2006.pdf", | |
"size": "666K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "O'Reilly - MySQL in a Nutshell - 2nd Edition - Apr 2008.chm", | |
"size": "1.2M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "O'Reilly - Web Database Applications with PHP and MySQL (CHM).chm", | |
"size": "1.8M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "O'Reilly High Performance MySQL.chm", | |
"size": "1.0M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "O'Reilly MySQL Cookbook (2nd Edition).chm", | |
"size": "1.4M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "O'Reilly MySQL Pocket Reference (2nd Edition).pdf", | |
"size": "514K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "O'Reilly MySQL Stored Procedure Programming.chm", | |
"size": "4.1M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "O'Reilly MySQL and mSQL.pdf", | |
"size": "5.0M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "O'Reilly MySQL in a Nutshell (2nd Edition).chm", | |
"size": "1.2M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "O'Reilly Understanding MySQL Internals.pdf", | |
"size": "800K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "OReIlly.High.Performance.MySQL.Second.Edition.Jun.2008.pdf", | |
"size": "5.6M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "OReilly - MySQL.Stored.Procedure.Programming.Mar.2006.chm", | |
"size": "4.1M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "OReilly.High.Performance.MySQL.Second.Edition.Jun.2008.eBook-DDU.pdf", | |
"size": "5.6M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "OReilly.MySQL.Stored.Procedure.Programming.Mar.2006.pdf", | |
"size": " 12M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "OReilly MySQL Cookbook.pdf", | |
"size": "4.0M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "OReilly_MySQL_Pocket_Reference.chm", | |
"size": "146K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "PHP & MySQL Programming For The Absolute Beginner 2003.chm", | |
"size": "7.0M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "PHP and MySQL for Dummies, 2nd ed 2004.pdf", | |
"size": "9.5M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Professional ADO NET 2 Programming With SQL Server 2005, Oracle, & MySQL 2006.pdf", | |
"size": " 11M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "ReallyUsefulEbooks.net_0975212826_BrainySoftware.Dimensional.Data.Warehousing.with.MySQL.A.Tutori.chm", | |
"size": "4.1M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "SAMS Teach Yourself MySQL in 21 Days.ebook.pdf", | |
"size": "2.7M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "SQL for MySQL Developers. A Comprehensive Tutorial and Reference (2007).pdf", | |
"size": "4.7M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Sams,.MySQL.Administrators.Guide.(2004).Ddu.(osloskop.net).chm", | |
"size": "1.1M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Sams,.MySQL.Phrasebook.Essential.Code.and.Commands.(2006).BBL.LotB.(osloskop.net).chm", | |
"size": "614K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Sams, Mysql Database Design And Tuning (2005) Ddu Lotb.chm", | |
"size": "8.5M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Sams - MySQL and JSP Web Applications Data-Driven Programming Using Tomcat and MySQL (Mar 27, 200.chm", | |
"size": "5.1M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Sams.MySQL.Crash.Course.Dec.2005.chm", | |
"size": "462K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Sams.MySQL.Tutorial.eBook-LiB.chm", | |
"size": "639K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Sams.Sams.Teach.Yourself.MySQL.in.10.Minutes.May.2006.chm", | |
"size": "970K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "SitePoint Build Your Own Database Driven Website Using PHP MySQL.chm", | |
"size": "496K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "SitePoint Pty Ltd Build Your Own Database Driven Website Using PHP and MySQL 2nd ed.pdf", | |
"size": "3.8M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Sql - MySQL Manual.pdf", | |
"size": "2.8M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Sybex.Mastering.MySQL.4.eBook-LiB.chm", | |
"size": "1.9M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Teach Yourself PHP, MySQL, And Apache All-In-One 2003.chm", | |
"size": "4.2M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Teach Yourself PHP, MySQL, And Apache In 24 Hours 2002.chm", | |
"size": "3.3M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Teach Yourself PHP MySQL and Apache in 24Hours.pdf", | |
"size": "7.4M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "The Definitive Guide To MySQL, 2nd Ed 2004.chm", | |
"size": "8.7M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "The Definitive Guide To MySQL 5, 3rd Ed 2005.pdf", | |
"size": " 11M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Web Database Applications With PHP and MySQL 1st ed.chm", | |
"size": "1.8M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Web Database Applications with PHP and MySQL 2nd ed May 2004.chm", | |
"size": "2.6M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Wiley.MySQL.Administrators.Bible.May.2009.pdf", | |
"size": " 18M", | |
"type": "file" | |
} | |
], | |
"name": "mysql", | |
"size": "-", | |
"type": "dir" | |
}, | |
{ | |
"children": [ | |
{ | |
"children": [], | |
"name": "Beginning Databases With PostreSQL - From Novice To Professional, 2nd Ed 2005.pdf", | |
"size": " 18M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "PostgreSQL-8.2-A4.pdf", | |
"size": "5.4M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "PostgreSQL - Introduction And Concepts 2001.pdf", | |
"size": "2.6M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "PostgreSQL - The Comprehensive Guide, 1st ed 2003.chm", | |
"size": "3.2M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "PostgreSQL - The Comprehensive Guide, 2nd ed 2005.chm", | |
"size": "6.6M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "PostgreSQL Admin-7.2-A4.pdf", | |
"size": "1.1M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "PostgreSQL Admin-7.2-US.pdf", | |
"size": "1.1M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "PostgreSQL Replication.pdf", | |
"size": " 11M", | |
"type": "file" | |
} | |
], | |
"name": "postgresql", | |
"size": "-", | |
"type": "dir" | |
} | |
], | |
"name": "Databases", | |
"size": "-", | |
"type": "dir" | |
}, | |
{ | |
"children": [ | |
{ | |
"children": [], | |
"name": "ASIC and FPGA Verification - A Guide To Component Modeling.pdf", | |
"size": "3.1M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Complete Digital Design.pdf", | |
"size": "5.7M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Digital Design - Mano.pdf", | |
"size": " 12M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Digital Design Principles And Practices - Wakerly.pdf", | |
"size": "8.1M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Digital Design Principles And Practices Solutions - Wakerly.pdf", | |
"size": "638K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Digital Design and Fabrication.pdf", | |
"size": " 18M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Digital Design with CPLD Applications & VHDL - Dueck.pdf", | |
"size": "8.6M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Digital Electronics.pdf", | |
"size": "2.7M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Digital Logic & Microprocessor Design With VHDL - Hwang.pdf", | |
"size": "4.8M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Digital Systems and Applications 2e.pdf", | |
"size": " 18M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Engineering Digital Design 2e - Tinder.pdf", | |
"size": " 63M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Logic & Computer Design Fundamentals 3e- Mano & Kime.pdf", | |
"size": " 67M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "RTL Hardware Design Using VHDL.pdf", | |
"size": " 34M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "The Design Warriors Guide to FPGAs.pdf", | |
"size": "4.5M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "VHDL - Coding Styles and Methodologies.pdf", | |
"size": " 12M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "VHDL Programming by Example.pdf", | |
"size": "2.3M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Verilog - A Guide to Digital Design and Synthesis.pdf", | |
"size": "8.8M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "fund of digital logic with vhdl design 2e brown.pdf", | |
"size": " 33M", | |
"type": "file" | |
} | |
], | |
"name": "Digital Design", | |
"size": "-", | |
"type": "dir" | |
}, | |
{ | |
"children": [ | |
{ | |
"children": [], | |
"name": "35 Electrical and Electronics Engineering Books.iso", | |
"size": "697M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Basic Engineering Mathematics [by John Bird].pdf", | |
"size": "5.5M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Digital Systems Principles And Applications [by Ronald Tocci].pdf", | |
"size": " 55M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Electrical Engineering 101 [by Darren Ashby].pdf", | |
"size": "2.2M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Electronic Devices And Circuit Theory 7th Edition [by Robert L. Boylestad].pdf", | |
"size": " 21M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Electronics for Dummies (2005).pdf", | |
"size": " 20M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Foundations Of Analog And Digital Electronic Circuit[by Anant Agarwal and Jeffrey H. Lang].pdf", | |
"size": "8.1M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Fundamentals of Industrial Instrumentation and Process Control [by William Dunn].pdf", | |
"size": "4.1M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Fundamentals of Materials Science and Engineering 5th Edition.pdf", | |
"size": " 11M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Instruction Set Reference [by Allen-Bradley].pdf", | |
"size": "3.0M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Introductory Circuit Analysis (10th Edition).pdf", | |
"size": " 13M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Jan_M._Rabaey-Digital_Integrated_Circuits-Prentice_Hall(1995).pdf", | |
"size": " 11M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "John Bird - Higher Engineering Mathematics.pdf", | |
"size": " 16M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Materials for engineering [by John Martin].pdf", | |
"size": "3.5M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "OReilly.Programming.Interactivity.Jul.2009.pdf", | |
"size": "7.7M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Programmable Controllers Theory and Implementation [L.A. Bryan & E.A. Bryan].PDF", | |
"size": "5.3M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Schaum's Outline of Electronic Devices and Circuits, Second Edition [by Jimmie J. Cathey].pdf", | |
"size": "7.2M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Springer.Analog.Circuit.Design.Nov.2008.eBook-ELOHiM.pdf", | |
"size": " 11M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Springer.The.NeuroProcessor.An.Integrated.Interface.To.Biological.Neural.Networks.Oct.2008.eBook-ELOHiM.pdf", | |
"size": "9.8M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Starting Electronics, 3rd Ed. - (Malestrom).pdf", | |
"size": "5.7M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Teach Yourself Electricity and Electronics,4th Edition - (Malestrom).pdf", | |
"size": "7.1M", | |
"type": "file" | |
} | |
], | |
"name": "Electronics", | |
"size": "-", | |
"type": "dir" | |
}, | |
{ | |
"children": [ | |
{ | |
"children": [], | |
"name": "330 Top Secret Restaurant Recipes.zip", | |
"size": "324K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "D._Knuth-The_TeXbook.pdf", | |
"size": "8.9M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Douglas_R._Hofstadter-G\u00c3\u00b6del,_Escher,_Bach__An_Eternal_Golden_Braid_(Twentieth-Anniversary_Edition)-Basic_Books(1999).pdf", | |
"size": " 31M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "MITLockGuide.pdf", | |
"size": "509K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Richard_Feynman-Feynman_Lectures_on_Physics,_Vol._1_Exercises-1964._Volume_1-Addison-Wesley(1964).pdf", | |
"size": "3.4M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Richard_P._Feynman-''Surely_You're_Joking,_Mr._Feynman!''__Adventures_of_a_Curious_Character(1997).pdf", | |
"size": "2.9M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Richard_P._Feynman-Feynman_Lectures_on_Computation__-Addison-Wesley(1996).pdf", | |
"size": "3.6M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Richard_P._Feynman-Feynman_Lectures_on_Physics,_Vol._2_Exercises-1964._Volume_2-Addison-Wesley(1964).pdf", | |
"size": "1.8M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Richard_P._Feynman-Feynman_Lectures_on_Physics,_Vol._3_Exercises-1965._Volume_3-Addison-Wesley(1965).pdf", | |
"size": "1.1M", | |
"type": "file" | |
} | |
], | |
"name": "Extra", | |
"size": "-", | |
"type": "dir" | |
}, | |
{ | |
"children": [ | |
{ | |
"children": [], | |
"name": "Computer Gaming World - Mar 2006.pdf", | |
"size": " 13M", | |
"type": "file" | |
}, | |
{ | |
"children": [ | |
{ | |
"children": [], | |
"name": "3DS Max 2009 Bible.pdf", | |
"size": " 75M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "3DS Max 2009 Essential Training.zip", | |
"size": "764M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "3ds Max 6 Bible.pdf", | |
"size": " 48M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "3ds Max 2009 Beyond the Basics.zip", | |
"size": "739M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "A Theory Of Fun In Game Design.pdf", | |
"size": " 87M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Adobe Creative Suite 2 Classroom In A Book.chm", | |
"size": " 17M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Adobe GoLive CS2 Classroom in a Book.chm", | |
"size": " 16M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Adobe Illustrator CS2 Classroom in a Book.chm", | |
"size": " 12M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Adobe InDesign CS2 Classroom in a Book.chm", | |
"size": " 14M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Adobe Photoshop CS2 Classroom in a Book.chm", | |
"size": " 18M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Animating Real-Time Game Characters.pdf", | |
"size": " 11M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Beginning Game Art In 3DS Max 8.pdf", | |
"size": " 17M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Beginning Game Level Design.pdf", | |
"size": "5.5M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Character Development and Storytelling for Games.pdf", | |
"size": " 14 ", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Chris Crawford on Game Design.chm", | |
"size": "2.2M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Deconstructing the Elements with 3ds Max 2nd Ed.pdf", | |
"size": "115M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Digital Animation Bible.pdf", | |
"size": "5.3M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Digital Character Design & Painting The Photoshop CS Edition.chm", | |
"size": " 26M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Digital Lighting and Rendering.pdf", | |
"size": " 48M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Easy Guide to Photoshop CS2 Image Editing.pdf", | |
"size": "7.6M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Example Design Documents.zip", | |
"size": "2.6M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Facial Modeling and Animation Done Right.pdf", | |
"size": " 16M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Focus On 3D Models.pdf", | |
"size": " 11M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Game Architecture and Design.pdf", | |
"size": "8.8M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Game Character Design Complete.pdf", | |
"size": " 13M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Game Design Foundations.chm", | |
"size": " 11M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Game Design Theory and Practice.chm", | |
"size": " 32M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Game Development and Production.pdf", | |
"size": "6.4M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Hacking Photoshop CS2.pdf", | |
"size": " 29M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Introducing 3ds Max 9.pdf", | |
"size": " 13M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Introducing 3ds Max 2008.pdf", | |
"size": " 20M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Level of Detail for 3D Graphics.pdf", | |
"size": "7.3M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Model Rig Animate With 3ds Max 7.chm", | |
"size": "6.7M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Modeling a Character in 3DS Max, 2nd Edition.pdf", | |
"size": " 66M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "The Game Animator's Guide To Maya.pdf", | |
"size": "7.6M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Ultimate Game Design Building Game Worlds.pdf", | |
"size": "6.6M", | |
"type": "file" | |
} | |
], | |
"name": "Designing", | |
"size": "-", | |
"type": "dir" | |
}, | |
{ | |
"children": [], | |
"name": "Elsevier Creating Games with Unity and Maya.pdf", | |
"size": " 22M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Game Developer - Game Career Guide Fall 2005.pdf", | |
"size": " 28M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Game Developer - Game Career Guide Fall 2008.pdf", | |
"size": " 31M", | |
"type": "file" | |
}, | |
{ | |
"children": [ | |
{ | |
"children": [], | |
"name": "3D Computer Graphics - A Mathematical Introduction with OpenGL.pdf", | |
"size": "7.7M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "3D Game Engine Architecture.pdf", | |
"size": "4.0M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "3D Game Engine Design .pdf", | |
"size": " 74M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "3D Game Engine Programming .pdf", | |
"size": "127M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "3D Game Programming All In One.pdf", | |
"size": " 17M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "3D Geometry Tuts.zip", | |
"size": " 11M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "3D Math Primer for Graphics and Game Development.pdf", | |
"size": " 22M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "3D Math Primer for Graphics and Game Development Souce Code.zip", | |
"size": "8.6M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "3D_Game_Engine_Design_-_Eberly.pdf", | |
"size": " 70M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "A First Course in Linear Algebra.pdf", | |
"size": "6.4M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "AI Game Development.chm", | |
"size": "3.2M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "AI Game Engine Programming.pdf", | |
"size": " 77M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "AI Game Wisdom.pdf", | |
"size": " 38M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "AI for Game Developers - David M. Bourg, Glenn Seeman.pdf", | |
"size": "5.5M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "AI for Game Developers Examples.zip", | |
"size": "7.0M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Advanced 3D Game Programming All in One.pdf", | |
"size": " 67M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Advanced 3D Game Programming Using DirectX 9.0.pdf", | |
"size": "2.5M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Advanced 3D Game Programming with DirectX 9.0.pdf", | |
"size": " 14M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Advanced Animation with DirectX.pdf", | |
"size": "2.4M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Advanced Graphics Programming Techniques Using Opengl.pdf", | |
"size": "8.2M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Advanced Graphics Programming Using OpenGL.pdf", | |
"size": "5.6M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Advanced WinSock Multiplayer Game Programming Multicasting.pdf", | |
"size": "449K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Algorithms And Networking For Computer Games.pdf", | |
"size": "1.9M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Artificial Intelligence for Games.pdf", | |
"size": "5.3M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Artificial Intelligence for Games Source Code.zip", | |
"size": "1.7M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Beginning 3D Game Programming.chm", | |
"size": "3.7M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Beginning Android C++ Game Development (2013).pdf", | |
"size": "4.8M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Beginning C# Game Programming.pdf", | |
"size": "4.3M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Beginning C# Game Programming Source Code.zip", | |
"size": "7.3M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Beginning C++ Game Programming.chm", | |
"size": "4.6M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Beginning C++ Game Programming.pdf", | |
"size": " 48M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Beginning Direct3D Game Programming, Second Edition.pdf", | |
"size": "6.9M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Beginning DirectX 9.pdf", | |
"size": "5.1M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Beginning Game Audio Programming.chm", | |
"size": "7.1M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Beginning Game Programming.pdf", | |
"size": "8.8M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Beginning Math and Physics for Game Programmers.chm", | |
"size": "2.7M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Beginning OpenGL Game Programming.pdf", | |
"size": " 47M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Beginning OpenGL Game Programming Source Code.zip", | |
"size": " 17M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Beginning XNA 3.0 Game Programming From Novice to Professional.pdf", | |
"size": "7.8M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "C++ Module I.pdf", | |
"size": "1.4M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "C++ Module II.pdf", | |
"size": "2.7M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "C Game Programming For Dummies 2.pdf", | |
"size": "650K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Cengage-Multi.Threaded.Game.Engine.Design.2010.RETAiL.EBook.pdf", | |
"size": "6.2M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Collision Detection in Interactive 3D Environments.pdf", | |
"size": " 12M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Computer Organization And Design The Hardware Software Interface.pdf", | |
"size": " 50M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Computer_Graphics__C_Version_-_Hearn,_Baker.pdf", | |
"size": " 19M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Core Techniques And Algorithms in Game Programming.chm", | |
"size": "4.5M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Core Techniques and Algorithms in Game Programming.pdf", | |
"size": " 11M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Corona SDK Mobile Game Development Beginners Guide.pdf", | |
"size": "8.6M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Course.Beginning.CPlusPlus.Through.Game.Programming - Honest.pdf", | |
"size": "4.3M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Creating Games In C++ - A Step By Step Guide (2006).pdf", | |
"size": "3.6M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Creating Games In C++ - A Step By Step Guide.chm", | |
"size": "1.2M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "CryENGINE 2 Features.pdf", | |
"size": "2.5M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Cry Engine Game Programming with C++, C#, and Lua.pdf", | |
"size": "7.2M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Cutting Edge Direct3D Programming.chm", | |
"size": "4.8M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Data Structures for Game Programmers.pdf", | |
"size": " 19M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "DirectX 3D Graphics Programming Bible.pdf", | |
"size": " 53M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "DirectX 8.1 Programming for C PlusPlus.chm", | |
"size": "9.3M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "DirectX 9 Graphics - The Definitive Guide to Direct3D.pdf", | |
"size": "4.1M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Directx 9 User Interfaces - Design and Implementation.pdf", | |
"size": "5.3M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Essential Mathematics for Games and Interactive Applications.pdf", | |
"size": " 11M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Essential Mathematics for Games and Interactive Applications 2nd Edition.pdf", | |
"size": "5.4M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Evolution of GPUs.pdf", | |
"size": "4.6M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Focus On Photon Mapping.chm", | |
"size": "2.0M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Focus on Mod Programming In Quake III Arena.pdf", | |
"size": "5.4M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Focus on SDL.pdf", | |
"size": "9.1M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Fundamentals of Audio and Video Programming for Games.chm", | |
"size": " 18M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "GPU Gems 1.djvu", | |
"size": " 14M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "GPU Gems 2.djvu", | |
"size": " 14M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "GPU Gems 3.chm", | |
"size": " 26M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "GPU Programming Guide.pdf", | |
"size": "1.0M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Game Coding Complete.chm", | |
"size": " 13M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Game Engine Toolset Development.pdf", | |
"size": "6.5M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Game Physics.pdf", | |
"size": " 69M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Game Physics Engine Development.pdf", | |
"size": "6.7M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Game Physics Engine Development Source Code.zip", | |
"size": "3.2M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Game Programming (2).pdf", | |
"size": " 11M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Game Programming All in One.pdf", | |
"size": " 26M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Game Programming Gems 1.pdf", | |
"size": " 44M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Game Programming Gems 2.pdf", | |
"size": " 21M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Game Programming Gems 3.pdf", | |
"size": " 11M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Game Programming Gems 4.pdf", | |
"size": " 32M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "GameProgrammingGems5-CDROM.zip", | |
"size": "121M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "GameProgrammingGems6-CDROM.zip", | |
"size": "126M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Game Programming Gems 6.pdf", | |
"size": " 30M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Game Programming Golden Rules.pdf", | |
"size": " 50M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Game Programming Tricks of the Trade.pdf", | |
"size": " 81M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Game Programming with DirectX 9.0.pdf", | |
"size": "1.3M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Game Scripting Mastery.pdf", | |
"size": " 52M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Game programming.pdf", | |
"size": "7.0M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "GeForce 8800 GPU Architecture Technical Brief .pdf", | |
"size": "3.5M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Graphics Gems 1.pdf", | |
"size": "5.9M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Graphics Gems 2.pdf", | |
"size": "7.4M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Graphics Gems 3.pdf", | |
"size": "4.8M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Graphics Gems 4.pdf", | |
"size": " 65M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Graphics Gems 5.pdf", | |
"size": " 44M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Graphics Gems Series Source Code.zip", | |
"size": "2.1M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Graphics Programming Black Book.pdf", | |
"size": "110M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Graphics Programming with DirectX 9 Module I.pdf", | |
"size": " 12M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Graphics Programming with DirectX 9 Module II.pdf", | |
"size": " 33M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Half Life 2 Mods For Dummies.pdf", | |
"size": " 13M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Hardcore AI for Computer Games and Animation.pdf", | |
"size": " 19M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "How GPUs Work.pdf", | |
"size": " 85K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Inside Direct3D.chm", | |
"size": "2.6M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Introduction_to_Computer_Graphics_-_Foley.pdf", | |
"size": " 72M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Introduction to 3D Game Programming with DirectX 9.0 Source Code.zip", | |
"size": "7.2M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Introduction to 3D Game Programming with DirectX 9.0c Shader Approach.chm", | |
"size": "6.4M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Introduction to 3D Game Programming with DirectX 9.0c Shader Approach Source Code.zip", | |
"size": " 52M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Introduction to 3D Game Programming with DirectX 9.pdf", | |
"size": "6.7M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Introduction to Game Programming with C++.chm", | |
"size": "6.3M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Invent Your Own Computer Games with Python 2nd Edition.pdf", | |
"size": "4.8M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Isometric Game Programming With DirectX 7.pdf", | |
"size": " 20M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Learn 2D Game Development with C#.pdf", | |
"size": "7.3M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Learn Vertex and Pixel Shader Programming With DirectX 9.pdf", | |
"size": "9.7M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Learning C# By Programming Games.pdf", | |
"size": "5.2M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Learning XNA 4.0.pdf", | |
"size": "4.7M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Learning_Libgdx_Game_Development_eBook.pdf", | |
"size": "7.0M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Level of Detail for 3D Graphics.pdf", | |
"size": "4.7M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Linear Algebra Demystified.pdf", | |
"size": "1.8M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Linux 3D Graphics Programming.pdf", | |
"size": "6.9M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Linux Games Programming.pdf", | |
"size": "3.4M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Lumenex Engine Technical Brief.pdf", | |
"size": "580K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "MUD Game Programming.chm", | |
"size": "2.6M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Making Games with Python and Pygame.pdf", | |
"size": "4.4M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Managed DirectX 9 Kick Start - Graphics and Game Programming.chm", | |
"size": "1.3M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Math Course Description.pdf", | |
"size": " 97K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Mathematical Physics - A Modern Introduction To It's Foundations.pdf", | |
"size": " 34M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Mathematics_for_Computer_Graphics_-_Vince.pdf", | |
"size": "1.8M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Mathematics_for_Game_Developers_-_Tremblay.pdf", | |
"size": " 15M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Mathematics for 3D Game Programming and Computer Graphics, Second Edition.pdf", | |
"size": " 15M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Mathematics for Computer Graphics.pdf", | |
"size": "3.6M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Mathematics for Game Developers.pdf", | |
"size": " 15M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Memory Management - Algorithms And Implementation In C-C++.pdf", | |
"size": "1.0M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Microsoft DirectX 10 Technical Brief.pdf", | |
"size": "800K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Multiplayer Game Programming.pdf", | |
"size": " 20M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Networking and Online Games - Understanding and Engineering Multiplayer Internet Games.pdf", | |
"size": "9.4M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "New.Riders.Beginning.Math.and.Physics.for.Game.Programmers.pdf", | |
"size": "6.8M", | |
"type": "file" | |
}, | |
{ | |
"children": [ | |
{ | |
"children": [], | |
"name": "OReilly.Killer.Game.Programming.in.Java.May.2005.chm", | |
"size": " 13M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "bbl.nfo", | |
"size": "6.8K", | |
"type": "file" | |
} | |
], | |
"name": "OReilly.Killer.Game.Programming.in.Java.May.2005.eBook-BBL", | |
"size": "-", | |
"type": "dir" | |
}, | |
{ | |
"children": [], | |
"name": "OpenGL.Shading.Language.2nd.Edition.(Orange.Book).2006.pdf", | |
"size": "6.6M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "OpenGL Game Development.pdf", | |
"size": "6.0M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "OpenGL Programming Guide.pdf", | |
"size": "7.8M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "OpenGL Red Book and Blue Book.zip", | |
"size": "5.8M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "OpenGL Reference Manual.pdf", | |
"size": "395K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "OpenGL Shading Language.chm", | |
"size": "2.8M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "OpenGL Super Bible.pdf", | |
"size": "4.2M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "OpenGL SuperBible 4th Edition.pdf", | |
"size": " 13M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Physically-Based Rendering - From Theory To Implementation.pdf", | |
"size": "7.1M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Physics Course Description.pdf", | |
"size": "162K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Physics for Game Developers.pdf", | |
"size": "3.9M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Polygon Collision Tutorials.zip", | |
"size": "4.0M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Postmortems From Game Developers.pdf", | |
"size": " 16M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Probability Theory - The Logic of Science.pdf", | |
"size": "5.8M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Probability for Dummies.pdf", | |
"size": "4.5M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Professional.XNA.Game.Programming.pdf", | |
"size": " 12M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Professional XNA Game Programming For Xbox 360 and Windows [h33t][mkrandow].pdf", | |
"size": "6.7M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Programming AI by Example Source Code.zip", | |
"size": "4.1M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Programming Game AI by Example.pdf", | |
"size": " 12M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Programming Multiplayer Games.pdf", | |
"size": "6.1M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Programming Role-Playing Games With DirectX 8.pdf", | |
"size": " 20M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Programming Role Playing Games with DirectX, 2nd Edition.pdf", | |
"size": "8.9M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Quake 4 Mods For Dummies.pdf", | |
"size": " 13M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Real-Time Collision Detection.pdf", | |
"size": "2.9M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Real-Time Rendering Tricks and Techniques in DirectX.pdf", | |
"size": "6.4M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Real-time Rendering 2nd ed.djvu", | |
"size": " 11M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Real Time Shader Programming.chm", | |
"size": " 11M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "SFML Game Development.pdf", | |
"size": "4.0M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "ShaderX1 - Vertex and Pixel Shader Tips and Tricks.pdf", | |
"size": "8.3M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "ShaderX2 - Introductions and Tutorials with DirectX9.pdf", | |
"size": "5.8M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "ShaderX3 - Advanced Rendering with DirectX and OpenGL.pdf", | |
"size": " 30M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Shaders for Game Programming and Artists.pdf", | |
"size": "9.7M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Shaderx2 - Shader Programming Tips & Tricks With Directx 9.pdf", | |
"size": " 15M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Software Engineering - for Game Developers.pdf", | |
"size": " 25M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Software Engineering and Computer Games.chm", | |
"size": "4.0M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Source Engine Infosheet.pdf", | |
"size": "6.3M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Special Effects Game Programming With DirectX Source Code.zip", | |
"size": " 19M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Special Effects Game Programming with DirectX.pdf", | |
"size": "156M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Strategy Game Programming With Directx 9.0.chm", | |
"size": " 12M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Teach Yourself Game Programming in 24 Hours.chm", | |
"size": "3.0M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "The Elements of Euclid.pdf", | |
"size": "1.8M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "The Official Guide to Learning OpenGL, Version 2.1.pdf", | |
"size": " 16M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Tricks of the 3D Game Programming Gurus - Advanced 3D Graphics and Rasterization.pdf", | |
"size": " 48M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Tricks of the Windows Game Programming Guru's.pdf", | |
"size": " 12M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Tricks of the Windows Game Programming Gurus, Second Edition.chm", | |
"size": " 11M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Tricks of the Windows Game Programming Gurus - Fundamentals of 2D and 3D Game Programming.pdf", | |
"size": " 16M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Using Opengl In Visual C++.pdf", | |
"size": " 67K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Vector Game Math Processors.pdf", | |
"size": "3.9M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Vector Game Math Processors Source Code.zip", | |
"size": "2.2M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Visualizing Quaternions.pdf", | |
"size": "6.6M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Will_McGugan_-_Beginning_Game_Development_with_Python_and_Pygame_2007.pdf", | |
"size": "8.1M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "XNA 3.0 Game Programming Recipes.pdf", | |
"size": "3.0M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "XNA 4 3D Game Development By Example Beginners Guide V413HAV.pdf", | |
"size": "4.8M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Zen of Graphics Programming - Michael Abrash.zip", | |
"size": "3.0M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "game programming book C++.pdf", | |
"size": " 16M", | |
"type": "file" | |
} | |
], | |
"name": "Programming", | |
"size": "-", | |
"type": "dir" | |
} | |
], | |
"name": "Game Development", | |
"size": "-", | |
"type": "dir" | |
}, | |
{ | |
"children": [ | |
{ | |
"children": [], | |
"name": "Information Retrieval Data Structures And Algorithms_FRAKES WB (2004).pdf", | |
"size": "1.2M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Information Storage And Retrieval Systems-Theory And Impl 2e_Kowalski GJ (2002).pdf", | |
"size": "7.7M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Interactive Information Retrieval In Digital Environments_Iris Xie (2008).pdf", | |
"size": "4.0M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Modern Information Retrieval_Ricardo Baeza-Yates (1999).pdf", | |
"size": "2.3M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Multimedia Information Storage And Retrieval Techniques And Technologies_Tse PKC (2008).pdf", | |
"size": "4.4M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Querying Databases Privately-A New Approach To Private Information Retrieval_Asanov D (2004).pdf", | |
"size": "2.2M", | |
"type": "file" | |
} | |
], | |
"name": "Information Retrieval", | |
"size": "-", | |
"type": "dir" | |
}, | |
{ | |
"children": [ | |
{ | |
"children": [], | |
"name": "Claude Shannon - Mathematical Theory of Communication.pdf", | |
"size": "4.2M", | |
"type": "file" | |
}, | |
{ | |
"children": [ | |
{ | |
"children": [], | |
"name": "Algorithmic introduction to coding theory - M. Sudan.pdf", | |
"size": "1.6M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Coding Theory - John C. Bowman.pdf", | |
"size": "477K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Coding Theory And Algebraic Geometry - H. Stichtenoth.pdf", | |
"size": "8.8M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Coding Theory The Essentials - D.G Hoffman.pdf", | |
"size": "9.8M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "ESSENTIALS OF ERROR-CONTROL CODING - Patrick Guy Farrell.pdf", | |
"size": "6.0M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "EXPONENTIAL SUMS IN CODING THEORY,CRYPTOLOGY AND ALGORITHMS - Igor E. Shparlinski.pdf", | |
"size": "357K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Error Control Coding Fundamentals and Applications - Shu Lin.pdf", | |
"size": " 22M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Finite geometry and coding theory - Peter Cameron.pdf", | |
"size": "466K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Fundamentals of Error-Correcting Codes - W. Cary Huffman.pdf", | |
"size": " 12M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Introduction To Coding Theory And Algebraic Geometry - Jacobus Van Lint.pdf", | |
"size": "4.6M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Introduction To Error Correcting Codes - Michael Purser.pdf", | |
"size": "4.4M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Network Coding Theory - Raymond Yeung.pdf", | |
"size": " 15M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Notes on Coding Theory - J.I.Hall.pdf", | |
"size": "2.2M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "The Art of Error Correcting Coding - Robert H. Morelos-Zaragoza.djvu", | |
"size": "2.6M", | |
"type": "file" | |
} | |
], | |
"name": "Coding Theory", | |
"size": "-", | |
"type": "dir" | |
}, | |
{ | |
"children": [ | |
{ | |
"children": [], | |
"name": "Compressed Image File Formats JPEG, PNG, GIF, XBM, BMP - John Miano.pdf", | |
"size": "3.0M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Data Compression The Complete Reference 3rd Ed - David Salomon.pdf", | |
"size": " 15M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Fast and Efficient Algorithms for Video Compression and Rate Control - Dzung Tien Hoang.pdf", | |
"size": "1.2M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Fractal Image Compression Theory and Application - Yuval Fisher.djvu", | |
"size": "6.9M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "H.264 and MPEG-4 Video Compression Video Coding for Next-generation Multimedia - Iain E. G. Richardson.pdf", | |
"size": "4.4M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "IMAGE and VIDEO COMPRESSION for MULTIMEDIA ENGINEERING Fundamentals, Algorithms, and Standards - Yun Q. Shi.pdf", | |
"size": " 19M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Introduction to Data Compression - Guy E. Blelloch.PDF", | |
"size": "343K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "JPEG2000 Standard for Image Compression Concepts, Algorithms and VLSI Architectures - Tinku Acharya.pdf", | |
"size": " 16M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "PNG The Definitive Guide - Greg Roelofs.pdf", | |
"size": "2.2M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Real-Time Video Compression Techniques and Algorithms - Raymond Westwater.pdf", | |
"size": "2.8M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Standard Codecs Image Compression to Advanced Video Coding - Mohammed Ghanbari.chm", | |
"size": " 12M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Structures Of String Matching And Data Compression - Jesper Larsson.pdf", | |
"size": "711K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "THE TRANSFORM AND DATA COMPRESSION HANDBOOK - K.R. RAO.PDF", | |
"size": " 15M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "The Data Compression Book 2nd Ed - Mark Nelson.pdf", | |
"size": "1.6M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Video COdec Design Developing Image And Video Compression Systems - Iain Richardson.pdf", | |
"size": " 33M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Video Demystified A Handbook for the Digital Engineer 4th ed - keith Jack.pdf", | |
"size": " 16M", | |
"type": "file" | |
} | |
], | |
"name": "Compression", | |
"size": "-", | |
"type": "dir" | |
}, | |
{ | |
"children": [ | |
{ | |
"children": [], | |
"name": "ALGORITHMIC INFORMATION THEORY - G.J. Chaitin.pdf", | |
"size": "930K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Elements Of Information Theory 2nd ed - Thomas Cover.pdf", | |
"size": " 10M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Entropy and Information Theory - Robert M. Gray.pdf", | |
"size": "1.3M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "INFORMATION RANDOMNESS & INCOMPLETENESS Papers on Algorithmic Information Theory 2nd Ed - G J Chaitin.pdf", | |
"size": "2.2M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Information Theory - Robert Ash.pdf", | |
"size": " 11M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Information Theory Inference And Learning Algorithms - David Mackay.pdf", | |
"size": " 11M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Information Theory and Quantum Physics - H.S Green.djvu", | |
"size": "2.7M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Information theory and statistics - Solomon Kullback.pdf", | |
"size": " 16M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Neural Networks And Information Theory - Colin Fyfe.pdf", | |
"size": "2.2M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "UNCERTAINTY AND INFORMATION Foundations of Generalized Information Theory - George J. Klir.pdf", | |
"size": "9.1M", | |
"type": "file" | |
} | |
], | |
"name": "Information Theory", | |
"size": "-", | |
"type": "dir" | |
} | |
], | |
"name": "Information Theory", | |
"size": "-", | |
"type": "dir" | |
}, | |
{ | |
"children": [ | |
{ | |
"children": [], | |
"name": "(Ebook - Computer) Hacking The Windows Registry.pdf", | |
"size": "222K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "(eBook - PDF) Hugo Cornwall - The Hacker's Handbook .pdf", | |
"size": "278K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "(eBook pdf) Hacking into computer systems - a beginners guide.pdf", | |
"size": "615K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "(ebook_-_pdf)_Hacking_IIS_Servers.pdf", | |
"size": " 31K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "0321108957.Addison-Wesley Professional.Honeypots- Tracking Hackers.pdf", | |
"size": "2.1M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "7Deadliest Web Application.pdf", | |
"size": "2.8M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "7Deadliest Wireless Technologies Attacks.pdf", | |
"size": "1.7M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "501 Website Hacking Secrets.pdf", | |
"size": " 16M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "285063-Hacker.Bibel.[278.kB_www.netz.ru].pdf", | |
"size": "278K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "731986-Hacker's Desk Reference.pdf", | |
"size": "715K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "1246523-Hacking.Guide.V3.1.pdf", | |
"size": "1.2M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "3077366-HackerHighSchool.pdf", | |
"size": "2.9M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "A-LIST Publishing - Hacker Disassembling Uncovered.chm", | |
"size": "4.7M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "A Beginners Guide To Hacking Computer Systems.pdf", | |
"size": "615K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "AMACOM - The International Handbook of Computer Security.pdf", | |
"size": "1.8M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "ASP.NET 2.0 MVP Hacks and Tips.chm", | |
"size": "6.9M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Access_Denied - Code_Breakers_Guide.pdf", | |
"size": "5.1M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Addison Wesley - Defend I.T. Security by Example.chm", | |
"size": "1.3M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Addison Wesley - Firewalls and Internet Security. Repelling the Wily Hacker. Second Edition.chm", | |
"size": "1.6M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Addison Wesley - Hack I.T. Security Through Penetration Test.chm", | |
"size": "4.6M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Addison Wesley - Hackers Delight 2002.pdf", | |
"size": "6.1M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Addison Wesley - Introduction to Computer Security.chm", | |
"size": "662K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Addison Wesley - Managing Information Security Risks. The OCTAVES Approach.chm", | |
"size": "4.1M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Addison Wesley - Software Security. Building Security In.chm", | |
"size": "3.8M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Addison Wesley - The Outlook Answer Book. Useful Tips, Tricks, and Hacks for Microsoft Outlook 20.chm", | |
"size": " 14M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Auerbach.Practical.Hacking.Techniques.and.Countermeasures.Nov.2006.pdf", | |
"size": "144M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Auerbach.Pub.The.Hackers.Handbook.The.Strategy.Behind.Breaking.into.and.Defending.Networks.Nov.20.pdf", | |
"size": " 18M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Auerbach Publications - The Practical Guide to HIPAA Privacy and Security Compliance.chm", | |
"size": "1.0M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Barry Dorrans - Beginning ASP.NET Security - 2010.pdf", | |
"size": " 27M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Blackhatonomics.pdf", | |
"size": "6.4M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Bradley_-_Essential_Computer_Security__28Syngress_2C_2006_29.pdf", | |
"size": "7.8M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Build Your Own Security Lab A Field Guide for Network Testing.pdf", | |
"size": "8.6M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Building Secure Servers With Linux (O'Reilly-2002) 1.chm", | |
"size": "1.5M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Butterworth-Heinemann - Trojans, Worms, and Spyware. A Computer Security Professional's Guide to .pdf", | |
"size": "1.2M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Butterworth Heinemann - Trojans, Worms, and Spyware. A Computer Security Professional's Guide to .pdf", | |
"size": "1.3M", | |
"type": "file" | |
}, | |
{ | |
"children": [ | |
{ | |
"children": [], | |
"name": "0470525207Hac.pdf", | |
"size": "6.7M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Actualtests Certified Ethical Hacker CEH 312-50 568Q 2008.10.07.pdf", | |
"size": "2.8M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "CEH-Classroom-Lab-Setup-v6.pdf", | |
"size": "1.5M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "CEH Certified Ethical Hacker Version 8 Study Guide - Oriyano, Sean-Philip.pdf", | |
"size": "4.6M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "CEH Official Certified Ethical Hacker Review Guide.pdf", | |
"size": "4.7M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "CEH Study Guide.pdf", | |
"size": " 13M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "CEHv6 Lab Guide 3 Module 42 to Module 48.pdf", | |
"size": " 12M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "CEHv6 Module 00 Student Introduction.pdf", | |
"size": "591K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "CEHv6 Module 01 Introduction to Ethical Hacking.pdf", | |
"size": "3.1M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "CEHv6 Module 02 Hacking Laws.pdf", | |
"size": "3.6M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "CEHv6 Module 03 Footprinting.pdf", | |
"size": " 10M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "CEHv6 Module 04 Google Hacking.pdf", | |
"size": "4.2M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "CEHv6 Module 05 Scanning.pdf", | |
"size": " 17M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "CEHv6 Module 06 Enumeration.pdf", | |
"size": "4.0M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "CEHv6 Module 07 System Hacking.pdf", | |
"size": " 15M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "CEHv6 Module 08 Trojans and Backdoors.pdf", | |
"size": "9.1M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "CEHv6 Module 09 Viruses and Worms.pdf", | |
"size": "5.6M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "CEHv6 Module 10 Sniffers.pdf", | |
"size": " 10M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "CEHv6 Module 11 Social Engineering.pdf", | |
"size": "5.0M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "CEHv6 Module 12 Phishing.pdf", | |
"size": "2.6M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "CEHv6 Module 13 Hacking Email Accounts.pdf", | |
"size": "1.8M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "CEHv6 Module 14 Denial of Service.pdf", | |
"size": "3.6M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "CEHv6 Module 15 Session Hijacking.pdf", | |
"size": "1.9M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "CEHv6 Module 16 Hacking Webservers.pdf", | |
"size": "4.9M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "CEHv6 Module 17 Web Application Vulnerabilities.pdf", | |
"size": "4.6M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "CEHv6 Module 18 Web based Password Cracking Techniques.pdf", | |
"size": "5.4M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "CEHv6 Module 19 SQL Injection.pdf", | |
"size": "3.2M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "CEHv6 Module 20 Hacking Wireless Networks.pdf", | |
"size": " 13M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "CEHv6 Module 21 Physical Security.pdf", | |
"size": "3.1M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "CEHv6 Module 22 Linux Hacking.pdf", | |
"size": "6.1M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "CEHv6 Module 23 Evading IDS Firewall and Honeypot.pdf", | |
"size": "4.7M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "CEHv6 Module 24 Buffer Overflows.pdf", | |
"size": "1.4M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "CEHv6 Module 25 Cryptography.pdf", | |
"size": "4.1M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "CEHv6 Module 26 Penetration Testing.pdf", | |
"size": "5.6M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "CEHv6 Module 28 Writing Virus Codes.pdf", | |
"size": "599K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "CEHv6 Module 29 Assembly Language Tutorial.pdf", | |
"size": "1.0M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "CEHv6 Module 30 Exploit Writing.pdf", | |
"size": "2.0M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "CEHv6 Module 31 Exploit Writing.pdf", | |
"size": "239K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "CEHv6 Module 32 Exploit Writing.pdf", | |
"size": "641K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "CEHv6 Module 34 MAC OS X Hacking.pdf", | |
"size": "1.3M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "CEHv6 Module 35 Hacking Routers, Cable Modems and Firewalls.pdf", | |
"size": "3.2M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "CEHv6 Module 36 Hacking Mobile Phones, PDA and Handheld Devices.pdf", | |
"size": "4.0M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "CEHv6 Module 37 Bluetooth Hacking.pdf", | |
"size": "2.5M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "CEHv6 Module 38 VoIP Hacking.pdf", | |
"size": "3.9M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "CEHv6 Module 39 RFID Hacking.pdf", | |
"size": "2.2M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "CEHv6 Module 40 Spamming.pdf", | |
"size": "2.7M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "CEHv6 Module 41 Hacking USB Devices.pdf", | |
"size": "1.8M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "CEHv6 Module 42 Hacking Database Servers.pdf", | |
"size": "1.6M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "CEHv6 Module 43 Cyber Warfare- Hacking Al-Qaida and Terrorism.pdf", | |
"size": "2.7M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "CEHv6 Module 44 Internet Content Filtering Techniques.pdf", | |
"size": "2.0M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "CEHv6 Module 45 Privacy on the Internet.pdf", | |
"size": "5.4M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "CEHv6 Module 46 Securing Laptop Computers.pdf", | |
"size": "1.9M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "CEHv6 Module 47 Spying Technologies.pdf", | |
"size": "4.3M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "CEHv6 Module 48 Corporate Espionage by Insiders.pdf", | |
"size": "2.2M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "CEHv6 Module 49 Creating Security Policies.pdf", | |
"size": "2.1M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "CEHv6 Module 50 Software Piracy and W.pdf", | |
"size": "2.1M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "CEHv6 Module 51 Hacking and Cheating Online Games.pdf", | |
"size": "2.0M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "CEHv6 Module 52 Hacking RSS and Atom.pdf", | |
"size": "1.7M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "CEHv6 Module 53 Hacking Web Browsers.pdf", | |
"size": "1.9M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "CEHv6 Module 54 Proxy Server Technologies.pdf", | |
"size": "2.3M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "CEHv6 Module 55 Preventing Data Loss.pdf", | |
"size": "3.7M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "CEHv6 Module 56 Hacking Global Positioning System.pdf", | |
"size": "2.1M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "CEHv6 Module 57 Computer Forensics and Incident Handling.pdf", | |
"size": "2.5M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "CEHv6 Module 58 Credit Card Frauds.pdf", | |
"size": "2.1M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "CEHv6 Module 59 How to Steal Passwords.pdf", | |
"size": "1.5M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "CEHv6 Module 60 Firewall Technologies.pdf", | |
"size": "2.8M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "CEHv6 Module 61 Threats and Countermeasures.pdf", | |
"size": " 25M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "CEHv6 Module 62 Case Studies.pdf", | |
"size": "714K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "CEHv6 Module 63 Botnets.pdf", | |
"size": "1.1M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "CEHv6 Module 64 Economic Espionage.pdf", | |
"size": "653K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "CEHv6 Module 65 Patch Management.pdf", | |
"size": "7.0M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "CEHv6 Module 66 Security Convergence.pdf", | |
"size": "631K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "CEHv6 Module 67 Identifying the Terrorists.pdf", | |
"size": "1.8M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "CEH v7 Study Guide.pdf", | |
"size": "6.7M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Ceh v8.pdf", | |
"size": " 34M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Certified Ethical Hacker (CEH) v3.0 Official Course.pdf", | |
"size": " 26M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Certified Ethical Hacker Exam Prep (2006).chm", | |
"size": "8.3M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Kimberly_Graves-CEH_Certified_Ethical_Hacker_Study_Guide-Sybex(2010).pdf", | |
"size": "4.2M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Que.Certified.Ethical.Hacker.Exam.Prep.Apr.2006.chm", | |
"size": "8.3M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Some CEH.pdf", | |
"size": " 13M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "ceh-official-certified-ethical-hacker-review-guide-exam-312-50.9780782144376.27422(00001).pdf", | |
"size": "4.7M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "ceh-official-certified-ethical-hacker-review-guide-exam-312-50.9780782144376.27422.pdf", | |
"size": "4.7M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "prova 312-50.pdf", | |
"size": "2.8M", | |
"type": "file" | |
} | |
], | |
"name": "CEH", | |
"size": "-", | |
"type": "dir" | |
}, | |
{ | |
"children": [ | |
{ | |
"children": [], | |
"name": "CEHV8 Module 01 Introduction to Ethical Hacking.pdf", | |
"size": "3.9M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "CEH v8 Labs Module 00.pdf", | |
"size": " 99K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "CEH v8 Labs Module 02 Footprinting and Reconnaissance.pdf", | |
"size": "3.5M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "CEH v8 Labs Module 03 Scanning Networks.pdf", | |
"size": "6.5M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "CEH v8 Labs Module 04 Enumeration.pdf", | |
"size": "1.4M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "CEH v8 Labs Module 05 System Hacking.pdf", | |
"size": "4.6M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "CEH v8 Labs Module 06 Trojans and Backdoors.pdf", | |
"size": "4.2M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "CEH v8 Labs Module 07 Viruses and Worms.pdf", | |
"size": "2.4M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "CEH v8 Labs Module 08 Sniffers.pdf", | |
"size": "4.2M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "CEH v8 Labs Module 09 Social Engineering.pdf", | |
"size": "1.1M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "CEH v8 Labs Module 10 Denial of Service.pdf", | |
"size": "512K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "CEH v8 Labs Module 11 Session Hijacking.pdf", | |
"size": "668K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "CEH v8 Labs Module 12 Hacking Webservers.pdf", | |
"size": "1.3M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "CEH v8 Labs Module 13 Hacking Web Applications.pdf", | |
"size": "886K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "CEH v8 Labs Module 14 SQL Injection.pdf", | |
"size": "1.5M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "CEH v8 Labs Module 15 Hacking Wireless Networks.pdf", | |
"size": "1.2M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "CEH v8 Labs Module 17 Evading IDS, Firewalls and Honeypots.pdf", | |
"size": "2.3M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "CEH v8 Labs Module 18 Buffer Overflow.pdf", | |
"size": "456K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "CEH v8 Labs Module 19 Cryptography.pdf", | |
"size": "1.8M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "CEHv8 Module 00.pdf", | |
"size": "1.2M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "CEHv8 Module 02 Footprinting and Reconnaissance.pdf", | |
"size": "7.9M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "CEHv8 Module 03 Scanning Networks.pdf", | |
"size": "8.3M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "CEHv8 Module 04 Enumeration.pdf", | |
"size": "3.8M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "CEHv8 Module 05 System Hacking .pdf", | |
"size": " 14M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "CEHv8 Module 06 Trojans and Backdoors.pdf", | |
"size": "8.7M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "CEHv8 Module 07 Viruses and Worms.pdf", | |
"size": "4.9M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "CEHv8 Module 08 Sniffing.pdf", | |
"size": "8.0M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "CEHv8 Module 09 Social Engineering.pdf", | |
"size": "5.1M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "CEHv8 Module 10 Denial of Service.pdf", | |
"size": "4.9M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "CEHv8 Module 11 Session Hijacking.pdf", | |
"size": "4.3M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "CEHv8 Module 12 Hacking Webservers.pdf", | |
"size": "5.7M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "CEHv8 Module 13 Hacking Web Applications .pdf", | |
"size": " 12M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "CEHv8 Module 14 SQL Injection.pdf", | |
"size": "6.8M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "CEHv8 Module 15 Hacking Wireless Networks.pdf", | |
"size": " 12M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "CEHv8 Module 16 Hacking Mobile Platforms.pdf", | |
"size": "7.0M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "CEHv8 Module 17 Evading IDS, Firewalls, and Honeypots.pdf", | |
"size": "6.5M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "CEHv8 Module 18 Buffer Overflow.pdf", | |
"size": "4.0M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "CEHv8 Module 19 Cryptography.pdf", | |
"size": "4.0M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "CEHv8 Module 20 Penetration Testing.pdf", | |
"size": "4.4M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "CEHv8 References.pdf", | |
"size": "2.7M", | |
"type": "file" | |
} | |
], | |
"name": "CEH v8 Courseware", | |
"size": "-", | |
"type": "dir" | |
}, | |
{ | |
"children": [], | |
"name": "CRC Press - Information Security Management Handbook, Fifth Edition.pdf", | |
"size": " 43M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "CRC Press - The Hacker's Handbookplus-.pdf", | |
"size": " 18M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "CYBER SECURITY.pdf", | |
"size": "6.0M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Charles River Media - The SecurityPLUS Exam Guide. TestTaker's Guide Series.chm", | |
"size": "1.4M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Chris Eagle - The IDA Pro Book - 2008.chm", | |
"size": "6.0M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Computer - Hackers Secrets - e-book.pdf", | |
"size": "493K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Computer Vulnerabilities.pdf", | |
"size": "477K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Computer_and_Information_Security_Handbook_2009_Edition.pdf", | |
"size": " 12M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Corporate Computer Security (3rd Edition).pdf", | |
"size": " 14M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Counter Hack Reloaded, Second Edition.chm", | |
"size": " 18M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Crc Press - The Hacker'S Handbook.pdf", | |
"size": " 18M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Credit.Card.Visa.Hack.Ucam.Cl.Tr.560.[223.kB_www.netz.ru].pdf", | |
"size": "223K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "CyberSecuity.pdf", | |
"size": "5.7M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "CyberSecurity.pdf", | |
"size": " 16M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Cyber Warfare, 2nd Ed By Jason Andress.pdf", | |
"size": "8.6M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Cyber Warfare.pdf", | |
"size": "2.9M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Cybercrime.pdf", | |
"size": " 10M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Cyberdeterrence and Cyberwar.pdf", | |
"size": " 14M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "DDoS Report.pdf", | |
"size": "132K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "DRDos Attack.pdf", | |
"size": "214K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "DangerousGoogle-SearchingForSecrets.pdf", | |
"size": "2.1M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "David_H._Ramirez-IPTV_Security__Protecting_High-Value_Digital_Contents-Wiley(2008).pdf", | |
"size": "3.4M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Debugging with gdb.pdf", | |
"size": "1.0M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Digital Forensics for Network, Internet, and Cloud Computing.pdf", | |
"size": " 13M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Digital Forensics with Open Source Tools-slicer.pdf", | |
"size": "4.4M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Digital Press - HP NonStop Server Security.chm", | |
"size": "2.2M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Digital Press - Implementing Homeland Security for Enterprise IT.chm", | |
"size": "1.4M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Dissecting.the.Hack.The.F0rb1dd3n.Networkook.pdf", | |
"size": "2.6M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Dissecting the Hack.pdf", | |
"size": "2.6M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Dummies - Hack How To Create Keygens (1).pdf", | |
"size": "9.6K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "ETHICAL+ (Case Conflict)", | |
"size": "-", | |
"type": "dir" | |
}, | |
{ | |
"children": [], | |
"name": "Engineering Secure Software and Systems.pdf", | |
"size": "3.1M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Enhancing_Computer_Security_with_Smart_Technology.pdf", | |
"size": "2.3M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Ethics.pdf", | |
"size": " 13M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Firewalls And Networks How To Hack Into Remote Computers, Gaining access and Securing the Gateway.pdf", | |
"size": "2.4M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Fundamentals of Information Systems Security.pdf", | |
"size": "113M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Generic Anti Exploitation Technology for Windows.pdf", | |
"size": "1.5M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Gray Hat Python.pdf", | |
"size": "3.0M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Hack-Proofing-Your-Network.pdf", | |
"size": "8.8M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Hack IT Security Through Penetration Testing.chm", | |
"size": "4.6M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Hack IT Security Through Penetration Testing.pdf", | |
"size": " 12M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Hack Proofing Linux A Guide to Open Source Security - Stangler, Lane - Syngress - ISBN 1-928994-34-2.pdf", | |
"size": " 12M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Hack Proofing Sun Solaris 8.pdf", | |
"size": "6.8M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Hack Proofing Your E-Commerce Site.pdf", | |
"size": "7.3M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Hack Proofing Your Identity In The Information Age.pdf", | |
"size": "8.9M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Hack Proofing Your Network Second Edition.pdf", | |
"size": "8.8M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Hack Proofing Your Web Applications.pdf", | |
"size": "8.6M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "HackWebApps.pdf", | |
"size": " 15M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Hack_Attacks_Revealed_A_Complete_Reference_With_Custom_Security_Hacking_Toolkit.chm", | |
"size": "6.3M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Hack_IT_Security_Through_Penetration_Testing.chm", | |
"size": "4.6M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Hack_Proofing_Your_Network.pdf", | |
"size": "2.9M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Hacker'S.Delight.chm", | |
"size": "2.1M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Hacker Disassembling Uncovered.chm", | |
"size": "4.7M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Hacker Heroes.pdf", | |
"size": " 13M", | |
"type": "file" | |
}, | |
{ | |
"children": [ | |
{ | |
"children": [], | |
"name": "HHS_TOC_Glossary.pdf", | |
"size": "244K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "HHS_en01_Being_a_Hacker.pdf", | |
"size": "229K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "HHS_en02_Windows_and_Linux.pdf", | |
"size": "361K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "HHS_en03_Ports_and_Protocols.pdf", | |
"size": "487K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "HHS_en04_Services_and_Connections.pdf", | |
"size": "301K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "HHS_en05_System_Identification.pdf", | |
"size": "237K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "HHS_en06_Malware.pdf", | |
"size": "208K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "HHS_en07_Attack_Analysis.pdf", | |
"size": "318K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "HHS_en08_Forensics.pdf", | |
"size": "320K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "HHS_en09_Email_Security.pdf", | |
"size": "531K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "HHS_en10_Web_Security_and_Privacy.pdf", | |
"size": "727K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "HHS_en11_Passwords.pdf", | |
"size": "212K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "HHS_en12_Legalities_and_Ethics.pdf", | |
"size": "290K", | |
"type": "file" | |
} | |
], | |
"name": "Hacker HighSchool - 13 ebooks", | |
"size": "-", | |
"type": "dir" | |
}, | |
{ | |
"children": [], | |
"name": "Hacker Linux Uncovered.chm", | |
"size": "4.5M", | |
"type": "file" | |
}, | |
{ | |
"children": [ | |
{ | |
"children": [ | |
{ | |
"children": [], | |
"name": "__MACOSX", | |
"size": "-", | |
"type": "dir" | |
}, | |
{ | |
"children": [], | |
"name": "hackermonthly-issue1.epub", | |
"size": "670K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "hackermonthly-issue1.mobi", | |
"size": "447K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "hackermonthly-issue1.pdf", | |
"size": "2.9M", | |
"type": "file" | |
} | |
], | |
"name": "hackermonthly-issue001", | |
"size": "-", | |
"type": "dir" | |
}, | |
{ | |
"children": [ | |
{ | |
"children": [], | |
"name": "__MACOSX", | |
"size": "-", | |
"type": "dir" | |
}, | |
{ | |
"children": [], | |
"name": "hackermonthly-issue2.epub", | |
"size": "1.1M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "hackermonthly-issue2.mobi", | |
"size": "569K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "hackermonthly-issue2.pdf", | |
"size": "4.9M", | |
"type": "file" | |
} | |
], | |
"name": "hackermonthly-issue002", | |
"size": "-", | |
"type": "dir" | |
}, | |
{ | |
"children": [ | |
{ | |
"children": [], | |
"name": "__MACOSX", | |
"size": "-", | |
"type": "dir" | |
}, | |
{ | |
"children": [], | |
"name": "hackermonthly-issue3.epub", | |
"size": "1.7M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "hackermonthly-issue3.mobi", | |
"size": "519K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "hackermonthly-issue3.pdf", | |
"size": "1.6M", | |
"type": "file" | |
} | |
], | |
"name": "hackermonthly-issue003", | |
"size": "-", | |
"type": "dir" | |
}, | |
{ | |
"children": [ | |
{ | |
"children": [], | |
"name": "__MACOSX", | |
"size": "-", | |
"type": "dir" | |
}, | |
{ | |
"children": [], | |
"name": "hackermonthly-issue4.epub", | |
"size": "4.0M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "hackermonthly-issue4.mobi", | |
"size": "1.8M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "hackermonthly-issue4.pdf", | |
"size": "2.2M", | |
"type": "file" | |
} | |
], | |
"name": "hackermonthly-issue004", | |
"size": "-", | |
"type": "dir" | |
}, | |
{ | |
"children": [ | |
{ | |
"children": [], | |
"name": "Hacker_Monthly_October_2010.epub", | |
"size": "924K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Hacker_Monthly_October_2010.mobi", | |
"size": "1.0M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "__MACOSX", | |
"size": "-", | |
"type": "dir" | |
}, | |
{ | |
"children": [], | |
"name": "hackermonthly-issue5.pdf", | |
"size": "3.2M", | |
"type": "file" | |
} | |
], | |
"name": "hackermonthly-issue005", | |
"size": "-", | |
"type": "dir" | |
}, | |
{ | |
"children": [ | |
{ | |
"children": [], | |
"name": "Hacker_Monthly_November_2010.epub", | |
"size": "1.2M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Hacker_Monthly_November_2010.mobi", | |
"size": "1.2M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "__MACOSX", | |
"size": "-", | |
"type": "dir" | |
}, | |
{ | |
"children": [], | |
"name": "hackermonthly-issue6.pdf", | |
"size": "2.4M", | |
"type": "file" | |
} | |
], | |
"name": "hackermonthly-issue006", | |
"size": "-", | |
"type": "dir" | |
}, | |
{ | |
"children": [ | |
{ | |
"children": [], | |
"name": "Hacker_Monthly_December_2010.epub", | |
"size": "1.9M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Hacker_Monthly_December_2010.mobi", | |
"size": "638K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "__MACOSX", | |
"size": "-", | |
"type": "dir" | |
}, | |
{ | |
"children": [], | |
"name": "hackermonthly-issue7.pdf", | |
"size": "4.5M", | |
"type": "file" | |
} | |
], | |
"name": "hackermonthly-issue007", | |
"size": "-", | |
"type": "dir" | |
}, | |
{ | |
"children": [ | |
{ | |
"children": [], | |
"name": "__MACOSX", | |
"size": "-", | |
"type": "dir" | |
}, | |
{ | |
"children": [], | |
"name": "hackermonthly-issue8.epub", | |
"size": "2.9M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "hackermonthly-issue8.mobi", | |
"size": "1.6M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "hackermonthly-issue8.pdf", | |
"size": "3.9M", | |
"type": "file" | |
} | |
], | |
"name": "hackermonthly-issue008", | |
"size": "-", | |
"type": "dir" | |
}, | |
{ | |
"children": [ | |
{ | |
"children": [], | |
"name": "Hacker Monthly February 2011.epub", | |
"size": "5.2M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Hacker Monthly February 2011.mobi", | |
"size": "3.2M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "__MACOSX", | |
"size": "-", | |
"type": "dir" | |
}, | |
{ | |
"children": [], | |
"name": "hackermonthly-issue9.pdf", | |
"size": "5.2M", | |
"type": "file" | |
} | |
], | |
"name": "hackermonthly-issue009", | |
"size": "-", | |
"type": "dir" | |
}, | |
{ | |
"children": [ | |
{ | |
"children": [], | |
"name": "__MACOSX", | |
"size": "-", | |
"type": "dir" | |
}, | |
{ | |
"children": [], | |
"name": "hackermonthly-issue10.epub", | |
"size": "3.7M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "hackermonthly-issue10.mobi", | |
"size": "2.1M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "hackermonthly-issue10.pdf", | |
"size": "3.9M", | |
"type": "file" | |
} | |
], | |
"name": "hackermonthly-issue010", | |
"size": "-", | |
"type": "dir" | |
}, | |
{ | |
"children": [ | |
{ | |
"children": [], | |
"name": "__MACOSX", | |
"size": "-", | |
"type": "dir" | |
}, | |
{ | |
"children": [], | |
"name": "hackermonthly-issue11.epub", | |
"size": "5.6M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "hackermonthly-issue11.mobi", | |
"size": "3.6M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "hackermonthly-issue11.pdf", | |
"size": "7.2M", | |
"type": "file" | |
} | |
], | |
"name": "hackermonthly-issue011", | |
"size": "-", | |
"type": "dir" | |
}, | |
{ | |
"children": [ | |
{ | |
"children": [], | |
"name": "__MACOSX", | |
"size": "-", | |
"type": "dir" | |
}, | |
{ | |
"children": [], | |
"name": "hackermonthly-issue12.epub", | |
"size": "2.6M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "hackermonthly-issue12.mobi", | |
"size": "1.6M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "hackermonthly-issue12.pdf", | |
"size": "3.4M", | |
"type": "file" | |
} | |
], | |
"name": "hackermonthly-issue012", | |
"size": "-", | |
"type": "dir" | |
}, | |
{ | |
"children": [ | |
{ | |
"children": [], | |
"name": "__MACOSX", | |
"size": "-", | |
"type": "dir" | |
}, | |
{ | |
"children": [], | |
"name": "hackermonthly-issue13.epub", | |
"size": "1.8M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "hackermonthly-issue13.mobi", | |
"size": "945K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "hackermonthly-issue13.pdf", | |
"size": "2.5M", | |
"type": "file" | |
} | |
], | |
"name": "hackermonthly-issue013", | |
"size": "-", | |
"type": "dir" | |
}, | |
{ | |
"children": [ | |
{ | |
"children": [], | |
"name": "__MACOSX", | |
"size": "-", | |
"type": "dir" | |
}, | |
{ | |
"children": [], | |
"name": "hackermonthly-issue14.epub", | |
"size": "7.4M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "hackermonthly-issue14.pdf", | |
"size": "5.0M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "hackermontly-issue14.mobi", | |
"size": "5.3M", | |
"type": "file" | |
} | |
], | |
"name": "hackermonthly-issue014", | |
"size": "-", | |
"type": "dir" | |
}, | |
{ | |
"children": [ | |
{ | |
"children": [], | |
"name": "__MACOSX", | |
"size": "-", | |
"type": "dir" | |
}, | |
{ | |
"children": [], | |
"name": "hackermonthly-issue15.epub", | |
"size": "4.9M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "hackermonthly-issue15.mobi", | |
"size": "4.5M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "hackermonthly-issue15.pdf", | |
"size": "9.2M", | |
"type": "file" | |
} | |
], | |
"name": "hackermonthly-issue015", | |
"size": "-", | |
"type": "dir" | |
}, | |
{ | |
"children": [ | |
{ | |
"children": [], | |
"name": "__MACOSX", | |
"size": "-", | |
"type": "dir" | |
}, | |
{ | |
"children": [], | |
"name": "hackermonthly-issue16.epub", | |
"size": "6.9M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "hackermonthly-issue16.mobi", | |
"size": "6.3M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "hackermonthly-issue16.pdf", | |
"size": " 14M", | |
"type": "file" | |
} | |
], | |
"name": "hackermonthly-issue016", | |
"size": "-", | |
"type": "dir" | |
}, | |
{ | |
"children": [ | |
{ | |
"children": [], | |
"name": "__MACOSX", | |
"size": "-", | |
"type": "dir" | |
}, | |
{ | |
"children": [], | |
"name": "hackermonthly-issue17-ipad.pdf", | |
"size": "5.8M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "hackermonthly-issue17.epub", | |
"size": "3.0M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "hackermonthly-issue17.mobi", | |
"size": "1.2M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "hackermonthly-issue17.pdf", | |
"size": "6.6M", | |
"type": "file" | |
} | |
], | |
"name": "hackermonthly-issue017", | |
"size": "-", | |
"type": "dir" | |
}, | |
{ | |
"children": [ | |
{ | |
"children": [], | |
"name": "__MACOSX", | |
"size": "-", | |
"type": "dir" | |
}, | |
{ | |
"children": [], | |
"name": "hackermonthly-issue018-ipad.pdf", | |
"size": "7.5M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "hackermonthly-issue018.epub", | |
"size": "2.5M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "hackermonthly-issue018.mobi", | |
"size": "1.5M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "hackermonthly-issue018.pdf", | |
"size": " 11M", | |
"type": "file" | |
} | |
], | |
"name": "hackermonthly-issue018", | |
"size": "-", | |
"type": "dir" | |
}, | |
{ | |
"children": [ | |
{ | |
"children": [], | |
"name": "__MACOSX", | |
"size": "-", | |
"type": "dir" | |
}, | |
{ | |
"children": [], | |
"name": "hackermonthly-issue019-ipad.pdf", | |
"size": " 10M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "hackermonthly-issue019.epub", | |
"size": "4.2M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "hackermonthly-issue019.mobi", | |
"size": "3.2M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "hackermonthly-issue019.pdf", | |
"size": " 14M", | |
"type": "file" | |
} | |
], | |
"name": "hackermonthly-issue019", | |
"size": "-", | |
"type": "dir" | |
}, | |
{ | |
"children": [ | |
{ | |
"children": [], | |
"name": "__MACOSX", | |
"size": "-", | |
"type": "dir" | |
}, | |
{ | |
"children": [], | |
"name": "hackermonthly-startupstories.pdf", | |
"size": "7.2M", | |
"type": "file" | |
} | |
], | |
"name": "hackermonthly-startupstories", | |
"size": "-", | |
"type": "dir" | |
}, | |
{ | |
"children": [ | |
{ | |
"children": [], | |
"name": "Hacker_Monthly_November_2010_Special_Debate_Issue.epub", | |
"size": "803K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Hacker_Monthly_November_2010_Special_Debate_Issue.mobi", | |
"size": "587K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "__MACOSX", | |
"size": "-", | |
"type": "dir" | |
}, | |
{ | |
"children": [], | |
"name": "hackermonthly-thedebate.pdf", | |
"size": "2.3M", | |
"type": "file" | |
} | |
], | |
"name": "hackermonthly-thedebate", | |
"size": "-", | |
"type": "dir" | |
} | |
], | |
"name": "HackerMonthly", | |
"size": "-", | |
"type": "dir" | |
}, | |
{ | |
"children": [], | |
"name": "Hacker Techniques, Tools, and Incident Handling.pdf", | |
"size": " 59M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Hacker Web Exploitation Uncovered.chm", | |
"size": "555K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Hacker_s_Guide.pdf", | |
"size": "3.7M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Hackers, Heroes Of The Computer Revolution.pdf", | |
"size": "105K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Hackers Beware - Defending Your Network From The Wiley Hacker (2001).pdf", | |
"size": "4.9M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Hackers Handbook.pdf", | |
"size": " 18M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Hackers Secrets.pdf", | |
"size": "493K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Hackers Secrets Revealed.pdf", | |
"size": "493K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Hacking, The Next Generation.pdf", | |
"size": "7.1M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Hacking - Addison-Wesley Hackers Delight.chm", | |
"size": "2.1M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Hacking - Firewalls And Networks How To Hack Into Remote Computers.pdf", | |
"size": "2.9M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Hacking-Hacker's Guide.pdf", | |
"size": "3.7M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Hacking-Hackers Secrets Revealed.pdf", | |
"size": "493K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Hacking-The Hacker Crackdown.pdf", | |
"size": "633K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Hacking-ebook - CIA-Book-of-Dirty-Tricks1.pdf", | |
"size": "355K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Hacking.For.Dummies.Access.To.Other.People's.System.Made.Simple.pdf", | |
"size": "1.3M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Hacking.Guide.V3.1.pdf", | |
"size": "1.2M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Hacking Cisco Routers.pdf", | |
"size": " 19K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Hacking Exposed Networks.pdf", | |
"size": "5.9M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Hacking IIS Servers.pdf", | |
"size": " 31K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "HackingTheXbox_Free.pdf", | |
"size": " 18M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Hacking Windows XP.pdf", | |
"size": " 10M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Hacking a terror network.pdf", | |
"size": "8.2M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Hacking attacks and Examples Test.pdf", | |
"size": "9.6M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Hacking into computer systems - a beginners guide.pdf", | |
"size": "615K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Hacking the Code - ASP.NET Web Application Security Cookbook (2004) .chm", | |
"size": "4.8M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Hacking web applications.pdf", | |
"size": "7.6M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Hackintosh_from_A_to_Z.pdf", | |
"size": " 13M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Hack proofing Ecommerce sites.pdf", | |
"size": "7.3M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Hackproofing Oracle Application Server.pdf", | |
"size": "306K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Hack proofing wireless networks.pdf", | |
"size": "6.6M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Hack the stack networks.pdf", | |
"size": "7.2M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Hakin9_01_2011.pdf", | |
"size": "5.2M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Handbook of Information and Communication Security.pdf", | |
"size": " 22M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Handbook of Security and Networks.pdf", | |
"size": "8.8M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Hands-On Ethical Hacking and Network Defense, 2nd Edition.pdf", | |
"size": " 20M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Heck Attacks Denied.pdf", | |
"size": "5.1M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Hentzenwerke Publishing - Hacker's Guide to Visual FoxPro 7.0.chm", | |
"size": "4.2M", | |
"type": "file" | |
}, | |
{ | |
"children": [ | |
{ | |
"children": [], | |
"name": "holistic-infosec-for-web-developers-fascicle1-vps-network-cloud-webapplications.epub", | |
"size": "5.5M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "holistic-infosec-for-web-developers-fascicle1-vps-network-cloud-webapplications.mobi", | |
"size": " 23M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "holistic-infosec-for-web-developers-fascicle1-vps-network-cloud-webapplications.pdf", | |
"size": "7.4M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "holistic-infosec-for-web-developers-fascicle2-mobile-iot.epub", | |
"size": "428K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "holistic-infosec-for-web-developers-fascicle2-mobile-iot.mobi", | |
"size": "904K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "holistic-infosec-for-web-developers-fascicle2-mobile-iot.pdf", | |
"size": "1.1M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "holistic-infosec-for-web-developers.epub", | |
"size": "4.6M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "holistic-infosec-for-web-developers.mobi", | |
"size": " 15M", | |
"type": "file" | |
} | |
], | |
"name": "HolisticInfosecForWebDeveopers", | |
"size": "-", | |
"type": "dir" | |
}, | |
{ | |
"children": [], | |
"name": "How To Hack Into A Computer On LAN.pdf", | |
"size": "566K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "IRandDF3rdEdition.pdf", | |
"size": " 16M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "ISBN 1928994202 - Mission Critical Internet Security.pdf", | |
"size": "3.9M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "ITAuditingUsingControlstoProtectInformation.pdf", | |
"size": "7.8M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Idea Group Publishing - Current Security Management AND Ethical Issues of Information Technology.chm", | |
"size": "2.6M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "InTech-A_multi_agent_system_architecture_for_sensor_networks.pdf", | |
"size": "289K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Industrial_Network_Security.pdf", | |
"size": "6.4M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Information Security \u00ef\u00bf\u00bd%84%964 2011.pdf", | |
"size": " 19M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Information Security Principles and Practice 2nd Edition - Stamp.pdf", | |
"size": " 27M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Inside.Cyber.Warfare.2nd.Edition.pdf", | |
"size": " 14M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Installing D4 Channel Banks.pdf", | |
"size": " 35K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Introduccion-Explotacion-Software-Linux.pdf", | |
"size": "552K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Introduction_to_Network_Security.pdf", | |
"size": "2.7M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "It_Governance_Publishing-E-Mail_Security__A_Pocket_Guide-IT_Governance_Publishing(2010).pdf", | |
"size": "1.0M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "JavascriptMalwareEncoding.pdf", | |
"size": " 59K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "John.Wiley.and.Sons.Hacking.Windows.XP.Jul.2004.eBook.pdf", | |
"size": " 10M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "John R. Vacca - Network and System Security 2010.pdf", | |
"size": "4.9M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Jonathan_Katz,_Yehuda_Lindell-Introduction_to_Modern_Cryptography__Principles_and_Protocols-Chapman_and_Hall_CRC(2007).pdf", | |
"size": "7.7K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Kluwer Academic Publishers - The Information Security Dictionary.pdf", | |
"size": "4.6M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "LEAP for Ad-hoc Networks.pdf", | |
"size": "286K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Learning PHP, MySQL, JavaScript, CSS & HTML5, 3rd Edition.pdf", | |
"size": " 21M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Linux-Server.Hacks-OReilly.pdf", | |
"size": " 34M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Low Tech Hacking Street Smarts for Security Professionals.pdf", | |
"size": "7.7M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "MS Press - Writing Secure Code.chm", | |
"size": "2.0M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Mark Russinovich - Zero Day.pdf", | |
"size": "719K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Mastering Web Services Security.pdf", | |
"size": "3.6M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Maximum Security - A Hacker's Guide to Protecting Your Internet.pdf", | |
"size": "2.6M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Maximum Security A Hackers Guide to Protecting Your Internet.pdf", | |
"size": "2.6M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Maximum Security Protecting your Internet Site.chm", | |
"size": "1.3M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "McGraw-Hill - HackNotes Web Security Pocket Referenceplus-.pdf", | |
"size": "3.4M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "McGraw-Hill - HackNotes Windows Security Portable Reference.pdf", | |
"size": "4.8M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "McGraw-Hill - Security Planning AND Disaster Recovery.pdf", | |
"size": "1.7M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "McGraw-Hill - Sun Certified Security Administrator for Solaris 9 AND 10 Study Guide.chm", | |
"size": "2.0M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "McGraw-Hill - Wi-Fi Security.pdf", | |
"size": "4.9M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Microsoft Encyclopedia of Security.pdf", | |
"size": " 10M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Microsoft Press - CompTIA Security Plus Training Kit EBook.chm", | |
"size": "1.2M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Microsoft Press - MCSE Self-Paced Training Kit (Exam 70-298). Designing Security for a Microsoft .chm", | |
"size": " 11M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Microsoft Press - Microsoft Encyclopedia of Security.chm", | |
"size": "4.3M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Mind Hacks - Tips & Tricks for Using Your Brain.chm", | |
"size": "3.4M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "ModSecurity Handbook.pdf", | |
"size": "3.1M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Network Security Essentials 4th Edition.pdf", | |
"size": "3.1M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Network Security Know It All.pdf", | |
"size": "3.2M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Network_Security_Hacks__Second_Edition 2006.chm", | |
"size": "3.9M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "New Riders - Network Intrusion Detection 3th Edition (2002).pdf", | |
"size": "2.5M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "New Riders Publishing - Hackers Bewareplus-.pdf", | |
"size": "4.6M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "No.Starch.The.Tangled.Web.Nov.2011.pdf", | |
"size": "4.0M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "No Starch Press - PGP and GPG Email for the Practical Paranoid.pdf", | |
"size": "3.4M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "No Starch Press CRACKPROOF Your Software.pdf", | |
"size": "6.8M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "O'Reilly - Greasemonkey Hacks - Tips & Tools for Remixing the Web with Firefox.chm", | |
"size": "7.8M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "O'Reilly - Kerberos The Definitive Guide.chm", | |
"size": "1.5M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "O'Reilly - Managing Security with Snort and IDS Toolsplus.chm", | |
"size": "1.7M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "O'Reilly - Network Security with OpenSSL Ebook - Fly.pdf", | |
"size": "2.4M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "O'Reilly - Online Investing Hacks.chm", | |
"size": "5.0M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "O'Reilly - RADIUS.chm", | |
"size": "620K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "O'Reilly - Secure Coding. Principles and Practices.chm", | |
"size": "642K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "O'Reilly - Security Warriorplus-.chm", | |
"size": "4.5M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "O'Reilly - Security and Usability.chm", | |
"size": "7.6M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "O'Reilly - Snort Cookbookplus.chm", | |
"size": "2.5M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "O'Reilly - Wireless Hacks (100 Industrial Strength Tips and Tools).chm", | |
"size": "4.0M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "O'Reilly.-.Network.Security.Hacks.chm", | |
"size": "1.6M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "O'Reilly.Windows.Server.Hack.chm", | |
"size": "1.8M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "O'Reilly Security Power Tools.pdf", | |
"size": " 10M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "OReilly,.Digital.Video.Hacks.(2005).DDU.LotB.chm", | |
"size": "3.0M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "OReilly,.IRC.Hacks.(2004).DDU.chm", | |
"size": "3.2M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "OReilly - Flickr Hacks Tips and Tools for Sharing Photos Online (Feb 2006).chm", | |
"size": "5.4M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "OReilly - Google Hacks.pdf", | |
"size": "2.9M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "OReilly.Linux.Security.Cookbook.pdf", | |
"size": "2.0M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "OReilly.Linux.Server.Hacks.Volume.Two.Dec.2005.chm", | |
"size": "2.2M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "OReilly.PC.Hacks.Oct.2004.eBook-DDU.chm", | |
"size": "6.0M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "OReilly.Perl.Hacks.Tips.and.Tools.for.Programming.Debugging.and.Surviving.May.2006.chm", | |
"size": "583K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "OReilly.SQL.Hacks.Nov.2006.chm", | |
"size": "2.0M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "OReilly.Skype.Hacks.Tips.and.Tools.for.Cheap.Fun.Innovative.Phone.Service.Dec.2005.chm", | |
"size": "3.7M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "OReilly.Statistics.Hacks.May.2006.chm", | |
"size": "1.0M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "OReilly.Ubuntu.Hacks.Tips.and.Tools.for.Exploring.Using.and.Tuning.Linux.Jun.2006.chm", | |
"size": "3.7M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "OReilly.VoIP.Hacks.Tips.and.Tools.for.Internet.Telephony.Dec.2005.chm", | |
"size": "2.5M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "OReilly.Word.Hacks.Oct.2004.eBook-DDU.chm", | |
"size": "3.5M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "OReilly Google Hacks, 1st Edition2003.pdf", | |
"size": "2.9M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "O_Reilly_-_Windows_XP_Hacks.chm", | |
"size": "5.2M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Oded_Goldreich-Foundations_of_Cryptography__Volume_2,_Basic_Applications(2009).pdf", | |
"size": "1.9M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Oded_Goldreich-Foundations_of_Cryptography__Volume_2,_Basic_Applications-Cambridge_University_Press(2009).pdf", | |
"size": "2.0M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Open Problems in Network Security.pdf", | |
"size": "3.9M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Open Source Security Tools A Practical Guide to Security Applicationsplus-.chm", | |
"size": " 12M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Oreilly, Paypal Hacks (2004) Ddu.chm", | |
"size": "1.9M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Oreilly.Linux.Desktop.Hacks.Mar.2005.eBook-LiB.chm", | |
"size": "453K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Oreilly Access Hacks Apr 2005.chm", | |
"size": " 18M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "PC Games - How to Crack CD Protection.pdf", | |
"size": " 30K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "PCT.pdf", | |
"size": "433K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Password.txt", | |
"size": " 7 ", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Pearson.Computer.Security.Fundamentals.2nd.Edition.Dec.2011.pdf", | |
"size": "5.7M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Practical UNIX and Internet Security 2nd Ed.chm", | |
"size": "2.5M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Premier Press - Invasion of Privacy. Big Brother and the Company Hackers.chm", | |
"size": " 10M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Prentice Hall PTR - IT Security. Risking the Corporation (1).chm", | |
"size": "609K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Prentice Hall PTR - IT Security. Risking the Corporation (2).chm", | |
"size": "609K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Prentice Hall PTR - IT Security. Risking the Corporation (3).chm", | |
"size": "609K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Prentice Hall PTR - IT Security. Risking the Corporation (4).chm", | |
"size": "609K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Prentice Hall PTR - IT Security. Risking the Corporation.chm", | |
"size": "609K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Prentice Hall PTR - Inside the Security Mind. Making the Tough Decisions.chm", | |
"size": "1.4M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Prentice Hall PTR - Solaris Security.pdf", | |
"size": "1.3M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Programming_from_the_Ground_Up.pdf", | |
"size": "1.3M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Que - UNIX Hints Hacks.chm", | |
"size": "806K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Que Publishing - Absolute Beginner's Guide To. Security, Spam, Spyware AND Viruses.chm", | |
"size": " 16M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Que Publishing - Maximum Security, Fourth Edition.chm", | |
"size": "2.9M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Que Publishing - SecurityPLUS Exam Cram 2 (Exam SYO-101).chm", | |
"size": "1.0M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Que Publishing - SecurityPLUS Training Guide.chm", | |
"size": "3.4M", | |
"type": "file" | |
}, | |
{ | |
"children": [ | |
{ | |
"children": [], | |
"name": "Wrox.Professional.Rootkits.Mar.2007.chm", | |
"size": "7.8M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "rootkit- Rootkits.for.Dummies 2007.pdf", | |
"size": "6.9M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "rootkit.djvu", | |
"size": "4.3M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "the-rootkit-arsenal-escape-and-evasion-2e.pdf", | |
"size": " 94M", | |
"type": "file" | |
} | |
], | |
"name": "ROOTKIT (Case Conflict)", | |
"size": "-", | |
"type": "dir" | |
}, | |
{ | |
"children": [], | |
"name": "RTFM - Red Team Field Manual.pdf", | |
"size": "2.9M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Risk Analysis and Security Countermeasure selection.pdf", | |
"size": " 15M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "SANS Incident Handling Step by step.pdf", | |
"size": "493K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "SANS Institute - HIPAA Security Implementation, Version 1.0.chm", | |
"size": "1.7M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "SANS Intrusion Dectection.pdf", | |
"size": "336K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "SANS Securing Linux.pdf", | |
"size": "2.3M", | |
"type": "file" | |
}, | |
{ | |
"children": [ | |
{ | |
"children": [], | |
"name": "Addison Wesley - Slamming Spam. A Guide for System Administrators.chm", | |
"size": " 16M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "McGraw-Hill - Anti-Spam Toolkit.chm", | |
"size": " 10M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "No Starch Press - Ending Spam. Bayesian Content Filtering and the Art of Statistical Language Cla.chm", | |
"size": "2.0M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "O'Reilly - SpamAssassin.chm", | |
"size": "587K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Syngress - Inside the SPAM Cartel. Trade Secrets From the Dark Side.chm", | |
"size": "6.0M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Wiley Publishing, Inc - Blocking Spam AND Spyware For Dummies.pdf", | |
"size": "6.0M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Wiley Publishing, Inc - Fighting Spam for Dummies.chm", | |
"size": "3.6M", | |
"type": "file" | |
} | |
], | |
"name": "SPAM (Case Conflict)", | |
"size": "-", | |
"type": "dir" | |
}, | |
{ | |
"children": [], | |
"name": "Scene of the Cybercrime - Computer Forensics Handbook (Syngress).pdf", | |
"size": "5.8M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Secrets of Super and Professional Hackers.pdf", | |
"size": "1.9M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Securing-Wireless.pdf", | |
"size": "7.1M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Securing.SQL.Server.pdf", | |
"size": "4.4M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Securing IIS.pdf", | |
"size": "1.0M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Security Officer.pdf", | |
"size": "383K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Security_Enhanced_Applications_for_Information_Systems.pdf", | |
"size": "6.3M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Security_Enhanced_Applications_for_Information_Systems1.pdf", | |
"size": "6.4M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Security and Hacking - Anti-Hacker Tool Kit Second Edition.chm", | |
"size": " 29M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Security and Privacy in Communication networks.pdf", | |
"size": "7.3M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Security of Self-Organizing Networks MANET, WSN, WMN, VANET.pdf", | |
"size": "7.2M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "SitePoint - The CSS Anthology. 101 Essential Tips, Tricks and Hacks.pdf", | |
"size": "8.7M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Snort For Dummies.pdf", | |
"size": "7.0M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "SoTayHacker1.0.chm", | |
"size": " 76M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Special Ops Host and Network Security for Microsoft - UNIX a.pdf", | |
"size": " 17M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Springer.Insider.Attack.and.Cyber.Security.Beyond.the.Hacker.Apr.2008.eBook-DDU.pdf", | |
"size": "2.5M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Springer.Open.Source.Systems.Security.Certification.Nov.2008.eBook-DDU.pdf", | |
"size": "2.9M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Stamp M., Low R.M. Applied cryptanalysis...pdf", | |
"size": " 18M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Steven Levy - Hackers Heroes of the Computer Revolution - 2010.pdf", | |
"size": " 13M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Sybex, Inc - Absolute PC Security and Privacy.pdf", | |
"size": "2.8M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Sybex, Inc - CISSP.Certified Information Systems Security Professoinal Study Guide.pdf", | |
"size": "8.0M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Sybex, Inc - SecurityPLUS Study Guide, Second Edition.pdf", | |
"size": " 13M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Sybex.Security.Administrator.Street.Smarts.Feb.2007.pdf", | |
"size": "9.6M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Syngress -- Hack Proofing Your Wireless Network.pdf", | |
"size": "6.6M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Syngress - Black Hat Physical Device Security.pdf", | |
"size": " 78M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Syngress - Check Point NG AI. Next Generation with Application Intelligence Security Administrati.chm", | |
"size": " 23M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Syngress - Cyber Adversary Characterization. Auditing the Hacker Mind.pdf", | |
"size": "4.1M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Syngress - Game Console Hacking. Xbox, Playstation, Nintendo, Atari and Gamepark32.pdf", | |
"size": " 23M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Syngress - Google Hacking for Penetration Testers.pdf", | |
"size": " 32M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Syngress - Hack Proofing ColdFusion.pdf", | |
"size": "7.8M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Syngress - Hack Proofing Linux (2001).pdf", | |
"size": " 12M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Syngress - Hack Proofing Your Identity in the Information Age - 2002.pdf", | |
"size": "8.9M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Syngress - Hack Proofing Your Network, Second Editionplus-.pdf", | |
"size": "8.8M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Syngress - Hacking a Terror Network. The Silent Threat of Covert Channels.pdf", | |
"size": "9.3M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Syngress - Hacking the Code. ASP.NET Web Application Security.chm", | |
"size": "4.8M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Syngress - Programmer's Ultimate Security DeskRef.pdf", | |
"size": "3.8M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Syngress - Secure Your Network for Free Using NMAP, WIRESHARK, SNORT, NESSUS, and MRTG - 2007.pdf", | |
"size": "7.2M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Syngress - The Mezonic Agenda. Hacking the Presidency.pdf", | |
"size": " 16M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Syngress - WarDriving. Drive, Detect, Defend. A Guide to Wireless Security.chm", | |
"size": " 37M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Syngress.Force.Emerging.Threat.Analysis.From.Mischief.to.Malicious.Oct.2006.pdf", | |
"size": "7.9M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Syngress.Hack.the.Stack.Oct.2006.pdf", | |
"size": "7.2M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Syngress.Hacking.a.Terror.Network.Nov.2004.ISBN1928994989.pdf", | |
"size": "8.2M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Syngress.InfoSecurity.2008.Threat.Analysis.Nov.2007plus.pdf", | |
"size": " 11M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Syngress.Nessus.Network.Auditing.Second.Edition.May.2008.eBook-DDU.pdf", | |
"size": " 10M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Syngress.Nmap.in.the.Enterprise.Your.Guide.to.Network.Scanning.Jan.2008plus.pdf", | |
"size": "5.7M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Syngress.The.Basics.of.Web.Hacking.Tools.and.Techniques.to.Attack.the.Web.0124166008.pdf", | |
"size": "4.6M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Syngress Publishing - Phishing Exposed.pdf", | |
"size": "8.3M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "THN-June2012.pdf", | |
"size": "5.0M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "TestKing - CIW 1D0-470 Security Professional v2.0.pdf", | |
"size": "397K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "TestKing - CIW 1D0-470 Security Professional v2.1.pdf", | |
"size": "466K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "The-Secret-of-hacking -1st edition.pdf", | |
"size": "5.3M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "The.Basics.of.Information.Security_Understanding.the.Fundamentals.pdf", | |
"size": "2.8M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "The Art of Computer Virus Research and Defense.pdf", | |
"size": "9.9M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "The Art of Memory Forensics.pdf", | |
"size": "7.2M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "TheCrypterBluePrint.pdf", | |
"size": "1.5M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "The Database Hacker's Handbook.pdf", | |
"size": "2.0M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "The Hackers Underground Handbook.pdf", | |
"size": "2.5M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "The Internet and Crime.pdf", | |
"size": "1.3M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "The_20Little_20Black_20Book_20of_20Computer_20Viruses.pdf", | |
"size": "1.0M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "The_Business_of_Cybercrime.pdf", | |
"size": "4.7M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "The_Tangled_Web_Securing_Modern_Web_Applications.pdf", | |
"size": "4.0M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Thor's Microsoft Security Bible.pdf", | |
"size": " 15M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "UNIX and Linux Forensic Analysis DVD Toolkit.2008.pdf", | |
"size": "4.9M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Value-Range Analysis of C Programs.pdf", | |
"size": "2.4M", | |
"type": "file" | |
}, | |
{ | |
"children": [ | |
{ | |
"children": [], | |
"name": "076459611X.John Wiley _amp_ Sons.Hacking GMail (ExtremeTech).pdf", | |
"size": "5.3M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Addison Wesley - Web Hacking. Attacks and Defenseplus-.chm", | |
"size": "6.3M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Cross Site Scripting Attacks Xss Exploits and Defense.pdf", | |
"size": "7.3M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "G-mail Advance Hacking Guides and Tutorials.pdf", | |
"size": "6.0M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Hacking GMail.pdf", | |
"size": "5.3M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Hacking Google Maps And Google Earth.pdf", | |
"size": " 11M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Instant.Burp.Suite.Starter.pdf", | |
"size": "2.0M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Internet Advanced Denial of Service (DDOS) Attack.pdf", | |
"size": "3.9M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Internet Security Technology and Hacking.pdf", | |
"size": "8.6M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "John Wiley and Sons.Hacking GMail (ExtremeTech).pdf", | |
"size": "5.3M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Nessus Network Auditing 2ed [AAVV] Syngress.pdf", | |
"size": " 11M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "OReilly.Google.Hacks.2nd.Edition.Dec.2004.ISBN0596008570.chm", | |
"size": "5.2M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "OReilly.Google.Maps.Hacks.Jan.2006.chm", | |
"size": "8.8M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Packtpub.WordPress.3.Ultimate.Security.Jun.2011.pdf", | |
"size": "8.3M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Programming Spiders, Bots, and Aggregators in Java [Sybex, 2.pdf", | |
"size": "3.0M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "The Browser Hacker's Handbook.pdf", | |
"size": " 12M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "The Web Application Hackers Handbook_2E (copy).pdf", | |
"size": " 14M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Virtual Honeypots From Botnet Tracking to Intrusion Detection.chm", | |
"size": "4.1M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Web App Hacking (Hackers Handbook).pdf", | |
"size": "5.8M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Web Hacking Attacks and Defence.chm", | |
"size": "6.3M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Web Hacking Attacks and Defence.pdf", | |
"size": "4.5M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Web Penetration Testing with Kali Linux.pdf", | |
"size": " 20M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Web_Hacking.pdf", | |
"size": "9.3M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Web_Services_Hacking_and_Hardening.pdf", | |
"size": "575K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Webbots, Spiders, And Screen Scrapers, 2nd Edition.pdf", | |
"size": " 15M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Wiley - Cracking Drupal, A Drop in the Bucket (2009).pdf", | |
"size": "4.5M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Wiley.Hacking.Firefox.More.Than.150.Hacks.Mods.and.Customizations.Jul.2005.eBook-DDU.pdf", | |
"size": " 14M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Wiley.Hacking.Google.Maps.and.Google.Earth.Jul.2006.pdf", | |
"size": " 11M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Wiley Publishing, Inc - CSS Hacks and Filters. Making Cascading Style Sheets Work.pdf", | |
"size": " 10M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Wiley Publishing, Inc - Hacking Firefox. More Than 150 Hacks, Mods, and Customizations.pdf", | |
"size": " 14M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Wiley Publishing, Inc - Hacking Gmail.pdf", | |
"size": "5.3M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "XSS Attacks.pdf", | |
"size": "7.3M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "amazon-hacks.chm", | |
"size": "2.8M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "google-hacks.pdf", | |
"size": "2.9M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "nessus_4.2_user_guideplus.pdf", | |
"size": "1.8M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "spidering-hacks.chm", | |
"size": "1.4M", | |
"type": "file" | |
} | |
], | |
"name": "WEB (Case Conflict)", | |
"size": "-", | |
"type": "dir" | |
}, | |
{ | |
"children": [ | |
{ | |
"children": [], | |
"name": "Addison Wesley - Real 802.11 Security. Wi-Fi Protected Access and 802.11i.chm", | |
"size": "2.9M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Addison Wesley - Wi-Foo. The Secrets of Wireless Hacking.chm", | |
"size": "6.7M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Addison Wesley - Wireless Security and Privacy. Best Practices and Design Techniques.chm", | |
"size": "1.4M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "BackTrack 5 Wireless Penetration Testing.pdf", | |
"size": " 17M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Digital Press - Wireless Operational Security.chm", | |
"size": "1.5M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Hacking Wireless Home Networking For Dummies.pdf", | |
"size": " 11M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "O'Reilly - 802.11 Security.pdf", | |
"size": "911K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "O'Reilly - Wireless Hacks, 2nd Edition.chm", | |
"size": "4.8M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "O'Reilly Wireless Hacks 100 Industrial - Strength Tips and Tools.chm", | |
"size": "4.0M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Oreilly.Hacking.and.Securing.iOS.Applications.Jan.2012.pdf", | |
"size": "9.9M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Sams Publishing - Maximum Wireless Security.chm", | |
"size": "4.2M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Seven Deadliest Wireless Technologies Attacks.pdf", | |
"size": "1.7M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Springer-Verlag Wireless Network Security.pdf", | |
"size": "3.9M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Springer.Networked.RFID.Systems.and.Lightweight.Cryptography.Dec.2007.pdf", | |
"size": "6.4M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Syngress - Wireless Hacking Projects for Wi-Fi Enthusiasts.pdf", | |
"size": " 18M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Wiley Publishing, Inc - Hacking Video Game Consoles. Turn Your Old Video Game Systems into Awesom.pdf", | |
"size": " 67M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Wiley Publishing, Inc - Securing Wireless LAN's.pdf", | |
"size": "5.1M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Wireless Technology Applcations Management & Security-2009.pdf", | |
"size": " 11M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "backtrack 5 wireless penetration testing beginner's guide[nepsterjay].pdf", | |
"size": " 17M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "eBooks.OReilly.-.Wireless.Hacks.100.Industrial.-.Strength.Tips.and.Tools.chm", | |
"size": "4.0M", | |
"type": "file" | |
} | |
], | |
"name": "WIRELESS (Case Conflict)", | |
"size": "-", | |
"type": "dir" | |
}, | |
{ | |
"children": [], | |
"name": "WVS Manual.pdf", | |
"size": "4.1M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "WVS Mmanual+.pdf", | |
"size": "2.6M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Web-applications security.pdf", | |
"size": " 60M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Web Security Testing Cookbook.chm", | |
"size": "8.7M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Websters.New.World.Websters.New.World.Hacker.Dictionary.Sep.2006.pdf", | |
"size": "4.9M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Wiley - Auditing And Security - As400, Nt, Unix, Networks, And Disaster Recovery Plans (2001).pdf", | |
"size": " 14M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Wiley-Principles.of.Computer.Security.2010.RETAiL.EBook.pdf", | |
"size": "5.5M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Wiley.Build.Your.Own.Security.Lab.A.Field.Guide.for.Network.Testing.Apr.2008.iNTERNAL.eBook-DDU.pdf", | |
"size": "8.6M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Wiley.Hacking.GPS.Mar.2005.ISBN0764598805.pdf", | |
"size": " 10M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Wiley.Handbook.of.Information.Security.Vol.1 (2006).pdf", | |
"size": " 17M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Wiley.Handbook.of.Information.Security.Vol.2 (2006).pdf", | |
"size": " 14M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Wiley.Handbook.of.Information.Security.Vol.3 (2006).pdf", | |
"size": " 14M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Wiley.Implementing.Email.and.Security.Tokens.May.2008.pdf", | |
"size": "4.0M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Wiley.Lifehacker.Dec.2006.pdf", | |
"size": "7.4M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Wiley.Secure.Computer.and.Network.Systems.Modeling.Analysis.and.Design.Mar.2008.pdf", | |
"size": "3.6M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Wiley.The.Database.Hackers.Handbook.Defending.Database.Servers.chm", | |
"size": "1.1M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Wiley.The.Shellcoders.Handbook.2nd.Edition.Aug.2007.ISBN.047008023X.pdf", | |
"size": "3.6M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Wiley.The.Shellcoders.Handbook.2nd.Edition.Aug.2007.pdf", | |
"size": "3.6M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Wiley Pathways Network Security Fundamentals.pdf", | |
"size": " 13M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Wiley Publishing, Inc - Hacking GPS.pdf", | |
"size": " 10M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Wiley Publishing, Inc - Hacking Photoshop CS2.pdf", | |
"size": " 29M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Wiley Publishing, Inc - Hacking RSS and Atom.pdf", | |
"size": " 15M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Wiley Publishing, Inc - Hacking Windows.pdf", | |
"size": " 10M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Wiley Publishing, Inc - Mission Critical Security Planner.pdf", | |
"size": "1.4M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Wiley Publishing, Inc - The CISM Prep Guide. Mastering the Five Domains of Information Security M.chm", | |
"size": "2.4M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Wiley_-_CMS_Security_Handbook_[]_(2011)_en.PDF", | |
"size": "8.4M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "WinXP_Memory Layout_UserKernelAddressSpaces.png", | |
"size": "714K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Yahoo.Hacks.Oct.2005.chm", | |
"size": "6.7M", | |
"type": "file" | |
}, | |
{ | |
"children": [ | |
{ | |
"children": [], | |
"name": "Android Hacker's Handbook.pdf", | |
"size": "9.0M", | |
"type": "file" | |
} | |
], | |
"name": "android", | |
"size": "-", | |
"type": "dir" | |
}, | |
{ | |
"children": [ | |
{ | |
"children": [], | |
"name": "Botnet Detection Countering the Largest Security Threat.pdf", | |
"size": "1.9M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Botnet Tutorial.pdf", | |
"size": "1.0M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Botnets - The killer web applications.pdf", | |
"size": "3.9M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Botnets The Killer Web Applications Hacking.pdf", | |
"size": "7.0M", | |
"type": "file" | |
} | |
], | |
"name": "botnets", | |
"size": "-", | |
"type": "dir" | |
}, | |
{ | |
"children": [], | |
"name": "bsd-hacks.pdf", | |
"size": "2.0M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "ch20.pdf", | |
"size": "4.1M", | |
"type": "file" | |
}, | |
{ | |
"children": [ | |
{ | |
"children": [], | |
"name": "ImplementingCiscoIOSNetworkSecurity.pdf", | |
"size": " 11M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Wiley Publishing, Inc - The CISSP Prep Guide. Gold Edition.pdf", | |
"size": "9.3M", | |
"type": "file" | |
} | |
], | |
"name": "cisco", | |
"size": "-", | |
"type": "dir" | |
}, | |
{ | |
"children": [ | |
{ | |
"children": [], | |
"name": "For.Dummies.Hacking.Wireless.Networks.For.Dummies.Sep.2005.eBook-DDU.pdf", | |
"size": " 11M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "For.Dummies.Hacking.for.Dummies.Apr.2004.eBook-DDU.pdf", | |
"size": "9.3M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Hacking For Beginners - a beginners guide for learning ethical hacking.pdf", | |
"size": " 11M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Hacking For Dummies.pdf", | |
"size": "175K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Hacking For Dummies 1.pdf", | |
"size": "143K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Hacking For Dummies 2.pdf", | |
"size": "177K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Hacking Wireless Networks For Dummies.pdf", | |
"size": " 11M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Hacking for Begginers.pdf", | |
"size": " 11M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Hacking for Dummies (2004).pdf", | |
"size": "9.3M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Hacking for Dummies[1].pdf", | |
"size": "9.3M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "How+to+be+a+Hacker.pdf", | |
"size": "933K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "John Wiley & Sons - Hacking For Dummies.pdf", | |
"size": "9.3M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "John Wiley _ Sons - Hacking For Dummies.pdf", | |
"size": "9.3M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Vulnerability Management for Dummies.pdf", | |
"size": "4.0M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Wiley.Hacking.For.Dummies.3rd.Edition.Jan.2010.pdf", | |
"size": " 11M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Wiley Publishing, Inc - Hacking for Dummies.pdf", | |
"size": "9.3M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Wiley Publishing, Inc - Mac mini Hacks AND Mods for Dummies.pdf", | |
"size": " 10M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Wiley Publishing, Inc - Wireless Network Hacks AND Mods for Dummies.pdf", | |
"size": "7.2M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "hacking_for_dummies_4th_edition.pdf", | |
"size": " 20M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "rootkit- Rootkits.for.Dummies 2007.pdf", | |
"size": "6.9M", | |
"type": "file" | |
} | |
], | |
"name": "dummies", | |
"size": "-", | |
"type": "dir" | |
}, | |
{ | |
"children": [], | |
"name": "ebay-hacks-100-industrial-strength-tips-and-tools.pdf", | |
"size": "4.3M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "ebook - Maximum Security - A Hackers Guide to Protecting Your Internet Site and Network.pdf", | |
"size": "2.6M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "ebook.oreilly.-.windows.xp.hacks.sharereactor.chm", | |
"size": "5.2M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "ebook hackers secrets.pdf", | |
"size": "493K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "excel-hacks.chm", | |
"size": "3.3M", | |
"type": "file" | |
}, | |
{ | |
"children": [ | |
{ | |
"children": [], | |
"name": "06 Advance ROP Attacks.ppt", | |
"size": "505K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "1-Stack_Based_Overflows.pdf", | |
"size": "3.1M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "1 Linux exploit writing tutorial part 1 - Stack overflow.pdf", | |
"size": "847K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "2-Writing_BufferOverflow_Exploits.pdf", | |
"size": "2.0M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "2 Linux exploit writing tutorial part 2 - Stack Overflow ASLR bypass using ret2reg.pdf", | |
"size": "762K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "3-Writing_SEH_BasedExploits-A.pdf", | |
"size": "3.5M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "3-Writing_SEH_BasedExploits-B.pdf", | |
"size": "1.3M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "3 Linux exploit development part 3 - ret2libc.pdf", | |
"size": "553K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "4-FromExploit_to_Metasploit_Basics.pdf", | |
"size": "1.8M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "4a Linux exploit development part 3 (rev 2) - Real app demo.pdf", | |
"size": "304K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "4b Linux exploit development part 2 (rev 2) - Real app demo (part 2).pdf", | |
"size": "572K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "5-Debugger modules_&_plugins_speedup.pdf", | |
"size": "2.5M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "5 Linux exploit development part 4 - ASCII armor bypass + return-to-plt.pdf", | |
"size": "600K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "6-Bypassing_StackCookies_SafeSeh_SEHOP_HWDEP_ASLR.pdf", | |
"size": "4.9M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "7-Unicode.pdf", | |
"size": "2.4M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "8-Win32_Egg_Hunting.pdf", | |
"size": "5.3M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "9-Win32_shellcoding.pdf", | |
"size": "4.9M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "10-Chaining_DEPwithROP.pdf", | |
"size": "5.9M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "11-heap-spraying-demystified.pdf", | |
"size": "7.5M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "A Buffer Overflow Study Attacks & Defenses.pdf", | |
"size": "485K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "A Guide to Kernel Exploitation Attacking the Core.pdf", | |
"size": "5.3M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "ASLR - Address Space Layout Randomization.pdf", | |
"size": "259K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "ASLR Smack_Reference.pdf", | |
"size": "509K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Advanced Windows Exploitation.pdf", | |
"size": "340K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Advanced_Windows_Debugging.pdf", | |
"size": "9.5M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Attacking the Windows Kernel.pdf", | |
"size": "294K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Bypassing Browser Memory Protections(BH08).pdf", | |
"size": "684K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Bypassing DEP with WPM & ROP.pdf", | |
"size": "334K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Chained Exploits Advanced Hacking Attacks form Start to Finish 2009.chm", | |
"size": "9.7M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Chapter02 - RuntimeAttacks.pdf", | |
"size": "6.6M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "DEPinDepth.pdf", | |
"size": "595K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Defeating DEP and ASLR.pdf", | |
"size": "1.2M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Detecting and exploiting integer overflows.pdf", | |
"size": "494K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Exploiting Format String Vulnerabilities.pdf", | |
"size": "229K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Exploiting Stack Overflows in the Linux Kernel.pdf", | |
"size": "289K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "FormatStringAttack.pdf", | |
"size": "121K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Format String Attacks.pdf", | |
"size": "217K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Gray Hat Hacking, Second Edition.pdf", | |
"size": " 13M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Guide to Kernel Exploitation.pdf", | |
"size": "5.3M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Hacking - The Art of Exploitation_2nd Ed.pdf", | |
"size": "4.4M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Hunting_Security_bugs.chm", | |
"size": " 22M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Jon.Erickson.Hacking.The.Art.Of.Exploitation.No.Starch.Press.2003.chm", | |
"size": "1.4M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "McGraw.Hill.Gray.Hat.Hacking.2nd.EdSpunkins.pdf", | |
"size": " 13M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "McGraw.Hill.Gray.Hat.Hacking.4th.Edition.pdf", | |
"size": " 32M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "McGraw.Hill.Gray.Hat.Hacking.The.Ethical.Hackers.Handbook.3rd.Edition.pdf", | |
"size": "9.2M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Metasploit - The Penetration Tester's Guide.pdf", | |
"size": "6.9M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "No.Starch.A.Bug.Hunters.Diary.Nov.2011.pdf", | |
"size": "5.2M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "No_NX.pdf", | |
"size": " 82K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Non-Executable Stack ARM Exploitation(def18).pdf", | |
"size": "230K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "On the Effectiveness of Address-Space Randomization.pdf", | |
"size": "147K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "OpenBSD Remote Exploiting.pdf", | |
"size": "256K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Practical Windows XP-2003 Heap Exploitation BH09.pdf", | |
"size": "807K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "ROPdefender_ A Detection Tool to Defend Against ROP Attacks.pdf", | |
"size": "423K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Return-oriented Programming without Returns (on the x86).pdf", | |
"size": "430K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "SEH Exploitation.pdf", | |
"size": "380K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Smashing The Stack For Fun And Profit.pdf", | |
"size": "178K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Smashing the stack in 2010.pdf", | |
"size": "2.1M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Stack Based Buffer Overflows and Protection Mechanisms.pdf", | |
"size": "502K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Syngress.Buffer.Overflow.Attacks.Dec.2004.eBook-DDU.pdf", | |
"size": "5.4M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "The.Shellcoder_s.Handbook.Discovering.and.Exploiting.Security.Holes.2nd.Edition 2007plus.pdf", | |
"size": "8.7M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "The Web Application Hackers Handbook_2E.pdf", | |
"size": " 14M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Understanding SEH Exploitation.pdf", | |
"size": "1.1M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Understanding the Low Fragmentation Heap-BH10.pdf", | |
"size": "1.1M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Unix Assembly Codes Development for Vulnerabilities.pdf", | |
"size": "274K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "gray_hat_hacking_3rd_edition.pdf", | |
"size": " 13M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "the_shellcoders_handbook.pdf", | |
"size": "8.7M", | |
"type": "file" | |
} | |
], | |
"name": "exploit-dev", | |
"size": "-", | |
"type": "dir" | |
}, | |
{ | |
"children": [ | |
{ | |
"children": [], | |
"name": "Computer Forensics.2010.pdf", | |
"size": " 10M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Computer Forensics_ Investigating Networ - EC-Council.pdf", | |
"size": " 24M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Forensic Computer Crime Investigation.pdf", | |
"size": "2.7M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Sybex.EnCase.Computer.Forensics.Study.Guide.2nd.Edition.Dec.2007.pdf", | |
"size": " 23M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Windows Forensic Analysis.pdf", | |
"size": "5.9M", | |
"type": "file" | |
} | |
], | |
"name": "forensics", | |
"size": "-", | |
"type": "dir" | |
}, | |
{ | |
"children": [ | |
{ | |
"children": [], | |
"name": "Fuzzing.pdf", | |
"size": "4.5M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Fuzzing Brute Force Vulnerability Discovery.pdf", | |
"size": " 28M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Fuzzing Making software Dumber.pdf", | |
"size": " 78K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Fuzzing_ Grammar-based Whitebox Fuzzing.pdf", | |
"size": "172K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Fuzzing_for_software_vulnerability_discovery.pdf", | |
"size": "5.6M", | |
"type": "file" | |
} | |
], | |
"name": "fuzzing", | |
"size": "-", | |
"type": "dir" | |
}, | |
{ | |
"children": [], | |
"name": "hacker-disassembling-uncovered.9781931769228.20035.chm", | |
"size": "4.7M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "hacker ethic.pdf", | |
"size": " 13M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "hacking the windows registry .pdf", | |
"size": "222K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "hacks.sfv", | |
"size": " 11K", | |
"type": "file" | |
}, | |
{ | |
"children": [ | |
{ | |
"children": [], | |
"name": "--Coke Machines Revealed--.pdf", | |
"size": " 90K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Ahmad-Reza_Sadeghi,_David_Naccache,_Pim_Tuyls-Towards_Hardware-Intrinsic_Security__Foundations_and_Practice_(Information_Security_and_Cryptography)(2010).pdf", | |
"size": "8.0M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Hacking The Cable Modem.pdf", | |
"size": " 22M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Hardware Hacking Projects for Geeks.chm", | |
"size": "5.5M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Spy Circuits.chm", | |
"size": "1.1M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Wiley Publishing, Inc - Hacking Video Game Consoles. Turn Your Old Video Game Systems into Awesom.pdf", | |
"size": " 67M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Wiley Publishing, Inc - Hacking the PSP. Cool Hacks, Mods, and Customizations for the Sony PlaySt.pdf", | |
"size": " 14M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Xbox-hack - AIM-2002-008.pdf", | |
"size": "515K", | |
"type": "file" | |
} | |
], | |
"name": "hardware hacking", | |
"size": "-", | |
"type": "dir" | |
}, | |
{ | |
"children": [], | |
"name": "mac-os-hacks.chm", | |
"size": "9.2M", | |
"type": "file" | |
}, | |
{ | |
"children": [ | |
{ | |
"children": [], | |
"name": "An Introduction To Keylogger, RATS And Malware.pdf", | |
"size": "2.1M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Black Book of Viruses and Hacking.pdf", | |
"size": "1.4M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Computer Viruses, Hacking and Malware attacks for Dummies.pdf", | |
"size": "2.6M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Malicious Bots.pdf", | |
"size": "5.8M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "The little black book of computer viruses.pdf", | |
"size": "1.4M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Worm- The First Digital World War.pdf", | |
"size": "108M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "little_black_book_oc_computer_viruses.pdf", | |
"size": "1.4M", | |
"type": "file" | |
} | |
], | |
"name": "malware", | |
"size": "-", | |
"type": "dir" | |
}, | |
{ | |
"children": [ | |
{ | |
"children": [], | |
"name": "Advance Hacking Exposed Part 6.pdf", | |
"size": " 15M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Andrew A. Vladimirov - Hacking Exposed Cisco Networks.Cisco Security Secrets AND Solutions - 2006.chm", | |
"size": "9.8M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Hacking Exposed-Network Security - Secrets & Solutions, 2nd Ed..pdf", | |
"size": "8.0M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Hacking Exposed-Network Security - Secrets & Solutions, 3rd Ed..pdf", | |
"size": "5.9M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Hacking Exposed-Network Security - Secrets & Solutions, 5th Ed..chm", | |
"size": " 19M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Hacking Exposed - Network Security Secrets & Solutions, 2nd Edition.pdf", | |
"size": " 10M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Hacking Exposed - Network Security Secrets _ Solutions, 2nd Edition.pdf", | |
"size": " 10M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Hacking Exposed-VoIP - Voice over IP Security, Secrets, & Solutions.chm", | |
"size": " 16M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Hacking Exposed-Web 2.0 - Web 2.0 Security Secrets & Solutions.pdf", | |
"size": "6.3M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Hacking Exposed-Windows - Windows Security Secrets & Solutions, 3rd Ed..pdf", | |
"size": "9.1M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Hacking Exposed-Wireless - Wireless Security Secrets & Solutions.chm", | |
"size": " 12M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Hacking Exposed. Malware and Rootkits (McGraw-Hill, 2010).pdf", | |
"size": " 10M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Hacking Exposed.pdf", | |
"size": " 16M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Hacking Exposed 7 Network Security Secre - Stuart McClure.pdf", | |
"size": " 33M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Hacking Exposed Computer Forensics 2nd Edition.pdf", | |
"size": " 12M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Hacking Exposed Malware AND Rootkits - McGrawHill - 2010.pdf", | |
"size": " 10M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Hacking Exposed Network Security Secrets & Solutions, Third Edition ch1.pdf", | |
"size": "1.9M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Hacking Exposed Web 2.0 [2008].pdf", | |
"size": "6.2M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Hacking Exposed Web Applications 3_E - Joel Scambray - McGraw-Hill Osborne Media - 2011plus.pdf", | |
"size": "6.8M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Hacking Exposed Web Applications 3rd ed - J. Scambray, et al., (McGraw-Hill, 2011) BBS.pdf", | |
"size": "6.9M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Hacking Exposed Windows, 3rd Edition.pdf", | |
"size": "9.7M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Hacking Windows Exposed.pdf", | |
"size": "8.9M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Johnny Cache, Joshua Wright, Vincent Liu - Hacking Exposed Wireless, 2 Edition 2010.pdf", | |
"size": " 11M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "MH,.Hacking.Exposed.Web.Applications.(2006),.2Ed.Spy.[0072262990].ShareConnector.chm", | |
"size": " 12M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "McGraw-Hill - Anti-Hacker Tool Kit, Second Edition.chm", | |
"size": " 29M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "McGraw-Hill - Hacking Exposed, 3rd Ed - Hacking Exposed Win2.pdf", | |
"size": "5.9M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "McGraw-Hill - Hacking Exposed, 3rd Ed - Hacking Exposed Win2K - Hacking Linux Exposed (Book Excerpts, 260 pages) - 2001 - (By Laxxuss).pdf", | |
"size": "5.9M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "McGraw-Hill - Hardening Network Infrastructure. Bulletproof Your Systems Before You Are Hacked!.chm", | |
"size": "1.6M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "McGraw-Hill - Intrusion Detection AND Prevention.chm", | |
"size": "3.1M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "McGraw-Hill - Linux and Unix Security Portable Reference.pdf", | |
"size": "3.5M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "McGraw.Hacking.Exposed.Cisco.Networks.chm", | |
"size": "9.8M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "McGraw.Hill.HackNotes.Linux.and.Unix.Security.Portable.Reference.eBook-DDU.pdf", | |
"size": "3.4M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "McGraw.Hill.HackNotes.Network.Security.Portable.Reference.eB.pdf", | |
"size": "3.6M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "McGraw.Hill.HackNotes.Web.Security.Portable.Reference.eBook-DDU.pdf", | |
"size": "3.4M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "McGraw.Hill.HackNotes.Windows.Security.Portable.Reference.eBook-DDU.pdf", | |
"size": "4.8M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "McGraw.Hill.Hacking.Exposed.Linux.Third.Edition.Jul.2008.pdf", | |
"size": " 10M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "McGraw.Hill.Hacking.Exposed.Windows.3rd.Edition.Dec.2007.pdf", | |
"size": "9.1M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "McGraw Hill - Web Applications (Hacking Exposed).pdf", | |
"size": "7.6M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "McGrawHill.Web.Application.Security.A.Beginners.Guide.pdf", | |
"size": " 61M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "ReallyUsefulEbooks.net 0072262583 McGraw.Hill.Hacking.Exposed.Wireless.Mar.2007.eBook-BBL.chm", | |
"size": " 12M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Scambray - Hacking Exposed - Windows 3E (Mcgraw, 2008)plus-.pdf", | |
"size": "8.0M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Stuart_McClure,_Joel_Scambray,_George_Kurtz_Hacking_Exposed_Network_Security_Secrets_and_Solution.pdf", | |
"size": " 15M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "hacking_exposed_6th_edition.pdf", | |
"size": " 16M", | |
"type": "file" | |
} | |
], | |
"name": "mcgraw-shit", | |
"size": "-", | |
"type": "dir" | |
}, | |
{ | |
"children": [ | |
{ | |
"children": [], | |
"name": "Attacking the DNS Protocol.pdf", | |
"size": "322K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Nmap Network Discovery III.PDF", | |
"size": "140M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Prentice.Hall.Network.Forensics.Jun.2012.pdf", | |
"size": " 20M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Routing Basics.pdf", | |
"size": " 30K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Stealing The Network - How To Own The Box.pdf", | |
"size": "3.1M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Stealing the Network - How to Own an Identity.pdf", | |
"size": "7.7M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Stealing the Network How to Own a Continent.pdf", | |
"size": "2.4M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "stealing-the-network-how-to-own-a-shadow.pdf", | |
"size": "9.1M", | |
"type": "file" | |
} | |
], | |
"name": "networking", | |
"size": "-", | |
"type": "dir" | |
}, | |
{ | |
"children": [], | |
"name": "nvidia-smi.1.pdf", | |
"size": " 49K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "oreilly,.visual.studio.hacks.(2005).ddu.lotb.chm", | |
"size": "6.4M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "oreilly.firefox.hacks.ebook-lib.chm", | |
"size": "2.7M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "oreilly.windows.xp.hacks.2nd.edition.feb.2005.lib.chm", | |
"size": " 13M", | |
"type": "file" | |
}, | |
{ | |
"children": [ | |
{ | |
"children": [], | |
"name": "Cracking_Passwords_Guide.pdf", | |
"size": "272K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Uncrackable.pdf", | |
"size": "183K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Uncrackable_Passwords.pdf", | |
"size": "442K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "cracking-sql-passwords.pdf", | |
"size": "160K", | |
"type": "file" | |
} | |
], | |
"name": "password cracking", | |
"size": "-", | |
"type": "dir" | |
}, | |
{ | |
"children": [ | |
{ | |
"children": [], | |
"name": "Advanced Penetration Testing for Highly-Secured Environments.pdf", | |
"size": " 16M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Advanced Pentesting.pdf", | |
"size": " 16M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Basics of Hacking and Penetration Testing, The (Second Edition).pdf", | |
"size": "4.5M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Coding for Penetration Testers.pdf", | |
"size": "9.9M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Ethical Hacking and Penetration Testing Guide - Baloch, Rafay.pdf", | |
"size": " 22M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Ethical Hacking and Penetration Testing Guide.pdf", | |
"size": " 22M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Ethical hacking student guide.pdf", | |
"size": "7.4M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Hack Attacks Testing.pdf", | |
"size": "9.6M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Hacking-Hugo Cornwall-The Hacker's Handbook .pdf", | |
"size": "278K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Hacking Wireless Networks For Dummies.pdf", | |
"size": " 11M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Hacking with Kali - Broad, James, Bindner, Andrew.pdf", | |
"size": "8.5M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Kali Linux- Assuring Security by Penetration Testing - Allen, Lee.pdf", | |
"size": "6.5M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Kennedy D., O'Gorman J., Kearns D., Aharoni M. - Metasploit. The Penetration Tester's Guide -.pdf", | |
"size": "6.9M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Mastering Kali Linux for Advanced Penetration Testing - Beggs, Robert.pdf", | |
"size": "9.0M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Metasploit guide.pdf", | |
"size": "6.9M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Ninja.Hacking.Unconventional.Penetration.Testing.Tactic.pdf", | |
"size": "9.9M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "OSB - Ethical Hacking (EC-Council Exam 312-50). Student Courseware.chm", | |
"size": " 14M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "OSB.Ethical.Hacking.and.Countermeasures.EC.Council.Exam.312.50.Student.Courseware.eBook-LiB.chm", | |
"size": " 14M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "OWASP Top 10 - 2010plus.pdf", | |
"size": "2.5M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Openmirrors.com__The_Basics_of_Hacking_and_Penetration_Testing__Ethical_Hacking_and_Penetration_Testing_Made_Easy.pdf", | |
"size": "3.7M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Packt.Penetration.Testing.with.the.Bash.shell.May.2014.pdf", | |
"size": "3.4M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Penentration Testing With Backtrack 5.pdf", | |
"size": "383K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Penetration Testing (2014).pdf", | |
"size": " 12M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Penetration Testing A Hands-On Introduction to Hacking.pdf", | |
"size": " 12M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Penetration Testing With BackBox.pdf", | |
"size": "3.5M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Penetration_Tester__s_Open_Source_Toolkitplus.pdf", | |
"size": " 17M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Professional Penetration Testing Creating and Operating a Formal Hacking Lab.pdf", | |
"size": "8.9M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Syngress.Coding.for.Penetration.Testers.Oct.2011.pdf", | |
"size": "9.7M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Syngress.Penetration.Testers.Open.Source.Toolkit.3rd.Edition.Aug.2011.pdf", | |
"size": " 30M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Syngress.The.Basics.of.Hacking.and.Penetration.Testing.Aug.2011.pdf", | |
"size": "6.7M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "The Basics of Hacking and Penetration Testing.pdf", | |
"size": "6.7M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "The Hacker Playbook, Practical Guide To Penetration Testing.pdf", | |
"size": " 26M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Web Penetration Testing with Kali Linux.pdf", | |
"size": " 20M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "[Gavin_Watson,_Andrew_Mason_and_Richard_Ackroyd_(A(BookZZ.org).pdf", | |
"size": " 15M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "advanced_penetration_testing_for_highly-secured_environments (1).pdf", | |
"size": " 16M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "backtrack 5 wireless penetration testing beginner's guide[nepsterjay].pdf", | |
"size": " 17M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "ethical hacking, student guide.pdf", | |
"size": "7.4M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "prentice hall - pipkin - halting the hacker- a practical guide to computer security, 2nd edition.chm", | |
"size": "639K", | |
"type": "file" | |
} | |
], | |
"name": "pentesting", | |
"size": "-", | |
"type": "dir" | |
}, | |
{ | |
"children": [ | |
{ | |
"children": [], | |
"name": "Charles.C.Thomas-Document.Security.Protecting.Physical.and.Electronic.Content.2007.RETAiL.EBook.pdf", | |
"size": "1.3M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "John.Wiley.and.Sons.The.Art.of.Intrusion.The.Real.Stories.Behind.the.Exploits.of.Hackers.Intruders.and.Deceivers.Feb.2005.ISBN0764569597.pdf", | |
"size": "3.1M", | |
"type": "file" | |
} | |
], | |
"name": "physical security", | |
"size": "-", | |
"type": "dir" | |
}, | |
{ | |
"children": [ | |
{ | |
"children": [], | |
"name": "CEHv6 Module 33 Reverse Engineering Techniques.pdf", | |
"size": "2.8M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Guide to Kernel Exploitation_ Attacking the Core, A - Perla, Enrico & Oldani, Massimiliano.pdf", | |
"size": "4.0M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "How to Crack CD Protections.pdf", | |
"size": " 30K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "IDA Pro Book.pdf", | |
"size": "9.1M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Linux Malware Incident Response_ A Practitioner's Guide ile Data - Cameron Malin & Eoghan Casey & James Aquilina.pdf", | |
"size": "5.4M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Malware Forensics Field Guide for Windows Syst Field Guides - Casey, Eoghan;Malin, Cameron H.;Aquilina, James M_.pdf", | |
"size": " 28M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "No.Starch.A.Bug.Hunters.Diary.Nov.2011.pdf", | |
"size": "5.2M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Practical Malware Analysis_ The Hands-On Guide to Dissecting Malicious Software - Sikorski, Michael & Honig, Andrew.pdf", | |
"size": " 12M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Practical Reverse Engineering_ x86, x64, ARM, Windows Kernel, Rev Obfuscation - Dang, Bruce & Gazet, Alexandre & Bachaalany, Elias.pdf", | |
"size": "3.8M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "REVERSE CODING.txt", | |
"size": " 15K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Reverse Engineering for Begginers.pdf", | |
"size": " 12M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Reversing_ Secrets of Reverse Engineering - Eilam, Eldad.pdf", | |
"size": "8.6M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "The.IDA.Pro.Book.2nd.Edition.Jun.2011.pdf", | |
"size": "9.2M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "The Ida Pro Book.pdf", | |
"size": " 26M", | |
"type": "file" | |
} | |
], | |
"name": "reverse engineering", | |
"size": "-", | |
"type": "dir" | |
}, | |
{ | |
"children": [ | |
{ | |
"children": [], | |
"name": "O'Reilly Secure Coding Principles and Practices.chm", | |
"size": "642K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "O'Reilly Security and Usability Designing Secure Systems that People Can Use.chm", | |
"size": "7.6M", | |
"type": "file" | |
} | |
], | |
"name": "secure coding", | |
"size": "-", | |
"type": "dir" | |
}, | |
{ | |
"children": [ | |
{ | |
"children": [], | |
"name": "7Deadliest Social Network Attacks.pdf", | |
"size": "4.6M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Hacking the Human.pdf", | |
"size": " 12M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Social_Engineering__The_Art_of_Human_Hacking.pdf", | |
"size": "6.1M", | |
"type": "file" | |
} | |
], | |
"name": "social engineering", | |
"size": "-", | |
"type": "dir" | |
}, | |
{ | |
"children": [ | |
{ | |
"children": [], | |
"name": "Adavanced Postgre SQL injection.pdf", | |
"size": "154K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Advanced SQL Injection.pdf", | |
"size": "183K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Advanced SQL Injection In SQL Server Applications - NGSSoftware, 2002.pdf", | |
"size": "292K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Advanced SQL Injection in SQL Applications.pdf", | |
"size": "312K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "AdvancedXSS.pdf", | |
"size": " 74K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Advanced_sql_injection.pdf", | |
"size": "291K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "An Introduction to SQL Injection - Attacks for Oracle Developers.pdf", | |
"size": "344K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Automatic creation of SQL injection and cross-site scripting attacks XSS.pdf", | |
"size": "323K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "BlackHat-Europe-09-Damele-A-G-Advanced-SQL-injection-whitepaper.pdf", | |
"size": "473K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Blind MySQL Injection.pdf", | |
"size": "306K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Blind_SQLInjection.pdf", | |
"size": "269K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Blindfolded SQL Injection.pdf", | |
"size": "300K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Blindfolded_SQL_Injection.pdf", | |
"size": "349K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "CEH v5 Module 14 SQL Injection.pdf", | |
"size": "959K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "CEHv6 Module 19 SQL Injection.pdf", | |
"size": "3.2M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Error based SQL Injection a true story.pdf", | |
"size": " 11K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Hacking - Advanced SQL Injection.pdf", | |
"size": "384K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Hacking - An Introduction To Sql Injection Attacks For Oracle Developers (Ing-24P-2003).pdf", | |
"size": "231K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Hacking Sql Injection Hack.pdf", | |
"size": "797K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Hunting Flaws in SQL Server.pdf", | |
"size": "288K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "IntegrigyIntrotoSQLInjectionAttacks.pdf", | |
"size": "231K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Manipulating Microsoft SQL Server Using SQL Injection.pdf", | |
"size": "181K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Manipulating Sql Server Using Sql Injection.pdf", | |
"size": "240K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "More Advanced SQL Injection.pdf", | |
"size": "190K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Racciati Marcelo-Tecnicas de SQL Injection - Un Repaso.pdf", | |
"size": "369K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "SQL-Injection.pdf", | |
"size": "1.0M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "SQL Injection, Are Your Web Applications Vulnerable.pdf", | |
"size": "530K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "SQL Injection - Are Your Webpages Vulnerable.pdf", | |
"size": "798K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "SQL Injection Attacks and Defense - 2009.pdf", | |
"size": "6.5M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "SQL Injection Attacks and Defense.pdf", | |
"size": "6.4M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "SQL Injection Attacks by Example.pdf", | |
"size": " 89K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "SQL Injection For Fun Profit.pdf", | |
"size": "1.5M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "SQL Injection PPT.pdf", | |
"size": "159K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "SQL Injection White Paper.pdf", | |
"size": "795K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "SQLInjectionWhitePaper.pdf", | |
"size": "797K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "SQL Injection Whitepaper - 2002 25Pages.pdf", | |
"size": "821K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "SQL Injection in Oracle Forms.pdf", | |
"size": "295K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "SQL_Hacks_November_2006.chm", | |
"size": "2.0M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "XSS.pdf", | |
"size": "141K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "XSS Evolution.pdf", | |
"size": "176K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "computer_science__sql_injection_attacks_by_example.pdf", | |
"size": "155K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "defcon-17-joseph_mccray-adv_sql_injection.pdf", | |
"size": "1.4M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "{Comp-Hack} Sql-Injection.pdf", | |
"size": "191K", | |
"type": "file" | |
} | |
], | |
"name": "sqli", | |
"size": "-", | |
"type": "dir" | |
}, | |
{ | |
"children": [], | |
"name": "tivo-hacks.100-industrial-strength-tips-and-tools.pdf", | |
"size": "8.8M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "u23_Wiley - Hacking GPS - 2005 - (By Laxxuss).pdf", | |
"size": " 10M", | |
"type": "file" | |
}, | |
{ | |
"children": [ | |
{ | |
"children": [], | |
"name": "WinXP SP1 Hack.pdf", | |
"size": "8.6K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "WindowsInternals_5ED.pdf", | |
"size": " 19M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "WindowsInternals_6thED_part1.pdf", | |
"size": " 25M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "WindowsInternals_6thED_part2.pdf", | |
"size": " 22M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Windows Server Hacks.chm", | |
"size": "1.8M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "windows_8_hacks.pdf", | |
"size": " 26M", | |
"type": "file" | |
} | |
], | |
"name": "windows", | |
"size": "-", | |
"type": "dir" | |
} | |
], | |
"name": "Infosec", | |
"size": "-", | |
"type": "dir" | |
}, | |
{ | |
"children": [ | |
{ | |
"children": [ | |
{ | |
"children": [], | |
"name": "Algebra Know-It-All (Malestrom).pdf", | |
"size": "2.0M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Bilinear_operator.html", | |
"size": " 26K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Foundations of Mathematical Logic.djvu", | |
"size": "3.0M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Introduction_to_Linear_Algebra.djvu", | |
"size": "6.3M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Jim_Hefferon_-_Linear_Algebra.pdf", | |
"size": "2.8M", | |
"type": "file" | |
} | |
], | |
"name": "Algebra", | |
"size": "-", | |
"type": "dir" | |
}, | |
{ | |
"children": [ | |
{ | |
"children": [], | |
"name": "A Course in Mathematical Analysis.pdf", | |
"size": " 35M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Academic.Press.Handbook.Of.Mathematical.Formula.And.Integrals.4th.Edition.Jan.2008.eBook-ELOHiM.pdf", | |
"size": "4.8M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Advanced Calculus 2nd Edition - Spiegel.pdf", | |
"size": "7.2M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Calculus - Early Transcendentals 6e.pdf", | |
"size": " 27M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Calculus - J. Stewart.pdf", | |
"size": " 23M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Calculus Know-It-All - Beginner to Advanced, and Everything in Between (Malestrom).pdf", | |
"size": "3.1M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Calculus Made Easy.pdf", | |
"size": "3.7M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Calculus_6th_ed_sols_manual.pdf", | |
"size": " 21M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "California Calculus.pdf", | |
"size": "2.3M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Hawaii Calculus.pdf", | |
"size": "1.8M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Michael Spivak - Calculus.pdf", | |
"size": " 21M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Tom Apostol - Calculus Vol.2 - Multi-Variable Calculus and Linear Algebra with Applications.pdf", | |
"size": " 13M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Tom Apostol - Calculus vol.1 - One-variable Calculus, with an Introduction to Linear Algebra (1975).pdf", | |
"size": " 16M", | |
"type": "file" | |
} | |
], | |
"name": "Calculus", | |
"size": "-", | |
"type": "dir" | |
}, | |
{ | |
"children": [ | |
{ | |
"children": [], | |
"name": "Benjamin_C._Pierce-Advanced_topics_in_types_and_programming_languages-The_MIT_Press(2004).pdf", | |
"size": "9.1M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Benjamin_C._Pierce-Types_and_Programming_Languages-The_MIT_Press(2002).pdf", | |
"size": " 13M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Computer Science An Overview, 11e.pdf", | |
"size": "6.2M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Concrete Mathematics A Foundation for Computer Science~tqw~_darksiderg.pdf", | |
"size": "5.3M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Discrete Math in Computer Science - Bogart , Stein.pdf", | |
"size": "1.7M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Foundations of Computer Science.pdf", | |
"size": "506K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "MIT Math For Computer Science.html", | |
"size": " 28K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Springer - Mathematical Methods In Computer Science.pdf", | |
"size": "3.3M", | |
"type": "file" | |
} | |
], | |
"name": "Comp Sci Math", | |
"size": "-", | |
"type": "dir" | |
}, | |
{ | |
"children": [ | |
{ | |
"children": [], | |
"name": "Computer Arithmetic__netbks.com.pdf", | |
"size": "4.6M", | |
"type": "file" | |
} | |
], | |
"name": "Computer Arithmetic", | |
"size": "-", | |
"type": "dir" | |
}, | |
{ | |
"children": [], | |
"name": "Concrete Mathematics 2e.pdf", | |
"size": "2.8M", | |
"type": "file" | |
}, | |
{ | |
"children": [ | |
{ | |
"children": [], | |
"name": "Electrical Engineering know it all.pdf", | |
"size": "6.9M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Mechanical Engineering Principles.pdf", | |
"size": "2.6M", | |
"type": "file" | |
} | |
], | |
"name": "Digital Engineering", | |
"size": "-", | |
"type": "dir" | |
}, | |
{ | |
"children": [ | |
{ | |
"children": [], | |
"name": "Geometry.pdf", | |
"size": "466K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Heath-Thirteen Books of Euclid's Elements. Books I-II. Volume 1-Cambridge.pdf", | |
"size": " 20M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Heath-Thirteen Books of Euclid's Elements. Books III-IX. Volume 2-Cambridge.pdf", | |
"size": " 17M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Heath-Thirteen Books of Euclid's Elements. Books X-XIII. Volume 3-Cambridge.pdf", | |
"size": " 20M", | |
"type": "file" | |
} | |
], | |
"name": "Geometry", | |
"size": "-", | |
"type": "dir" | |
}, | |
{ | |
"children": [ | |
{ | |
"children": [], | |
"name": "Elementary Linear Algebra.pdf", | |
"size": "890K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Linear Algebra - Jim Heffeson.pdf", | |
"size": "2.9M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Linear Algebra and its Applns 4th ed (intro txt) - D. Lay (Pearson, 2012) BBS.pdf", | |
"size": "133M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "New Linear Algebra.pdf", | |
"size": "1.5M", | |
"type": "file" | |
} | |
], | |
"name": "Linear Algebra", | |
"size": "-", | |
"type": "dir" | |
}, | |
{ | |
"children": [], | |
"name": "Mathmatical Expressions For Dummies.pdf", | |
"size": "215K", | |
"type": "file" | |
}, | |
{ | |
"children": [ | |
{ | |
"children": [], | |
"name": "Introduction to Matrix Algebra.pdf", | |
"size": "9.4M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Matrix Algebra - Kaw.pdf", | |
"size": "641K", | |
"type": "file" | |
} | |
], | |
"name": "Matrix Algebra", | |
"size": "-", | |
"type": "dir" | |
}, | |
{ | |
"children": [], | |
"name": "Sol Discrete and Combinatorial Mathematics 5ed R. Grimaldi Part 1 BZUPAGES.COM.pdf", | |
"size": " 21M", | |
"type": "file" | |
}, | |
{ | |
"children": [ | |
{ | |
"children": [], | |
"name": "A Course in Mathematical Statistics 2nd edition.pdf", | |
"size": "2.7M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Introduction to Probability and Statistics.pdf", | |
"size": "4.4M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Introduction to Probability and Statistics for Engineers and Scientists 0125980574.pdf", | |
"size": "2.3M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "OReilly.Statistics.in.a.Nutshell.A.Desktop.Quick.Reference.Aug.2008.pdf", | |
"size": "4.5M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Statistics For Dummies.chm", | |
"size": "3.4M", | |
"type": "file" | |
} | |
], | |
"name": "Statistics", | |
"size": "-", | |
"type": "dir" | |
}, | |
{ | |
"children": [ | |
{ | |
"children": [], | |
"name": "TrigMecMathBook.pdf", | |
"size": "1.7M", | |
"type": "file" | |
} | |
], | |
"name": "Trigonemetry", | |
"size": "-", | |
"type": "dir" | |
}, | |
{ | |
"children": [ | |
{ | |
"children": [], | |
"name": "Vector Calc-Calc 3.pdf", | |
"size": "2.4M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Vector Calc Open Math.pdf", | |
"size": "3.2M", | |
"type": "file" | |
} | |
], | |
"name": "Vector Calculus", | |
"size": "-", | |
"type": "dir" | |
} | |
], | |
"name": "Maths", | |
"size": "-", | |
"type": "dir" | |
}, | |
{ | |
"children": [ | |
{ | |
"children": [], | |
"name": "A+.zip", | |
"size": "9.8M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "A+ Certification For Dummies, 3rd Edition.chm", | |
"size": "6.9M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "A+ Certification for Dummies, 2nd Edition.pdf", | |
"size": "3.0M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "ACT! 2005 for Dummies.pdf", | |
"size": " 10M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "A Primer on Scientific Programming with Python (2009).pdf", | |
"size": "6.8M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Access Forms & Reports for Dummies.pdf", | |
"size": " 11M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Adobe Acrobat 6 PDF For Dummies.pdf", | |
"size": "8.4M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Adobe Creative Suite 2 All-in-One Desk Reference for Dummies.pdf", | |
"size": " 20M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Adobe Creative Suite All-In-One Desk Reference For Dummies.chm", | |
"size": " 29M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Adobe Illustrator 10 for Dummies.pdf", | |
"size": "1.7M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Adobe Illustrator CS for Dummies (2004).chm", | |
"size": " 17M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Adobe Premiere Elements For Dummies.pdf", | |
"size": " 15M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "All Robotics and Mechatronics Books (Total 50 Books).uif", | |
"size": "518M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Allen.and.Unwin-The.UFO.Diaries.Travels.in.the.Weird.World.of.High.Strangeness.2011.RETAiL.EBook.pdf", | |
"size": "2.7M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "An Introduction to Computational Physics, Second Edition.pdf", | |
"size": "5.2M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Anarchist's Cookbook.txt", | |
"size": "949K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Artech.House-3D.and.HD.Broadband.Video.Networking.2010.RETAiL.EBook.pdf", | |
"size": "7.0M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Art of Designing Embedded Systems~tqw~_darksiderg.pdf", | |
"size": "3.6M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "AutoCAD 2004 for Dummies.chm", | |
"size": " 12M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "AutoCAD 2005 For Dummies (May 2004).pdf", | |
"size": " 12M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Auto Repair for Dummies.pdf", | |
"size": " 45M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Bea WebLogic Server 8 For Dummies (2003).pdf", | |
"size": "7.5M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Beginning Programming for Dummies, 3rd Edition.pdf", | |
"size": " 44M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Betty Crocker Cookie Book Recipes.pdf", | |
"size": "849K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "BitTorrent for Dummies.pdf", | |
"size": "793K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "BlackBerry for Dummies.pdf", | |
"size": "9.2M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Blocking Spam & Spyware for Dummies.pdf", | |
"size": "6.0M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Blogging for Dummies.pdf", | |
"size": " 16M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Building Research Tools With Google for Dummies (2005).pdf", | |
"size": " 11M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Building Your Business with Google for Dummies.pdf", | |
"size": " 15M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Building a Web Site for Dummies, 2nd Edition.pdf", | |
"size": " 13M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Buying A Computer For Dummies (2004).pdf", | |
"size": "3.5M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Buying a Computer for Dummies (2005).pdf", | |
"size": "5.9M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Buying a Computer for Dummies (2006).pdf", | |
"size": "7.9M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Buzz Marketing With Blogs For Dummies.pdf", | |
"size": " 13M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "CCNA For Dummies (2000).pdf", | |
"size": "1.1M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "CRC.-.Implementing.and.Developing.Cloud.Computing.Applications.pdf", | |
"size": "7.0M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "CRC.Press-Introduction.to.Supply.Chain.Management.Technologies.2010.RETAiL.EBook.pdf", | |
"size": "4.7M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "CRC.Press-Leadership.Principles.for.Project.Success.2010.RETAiL.EBook.pdf", | |
"size": "2.9M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "CRC.Press-Lean.IT.Enabling.and.Sustaining.Your.Lean.Transformation.2010.RETAiL.EBook.pdf", | |
"size": "4.1M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Cambridge.University.Press-How.Well.Do.Facts.Travel.2010.RETAiL.EBook.pdf", | |
"size": "4.8M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Cambridge.University.Press-Human.Attention.in.Digital.Environments.2011.RETAiL.EBook.pdf", | |
"size": "3.0M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Cambridge.University.Press-Light.and.Photosynthesis.in.Aquatic.Ecosystems.2010.RETAiL.EBook.pdf", | |
"size": "8.1M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Camera Raw with Photoshop for Dummies.pdf", | |
"size": " 33M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Car Hacks And Mods For Dummies (2004).pdf", | |
"size": "5.2M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Cengage-Increase.Your.Web.Traffic.In.a.Weekend.2010.RETAiL.EBook.pdf", | |
"size": "9.9M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Cengage-Lego.Mindstorms.NXT.2.0.for.Teens.2011.RETAiL.EBook.pdf", | |
"size": "7.7M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Cengage-Secrets.of.Corel.Painter.Experts.Tips.Techniques.and.Insights.for.Users.of.All.Abilities.2010.RETAiL.EBook.pdf", | |
"size": " 30M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Cengage-SharePoint.2010.Disaster.Recovery.Guide.2010.RETAiL.EBook.pdf", | |
"size": "8.2M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Cengage-Take.Your.iPad.to.Work.2010.RETAiL.EBook.pdf", | |
"size": " 34M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Cisco.-.Computer.Incident.Response.and.Product.Security.pdf", | |
"size": "1.2M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Cleaning and Stain Removal for Dummies.pdf", | |
"size": "5.6M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Cooking - Delicious Sandwich Recipes.pdf", | |
"size": "4.4M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Creating Family Web Sites For Dummies.pdf", | |
"size": " 17M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Creating Web Pages All-in-One Desk Reference for Dummies, 2nd Edition.pdf", | |
"size": " 18M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Creating Web Pages for Dummies, 7th Edition.pdf", | |
"size": "9.6M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Crockpot Recipes.pdf", | |
"size": " 33K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Crystal Reports 10 For Dummies.pdf", | |
"size": " 10M", | |
"type": "file" | |
}, | |
{ | |
"children": [ | |
{ | |
"children": [], | |
"name": "Amacom - Accounting Demystified (2004).pdf", | |
"size": "755K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Capacitors Demystified.pdf", | |
"size": " 48K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Demystifying Six Sigma.pdf", | |
"size": "737K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Digital Frequency Synthesis Demystified.pdf", | |
"size": "4.8M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Embedded Systems Firmware Demystified.pdf", | |
"size": "1.0M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Finance - Accounting Demystified.pdf", | |
"size": "1.0M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Gillam - Unicode Demystified.chm", | |
"size": "3.6M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Govindavajhala & Appel - Windows Access Control Demystified.pdf", | |
"size": "228K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Macromedia Flash MX Game Design Demystified.pdf", | |
"size": "9.2M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "McGraw-Hill - ASP.NET 2.0 Demystified.pdf", | |
"size": " 18M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "McGraw-Hill - Algebra Demystified.pdf", | |
"size": "1.6M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "McGraw-Hill - Astronomy Demystified.pdf", | |
"size": " 30M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "McGraw - Hill - Biology Demystified (2003).pdf", | |
"size": "7.8M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "McGraw-Hill - Business Calculus Demystified (2006).pdf", | |
"size": "5.3M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "McGraw-Hill - Business Statistics Demystified.pdf", | |
"size": "5.9M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "McGraw-Hill - C++ Demystified (2004).pdf", | |
"size": "6.0M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "McGraw-Hill - CD-R DVD Disc Recording Demystified (2000).pdf", | |
"size": " 21M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "McGraw-Hill - C Demystified.pdf", | |
"size": "6.0M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "McGraw-Hill - Calculus Demystified.pdf", | |
"size": "3.8M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "McGraw-Hill - Chemistry Demystified (2003).pdf", | |
"size": " 63M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "McGraw-Hill - Computer Telephony Demystified.pdf", | |
"size": "6.1M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "McGraw-Hill - DVD Demystified.pdf", | |
"size": "6.6M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "McGraw-Hill - Data Structures Demystified.chm", | |
"size": "2.8M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "McGraw-Hill - Databases Demystified (2004).pdf", | |
"size": "9.4M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "McGraw-Hill - Differential Equations Demystified.pdf", | |
"size": "4.9M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "McGraw-Hill - Digital Electronics Demystified (2004).pdf", | |
"size": " 14M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "McGraw-Hill - Electricity Demystified.pdf", | |
"size": "4.7M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "McGraw-Hill - Electronics Demystified.pdf", | |
"size": "4.1M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "McGraw-Hill - Environmental Science Demystified (2005).pdf", | |
"size": "3.1M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "McGraw-Hill - Everyday Math Demystified.pdf", | |
"size": "7.0M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "McGraw-Hill - Geometry Demystified.pdf", | |
"size": "5.4M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "McGraw-Hill - Investing Demystified (2005).pdf", | |
"size": "4.4M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "McGraw-Hill - Math Proofs Demystified (2005).pdf", | |
"size": "2.6M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "McGraw-Hill - Math Word Problems Demystified.pdf", | |
"size": " 18M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "McGraw-Hill - Microbiology Demystified.pdf", | |
"size": "2.8M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "McGraw-Hill - Nanotechnology Demystified (2006).pdf", | |
"size": "5.0M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "McGraw-Hill - OOP Demystified.pdf", | |
"size": "3.3M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "McGraw-Hill - Options Demystified.pdf", | |
"size": "3.4M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "McGraw-Hill - Pharmacology Demystified.pdf", | |
"size": "4.9M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "McGraw-Hill - Physics Demystified.pdf", | |
"size": "2.6M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "McGraw-Hill - Pre-Algebra Demystified.pdf", | |
"size": "3.9M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "McGraw-Hill - Probability Demystified.pdf", | |
"size": "2.8M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "McGraw-Hill - Quality Management Demystified.pdf", | |
"size": "4.4M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "McGraw-Hill - Quantum Mechanics Demystified (2006).pdf", | |
"size": "9.6M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "McGraw-Hill - Relativity Demystified.pdf", | |
"size": "5.2M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "McGraw-Hill - Robotics Demystified.pdf", | |
"size": "6.5M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "McGraw-Hill - SIP Demystified (2002).pdf", | |
"size": "5.2M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "McGraw-Hill - Streaming Media Demystified.pdf", | |
"size": "4.6M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "McGraw-Hill - Technical Math Demystified.pdf", | |
"size": "5.3M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "McGraw-Hill - Telecommunications Demystified.pdf", | |
"size": "2.4M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "McGraw-Hill - Trigonometry Demystified.pdf", | |
"size": "4.3M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "McGraw-Hill - Visual C# 2005 Demystified.pdf", | |
"size": " 10M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "McGraw-Hill - Wireless Data Demystified.pdf", | |
"size": "5.2M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "McGraw Hill - College Algebra Demystified (2004).pdf", | |
"size": "6.0M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "McGraw Hill - Wireless Data Demystified (2003).pdf", | |
"size": "2.9M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Mcgraw-Hill - Bluetooth Demystified.pdf", | |
"size": " 11M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Mcgraw-Hill - Javascript Demystified (2006).pdf", | |
"size": "6.4M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Mcgraw Hill - Pre-Calculus Demystified 2005.pdf", | |
"size": "7.1M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Nvidia Corporation - 3D Graphics Demystified.pdf", | |
"size": "558K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "PCI Bus Demystified.pdf", | |
"size": "1.8M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "The Fast Fourier Transform Demystified.pdf", | |
"size": " 17K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "The Gyroscope Demystified, how it works.pdf", | |
"size": " 68K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Video Demystified - A Handbook for the Digital Engineer 3ed.pdf", | |
"size": "6.5M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Wavelet Theory Demystified.pdf", | |
"size": "855K", | |
"type": "file" | |
} | |
], | |
"name": "Demystified Series", | |
"size": "-", | |
"type": "dir" | |
}, | |
{ | |
"children": [], | |
"name": "Digital Art Photography for Dummies.pdf", | |
"size": " 36M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Digital Video for Dummies.pdf", | |
"size": " 13M", | |
"type": "file" | |
}, | |
{ | |
"children": [ | |
{ | |
"children": [], | |
"name": "O'Reilly Dreamweaver CS3 The Missing Manual.pdf", | |
"size": " 23M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "O'Reilly Dreamweaver In a Nutshell.chm", | |
"size": "3.7M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "O'Reilly Dreamweaver MX 2004 The Missing Manual.chm", | |
"size": " 15M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "O'Reilly Dynamic Learning Dreamweaver CS3.chm", | |
"size": " 72M", | |
"type": "file" | |
} | |
], | |
"name": "Dreamweaver", | |
"size": "-", | |
"type": "dir" | |
}, | |
{ | |
"children": [], | |
"name": "Dreamweaver 8 For Dummies (Oct 2005).pdf", | |
"size": " 16M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Dungeons and Dragons for Dummies (2005).pdf", | |
"size": " 13M", | |
"type": "file" | |
}, | |
{ | |
"children": [ | |
{ | |
"children": [], | |
"name": "O'Reilly Eclipse A Java Developers Guide.pdf", | |
"size": "5.2M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "O'Reilly Eclipse Cookbook.chm", | |
"size": "5.5M", | |
"type": "file" | |
} | |
], | |
"name": "Eclipse", | |
"size": "-", | |
"type": "dir" | |
}, | |
{ | |
"children": [], | |
"name": "Eclipse for Dummies (2005).pdf", | |
"size": " 11M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Elsevier-Digital.Restoration.from.Start.to.Finish.2010.RETAiL.EBook.pdf", | |
"size": " 32M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Elsevier.-.Portable.Video.ENG.and.EFP.5th.Edition.pdf", | |
"size": " 26M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Emerald-Collaborative.Digitization.Programs.2005.RETAiL.EBook.pdf", | |
"size": "3.6M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Encyclopedia of Computer Science and Technology - (Malestrom).pdf", | |
"size": "8.8M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Europe For Dummies, 3rd Edition (2005).pdf", | |
"size": " 17M", | |
"type": "file" | |
}, | |
{ | |
"children": [ | |
{ | |
"children": [], | |
"name": "O'Reilly Excel 2003 Programming A Developer's Notebook.chm", | |
"size": "6.8M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "O'Reilly Excel 2007 The Missing Manual.chm", | |
"size": " 23M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "O'Reilly Excel 2007 for Starters The Missing Manual.chm", | |
"size": "7.9M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "O'Reilly Excel Hacks (2nd Edition).pdf", | |
"size": "7.0M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "O'Reilly Excel Scientific and Engineering Cookbook.chm", | |
"size": "9.7M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "O'Reilly Excel for Starters The Missing Manual.chm", | |
"size": "4.0M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "O'Reilly Programming Excel with VBA and .NET.chm", | |
"size": "8.8M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "O'Reilly Writing Excel Macros with VBA (2nd Edition).pdf", | |
"size": "5.7M", | |
"type": "file" | |
} | |
], | |
"name": "Excel", | |
"size": "-", | |
"type": "dir" | |
}, | |
{ | |
"children": [], | |
"name": "Excel Timesaving Techniques for Dummies (2005).pdf", | |
"size": " 15M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Excel Workbook For Dummies (Apr 2006).pdf", | |
"size": "8.0M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Fighting Spam for Dummies (2004).chm", | |
"size": "3.6M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Firewalls For Dummies, 2nd Edition.pdf", | |
"size": "7.8M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Francis Glassborow & Roberta Allen - A Beginner's Introduction to Computer Programming.pdf", | |
"size": "4.2M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "GPS for Dummies.pdf", | |
"size": " 18M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Garbage Collection Algorithms For Automatic Dynamic Memory Management - Richard Jones.pdf", | |
"size": " 14M", | |
"type": "file" | |
}, | |
{ | |
"children": [ | |
{ | |
"children": [], | |
"name": "O'Reilly Google Advertising Tools Cashing in with AdSense, AdWords, and the Google APIs.chm", | |
"size": "5.2M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "O'Reilly Google Apps Hacks.chm", | |
"size": " 12M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "O'Reilly Google Hacks (3rd Edition).chm", | |
"size": "5.6M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "O'Reilly Google The Missing Manual (2nd Edition).chm", | |
"size": " 16M", | |
"type": "file" | |
} | |
], | |
"name": "Google", | |
"size": "-", | |
"type": "dir" | |
}, | |
{ | |
"children": [], | |
"name": "Google For Dummies (2003).chm", | |
"size": " 29M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Google Search Rescue For Dummies (Aug 2005).pdf", | |
"size": " 18M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "HDTV for Dummies.pdf", | |
"size": "4.7M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "HTML 4 for Dummies, 4th Edition.pdf", | |
"size": "8.1M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Ham Radio for Dummies (Apr 2004).pdf", | |
"size": "8.7M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Home Networking For Dummies.pdf", | |
"size": "873K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "IBM Workplace Services Express For Dummies (Mar 2006).pdf", | |
"size": " 11M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "ISR.Encyclopedia.Of.Information.Science.And.Technology.2nd.Edition.Sep.2008.eBook-ELOHiM.pdf", | |
"size": " 37M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "ISR.Encyclopedia.Of.Multimedia.Technology.And.Networking.2nd.Edition.Sep.2008.eBook-ELOHiM.pdf", | |
"size": " 15M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "IT.Governance.Publishing-Agile.Productivity.Unleashed.2010.RETAiL.EBook.pdf", | |
"size": "2.3M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "IT.Governance.Publishing-Changing.the.IT.Leaders.Mindset.2010.RETAiL.EBook.pdf", | |
"size": "3.1M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "IT.Governance.Publishing-Computer.Forensics.A.Pocket.Guide.2010.RETAiL.EBook.pdf", | |
"size": "1.2M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "IT.Governance.Publishing-Cyber.Risks.for.Business.Professionals.A.Management.Guide.2010.RETAiL.EBook.pdf", | |
"size": "935K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "IT.Governance.Publishing-E-mail.Security.A.Pocket.Guide.2010.RETAiL.EBook.pdf", | |
"size": "1.1M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "IT.Governance.Publishing-Security.The.Human.Factor.2010.RETAiL.EBook.pdf", | |
"size": "423K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Interaction Design - Beyond Human-Computer Interaction (1st edition).pdf", | |
"size": " 19M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Internet Explorer Construction Kit for Dummies.pdf", | |
"size": " 11M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Investing Online for Dummies, 5th Edition.pdf", | |
"size": "7.9M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "IronPython in Action (2009).pdf", | |
"size": " 14M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Jakarta Struts for Dummies.pdf", | |
"size": "8.9M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "John_C._Lilly-Programming_and_Metaprogramming_in_the_Human_Biocomputer__Theory_and_Experiments____-Three_Rivers_Press_Julian_Press(1972).pdf", | |
"size": "364K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Laptops for Dummies.pdf", | |
"size": "6.6M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Macromedia Flash 8 For Dummies (Nov 2005).pdf", | |
"size": "9.9M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Macromedia Studio 8 All-in-One Desk Reference for Dummies.pdf", | |
"size": " 20M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Macromedia Studio MX 2004 All-in-One Desk Reference for Dummies.pdf", | |
"size": " 13M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Maindonald, Using R.pdf", | |
"size": "1.4M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Making Embedded Systems.zip", | |
"size": " 12M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Malicious Cryptography - Exposing Cryptovirology.pdf", | |
"size": " 29M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Managing Your Business with Outlook 2003 for Dummies.pdf", | |
"size": "9.7M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Marshall.Cavendish-Geese.2011.RETAiL.EBook.pdf", | |
"size": "6.1M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Marshall.Cavendish-Raccoons.2011.RETAiL.EBook.pdf", | |
"size": "6.6M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Mc.Graw.Hill.-.How.to.Do.Everything.Netbook.pdf", | |
"size": " 28M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "McGrawHill-500.AP.English.Language.Questions.to.Know.by.Test.Day.2010.RETAiL.EBook.pdf", | |
"size": "939K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "McGrawHill-500.AP.English.Literature.Questions.to.Know.By.Test.Day.2010.RETAiL.EBook.pdf", | |
"size": "1.0M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "McGrawHill-500.AP.Psychology.Questions.to.Know.by.Test.Day.2010.RETAiL.EBook.pdf", | |
"size": "773K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "McGrawHill-500.AP.U.S.History.Questions.to.Know.by.Test.Day.2010.RETAiL.EBook.pdf", | |
"size": "1.0M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "McGrawHill-Cosmetic.Dermatology.Principles.and.Practice.2009.RETAiL.EBook.pdf", | |
"size": " 18M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "McGrawHill-Electricity.Experiments.You.Can.Do.At.Home.2010.RETAiL.EBook.pdf", | |
"size": "2.0M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "McGrawHill-IT.Auditing.Using.Controls.to.Protect.Information.Assets.2011.RETAiL.EBook.pdf", | |
"size": "7.8M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "McGrawHill-Microsoft.Office.Outlook.2010.QuickSteps.2010.RETAiL.EBook.pdf", | |
"size": " 14M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "McGrawHill-PICAXE.Microcontroller.Projects.for.the.Evil.Genius.2010.RETAiL.EBook.pdf", | |
"size": " 10M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Microsoft Money 2006 For Dummies (Sep 2005).pdf", | |
"size": "9.6M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Microsoft SQL Server 2005 Reporting Services for Dummies.pdf", | |
"size": " 11M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Microsoft Visual Studio .NET C++ for Dummies Quick Reference Guide.pdf", | |
"size": " 11M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "MindManager for Dummies.pdf", | |
"size": " 13M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Mobile Computing Concepts, Methodologies, Tools, and Applications-C00KIEEE.pdf", | |
"size": " 95M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Modern Control Theory.pdf", | |
"size": "1.9M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "New.Society.Publishers-Wind.Power.Basics.A.Green.Energy.Guide.2010.RETAiL.EBook.pdf", | |
"size": "3.0M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "No Starch Press - Cisco Routers for The Desperate.pdf", | |
"size": " 15M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "No Starch Press - Cult of Mac.pdf", | |
"size": " 34M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "No Starch Press - Cult of iPod.pdf", | |
"size": "7.1M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "No Starch Press - Just Say No to Microsoft How to Ditch Microsoft and Why Its Not as Hard as You Think.pdf", | |
"size": " 33M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "No Starch Press - Practical Packet Analysis.pdf", | |
"size": " 11M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "No Starch Press - Steal This Computer Book 3 What They Won't Tell You About the Internet.chm", | |
"size": " 14M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "No Starch Press - Steal This File Sharing Book - What They Won't Tell You About File Sharing.chm", | |
"size": " 17M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "No Starch Press - The Book Of VMware - The Complete Guide To VMware Workstation.pdf", | |
"size": "1.6M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "No Starch Press - The Book of Overclocking Tweak Your PC to Unleash Its Power.chm", | |
"size": "5.6M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "No Starch Press - The Book of Overclocking Tweak Your PC to Unleash Its Power.pdf", | |
"size": "2.8M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "No Starch Press - The Book of SAX.pdf", | |
"size": "1.2M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "No Starch Press - The Book of VMware.pdf", | |
"size": "1.4M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "No Starch Press - The Book of Visual Studio.NET.pdf", | |
"size": "4.9M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "No Starch Press - The Web Programmer's Desk Reference.chm", | |
"size": "1.2M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "No Starch Press - Webbots Spiders and Screen Scrapers.chm", | |
"size": "2.3M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Numerical Methods in Engineering with Python (2005).pdf", | |
"size": "7.1M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Numerical Recipes in C The Art of Scientific Computing 2nd Ed - William H. Press.pdf", | |
"size": " 19M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "O'Reilly - Beautiful Code.chm", | |
"size": "4.8M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "O'Reilly - Mastering Regular Expressions.pdf", | |
"size": "3.9M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "O'Reilly A+, Network+, Security+ Exams in a Nutshell.pdf", | |
"size": "5.8M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "O'Reilly Analyzing Business Data with Excel.chm", | |
"size": "6.5M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "O'Reilly Ant The Definitive Guide.pdf", | |
"size": "2.9M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "O'Reilly Apollo for Adobe Flex Developers Pocket Guide.chm", | |
"size": "367K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "O'Reilly AppleScript The Definitive Guide.chm", | |
"size": "1.8M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "O'Reilly Asterisk The Future of Telephony (2nd Edition).pdf", | |
"size": "3.9M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "O'Reilly BLAST.chm", | |
"size": "1.4M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "O'Reilly Building the Perfect PC (2nd Edition).chm", | |
"size": " 18M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "O'Reilly Content Syndication with RSS.chm", | |
"size": "611K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "O'Reilly Database Nation The Death of Privacy in the 21st Century.pdf", | |
"size": "6.1M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "O'Reilly Delphi In a Nutshell.pdf", | |
"size": " 25M", | |
"type": "file" | |
}, | |
{ | |
"children": [ | |
{ | |
"children": [], | |
"name": "O'Reilly Designing Active Server Pages.pdf", | |
"size": "2.0M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "O'Reilly Designing Enterprise Applications with Java 2 Enterprise Edition.pdf", | |
"size": "5.3M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "O'Reilly Designing Large-Scale LANs.pdf", | |
"size": "2.0M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "O'Reilly Designing Web Navigation.pdf", | |
"size": " 17M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "O'Reilly Developing ASP Components (2nd Edition).pdf", | |
"size": "9.5M", | |
"type": "file" | |
} | |
], | |
"name": "O'Reilly Designing Series", | |
"size": "-", | |
"type": "dir" | |
}, | |
{ | |
"children": [], | |
"name": "O'Reilly Digital Photography Pocket Guide.pdf", | |
"size": "2.1M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "O'Reilly Don't Get Burned On eBay.chm", | |
"size": "1.9M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "O'Reilly Enterprise SOA Designing IT for Business Innovation.chm", | |
"size": "6.2M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "O'Reilly Fonts & Encodings.pdf", | |
"size": " 21M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "O'Reilly Free as in Freedom.pdf", | |
"size": "1.1M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "O'Reilly GNU Emacs Pocket Reference.pdf", | |
"size": "234K", | |
"type": "file" | |
}, | |
{ | |
"children": [ | |
{ | |
"children": [], | |
"name": "O'Reilly Astronomy Hacks.chm", | |
"size": " 17M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "O'Reilly BSD Hacks.chm", | |
"size": "1.0M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "O'Reilly Baseball Hacks.chm", | |
"size": "4.0M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "O'Reilly Big Book of Windows Hacks.pdf", | |
"size": " 74M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "O'Reilly Digital Photography Hacks.chm", | |
"size": " 12M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "O'Reilly Greasemonkey Hacks.chm", | |
"size": "7.8M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "O'Reilly Knoppix Hacks (2nd Edition).pdf", | |
"size": "3.3M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "O'Reilly Mapping Hacks.chm", | |
"size": " 34M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "O'Reilly Mind Performance Hacks.chm", | |
"size": "937K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "O'Reilly PDF Hacks.chm", | |
"size": "3.5M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "O'Reilly PSP Hacks.chm", | |
"size": "3.9M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "O'Reilly Palm & Treo Hacks.chm", | |
"size": "2.1M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "O'Reilly Podcasting Hacks.chm", | |
"size": "5.5M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "O'Reilly Retro Gaming Hacks.chm", | |
"size": "3.0M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "O'Reilly TiVo Hacks.chm", | |
"size": "5.8M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "O'Reilly eBay Hacks (2nd Edition).chm", | |
"size": "3.4M", | |
"type": "file" | |
} | |
], | |
"name": "O'Reilly Hacks Series", | |
"size": "-", | |
"type": "dir" | |
}, | |
{ | |
"children": [], | |
"name": "O'Reilly Harnessing Hibernate.chm", | |
"size": "5.2M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "O'Reilly Hibernate A Developer's Notebook.chm", | |
"size": "1.2M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "O'Reilly Internet Core Protocols The Definitive Guide.chm", | |
"size": " 11M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "O'Reilly Internet Forensics.chm", | |
"size": "844K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "O'Reilly JBoss 3.2 Workbook for Enterprise JavaBeans (3rd Edition).pdf", | |
"size": "1.0M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "O'Reilly JBoss A Developer's Notebook.chm", | |
"size": "1.9M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "O'Reilly Jakarta Commons Cookbook.chm", | |
"size": "631K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "O'Reilly Jakarta Struts.pdf", | |
"size": "1.9M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "O'Reilly Kerberos The Definitive Guide.chm", | |
"size": "1.5M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "O'Reilly LINQ Pocket Reference.chm", | |
"size": "1.7M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "O'Reilly LINQ The Future of Data Access in C Sharp 3.0.chm", | |
"size": "146K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "O'Reilly Lex and Yacc.pdf", | |
"size": " 16M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "O'Reilly MP3 The Definitive Guide.pdf", | |
"size": "3.8M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "O'Reilly Macromedia Lingo In a Nutshell.pdf", | |
"size": "1.0M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "O'Reilly Managing Projects with GNU Make (3rd Edition).pdf", | |
"size": "2.6M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "O'Reilly Managing Security with Snort and IDS Tools.chm", | |
"size": "1.7M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "O'Reilly Managing and Using MySQL (2nd Edition).chm", | |
"size": "914K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "O'Reilly Managing the Windows 2000 Registry.pdf", | |
"size": "3.1M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "O'Reilly Peer-To-Peer Harnessing the Power of Disruptive Technologies.pdf", | |
"size": "2.1M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "O'Reilly Practical RDF.chm", | |
"size": "1.8M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "O'Reilly RELAX NG.chm", | |
"size": "945K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "O'Reilly Repairing and Upgrading Your PC.chm", | |
"size": "5.6M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "O'Reilly SAX2.pdf", | |
"size": "2.3M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "O'Reilly SOA in Practice.pdf", | |
"size": "3.2M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "O'Reilly SVG Essentials.pdf", | |
"size": " 13M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "O'Reilly Search Engine Optimization.chm", | |
"size": "109K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "O'Reilly Snort Cookbook.chm", | |
"size": "2.5M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "O'Reilly Switching to VoIP.chm", | |
"size": "3.4M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "O'Reilly The OpenBSD 4.0 Crash Course.chm", | |
"size": "145K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "O'Reilly Tomcat The Definitive Guide (2nd Edition).pdf", | |
"size": "5.0M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "O'Reilly UML 2.0 In a Nutshell.chm", | |
"size": "2.8M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "O'Reilly Using Moodle (2nd Edition).pdf", | |
"size": "4.5M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "O'Reilly Version Control with Subversion.chm", | |
"size": "682K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "O'Reilly Virtual Private Networks (2nd Edition).pdf", | |
"size": "1.7M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "O'Reilly Visualizing Data.pdf", | |
"size": "5.8M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "O'Reilly WebLogic The Definitive Guide.chm", | |
"size": "1.8M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "O'Reilly XForms Essentials.chm", | |
"size": "686K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "O'Reilly X Power Tools.pdf", | |
"size": "2.4M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "O'Reilly iPod and iTunes The Missing Manual (2nd Edition).chm", | |
"size": " 12M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "OReilly.-.Best.Android.Apps.pdf", | |
"size": "104M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "OReilly.FBML.Essentials.Jul.2008.pdf", | |
"size": "2.8M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "OReilly.Intellectual.Property.and.Open.Source.Jul.2008.pdf", | |
"size": "5.4M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "OReilly.Programming.dot.NET.3.5.Aug.2008.pdf", | |
"size": "9.6M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Office 2003 Application Development All-in-One Desk Reference for Dummies.pdf", | |
"size": " 18M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Office 2003 Timesaving Techniques for Dummies (2004).pdf", | |
"size": " 26M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "OpenOffice.org for Dummies.pdf", | |
"size": "9.5M", | |
"type": "file" | |
}, | |
{ | |
"children": [ | |
{ | |
"children": [], | |
"name": "O'Reilly-MySQL.Cookbook.eBook-iNTENSiTY.pdf", | |
"size": "4.7M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "O'Reilly-XSLT-Mastering.XML.Transformations.eBook-iNTENSiTY.pdf", | |
"size": "2.2M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "O'Reilly.Building.Secure Servers with Linux.pdf", | |
"size": "2.7M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "O'Reilly.PC.Hardware in a Nutshell, 2nd Edition.pdf", | |
"size": "9.1M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "OReilly.ASP.dotNET in Nutshell.pdf", | |
"size": "9.7M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "OReilly.BSD.Hacks.May.2004.eBook-DDU.pdf", | |
"size": "3.6M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "OReilly.Beginning.Perl For Bioinformatics.pdf", | |
"size": "1.4M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "OReilly.Better.Faster.Lighter.Java.Jun.2004.eBook-DDU.pdf", | |
"size": "2.3M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "OReilly.Building Java Enterprise Applications Volume I - Archi", | |
"size": "3.3M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "OReilly.Creating.Effective JavaHelp(RoR).pdf", | |
"size": "1.4M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "OReilly.DNS.on Windows 2000 2nd edition.pdf", | |
"size": "2.4M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "OReilly.Database.Porgramming With Jdbc And Java 2nd Edition.pdf", | |
"size": "1.6M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "OReilly.Delphi.In A Nutshell 1st.Ed.pdf", | |
"size": " 25M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "OReilly.Developing.Java Beans.pdf", | |
"size": "1.4M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "OReilly.Dhcp.For Windows 2000.pdf", | |
"size": "2.4M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "OReilly.Director.In A Nutshell.pdf", | |
"size": "1.1M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "OReilly.Eclipse.A.Java.Developers.Guide.eBook-DDU.pdf", | |
"size": " 10M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "OReilly.Enterprise.Javabeans 3rd Edition.pdf", | |
"size": "2.4M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "OReilly.Exploring.the.JDS.Linux.Desktop.Sep.2004.eBook-DDU.pdf", | |
"size": " 13M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "OReilly.Hardcore.Java.eBook-DDU.pdf", | |
"size": "2.3M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "OReilly.Hig", | |
"size": "1.7M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "OReilly.High.Performance.MySQL.eBook-DDU.pdf", | |
"size": "2.5M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "OReilly.J2ME.in a Nutshell.pdf", | |
"size": "5.7M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "OReilly.Jav", | |
"size": "2.0M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "OReilly.Java.& XSLT.pdf", | |
"size": "2.0M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "OReilly.Java.2d Graphics.pdf", | |
"size": "2.6M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "OReilly.Java.3d Programming.pdf", | |
"size": "4.4M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "OReilly.Java.And Soap.pdf", | |
"size": "2.7M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "OReilly.Java.Cook Book.pdf", | |
"size": "3.0M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "OReilly.Java.Cookbook.2nd.Edition.Jun.30.2004.eBook-DDU.pdf", | |
"size": "8.1M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "OReilly.Java.Cryptography.pdf", | |
"size": "1.5M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "OReilly.Java.Management Extension.pdf", | |
"size": "2.7M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "OReilly.Java.Message Service.pdf", | |
"size": "1.1M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "OReilly.Java.NIO.pdf", | |
"size": "1.4M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "OReilly.Java.Network Programming, 2nd Edition.pdf", | |
"size": "2.5M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "OReilly.Java.Programming With Oracle Jdbc.pdf", | |
"size": "1.4M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "OReilly.Java.Programming on linux.pdf", | |
"size": "4.3M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "OReilly.Java.Rmi.pdf", | |
"size": "2.3M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "OReilly.Java.Security 2nd Edition.pdf", | |
"size": "1.4M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "OReilly.Java.Servlet Programming.pdf", | |
"size": "4.3M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "OReilly.Java.Threads.3rd.Edition.Sep.2004.eBook-DDU.pdf", | |
"size": "2.5M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "OReilly.Java.Web Services.pdf", | |
"size": "2.9M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "OReilly.Java.performance tuning.pdf", | |
"size": "1.8M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "OReilly.Java.server Pages.pdf", | |
"size": "2.5M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "OReilly.JavaServer.Pages 2nd Edition.pdf", | |
"size": "3.0M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "OReilly.JavaServer.Pages Pocket Reference.pdf", | |
"size": "1.0M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "OReilly.LINUX.admin.pdf", | |
"size": "8.6M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "OReilly.Lea", | |
"size": "456K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "OReilly.Learning.PHP.5.Jul.2004.FIXED.eBook-DDU.pdf", | |
"size": "3.5M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "OReilly.Learning.PHP.5.Jul.2004.eBook-DDU.pdf", | |
"size": "3.4M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "OReilly.Learning.Perl, Third Edition.pdf", | |
"size": "1.3M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "OReilly.Learning.Python.pdf", | |
"size": "2.7M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "OReilly.Learning.the Unix OS 4th Edition.pdf", | |
"size": "1.0M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "OReilly.Learning.the bash Shell - 2nd Edition.pdf", | |
"size": "1.4M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "OReilly.Linux.Network Admin Guide 2nd Edition.pdf", | |
"size": "1.6M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "OReilly.Linux.Unwired.eBook-DDU.pdf", | |
"size": "4.4M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "OReilly.Mastering.Oracle.SQL.2nd.Edition.Jun.2004.eBook-DDU.pdf", | |
"size": "2.9M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "OReilly.Office.2003.XML.Jun.2004.eBook-DDU.pdf", | |
"size": " 11M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "OReilly.Oracle.8i Interal Service.pdf", | |
"size": "383K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "OReilly.Oracle.PLSQL Best Practices.pdf", | |
"size": "503K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "OReilly.Oracle.RMAN Pocket Reference.pdf", | |
"size": "1.3M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "OReilly.Oracle.SQL Tuning Pocket Reference.pdf", | |
"size": "1.0M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "OReilly.Oracle.sqlloader.pdf", | |
"size": "5.1M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "OReilly.PHP.Cookbook.pdf", | |
"size": "3.9M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "OReilly.PHP.Pocket Reference - 2nd Edition.pdf", | |
"size": "349K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "OReilly.Per", | |
"size": "428K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "OReilly.Perl.Cookbook.pdf", | |
"size": "9.2M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "OReilly.Perl.Template.Toolkit.eBook-DDU.pdf", | |
"size": "3.0M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "OReilly.Programming.Perl .pdf", | |
"size": "4.3M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "OReilly.Programming.Perl Dbi.pdf", | |
"size": "1.4M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "OReilly.ProgrammingPHP.pdf", | |
"size": "3.5M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "OReilly.Running.Linux 4th Edition.pdf", | |
"size": "3.6M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "OReilly.SEL", | |
"size": "1.1M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "OReilly.SQL.In.A.Nutshell.2nd.Edition.Sep.2004.eBook-DDU.pdf", | |
"size": "3.3M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "OReilly.SQL.In Nutshell.pdf", | |
"size": "2.7M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "OReilly.SSH,.The Secure Shell - The Definitive Guide Ebook .pdf", | |
"size": "4.3M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "OReilly.Securing.Windows.Server.2003.Nov.2004.eBook-DDU.pdf", | |
"size": "7.5M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "OReilly.Understanding.The Linux Kernel 1st Edition.pdf", | |
"size": "3.1M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "OReilly.Understanding.the Linux Kernel - 2nd Edition.pdf", | |
"size": "4.3M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "OReilly.Unix.for Oracle DBAs Pocket Reference.pdf", | |
"size": "1.0M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "OReilly.Unix.in a Nutshell.pdf", | |
"size": "3.0M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "OReilly.Upgrading.to.PHP.5.Jul.2004.eBook-DDU.pdf", | |
"size": "2.3M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "OReilly.Vb.& Vba Nutshell.pdf", | |
"size": "4.5M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "OReilly.Vb.net.Language In A Nutshell.pdf", | |
"size": "1.7M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "OReilly.Visual.Basic .NET Language in a Nutshell.pdf", | |
"size": "1.7M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "OReilly.Web", | |
"size": "2.6M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "OReilly.Web.Database Applications With PHP and MySQL.pdf", | |
"size": "4.4M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "OReilly.Web.Design in a Nutshell.pdf", | |
"size": "6.3M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "OReilly.Windows.2000 Commands Pocket Reference.pdf", | |
"size": "650K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "OReilly.Windows.Server.Hacks.eBook-DDU.pdf", | |
"size": "4.6M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "OReilly.Windows.XP Pocket Reference.pdf", | |
"size": "1.8M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "OReilly.Writing.Apache Modules with Perl and C.pdf", | |
"size": "4.5M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "OReilly.XML.Hacks.Jul.2004.eBook-DDU.pdf", | |
"size": "6.4M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "OReilly.XML.Publishing.with.AxKit.Jan.2004.eBook-DDU.pdf", | |
"size": "1.9M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "OReilly.XML.in.a.Nutshell.Third.Edition.Sep.2004.eBook-DDU.pdf", | |
"size": " 10M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "OReilly.linux_poster.pdf", | |
"size": "163K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Oreilly.ADO.Dot.Net.In.A.Nutshell.eBook-LiB.pdf", | |
"size": "5.2M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Oreilly.ASP.Dot.NET.In.A.Nutshell.2nd.Edition.eBook-LiB.pdf", | |
"size": " 12M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Oreilly.AppleScript.In.A.Nutshell.eBook-LiB.pdf", | |
"size": "4.9M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Oreilly.Building.Embedded.Linux.Systems.eBook-LiB.pdf", | |
"size": "3.0M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Oreilly.C.Sharp.In.A.Nutshell.2nd.Edition.eBook-LiB.pdf", | |
"size": "9.7M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Oreilly.Cocoa.In.A.Nutshell.eBook-LiB.pdf", | |
"size": "6.2M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Oreilly.Cpp.In.A.Nutshell.eBook-LiB.pdf", | |
"size": "4.7M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Oreilly.DNS.On.Windows.Server.2003.eBook-LiB.pdf", | |
"size": "5.3M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Oreilly.Dot.NET.And.XML.eBook-LiB.pdf", | |
"size": "4.0M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Oreilly.Dot.NET.Windows.Forms.In.A.Nutshell.eBook-LiB.pdf", | |
"size": "9.2M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Oreilly.Java.Data.Objects.eBook-LiB.pdf", | |
"size": "2.6M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Oreilly.Java.Database.Best.Practices.eBook-LiB.pdf", | |
"size": "2.2M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Oreilly.Java.Examples.In.A.Nutshell.3rd.EditioneBook-LiB.pdf", | |
"size": "4.5M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Oreilly.Java.Extreme.Programming.Cookbook.eBook-LiB.pdf", | |
"size": "2.0M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Oreilly.Java.Performance.Tuning.2nd.Edition.eBook-LiB.pdf", | |
"size": "2.9M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Oreilly.Java.Script.And.DHTML.Cookbook.eBook-LiB.pdf", | |
"size": "3.5M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Oreilly.Java.Server.Pages.3rd.Edition.eBook-LiB.pdf", | |
"size": "5.4M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Oreilly.Java.Servlet.And.JSP.Cookbook.eBook-LiB.pdf", | |
"size": "8.8M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Oreilly.JavaScript.Pocket.Reference.2nd.Edition.iNT.eBook-LiB.pdf", | |
"size": "710K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Oreilly.Learning.Python.2nd.Edition.eBook-LiB.pdf", | |
"size": "3.7M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Oreilly.Learning.RedHat.Linux.3rd.Edition.eBook-LiB.pdf", | |
"size": "6.4M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Oreilly.Learning.Unix.For.Mac.OS.X.Panther.eBook-LiB.pdf", | |
"size": "2.4M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Oreilly.Learning.XML.2nd.Edition.eBook-LiB.pdf", | |
"size": "3.5M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Oreilly.Linux.In.A.Nutshell.4th.Edition.eBook-LiB.pdf", | |
"size": "4.4M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Oreilly.Linux.Security.Cookbook.eBook-LiB.pdf", | |
"size": "2.3M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Oreilly.Mastering.Oracle.SQL.eBook-LiB.pdf", | |
"size": "2.0M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Oreilly.Mastering.Perl.For.Bioinformatics.eBook-LiB.pdf", | |
"size": "2.0M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Oreilly.MySQL.Pocket.Reference.eBook-LiB.pdf", | |
"size": "345K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Oreilly.Ora", | |
"size": "1.1M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Oreilly.Oracle.Regular.Expressions.Pocket.Reference.eBook-LiB.pdf", | |
"size": "312K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Oreilly.Orb", | |
"size": "195K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Oreilly.PC.Hardware.In.A.Nutshell.2nd.Edition.eBook-LiB.pdf", | |
"size": "9.1M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Oreilly.PC.Hardware.In.A.Nutshell.3rd.Edition.eBook-LiB.pdf", | |
"size": "9.1M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Oreilly.Perl.6.Essentials.eBook-LiB.pdf", | |
"size": "1.0M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Oreilly.Perl.Cookbook.2nd.Edition.eBook-LiB.pdf", | |
"size": "5.0M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Oreilly.Perl.For.Oracle.DBAs.eBook-LiB.pdf", | |
"size": "6.1M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Oreilly.Perl.Template.Toolkit.eBook-LiB.pdf", | |
"size": "2.4M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Oreilly.Postfix.The.Definitive.Guide.eBook-LiB.pdf", | |
"size": "1.7M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Oreilly.Pra", | |
"size": "2.4M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Oreilly.Practical.Mod.Perl.eBook-LiB.pdf", | |
"size": "5.4M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Oreilly.Programming.Dot.NET.Windows.Applications.eBook-LiB.pdf", | |
"size": " 12M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Oreilly.Python.In.A.Nutshell.eBook-LiB.pdf", | |
"size": "3.2M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Oreilly.SQL.Tuning.eBook-LiB.pdf", | |
"size": "2.7M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Oreilly.Sequence.Analysis.In.A.Nutshell.eBook-LiB.pdf", | |
"size": "2.5M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Oreilly.TCP.IP.Network.Administration.3rd.Edition.eBook-LiB.pdf", | |
"size": "5.0M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Oreilly.VB", | |
"size": "755K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Oreilly.VB.Dot.NET.Core.Classes.In.A.Nutshell.eBook-LiB.pdf", | |
"size": "9.4M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Oreilly.VBScript.In.A.Nutshell.2nd.Edition.eBook-LiB.pdf", | |
"size": "4.0M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Oreilly.Windows.Server.2003.In.A.Nutshell.eBook-LiB.pdf", | |
"size": "4.3M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Oreilly.Windows.XP.Hacks.eBook-LiB.pdf", | |
"size": "7.9M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Oreilly.Windows.XP.Pro.The.Missing.Manual.eBook-LiB.pdf", | |
"size": " 22M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Oreilly.Windows.XP.Unwired.eBook-LiB.pdf", | |
"size": "6.5M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Oreilly.qmail.eBook-LiB.pdf", | |
"size": "1.4M", | |
"type": "file" | |
} | |
], | |
"name": "Oreilly", | |
"size": "-", | |
"type": "dir" | |
}, | |
{ | |
"children": [], | |
"name": "PC Recording Studios For Dummies (Mar 2005).pdf", | |
"size": "9.3M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "PCs All-in-One Desk Reference for Dummies 2nd Edition.pdf", | |
"size": " 20M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "PCs for Dummies, 10th Edition.pdf", | |
"size": "8.9M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "PCs for Dummies Quick Reference, 3rd Edition.pdf", | |
"size": "5.3M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Packt.-.Facebook.Graph.API.Development.with.Flash.pdf", | |
"size": "2.9M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Paint Shop Pro 8 for Dummies.pdf", | |
"size": "6.5M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Paint Shop Pro 9 for Dummies (2005).pdf", | |
"size": " 11M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Pearson-A.Developers.Guide.to.Amazon.SimpleDB.2010.RETAiL.EBook.pdf", | |
"size": "2.3M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Pearson-Essential.SharePoint.2010.Overview.Governance.and.Planning.2010.RETAiL.EBook.pdf", | |
"size": " 15M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Pearson-Flash.Professional.CS5.Advanced.for.Windows.and.Macintosh.2010.RETAiL.EBook.pdf", | |
"size": " 10M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Pearson-InDesign.CS5.for.Windows.and.Macintosh.Visual.QuickStart.Guide.2010.RETAiL.EBook.pdf", | |
"size": " 13M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Pearson-Layers.The.Complete.Guide.to.Photoshops.Most.Powerful.Feature.2010.RETAiL.EBook.pdf", | |
"size": " 44M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Pearson-Sams.Teach.Yourself.Web.Publishing.with.HTML.and.CSS.in.One.Hour.a.Day.6th.Edition.2010.RETAiL.EBook.pdf", | |
"size": " 22M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Pearson-The.Developers.Guide.to.Social.Programming.2010.RETAiL.EBook.pdf", | |
"size": "3.5M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Pearson-The.Official.Adobe.Print.Publishing.Guide.2007.RETAiL.EBook.pdf", | |
"size": " 14M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Pearson-The.Photoshop.CS5.Pocket.Guide.2010.RETAiL.EBook.pdf", | |
"size": "5.6M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Pearson-The.Rules.of.Work.A.Definitive.Code.for.Personal.Success.2010.RETAiL.EBook.pdf", | |
"size": "826K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Pearson-Using.Microsoft.Excel.2010.RETAiL.EBook.pdf", | |
"size": "9.1M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Pearson-Using.Microsoft.Office.for.Mac.2011.RETAiL.EBook.pdf", | |
"size": "9.0M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Pearson-Using.Microsoft.PowerPoint.2010.RETAiL.EBook.pdf", | |
"size": " 13M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Pearson-Using.Microsoft.Publisher.2010.RETAiL.EBook.pdf", | |
"size": "9.9M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Pearson-Vector.Basic.Training.A.Systematic.Creative.Process.for.Building.Precision.Vector.Artwork.2010.RETAiL.EBook.pdf", | |
"size": " 34M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Pearson-YouTube.for.Business.Online.Video.Marketing.for.Any.Business.2011.RETAiL.EBook.pdf", | |
"size": " 11M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Pearson.-.The.iPhone.Book.4th.Edition.pdf", | |
"size": " 19M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Pete Goodliffe - Code Craft.pdf", | |
"size": "2.6M", | |
"type": "file" | |
}, | |
{ | |
"children": [ | |
{ | |
"children": [], | |
"name": "O'Reilly Commercial Photoshop Retouching In the Studio.chm", | |
"size": "5.8M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "O'Reilly Creating Photomontages with Photoshop A Designer's Notebook.pdf", | |
"size": " 54M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "O'Reilly Photo Retouching with Photoshop A Designer's Notebook.pdf", | |
"size": " 43M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "O'Reilly Photoshop CS2 RAW.chm", | |
"size": " 19M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "O'Reilly Photoshop Fine Arts Effects Cookbook.chm", | |
"size": "323K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "O'Reilly Photoshop Workflow Setups.chm", | |
"size": "245K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Photoshop Album for Dummies.pdf", | |
"size": " 11M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Photoshop CS2 All-in-One Desk Reference for Dummies.pdf", | |
"size": " 56M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Photoshop CS2 For Dummies (May 2005).pdf", | |
"size": " 36M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Photoshop CS All-in-One Desk Reference for Dummies.pdf", | |
"size": " 27M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Photoshop CS Timesaving Techniques for Dummies.chm", | |
"size": " 41M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Photoshop Elements 3 for Dummies.pdf", | |
"size": " 25M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Photoshop Elements 4 for Dummies.pdf", | |
"size": " 30M", | |
"type": "file" | |
} | |
], | |
"name": "Photoshop", | |
"size": "-", | |
"type": "dir" | |
}, | |
{ | |
"children": [], | |
"name": "Piano for Dummies (1999).pdf", | |
"size": " 12M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Poker for Dummies (2004).pdf", | |
"size": " 13M", | |
"type": "file" | |
}, | |
{ | |
"children": [ | |
{ | |
"children": [], | |
"name": "O'Reilly Fixing Powerpoint Annoyances.chm", | |
"size": "8.4M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "O'Reilly PowerPoint 2007 The Missing Manual.chm", | |
"size": "8.5M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "O'Reilly PowerPoint 2007 for Starters The Missing Manual.chm", | |
"size": "5.6M", | |
"type": "file" | |
} | |
], | |
"name": "Powerpoint", | |
"size": "-", | |
"type": "dir" | |
}, | |
{ | |
"children": [], | |
"name": "Powerpoint 2003 Just The Steps For Dummies (May 2006).pdf", | |
"size": "9.3M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Pragmatic.-.HTML5.and.CSS3.pdf", | |
"size": "1.7M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Pro IronPython (2009).pdf", | |
"size": "3.0M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "QuarkXPress 6 for Dummies (2003).chm", | |
"size": " 19M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Quicken All-in-One Desk Reference for Dummies.pdf", | |
"size": " 31M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "R-intro.pdf", | |
"size": "772K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "RFID For Dummies (Mar 2005).pdf", | |
"size": "9.1M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Randall Hyde - Write Great Code II - Thinking Low Level, Writing High Level.pdf", | |
"size": "4.4M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Roxio Easy Media Creator 8 for Dummies.pdf", | |
"size": " 10M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "SAP NetWeaver For Dummies (2004).chm", | |
"size": "9.0M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Scanners for Dummies, 2nd Edition.pdf", | |
"size": " 11M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Scribe.Publications-A.Lighter.Footprint.A.Practical.Guide.to.Minimising.Your.Impact.on.the.Planet.2011.RETAiL.EBook.pdf", | |
"size": " 13M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Search Engine Optimization for Dummies (2004).pdf", | |
"size": " 12M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Simon.and.Schuster-Inside.of.a.Dog.What.Dogs.See.Smell.and.Know.2009.RETAiL.EBook.pdf", | |
"size": "1.3M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "SitePoint.-.FireFox.Secrets.pdf", | |
"size": "3.0M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "SitePoint.-.jQuery.Novice.to.Ninja.pdf", | |
"size": "2.2M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Snort for Dummies.pdf", | |
"size": "7.0M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Solar Energy Projects for the Evil Genius - (Malestrom).pdf", | |
"size": "8.6M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Solar Power Your Home For Dummies (Malestrom).pdf", | |
"size": "7.1M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Sony CLIE for Dummies.pdf", | |
"size": "9.6M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Springer - Industrual Robots Programming 2007.pdf", | |
"size": " 31M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Springer - VLSI Physical Design.pdf", | |
"size": " 24M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Springer.Human.Reliability.And.Error.In.Transportation.Systems.Jan.2007.eBook-ELOHiM.pdf", | |
"size": "3.4M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Springer.TestGoal.Result.Driven.Testing.Jul.2008.pdf", | |
"size": "5.6M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Springer.Wiki.Web.Collaboration.2nd.Edition.Jul.2008.pdf", | |
"size": " 20M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Stanford.University.Press-Virtual.Freedom.Net.Neutrality.and.Free.Speech.in.the.Internet.Age.2009.RETAiL.EBook.pdf", | |
"size": "2.4M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Starting an Online Business for Dummies, 4th Edition (2005).pdf", | |
"size": " 11M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Stefan_Larsson_2011_Metaphors_and_Norms_-_Understanding_copyright_law_in_a_digital_society.pdf", | |
"size": "2.9M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Summersdale.Publishers-Call.of.the.White.Taking.the.World.to.the.South.Pole.2011.RETAiL.EBook.pdf", | |
"size": "6.7M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Summersdale.Publishers-Dip.in.the.Ocean.Rowing.Solo.Across.the.Indian.Ocean.2011.RETAiL.EBook.pdf", | |
"size": "1.8M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Syndicating Web Sites with RSS Feeds for Dummies.pdf", | |
"size": " 12M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "TI-83 Plus Graphing Calculator For Dummies (2004).pdf", | |
"size": "5.9M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Taylor.and.Francis-A.Networked.Self.Identity.Community.and.Culture.on.Social.Network.Sites.2010.RETAiL.EBook.pdf", | |
"size": "2.0M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Temple.University.-.Black.Venus.pdf", | |
"size": "4.5M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "The Definitive Guide to Jython - Python for the Java Platform (2010).pdf", | |
"size": "7.7M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "The Everyday Internet All-in-One Desk Reference for Dummies.pdf", | |
"size": " 17M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "The Internet GigaBook For Dummies (2004).pdf", | |
"size": " 37M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "TiVo for Dummies.pdf", | |
"size": " 10M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Tkinter 8.4 reference - a GUI for Python (2010).pdf", | |
"size": "1.4M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Transworld-61.Hours.2010.RETAiL.EBook.pdf", | |
"size": "1.2M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Troubleshooting Your PC For Dummies, 2nd Edition (Feb 2005).pdf", | |
"size": "8.8M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "UML.zip", | |
"size": "169M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "UML 2 for Dummies (2003).chm", | |
"size": "5.7M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "University.of.Chicago.-.Academically.Adrift.pdf", | |
"size": "3.9M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "VHDL-Cookbook.pdf", | |
"size": "298K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Visual Web Developer 2005 Express Edition for Dummies.pdf", | |
"size": " 12M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "VoIP for Dummies.pdf", | |
"size": "8.4M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Web Design For Dummies, 2nd Edititon Mar 2006.pdf", | |
"size": " 45M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "WebEx Web Meetings for Dummies (2005).pdf", | |
"size": " 11M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Westminster.John.Knox.-.Exodus.From.Hunger.The.Politics.of.Hunger.pdf", | |
"size": "1.2M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Wiley-Biology.for.Dummies.2010.RETAiL.EBook.pdf", | |
"size": "7.4M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Wiley-Cosmetic.Dermatology.Products.and.Procedures.2010.RETAiL.EBook.pdf", | |
"size": " 39M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Wiley-Dog.Tricks.For.Dummies.2010.RETAiL.EBook.pdf", | |
"size": "1.1M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Wiley-Frommers.Provence.and.Cote.dAzur.With.Your.Family.2011.RETAiL.EBook.pdf", | |
"size": "8.4M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Wiley-Introducing.Mudbox.2010.RETAiL.EBook.pdf", | |
"size": " 33M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Wiley-Level.Up.The.Guide.to.Great.Video.Game.Design.2010.RETAiL.EBook.pdf", | |
"size": " 10M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Wiley-Mobile.3D.Graphics.SoC.From.Algorithm.to.Chip.2010.RETAiL.EBook.pdf", | |
"size": "6.2M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Wiley-Pay.Per.Click.Search.Engine.Marketing.An.Hour.a.Day.2010.RETAiL.EBook.pdf", | |
"size": " 11M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Wiley-Personal.Networks.Wireless.Networking.for.Personal.Devices.2010.RETAiL.EBook.pdf", | |
"size": "1.8M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Wiley-Simply.Excel.2010.RETAiL.EBook.pdf", | |
"size": " 13M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Wiley-Simply.Office.2010.RETAiL.EBook.pdf", | |
"size": " 14M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Wiley-Social.Media.for.Trainers.Techniques.for.Enhancing.and.Extending.Learning.2010.RETAiL.EBook.pdf", | |
"size": "3.8M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Wiley-Stop.Staring.Facial.Modeling.and.Animation.Done.Right.3rd.Edition.2010.RETAiL.EBook.pdf", | |
"size": " 31M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Wiley-Virtual.Teamwork.Mastering.the.Art.and.Practice.of.Online.Learning.and.Corporate.Collaboration.2010.RETAiL.EBook.pdf", | |
"size": "2.0M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Wiley-Visual.Studio.2010.and.NET.4.Six.in.One.2010.RETAiL.EBook.pdf", | |
"size": " 37M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Wiley - Wills and Trusts Kit for Dummies.pdf", | |
"size": " 42M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Wiley-Windows.Command.Line.Administration.Instant.Reference.2010.RETAiL.EBook.pdf", | |
"size": "5.0M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Wiley.-.PC.Toys.14.Cool.Projects.for.Home.Office.and.Entertainment.pdf", | |
"size": " 72M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Wiley.Bricklin.On.Technology.May.2009.eBook-ELOHiM.pdf", | |
"size": "8.4M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Wiley.Cracking.Drupal.A.Drop.In.The.Bucket.May.2009.eBook-ELOHiM.pdf", | |
"size": " 10M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Wiley.Cryptology.Unlocked.Aug.2007.pdf", | |
"size": "4.7M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Wiley.Flex.3.Bible.Aug.2008.pdf", | |
"size": " 16M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Wiley.Microsoft.PowerShell.VBScript.and.JScript.Bible.Feb.2009.pdf", | |
"size": " 13M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Wiley.SEO.Search.Engine.Optimization.Bible.2nd.Edition.Apr.2009.pdf", | |
"size": " 18M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Wiley.Service.Automation.and.Dynamic.Provisioning.Techniques.in.IP.MPLS.Environments.Apr.2008.pdf", | |
"size": "4.6M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "WordPerfect 11 For Dummies.chm", | |
"size": "7.4M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "WordPerfect 12 for Dummies.pdf", | |
"size": "9.7M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Wrox.Microsoft.SharePoint.2007.for.Office.2007.Users.May.2009.pdf", | |
"size": "7.7M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Wrox.OpenSocial.Network.Programming.Apr.2009.pdf", | |
"size": "6.0M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Wrox.Professional.DotNetNuke.5.Feb.2009.pdf", | |
"size": " 13M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Yahoo! SiteBuilder For Dummies (Oct 2005).pdf", | |
"size": " 13M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "eBay Bargain Shopping for Dummies.pdf", | |
"size": "5.9M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "iLife '04 All-in-One Desk Reference for Dummies.pdf", | |
"size": " 18M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "iPod & iTunes for Dummies, 2nd Edition (2005).pdf", | |
"size": " 11M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "iPod & iTunes for Dummies 3rd Edition.pdf", | |
"size": " 10M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "mil.pdf", | |
"size": "890K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "programforth.zip", | |
"size": "639K", | |
"type": "file" | |
}, | |
{ | |
"children": [ | |
{ | |
"children": [], | |
"name": "Bangla Unicode Table (U0980).pdf", | |
"size": "114K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Corpus.pdf", | |
"size": "377K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "OReilly.Unicode.Explained.Jun.2006.chm", | |
"size": "4.0M", | |
"type": "file" | |
} | |
], | |
"name": "utf8", | |
"size": "-", | |
"type": "dir" | |
}, | |
{ | |
"children": [], | |
"name": "zingcobol.zip", | |
"size": "604K", | |
"type": "file" | |
} | |
], | |
"name": "Misc", | |
"size": "-", | |
"type": "dir" | |
}, | |
{ | |
"children": [ | |
{ | |
"children": [ | |
{ | |
"children": [], | |
"name": "Apache Server 2 Bible.pdf", | |
"size": "3.4M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "O'Reilly - Apache Cookbook.pdf", | |
"size": "2.3M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "O'Reilly - Apache Cookbook Jan 2008.chm", | |
"size": "6.6M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "O'Reilly - Apache The Definitive Guide 3rd Edition.pdf", | |
"size": "2.3M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "O'Reilly Apache Cookbook.chm", | |
"size": "1.0M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "O'Reilly Apache Security.chm", | |
"size": "1.6M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "O'reilly - The Apache Definitive Guide 2nd Edition.pdf", | |
"size": "2.8M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Run Your Own Web Server Using Linux and Apache.chm", | |
"size": "6.0M", | |
"type": "file" | |
} | |
], | |
"name": "Apache", | |
"size": "-", | |
"type": "dir" | |
}, | |
{ | |
"children": [ | |
{ | |
"children": [], | |
"name": "Beginning CSS Cascading Style Sheets for Web Design.pdf", | |
"size": " 16M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Build Your Own Web Site The Right Way using HTML & CSS.pdf", | |
"size": " 33M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "CSS Instant Results (2006).chm", | |
"size": "7.6M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "CSS Mastery Advanced Web Standards Solutions Feb 2006.pdf", | |
"size": "9.9M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "CSS Web Design for Dummies (2005).pdf", | |
"size": " 12M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Creating Cool Web Sites With HTML, XHTML, And CSS (2004).pdf", | |
"size": " 14M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "DevGuru_CSS_Quickref.pdf", | |
"size": "1.2M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "DevGuru_HTML_Quickref.pdf", | |
"size": "1.5M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "DevGuru_XHTML_Quickref.pdf", | |
"size": "1.3M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "HTML, XHTML, & CSS - Visual QuickStart Guide, 6th Edition (2006).chm", | |
"size": " 25M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "HTML, XHTML, & CSS Bible, 3rd Edition (2004).pdf", | |
"size": " 20M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "HTML 4 For Dummies, 5th Edition (2005).pdf", | |
"size": " 11M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "HTML In 10 Simple Steps Or Less (2004).pdf", | |
"size": " 15M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "HTML Mastery - Semantics, Standards, And Styling (2006).pdf", | |
"size": "2.9M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "John.Wiley.CSS.Hacks.and.Filters.May.2005.eBook-LinG.pdf", | |
"size": " 10M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "O'Reilly CSS Cookbook (2nd Edition).chm", | |
"size": " 14M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "O'Reilly CSS The Definitive Guide (3rd Edition).chm", | |
"size": "7.6M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "O'Reilly CSS The Missing Manual.chm", | |
"size": " 11M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "O'Reilly Cascading Style Sheets The Definitive Guide (2nd Edition).chm", | |
"size": "4.5M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "O'Reilly Dynamic HTML The Definitive Reference.pdf", | |
"size": "9.2M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "O'Reilly HTML & XHTML The Definitive Guide (6th Edition).chm", | |
"size": "3.7M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "O'Reilly HTML Pocket Reference (2nd Edition).pdf", | |
"size": "1.3M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Professional CSS Cascading Style Sheets For Web Design.pdf", | |
"size": "9.3M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Sitepoint.Everything.You.Know.About.CSS.Is.Wrong.pdf", | |
"size": " 17M", | |
"type": "file" | |
} | |
], | |
"name": "CSS & HTML", | |
"size": "-", | |
"type": "dir" | |
}, | |
{ | |
"children": [ | |
{ | |
"children": [], | |
"name": "O'Reilly Cisco Cookbook.chm", | |
"size": "1.5M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "O'Reilly Cisco IOS Access Lists.pdf", | |
"size": "1.4M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "O'Reilly Cisco IOS In a Nutshell.pdf", | |
"size": "4.9M", | |
"type": "file" | |
} | |
], | |
"name": "Cisco", | |
"size": "-", | |
"type": "dir" | |
}, | |
{ | |
"children": [], | |
"name": "Computer Networks - A Tanenbaum - 5th edition.pdf", | |
"size": "8.1M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Computer Networks - Andrew Tanenbaum [Fourth Edition] - CHM.pdf", | |
"size": "7.8M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Cram session for Network Exam 2000.pdf", | |
"size": "280K", | |
"type": "file" | |
}, | |
{ | |
"children": [ | |
{ | |
"children": [], | |
"name": "DNS on Windows 2000, 2nd ed.chm", | |
"size": "1.9M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "O'Reilly DNS & BIND Cookbook.chm", | |
"size": "576K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "O'Reilly DNS and BIND (4th Edition).chm", | |
"size": "1.5M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "O'Reilly DNS on Windows 2000.pdf", | |
"size": "2.4M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "O'Reilly DNS on Windows Server 2003.chm", | |
"size": "2.7M", | |
"type": "file" | |
} | |
], | |
"name": "DNS", | |
"size": "-", | |
"type": "dir" | |
}, | |
{ | |
"children": [], | |
"name": "Design_and_Validation_of_Computer_Protocols_-_Gerard_Holzmann.pdf", | |
"size": "1.3M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Designing Large Scale LANs 2001.zip", | |
"size": "7.6M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Essential SNMP 2001.pdf", | |
"size": "351K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Ethernet Networks Design Implementation Organization and Management 4th Ed 2003.pdf", | |
"size": "5.2M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Home Networking Bible, 2nd ed 2004.pdf", | |
"size": "7.6M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Kerberos The Definitive Guide 2003.pdf", | |
"size": "3.1M", | |
"type": "file" | |
}, | |
{ | |
"children": [ | |
{ | |
"children": [], | |
"name": "Springer.Advances.in.Mobile.and.Wireless.Communications.Jun.2008.pdf", | |
"size": " 11M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Wiley.Aeronautical.Radio.Communication.Systems.and.Networks.Apr.2008.pdf", | |
"size": "5.8M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Wiley.Evolved.Packet.System.The.LTE.and.SAE.Evolution.of.3G.UMTS.Mar.2008.pdf", | |
"size": "6.9M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Wiley.Mobile.WiMAX.Apr.2008.pdf", | |
"size": " 12M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Wiley.The.Open.Mobile.Alliance.Delivering.Service.Enablers.for.Next.Generation.Applications.Apr.2008.pdf", | |
"size": "6.1M", | |
"type": "file" | |
} | |
], | |
"name": "Mobile", | |
"size": "-", | |
"type": "dir" | |
}, | |
{ | |
"children": [], | |
"name": "Network+ Certification Study Guide 2000.pdf", | |
"size": "195K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Network+ book 2001.pdf", | |
"size": " 16M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Network Certification Training Kit 2001.chm", | |
"size": " 10M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Network Programming for Microsoft Windows 1999.chm", | |
"size": "2.2M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Network Security Assessment 2004.chm", | |
"size": "1.7M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Network Security Bible 2005.pdf", | |
"size": " 10M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Network Security Tools 2005.chm", | |
"size": "1.3M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Network Security With OpenSSL 2002.pdf", | |
"size": "2.4M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Networking All-In-One Desk Reference For Dummies 2004.pdf", | |
"size": "543K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Networking All-in-One Desk Reference for Dummies 2nd Edition.pdf", | |
"size": "7.8M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Networking For Dummies 7 Ed 2004.pdf", | |
"size": "9.2M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Network programming in C.pdf", | |
"size": "8.1M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Next-Generation Network Services 2005.chm", | |
"size": "8.1M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "O'Reilly 802.11 Wireles Networks The Definitive Guide.pdf", | |
"size": "4.1M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "O'Reilly Ethernet The Definitive Guide.pdf", | |
"size": "8.0M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "O'Reilly Network Programming with Perl.pdf", | |
"size": "301K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "O'Reilly Network Security Assessment (2nd Edition).pdf", | |
"size": "4.5M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "O'Reilly Network Troubleshooting Tools.pdf", | |
"size": "2.6M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "O'Reilly Network Warrior.pdf", | |
"size": "4.2M", | |
"type": "file" | |
}, | |
{ | |
"children": [ | |
{ | |
"children": [], | |
"name": "O'Reilly Building Oracle XML Applications.pdf", | |
"size": "4.6M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "O'Reilly Oracle DBA Checklists Pocket Reference.pdf", | |
"size": "519K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "O'Reilly Oracle Distributed Systems.pdf", | |
"size": "4.8M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "O'Reilly Oracle Essentials Oracle Database 11g (4th Edition).pdf", | |
"size": "3.6M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "O'Reilly Oracle PL-SQL Language Pocket Reference (4th Edition).pdf", | |
"size": "415K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "O'Reilly Oracle PL SQL Best Practices (2nd Edition).chm", | |
"size": "3.0M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "O'Reilly Oracle PL SQL Programming.pdf", | |
"size": "3.1M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "O'Reilly Oracle RMAN Pocket Reference.pdf", | |
"size": "1.3M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "O'Reilly Oracle Regular Expressions Pocket Reference.chm", | |
"size": "114K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "O'Reilly Oracle SQL Plus Pocket Reference (2nd Edition).pdf", | |
"size": "827K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "O'Reilly Oracle SQL The Essential Reference.pdf", | |
"size": "1.5M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "O'Reilly Oracle SQL Tuning Pocket Reference.pdf", | |
"size": "1.0M", | |
"type": "file" | |
} | |
], | |
"name": "Oracle", | |
"size": "-", | |
"type": "dir" | |
}, | |
{ | |
"children": [ | |
{ | |
"children": [], | |
"name": "Addison.Wesley.PHP.and.MySQL.Web.Development.4th.Edition.1009pp.10-2008.pdf", | |
"size": " 12M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Apress.PHP.5.Recipes.A.Problem.Solution.Approach.673pp.9-2005.pdf", | |
"size": "5.4M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Apress.Practical.Web.2.0.Applications.with.PHP.592pp.Dec.2007.pdf", | |
"size": "6.7M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Apress.Pro.PHP.Patterns.Frameworks.Testing.and.More.375pp.3-2008.pdf", | |
"size": "5.8M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Apress Beginning PHP and MySQL, 3rd ed. (2008).pdf", | |
"size": " 14M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Apress PHP Objects Patterns And Practice (2008).pdf", | |
"size": "7.1M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Apress Practical Web 2.0 Applications with PHP (2007).pdf", | |
"size": "4.9M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Manning.PHP.in.Action.554pp.7-2006.pdf", | |
"size": "9.0M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "No.Starch.Press.Object.Oriented.PHP.Concepts.Techniques.and.Code.210pp.6-2006.pdf", | |
"size": "4.2M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "No Starch Press Wicked Cool PHP Feb (2008).chm", | |
"size": "1.9M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "O'Reilly First PHP MySQL (2008).pdf", | |
"size": " 66M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "OReilly.Learning.PHP.MySQL.and.JavaScript.Jul.2009.pdf", | |
"size": "7.4M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "PHP 6 and MySQL 5 for Dynamic Web Sites (2008).pdf", | |
"size": " 12M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "PHP Solutions Dynamic Web Design Made Easy (2006).pdf", | |
"size": "8.7M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "PHP and MySQL Web Development, 4th ed. (2009).pdf", | |
"size": " 12M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "PHP for the Web, 3rd Ed.pdf", | |
"size": "8.6M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Packt.Ajax.and.PHP.Building.Responsive.Web.Applications.289pp.3-2006.pdf", | |
"size": "4.6M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Peachpit.Press.PHP.5.Advanced.609pp.3-2007.pdf", | |
"size": " 11M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Pro PHP Patterns Frameworks Testing and More (2008).pdf", | |
"size": "4.8M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Sams.Advanced.PHP.Programming.673pp.3-2004.pdf", | |
"size": "7.0M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Sams.Extending.and.Embedding.PHP.456pp.6-2006.chm", | |
"size": "878K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Sams.PHP.5.in.Practice.456pp.7-2006.chm", | |
"size": "744K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Wrox.Professional.Search.Engine.Optimization.with.PHP.A.Developer's.Guide.to.SEO.387pp.4-2007.pdf", | |
"size": "8.0M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "friends.of.Ed.PHP.Object.Oriented.Solutions.395pp.8-2008.pdf", | |
"size": "6.8M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "friends.of.Ed.PHP.Solutions.Dynamic.Web.Design.Made.Easy.486pp.11-2006.pdf", | |
"size": "8.9M", | |
"type": "file" | |
} | |
], | |
"name": "PHP & MySQL", | |
"size": "-", | |
"type": "dir" | |
}, | |
{ | |
"children": [], | |
"name": "Prentice Hall - Computer Networks Tanenbaum 4ed.pdf", | |
"size": " 30M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "PrimeEvil'sMasterSniffer.pdf", | |
"size": " 58K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Sybex.Cisco.Network.Professionals.Advanced.Internetworking.Guide.May.2009.pdf", | |
"size": " 18M", | |
"type": "file" | |
}, | |
{ | |
"children": [ | |
{ | |
"children": [], | |
"name": "A Professionals Guide To Data Communication In A TCPIP World 2004.pdf", | |
"size": "3.5M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Data Networks IP and the Internet Protocols Design and Operation 2003.pdf", | |
"size": " 13M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Gary_R._Wright,_W._Richard_Stevens-TCP_IP_Illustrated._The_Implementation-Addison-Wesley_Professional(1995).djvu", | |
"size": " 36M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Home Networking for Dummies 3rd Ed 2005.pdf", | |
"size": "8.8M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "IPSec - The New Security Standard For The Internet, Intranets, And Virtual Private Networks, 2nd Ed 2003.chm", | |
"size": "1.6M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "IPSec VPN Design 2005.chm", | |
"size": "8.9M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Illustrated TCP-IP - A Graphic Guide To The Protocol Suite 1999.chm", | |
"size": "5.9M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Illustrated TCP-IP - A Graphic Guide To The Protocol Suite 1999.pdf", | |
"size": "6.1M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Javascript In 10 Simple Steps Or Less 2004.pdf", | |
"size": " 14M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Microsoft Windows Scripting Self-Paced Learning Guide 2004.pdf", | |
"size": "5.2M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "O'Reilly IPv6 Essentials (2nd Edition).chm", | |
"size": "4.4M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "O'Reilly IPv6 Network Administration.chm", | |
"size": "817K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "O'Reilly TCP IP Network Administration (3rd Edition).chm", | |
"size": "1.7M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Object-Oriented ActionScript For Flash 8 2006.pdf", | |
"size": " 13M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Practical VoIP Security 2006.pdf", | |
"size": "9.7M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Professional JavaScript For Web Developers 2005.pdf", | |
"size": "9.0M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Running IPv6 2006.pdf", | |
"size": "3.6M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "SNA and TCP IP Integration Handbook 1999.pdf", | |
"size": " 10M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "TCP IP Analysis and Troubleshooting Toolkit 2003.pdf", | |
"size": " 12M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "TCP IP Foundations Aug 2004.pdf", | |
"size": "6.8M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "TCP IP Illustrated, Volume 2 The Implementation 1995.chm", | |
"size": " 27M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "TCPIP Illustrated Volume 1.chm", | |
"size": "1.0M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "TCPIP for Dummies.pdf", | |
"size": "4.1M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "TCP_IP_Illustrated,_Volume_1__The_Protocols-Addison-Wesley_Professional(2011).pdf", | |
"size": " 20M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Teach Yourself TCP IP in 24 Hours 3rd Ed 2004.chm", | |
"size": "3.6M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Understanding_IP_adressing.pdf", | |
"size": "1.1M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "VoIP for Dummies 2005.pdf", | |
"size": "8.3M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "iPod & iTunes - The Missing Manual, 4th Edition 2006.chm", | |
"size": "5.1M", | |
"type": "file" | |
} | |
], | |
"name": "TCP-IP", | |
"size": "-", | |
"type": "dir" | |
}, | |
{ | |
"children": [], | |
"name": "TCP Foundations.pdf", | |
"size": "6.8M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "TCP IP.pdf", | |
"size": " 38M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "The Network Administration Guide 1996.chm", | |
"size": "556K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Upgrading and Repairing Networks 2006.zip", | |
"size": "3.6M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Wiley.Networking.Self.Teaching.Guide.May.2009.eBook-ELOHiM.pdf", | |
"size": " 11M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Wiley.Next.Generation.Networks.Perspectives.and.Potentials.Feb.2008.pdf", | |
"size": "3.0M", | |
"type": "file" | |
}, | |
{ | |
"children": [ | |
{ | |
"children": [], | |
"name": "802.11 Security 2002.pdf", | |
"size": "911K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "802.11 Wireless Networks- The Definitive Guide 2002.pdf", | |
"size": "4.0M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "802.11 wi-fi handbook, Chapter 9 Wireless Lans in the network.pdf", | |
"size": "393K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Absolute Beginner's Guide to Wi-Fi Wireless Networking 2004.chm", | |
"size": " 11M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Applications and Services in Wireless Networks 2001.pdf", | |
"size": "4.7M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Building Wireless Community Networks 1st ed 2002.pdf", | |
"size": "1.0M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Bulletproof Wireless Security - GSM, UMTS, 802.11, And Ad Hoc Security 2005.pdf", | |
"size": "3.3M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Caution! Wireless Networking Preventing a Data Disaster 2004.chm", | |
"size": "8.0M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Complete Home Wireless Networking - Windows XP Edition 2003.chm", | |
"size": "3.9M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Deploying Secure 802.11 Wireless Networks with Microsoft Windows 2004.chm", | |
"size": "6.9M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "IP In Wireless Networks 2003.chm", | |
"size": "2.6M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "O'Reilly Building Wireless Community Networks (2nd Edition).chm", | |
"size": "1.2M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Programming Wireless Devices With The Java 2 Platform Micro ed 2nd ed 2003.chm", | |
"size": "2.4M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Real 802.11 Security - Wi-Fi Protected Access And 802.11i 2003.chm", | |
"size": "2.9M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "The Secrets of Wireless Hacking 2004.chm", | |
"size": "6.7M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "WarDriving - Drive, Detect, Defend - A Guide To Wireless Security 2004.chm", | |
"size": " 37M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Wi-Fi Toys - 15 Cool Wireless Projects For Home, Office, And Entertainment 2004.pdf", | |
"size": " 12M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Wireless Communication Technologies New Multimedia Systems 2002.pdf", | |
"size": " 10M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Wireless Communications.pdf", | |
"size": " 48M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Wireless Hacking Projects for Wi-Fi Enthusiasts 2004.pdf", | |
"size": " 18M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Wireless Home Networking for Dummies 2003.pdf", | |
"size": "7.1M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Wireless IP and Building the Mobile Internet 2003.pdf", | |
"size": " 17M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Wireless Java Developing With J2ME, 2nd Ed 2003.chm", | |
"size": "2.6M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Wireless Maximum Security 2006.chm", | |
"size": "4.2M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Wireless Network Hacks & Mods for Dummies.pdf", | |
"size": "7.2M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Wireless Networks For Dummies 2004.pdf", | |
"size": "8.2M", | |
"type": "file" | |
} | |
], | |
"name": "Wireless", | |
"size": "-", | |
"type": "dir" | |
}, | |
{ | |
"children": [ | |
{ | |
"children": [], | |
"name": "O'Reilly.-.XML.Pocket.Reference.2nd.pdf", | |
"size": "679K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "O'Reilly XPath and XPointer.pdf", | |
"size": "2.7M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "O'Reilly XQuery.pdf", | |
"size": "1.6M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "O'Reilly XSL-FO.chm", | |
"size": "583K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "O'Reilly XSLT Cookbook.chm", | |
"size": "1.1M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "OReilly.XSLT.2nd.Edition.Jul.2008.pdf", | |
"size": "6.2M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "XML for Dummies 4th Edition.pdf", | |
"size": "7.0M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "xml_by_example.pdf", | |
"size": "3.4M", | |
"type": "file" | |
} | |
], | |
"name": "XML", | |
"size": "-", | |
"type": "dir" | |
} | |
], | |
"name": "Networking", | |
"size": "-", | |
"type": "dir" | |
}, | |
{ | |
"children": [ | |
{ | |
"children": [ | |
{ | |
"children": [], | |
"name": "No Starch Press - Absolute FreeBSD The Complete Guide to FreeBSD 2nd Edition.pdf", | |
"size": "7.1M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "No Starch Press - Absolute OpenBSD UNIX For The Practical Paranoid.pdf", | |
"size": "4.2M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "No Starch Press - Building a Server with FreeBSD 7 Apr 2008.chm", | |
"size": "741K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "O'Reilly Mastering FreeBSD and OpenBSD Security.chm", | |
"size": "1.3M", | |
"type": "file" | |
} | |
], | |
"name": "BSD", | |
"size": "-", | |
"type": "dir" | |
}, | |
{ | |
"children": [ | |
{ | |
"children": [], | |
"name": "ABS Guide.pdf", | |
"size": "2.0M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Addison.Wesley.Managing.Linux.Systems.With.Webmin.System.Administration.And.Module.Development.eB.chm", | |
"size": "5.0M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Addison Wesley - Advanced Linux Networking.chm", | |
"size": "3.2M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Addison Wesley - Moving To Linux Kiss The Blue Screen Of Death Goodbye.chm", | |
"size": "5.4M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Addison Wesley - Moving to Linux. Kiss the Blue Screen of Death Goodbye! Second Edition.chm", | |
"size": " 14M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Addison Wesley - Multitool Linux. Practical Uses for Open Source Software.chm", | |
"size": "5.9M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Addison Wesley - Open Source Web Development with LAMP. Using Linux, Apache, MySQL, Perl, and PHP.chm", | |
"size": "3.8M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Addison Wesley - Spring Into Linux.chm", | |
"size": " 18M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Addison Wesley - The Korn Shell. Unix and Linux Programming Manual, Third Edition.chm", | |
"size": "442K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Advanced Linux Networking 2002.chm", | |
"size": "3.2M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Advanced Programming in the UNIX Envinronment, 2013.pdf", | |
"size": " 20M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Apress - Automating UNIX and Linux Administration.chm", | |
"size": "1.3M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Apress.Pro.Linux.Embedded.Systems.Dec.2009.pdf", | |
"size": "6.4M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Assembly Language Step-by-Step - Programming with Linux, 3rd Edition.pdf", | |
"size": "4.0M", | |
"type": "file" | |
}, | |
{ | |
"children": [ | |
{ | |
"children": [], | |
"name": "O'Reilly - Learning the UNIX Operating System.pdf", | |
"size": "1.1M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "O'Reilly - The Complete FreeBSD.pdf", | |
"size": " 10M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "UNIX Filesystems - Evolution, Design, & Implementation.pdf", | |
"size": "4.1M", | |
"type": "file" | |
} | |
], | |
"name": "BSD & Unix", | |
"size": "-", | |
"type": "dir" | |
}, | |
{ | |
"children": [], | |
"name": "Beginning Linux Programming.pdf", | |
"size": "7.7M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Burtch K.Linux Shell Scripting with Bash.Sams.[ENG,433p.,2004].pdf", | |
"size": "4.5M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "C Programming In Linux.pdf", | |
"size": "3.6M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Charles River Media - GNU Linux Application Programming.chm", | |
"size": "2.4M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Charles River Media - Linux Application Development for the Enterprise.chm", | |
"size": " 13M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Charles River Media - Moving from Windows to Linux.chm", | |
"size": " 29M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Classic Shell Scripting.chm", | |
"size": "1.0M", | |
"type": "file" | |
}, | |
{ | |
"children": [ | |
{ | |
"children": [], | |
"name": "Linux Enterprise Cluster.chm", | |
"size": "3.7M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "OReilly High Performance Linux Clusters With Oscar Rocks openmosix And Mpi.chm", | |
"size": "1.7M", | |
"type": "file" | |
} | |
], | |
"name": "Cluster", | |
"size": "-", | |
"type": "dir" | |
}, | |
{ | |
"children": [], | |
"name": "CompTIA Linuxplus Study Guide Exam XK0-003.pdf", | |
"size": " 11M", | |
"type": "file" | |
}, | |
{ | |
"children": [ | |
{ | |
"children": [], | |
"name": "Linux Thin Client Networks Design and Deployment.pdf", | |
"size": "5.3M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "O'Reilly - Linux Device Drivers 2nd Edition.pdf", | |
"size": "7.4M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "OReilly Zero Configuration Networking The Definitive Guide.chm", | |
"size": "1.0M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Understanding Linux Network Internals.chm", | |
"size": "7.5M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "shell_scripting.pdf", | |
"size": " 14M", | |
"type": "file" | |
} | |
], | |
"name": "Core Linux Concepts (Kernel,Networking,FineTuning,Device Drivers,Thin Client)", | |
"size": "-", | |
"type": "dir" | |
}, | |
{ | |
"children": [ | |
{ | |
"children": [], | |
"name": "Bind9 Administration Reference Manual.pdf", | |
"size": "645K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "DNS and BIND, 5th ed.chm", | |
"size": "2.4M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Dns in Action A Detailed and Practical Guide to Dns.pdf", | |
"size": "3.4M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Pro DNS and BIND.pdf", | |
"size": "3.1M", | |
"type": "file" | |
} | |
], | |
"name": "DNS", | |
"size": "-", | |
"type": "dir" | |
}, | |
{ | |
"children": [], | |
"name": "Darryl Gove - Multicore Application Programming for Windows, Linux, and Oracle Solaris - 2010.pdf", | |
"size": "3.1M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Debian Handbook.pdf", | |
"size": " 26M", | |
"type": "file" | |
}, | |
{ | |
"children": [ | |
{ | |
"children": [], | |
"name": "TestKing - CompTIA XK0-001 LinuxPLUS v1.0.pdf", | |
"size": "439K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "TestKing - LPI 117-201 Advanced Linux v1.0.pdf", | |
"size": "281K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "TestKing - LPI 117-201 Advanced Linux v2.0.pdf", | |
"size": "397K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "TestKing - LPI 117-202 Linux Networking Administration v1.0.pdf", | |
"size": "283K", | |
"type": "file" | |
} | |
], | |
"name": "EXAM", | |
"size": "-", | |
"type": "dir" | |
}, | |
{ | |
"children": [], | |
"name": "Essential Linux Device Drivers (Prentice Hall, 2008, 0132396556).chm", | |
"size": "4.1M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Essential Linux Device Drivers.pdf", | |
"size": "4.9M", | |
"type": "file" | |
}, | |
{ | |
"children": [ | |
{ | |
"children": [], | |
"name": "Backup And Recovery.pdf", | |
"size": "2.7M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Ebook Teach Yourself Linux In 24 Hours Sharereactor.pdf", | |
"size": "3.8M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Hacking Linux Exposed.pdf", | |
"size": " 97M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "How Linux Works - What Every Super-User Should Know.chm", | |
"size": "1.0M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Linux+ Certification_Bible.pdf", | |
"size": "3.6M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Linux Annoyances For Geeks.chm", | |
"size": "2.3M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Linux Bible 2008 Edition.pdf", | |
"size": " 26M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Linux Newbie Administrator Guide.pdf", | |
"size": "647K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Linux The Complete Reference.pdf", | |
"size": "8.9M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Linux Timesaving Techniques for Dummies.pdf", | |
"size": " 15M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Linux Troubleshooting For System Administrators And Power Users .chm", | |
"size": "4.1M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "O'Reilly - Essential System Administration 3rd Edition.chm", | |
"size": "4.3M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "O'Reilly - Learning Red Hat Enterprise Linux & Fedora 4th Edition.chm", | |
"size": "4.4M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "O'Reilly - Learning the Vi Editor 6th Edition.pdf", | |
"size": "1.9M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "O'Reilly - Learning the bash Shell 2nd Edition.chm", | |
"size": "636K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "O'Reilly - UNIX Power Tools 3rd Edition.chm", | |
"size": "2.2M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "O'Reilly - UNIX in a Nutshell 3rd Edition.chm", | |
"size": "1.2M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "OReilly Linux System Administration.pdf", | |
"size": "3.4M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Red Hat Linux Security And Optimization.pdf", | |
"size": "5.1M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "User Mode Linux.chm", | |
"size": "1.1M", | |
"type": "file" | |
} | |
], | |
"name": "Essentials Books", | |
"size": "-", | |
"type": "dir" | |
}, | |
{ | |
"children": [ | |
{ | |
"children": [], | |
"name": "O'Reilly - Server Load Balancing.pdf", | |
"size": "3.1M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "OpenVPN - Building And Integrating Virtual Private Networks.pdf", | |
"size": "9.3M", | |
"type": "file" | |
} | |
], | |
"name": "Essentials Networking (VPN,SNMP,Load Balancing)", | |
"size": "-", | |
"type": "dir" | |
}, | |
{ | |
"children": [], | |
"name": "For Dummies - Linux All in One Desk Reference.pdf", | |
"size": " 20M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "For Dummies - Linux Timesaving Techniques.pdf", | |
"size": " 15M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "GNU-Linux-Tools-Summary.pdf", | |
"size": "682K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Geisshirt K.Pluggable Authentication Modules.Packt.[ENG,118p.,2007].pdf", | |
"size": "2.6M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Gerard_Beekmans-Linux_From_Scratch_V6.5.pdf", | |
"size": "1.4M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Glass,Ables - Linux for Programmers and Users (Prentice, 2006).pdf", | |
"size": "4.8M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Hacking Exposed - Network Security Secrets and Solutions, 3rd Ed - Win2K-Linux-Internet (EXERPTS).pdf", | |
"size": "5.9M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Haskins D.C Programming in Linux.Ventus.[ENG,84p.,2009].pdf", | |
"size": "6.9M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Hentzenwerke Publishing - Linux Transfer for Windows Network Admins. A Roadmap for Building a Lin.chm", | |
"size": "9.7M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Hentzenwerke Publishing - Linux Transfer for Windows Power Users. Getting Started with Linux for .chm", | |
"size": " 24M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "How Linux Works - What Every Super-User Should Know (2004).chm", | |
"size": "1.0M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Hungry Minds, Inc - Debian GNU Linux Bible.pdf", | |
"size": "6.6M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Hungry Minds, Inc - Linux Database Bible.pdf", | |
"size": "1.9M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "IBM Redbooks - Deploying Linux on IBM eServer pSeries Clusters.chm", | |
"size": "4.7M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "IBM Redbooks - IBM Lotus Domino 6.5 for Linux on zSeries Implementation.chm", | |
"size": " 16M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "IBM Redbooks - Linux Clustering with CSM and GPFS.chm", | |
"size": "2.4M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "IBM Redbooks - WebSphere for Linux on iSeries. Implementation Guide.chm", | |
"size": " 12M", | |
"type": "file" | |
}, | |
{ | |
"children": [ | |
{ | |
"children": [], | |
"name": "Configuring IPCop Firewalls - Closing Borders With Open Source.pdf", | |
"size": " 11M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "O'Reilly - Building Secure Servers with Linux.chm", | |
"size": "1.5M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "O'Reilly - Building Secure Servers with Linux.pdf", | |
"size": "2.8M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "O'Reilly - Network Security with OpenSSL.pdf", | |
"size": "2.4M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "O'Reilly - RADIUS.chm", | |
"size": "620K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "O'Reilly Building Internet Firewalls 2nd Edition.pdf", | |
"size": "4.9M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Security Warrior.chm", | |
"size": "4.5M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Snort For Dummies.pdf", | |
"size": "7.0M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "The Best Damn Firewall Book Period .pdf", | |
"size": " 22M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "The Tao Of Network Security Monitoring - Beyond Intrusion Detection.chm", | |
"size": " 15M", | |
"type": "file" | |
} | |
], | |
"name": "IDS Firewall & Security", | |
"size": "-", | |
"type": "dir" | |
}, | |
{ | |
"children": [], | |
"name": "Johnson C.Pro Bash Programming.Scripting the GNU_Linux Shell.Apress.[ENG,258p.,2009.pdf", | |
"size": "5.7M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Korn_Shell_-_Unix_and_Linux_Programming_Manual_(Addison_Wesley-3rd_Ed-2000).chm", | |
"size": "442K", | |
"type": "file" | |
}, | |
{ | |
"children": [ | |
{ | |
"children": [], | |
"name": "O'Reilly - LDAP System Administration.chm", | |
"size": "1.1M", | |
"type": "file" | |
} | |
], | |
"name": "LDAP", | |
"size": "-", | |
"type": "dir" | |
}, | |
{ | |
"children": [], | |
"name": "LFS-BOOK-6.1.1.pdf", | |
"size": "717K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "LPI - Linux System Administration.pdf", | |
"size": " 17M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Learning the vi and Vim Editors, 7e.pdf", | |
"size": "6.9M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Lin N.Advanced Linux 3D Graphics Programming.Wordware.[ENG,640p.,2001].pdf", | |
"size": " 24M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Linux-Dictionary.pdf", | |
"size": "8.2M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Linux-Filesystem-Hierarchy.pdf", | |
"size": "601K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Linux-Java-Decompiler-HOWTO.pdf", | |
"size": " 36K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Linux - OReilly - Learning the bash Shell - 2nd Edition.chm", | |
"size": "636K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Linux-USB Stack.pdf", | |
"size": "3.5M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Linux.Pocket.Guide.2nd.Edition.pdf", | |
"size": "5.7M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Linux.in.a.Nutshell.6th.Edition.pdf", | |
"size": " 12M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Linux All-In-One Desk Reference For Dummies (Feb 2005).pdf", | |
"size": " 19M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Linux Annoyances For Geeks.chm", | |
"size": "2.3M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Linux Bible 2010 Edition.pdf", | |
"size": " 11M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Linux Certification Bible.pdf", | |
"size": "3.6M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Linux Complete Command Reference.pdf", | |
"size": " 10M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Linux Device Drivers.pdf", | |
"size": "7.4M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Linux Firewalls, 3rd edition (Novell Press, 2005).chm", | |
"size": "1.6M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Linux Firewalls - Attack Detection and Response with iptables, psad, and fwsnort.pdf", | |
"size": "6.5M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Linux Firewalls Attack Detection and Response with Iptables, PSAD, and Fwsnort.pdf", | |
"size": "6.5M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Linux For Dummies, 6th Edition (Feb 2005).pdf", | |
"size": " 11M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Linux From Scratch_V7.2-English-eBook.pdf", | |
"size": "1.4M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Linux Integration Components Read Me-.pdf", | |
"size": "337K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Linux Integration Components Read Me.pdf", | |
"size": "275K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Linux Integration Services v2.1 Read Me.pdf", | |
"size": "305K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Linux Kernel Module Programming.pdf", | |
"size": "542K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Linux Network Administrators Guide.pdf", | |
"size": "1.5M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Linux Network Servers.pdf", | |
"size": "4.8M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Linux Sams Teach Yourself Samba In 24 Hours.pdf", | |
"size": "3.9M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Linux System Administration - Linux Professional Institute (Lpi) Certification Level 1 - Exam 101.pdf", | |
"size": "558K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Linux System Programming.PDF", | |
"size": "2.4M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Linux The Complete Reference.pdf", | |
"size": "8.9M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Linux Thin Client Networks Design and Deployment.pdf", | |
"size": "5.3M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Linux Troubleshooting For System Administrators And Power Users .chm", | |
"size": "4.1M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Linux Troubleshooting For System Administrators And Power Users.chm", | |
"size": "4.1M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Linux plus Certification Bible.pdf", | |
"size": " 12M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "LinuxplusWin9xplusGrub-HOWTO.pdf", | |
"size": " 17K", | |
"type": "file" | |
}, | |
{ | |
"children": [ | |
{ | |
"children": [], | |
"name": "No Starch Press - The Book of Postfix.pdf", | |
"size": " 54M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "O'Reilly - Postfix The Definitive Guide.pdf", | |
"size": "2.6M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "O'Reilly SendMail Cookbook.chm", | |
"size": "798K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "OReilly sendmail 4th Edition.pdf", | |
"size": "7.2M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Packtpub.Linux.Email.Nov.2009.pdf", | |
"size": "3.9M", | |
"type": "file" | |
} | |
], | |
"name": "Mail Servers", | |
"size": "-", | |
"type": "dir" | |
}, | |
{ | |
"children": [], | |
"name": "Martin F. Krafft - The Debian System Concepts and Techniques [2005, Eng, PDF].pdf", | |
"size": "5.2M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Mason M.Pragmatic Guide to Subversion.[ENG,146p.,2010].pdf", | |
"size": "3.4M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Mastering Mandriva Linux 2009.pdf", | |
"size": " 13M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Masters J.Professional Linux Programming.Wiley.[ENG,507p.,2007].pdf", | |
"size": "5.7M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Matthew - Beginning Linux Programming 4e (Wrox, 2007).pdf", | |
"size": "7.7M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Matthew N.Beginning Linux Programming.3 ed.Wiley.[ENG,848p.,2004].pdf", | |
"size": " 11M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "McGraw-Hill - HackNotes Linux and Unix Security Portable Reference.pdf", | |
"size": "3.4M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Meyers N.Java Programming on Linux.Waite GP.[ENG,907p,2000].pdf", | |
"size": " 15M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Michael - Mastering UNIX Shell Scripting (Wiley, 2003).pdf", | |
"size": "1.6M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Mitchell - Advanced Linux Programming (New Riders, 2001).pdf", | |
"size": "3.7M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Muska AND Lipman - LinuxPLUS 2005 In Depth.pdf", | |
"size": " 12M", | |
"type": "file" | |
}, | |
{ | |
"children": [ | |
{ | |
"children": [], | |
"name": "O'Reilly - Managing NFS and NIS 2nd Edt.pdf", | |
"size": "1.9M", | |
"type": "file" | |
} | |
], | |
"name": "NFS & NIS", | |
"size": "-", | |
"type": "dir" | |
}, | |
{ | |
"children": [], | |
"name": "Negus C.Linux Bible.2008 Edition.Wiley[2008,ENG].pdf", | |
"size": " 26M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Neil Matthew, Richard Stones - Beginning Linux Programming, Fourth Edition.pdf", | |
"size": "7.7M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Networking Linux.chm", | |
"size": "1.3M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "New Riders Publishing - Advanced Linux Programming.chm", | |
"size": "552K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "New Riders Publishing - Linux Clustering. Building and Maintaining Linux Clusters.pdf", | |
"size": "933K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "No.Starch.Linux.Programming.Interface.Oct.2010.pdf", | |
"size": " 12M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "No Starch Press - How Linux Works. What Every Super-User Should Know.chm", | |
"size": "1.0M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "No Starch Press - Linux Appliance Design.pdf", | |
"size": "8.5M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "No Starch Press - Linux Firewalls.pdf", | |
"size": "6.5M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "No Starch Press - Linux For Non-Geeks (2004).chm", | |
"size": " 15M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "No Starch Press - Linux for Non-Geeks. A Hands-On, Project-Based, Take-It-Slow Guidebook.chm", | |
"size": " 15M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "No Starch Press - Programming Linux Games.pdf", | |
"size": "1.8M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "No Starch Press - The Linux Enterprise Cluster.chm", | |
"size": "3.7M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "No Starch Press - Wicked Cool Shell Scripts. 101 Scripts for Linux, Mac OS X, and Unix Systems.chm", | |
"size": "1.4M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Novell Press - Novell Linux Certification Practium Lab Manual.chm", | |
"size": "4.0M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Novell Press - Novell Linux Desktop 9. User's Handbook.chm", | |
"size": " 37M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "O'Reilly,.Linux.in.a.Windows.World.(2005).LiB.LotB.chm", | |
"size": "2.5M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "O'Reilly - Building Secure Servers with Linux.chm", | |
"size": "1.5M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "O'Reilly - Exploring the JDS Linux Desktop.chm", | |
"size": "9.3M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "O'Reilly - Linux Cookbook.chm", | |
"size": "1.6M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "O'Reilly - Linux Desktop Hacks.chm", | |
"size": "2.5M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "O'Reilly - Linux Multimedia Hacks.chm", | |
"size": "1.7M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "O'Reilly - Linux Network Administrator's Guide, 3rd Edition.chm", | |
"size": "1.1M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "O'Reilly - Linux Network Administrator's Guide 2nd Edition.pdf", | |
"size": "1.6M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "O'Reilly - Linux Networking Cookbook.pdf", | |
"size": "4.6M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "O'Reilly - Linux Security Cookbook.June 2003.chm", | |
"size": "657K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "O'Reilly - Linux Security Cookbook.chm", | |
"size": "657K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "O'Reilly - Linux Server Hacks.pdf", | |
"size": " 34M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "O'Reilly - Linux Server Security, 2nd Edition.chm", | |
"size": "2.1M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "O'Reilly - Linux Unwired.chm", | |
"size": "3.3M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "O'Reilly - Linux in a Nutshell, 4th Edition.chm", | |
"size": "1.7M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "O'Reilly - Linux in a Nutshell, 5th Edition.chm", | |
"size": "1.4M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "O'Reilly - Running Linux, 4th Edition.pdf", | |
"size": "3.6M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "O'Reilly - Running Linux, 5th Edition.chm", | |
"size": "5.4M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "O'Reilly - SELinux. NSAs Open Source Security Enhanced Linux.chm", | |
"size": "1.1M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "O'Reilly - Server Load Balancing.pdf", | |
"size": "3.1M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "O'Reilly - Test Driving Linux, First Edition.chm", | |
"size": "6.5M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "O'Reilly - The Network Administration Guide.chm", | |
"size": "556K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "O'Reilly - Understanding The Linux Kernel.pdf", | |
"size": "3.1M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "O'Reilly - Understanding the Linux Kernel, 3rd Edition.chm", | |
"size": "2.8M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "O'Reilly - Understanding the Linux Kernel, Second Edition.chm", | |
"size": "1.9M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "O'Reilly - Understanding the Linux Kernel 2nd Edition.chm", | |
"size": "2.0M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "O'Reilly Fedora Linux.chm", | |
"size": "8.0M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "O'Reilly LPI Linux Certification In A Nutshell (2nd Edition).chm", | |
"size": "2.3M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "O'Reilly Linux Desktop Hacks.chm", | |
"size": "2.5M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "O'Reilly Linux Device Drivers (3rd Edition).chm", | |
"size": "1.3M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "O'Reilly Linux Kernel in a Nutshell.pdf", | |
"size": "3.2M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "O'Reilly Linux Multimedia Hacks.chm", | |
"size": "1.7M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "O'Reilly Linux Network Administrator's Guide (3rd Edition).chm", | |
"size": "1.1M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "O'Reilly Linux Server Hacks.chm", | |
"size": "602K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "O'Reilly Linux System Administration.pdf", | |
"size": "2.8M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "O'Reilly Linux System Programming.pdf", | |
"size": "1.2M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "O'Reilly Linux in a Nutshell (5th Edition).chm", | |
"size": "1.4M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "O'Reilly Linux in a Nutshell, 4th Edition.June 2003.chm", | |
"size": "1.7M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "O'Reilly Running Linux (5th Edition).chm", | |
"size": "5.4M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "O'Reilly SUSE Linux.chm", | |
"size": "5.5M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "O'Reilly Understanding The Linux Kernel (3rd Edition).pdf", | |
"size": " 11M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "O'Reilly_-_Linux_Command_Directory.pdf", | |
"size": " 10M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "OREILLY-Classic_Shell_Scripting.chm", | |
"size": "1.0M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "OREILLY-Using_Samba_Second_Edition.chm", | |
"size": "3.2M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "OReilly - Linux Networking Cookbook.pdf", | |
"size": "4.5M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "OReilly.Building.Embedded.Linux.Systems.Aug.2008.eBook-DDU.pdf", | |
"size": "4.2M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "OReilly.Learning.the.vi.and.Vim.Editors.7th.Edition.Jul.2008(1).pdf", | |
"size": "6.9M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "OReilly.Linux.Kernel.in.a.Nutshell.Dec.2006.chm", | |
"size": "1.1M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "OReilly Linux System Administration.pdf", | |
"size": "3.4M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "OReilly Linux Unwired.chm", | |
"size": "3.3M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Oreilly.Learning.RedHat.Linux.3rd.Edition.eBook-LiB.chm", | |
"size": "4.0M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Oreilly.Linux.System.Programming.Sep.2007.pdf", | |
"size": "2.5M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Packtpub.Linux.Shell.Scripting.Cookbook.Jan.2011.pdf", | |
"size": " 12M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Palmer M.Guide to Unix Using Linux.4 Ed.Course Tech.[ENG,718p.,2008].pdf", | |
"size": "8.9M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Prentice.Hall.PTR.Embedded.Linux.Primer.A.Practical.Real.World.Approach.Sep.2006.chm", | |
"size": "3.4M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Prentice Hall PTR - Building Applications with the Linux Standard Base.chm", | |
"size": "832K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Prentice Hall PTR - Integrating Linux and Windows.pdf", | |
"size": "4.2M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Prentice Hall PTR - Interprocess Communications in Linux. The Nooks and Crannies.chm", | |
"size": "1.9M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Prentice Hall PTR - Java Application Development on Linux.chm", | |
"size": "1.6M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Prentice Hall PTR - Linux Debugging and Performance Tuning. Tips and Techniques.chm", | |
"size": " 15M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Prentice Hall PTR - Linux Desktop Garage.chm", | |
"size": " 19M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Prentice Hall PTR - Linux Patch Management. Keeping Linux Systems Up To Date.chm", | |
"size": "6.2M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Prentice Hall PTR - Linux Quick Fix Notebook.chm", | |
"size": "2.8M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Prentice Hall PTR - Linux on the Mainframe.chm", | |
"size": "3.0M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Prentice Hall PTR - Optimizing Linux Performance. A Hands-On Guide to Linux Performance Tools.chm", | |
"size": "1.7M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Prentice Hall PTR - Performance Tuning for Linux Servers - May 2005.chm", | |
"size": "6.2M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Prentice Hall PTR - Self-Service Linux. Mastering the Art of Problem Determination.chm", | |
"size": "1.9M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Prentice Hall PTR - The Linux Kernel Primer. A Top-Down Approach for x86 and PowerPC Architecture.chm", | |
"size": "2.6M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Prentice Hall PTR - Troubleshooting Linux Firewalls.chm", | |
"size": "5.7M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Prentice Hall The Linux Networking Architecture Design And Implementation Of Network Protocols In.chm", | |
"size": "8.6M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Professional LAMP - Linux, Apache, MySQL, AND PHP5 Web Development (2008).pdf", | |
"size": "7.1M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Red Hat Enterprise Linux 3 - System Administration Guide.pdf", | |
"size": "6.9M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Red Hat Enterprise Linux 4 for Dummies (Apr 2005).pdf", | |
"size": " 13M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Red Hat Enterprise Linux 5 Administration Unleashed - [Sams] - [0672328925].pdf", | |
"size": "7.3M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Red Hat Linux Fedora for Dummies.chm", | |
"size": "5.0M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Red Hat Software - Linux Complete Command Reference.pdf", | |
"size": " 18M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Redhat Linux Administration A Beginners Guide - Mcgraw-Hill.pdf", | |
"size": " 35M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "SANS Institute - Securing Linux. A Survival Guide for Linux Security, Version 1.0.chm", | |
"size": "177K", | |
"type": "file" | |
}, | |
{ | |
"children": [ | |
{ | |
"children": [], | |
"name": "SELinux By Example - Using Security Enhanced Linux .chm", | |
"size": "3.9M", | |
"type": "file" | |
} | |
], | |
"name": "SELinux", | |
"size": "-", | |
"type": "dir" | |
}, | |
{ | |
"children": [ | |
{ | |
"children": [], | |
"name": "IPsec Virtual Private Network Fundamentals.chm", | |
"size": " 18M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "O'Reilly - SSH The Secure Shell The Definitive Guide.pdf", | |
"size": "3.1M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "O'Reilly - The Secure Shell The Definitive Guide.pdf", | |
"size": "3.1M", | |
"type": "file" | |
} | |
], | |
"name": "SSH & VPN", | |
"size": "-", | |
"type": "dir" | |
}, | |
{ | |
"children": [], | |
"name": "SUSE Linux 9.3 For Dummies (May 2005).pdf", | |
"size": " 11M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "SUSE Linux 10 for Dummies.pdf", | |
"size": " 13M", | |
"type": "file" | |
}, | |
{ | |
"children": [ | |
{ | |
"children": [], | |
"name": "O'Reilly Samba 2nd Edition.chm", | |
"size": "3.2M", | |
"type": "file" | |
} | |
], | |
"name": "Samba", | |
"size": "-", | |
"type": "dir" | |
}, | |
{ | |
"children": [], | |
"name": "Sams,.Expanding.Choice.Moving.to.Linux.and.Open.Source.with.Novell.(2005).LiB.chm", | |
"size": "2.1M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Sams - Linux Programming Unleashed.pdf", | |
"size": "6.3M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Sams - Teach Yourself Linux in 24 Hours.pdf", | |
"size": " 12M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Sams Publishing - Expanding Choice Moving to Linux and Open Source with Novell Open Enterprise Se.chm", | |
"size": "2.1M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Sams Publishing - Linux Firewalls, Third Edition.chm", | |
"size": "1.6M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Sams Publishing - Linux Kernel Development Second Edition.chm", | |
"size": "1.3M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Sams Publishing - Novell ZENworks 7 Linux Management Administrator's Handbook.chm", | |
"size": "3.3M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Sams Publishing - Sams Teach Yourself Linux In 24 Hours, Second Edition.pdf", | |
"size": " 14M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Sams Publishing - Unix Shell Programming, 3rd Edition.chm", | |
"size": "1.1M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Sams Teach Yourself Shell Programming in 24 Hours.ebook.pdf", | |
"size": "5.2M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Schroder - Linux Networking Cookbook (O'Reilly, 2008).pdf", | |
"size": "3.9M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Securing-Optimizing-Linux-The-Ultimate-Solution-v2.0.pdf", | |
"size": "6.2M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Self-Service Linux - Mastering the Art of Problem Determination (Prentice Hall PTR, 2005).chm", | |
"size": "1.9M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Shell Scripting Expert Recipes for Linux, Bash, And More.pdf", | |
"size": " 17M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Smart Home Automation with Linux (2010) (ATTiCA).pdf", | |
"size": " 17M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Smart_Home_Automation_With_Linux.pdf", | |
"size": " 17M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Springer-Verlag - Guide to Assembly Language Programming in Linux.pdf", | |
"size": " 31M", | |
"type": "file" | |
}, | |
{ | |
"children": [ | |
{ | |
"children": [], | |
"name": "O'Reilly - Squid The Definitive Guide.chm", | |
"size": "1.0M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "O'Reilly - Squid The Definitive Guide.pdf", | |
"size": "4.2M", | |
"type": "file" | |
} | |
], | |
"name": "Squid", | |
"size": "-", | |
"type": "dir" | |
}, | |
{ | |
"children": [], | |
"name": "Study Guide for Advanced Linux System Administration I - Lab work for LPI 201.pdf", | |
"size": "437K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Study Guide for Linux System Administration I - Lab work for LPI 101.pdf", | |
"size": "802K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Sybex, Inc - Linux Network Servers.pdf", | |
"size": "6.7M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Sybex, Inc - LinuxPLUS Study Guide, Second Edition (Exam XKO-001).chm", | |
"size": "8.4M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Sybex, Inc - Linux Power Tools.chm", | |
"size": " 12M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Sybex, Inc - Linux System Administration, Second Edition.pdf", | |
"size": "7.4M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Sybex, Inx - Setting Up LAMP. Getting Linux, Apache, MySQL, and PHP Working Together.pdf", | |
"size": "6.7M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Sybex.Linux.Administrator.Street.Smarts.Oct.2006.pdf", | |
"size": "9.0M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "T.M.Jones - GNU-Linux Application Programming. 2005.chm", | |
"size": "2.4M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "TLCL-13.07.pdf", | |
"size": "2.0M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "The Linux Programming Interface.pdf", | |
"size": "7.4M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "The Linux System Administration.pdf", | |
"size": "849K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "The MIT Press - Beowulf Cluster Computing with Linux, Second Edition.chm", | |
"size": "4.6M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "UNIX and Linux System Administration Handbook.pdf", | |
"size": " 16M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Unix For Dummies.chm", | |
"size": "3.0M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "User Mode Linux.chm", | |
"size": "1.1M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Venkateswarlu N.Introducing Linux.Installation and Programming.BSP.[ENG,601p.,2008].pdf", | |
"size": " 22M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Wall - Linux Programming Unleashed (SAMS, 1999).pdf", | |
"size": "6.3M", | |
"type": "file" | |
}, | |
{ | |
"children": [ | |
{ | |
"children": [], | |
"name": "O'Reilly Apache The Definitive Guide 3rd Edition.chm", | |
"size": "888K", | |
"type": "file" | |
} | |
], | |
"name": "Web Server - Apache", | |
"size": "-", | |
"type": "dir" | |
}, | |
{ | |
"children": [], | |
"name": "Wiley.Linux.Bible.2009.Edition.Jan.2009.pdf", | |
"size": " 36M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Wiley Publishing, Inc - Assembly Language Step-by-Step. Programming with DOS and Linux, Second Ed.chm", | |
"size": "8.6M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Wiley Publishing, Inc - Linux All-in-One Desk Reference for Dummies.pdf", | |
"size": " 19M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Wiley Publishing, Inc - Linux Timesaving Techniques For Dummies.pdf", | |
"size": " 15M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Wiley Publishing, Inc - Linux Toys II. 9 Cool New Projects for Home, Office, and Entertainment.pdf", | |
"size": "9.1M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Wolfgang Mauerer - Professional_Linux_kernel_architecture.pdf", | |
"size": "7.6M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Working with your desktop.[ENG,2006].pdf", | |
"size": "683K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Wrox - Beginning Linux Programming 4th Edition (2009).pdf", | |
"size": "7.7M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Wrox Press - Beginning Linux Programming, Third Edition.pdf", | |
"size": " 11M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Wrox Press - Professional Linux Programming.pdf", | |
"size": "4.9M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "dnsandbind_5thedition.epub", | |
"size": "2.5M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "dnsandbind_5thedition.mobi", | |
"size": "9.2M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "dnsandbind_5thedition.pdf", | |
"size": "3.7M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "eBook - Using Linux as a Router.pdf", | |
"size": " 30K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "essentialsystemadministration_3rdedition.epub", | |
"size": "4.1M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "essentialsystemadministration_3rdedition.mobi", | |
"size": " 16M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "essentialsystemadministration_3rdedition.pdf", | |
"size": "9.8M", | |
"type": "file" | |
}, | |
{ | |
"children": [ | |
{ | |
"children": [], | |
"name": "Addison-Wesley Professional Linux Kernel Development 3rd.pdf", | |
"size": "1.6M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Linux_Kernel_in_a_Nutshell.pdf", | |
"size": "2.5M", | |
"type": "file" | |
} | |
], | |
"name": "kernel", | |
"size": "-", | |
"type": "dir" | |
}, | |
{ | |
"children": [], | |
"name": "learninggnuemacs_3rdedition.epub", | |
"size": "5.3M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "learninggnuemacs_3rdedition.mobi", | |
"size": " 15M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "learninggnuemacs_3rdedition.pdf", | |
"size": "9.7M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "lexandyacc.epub", | |
"size": "1.4M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "lexandyacc.mobi", | |
"size": "4.9M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "lexandyacc.pdf", | |
"size": "8.7M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "linux-Addison.Wesley.The.Art.Of.Unix.Programming.chm", | |
"size": "1.5M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "linux - Advanced Bash Shell Scripting Guide.pdf", | |
"size": "4.6M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "linux-ip.pdf", | |
"size": "664K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "linux-system-administration-recipes-a-problem-solution-approach.9781430224495.49769.pdf", | |
"size": "5.4M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "linuxpocketguide_3rdedition.epub", | |
"size": "2.8M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "linuxpocketguide_3rdedition.mobi", | |
"size": "7.2M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "linuxpocketguide_3rdedition.pdf", | |
"size": "3.0M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "networktroubleshootingtools.epub", | |
"size": "2.1M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "networktroubleshootingtools.mobi", | |
"size": "7.2M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "networktroubleshootingtools.pdf", | |
"size": "4.0M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "pro-bash-programming-scripting-the-gnu-linux-shell-experts-voice-in-linux.9781430219972.49767.pdf", | |
"size": "5.2M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "sedandawk.epub", | |
"size": "1.6M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "sedandawk.mobi", | |
"size": "5.9M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "sedandawk.pdf", | |
"size": "6.1M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "tcp_ip_networkadministration_3rdedition.epub", | |
"size": "2.6M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "tcp_ip_networkadministration_3rdedition.mobi", | |
"size": " 11M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "tcp_ip_networkadministration_3rdedition.pdf", | |
"size": "6.7M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "unix_bookbundle_freetier.epub", | |
"size": "4.2M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "unix_bookbundle_freetier.mobi", | |
"size": "8.5M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "unix_bookbundle_freetier_updated_1479930452.pdf", | |
"size": "5.7M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "unixinanutshell_4thedition.epub", | |
"size": "3.0M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "unixinanutshell_4thedition.mobi", | |
"size": "2.1M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "unixinanutshell_4thedition.pdf", | |
"size": "3.4M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "unixpowertools.epub", | |
"size": "2.9M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "unixpowertools.mobi", | |
"size": " 16M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "unixpowertools.pdf", | |
"size": "6.5M", | |
"type": "file" | |
} | |
], | |
"name": "Linux_Unix", | |
"size": "-", | |
"type": "dir" | |
}, | |
{ | |
"children": [], | |
"name": "Modern_Operating_Systems.pdf", | |
"size": "6.3M", | |
"type": "file" | |
}, | |
{ | |
"children": [ | |
{ | |
"children": [], | |
"name": "Mac OS X GUI Customization for Dummies v2.1.pdf", | |
"size": "8.6M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Mac OS X Panther Timesaving Techniques for Dummies (2004).pdf", | |
"size": " 24M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Mac OS X Tiger Timesaving Techniques for Dummies.pdf", | |
"size": " 38M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Mac mini Hacks & Mods for Dummies.pdf", | |
"size": " 10M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Macs for Dummies, 8th Edition (2004).pdf", | |
"size": "9.8M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "O'Reilly Essential Mac OS X Panther Server Administration.chm", | |
"size": " 21M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "O'Reilly Learning Unix for Mac OS X.pdf", | |
"size": " 16M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "O'Reilly Mac OS X Panther In a Nutshell (2nd Edition).chm", | |
"size": "9.5M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "O'Reilly Mac OS X The Missing Manual (Panther Edition).chm", | |
"size": " 13M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "O'Reilly Mac OS X Unwired.chm", | |
"size": "4.8M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "O'Reilly Switching to the Mac The Missing Manual (Tiger Edition).chm", | |
"size": "5.0M", | |
"type": "file" | |
} | |
], | |
"name": "OSX", | |
"size": "-", | |
"type": "dir" | |
}, | |
{ | |
"children": [], | |
"name": "Operating.Systems.-.A.concept-based.approach.pdf", | |
"size": " 14M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Operating Systems - Internals and Design Principles - 7th E.pdf", | |
"size": "8.5M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Operating Systems and Middleware.pdf", | |
"size": "2.7M", | |
"type": "file" | |
}, | |
{ | |
"children": [ | |
{ | |
"children": [], | |
"name": "Introduction_to_Operating_Systems_Abstractions_Using_Plan_9_from_Bell_Labs_-_Ballesteros.pdf", | |
"size": "1.3M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Notes_on_The_Plan_9_3rd_Edition_Kernel_Source_-_Ballesteros.pdf", | |
"size": "1.9M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Notes_on_The_Plan_9_3rd_Edition_Kernel_Source_-_Ballesteros.tar.gz", | |
"size": "649K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Notes_on_The_Plan_9_3rd_Edition_Kernel_Source_-_Ballesteros.txt", | |
"size": "833K", | |
"type": "file" | |
} | |
], | |
"name": "Plan9", | |
"size": "-", | |
"type": "dir" | |
}, | |
{ | |
"children": [ | |
{ | |
"children": [], | |
"name": "A.Practical.Guide.to.Ubuntu.Linux.pdf", | |
"size": " 12M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Apress.Beginning.Ubuntu.Server.Administration.From.Novice.To.Professional.RETAiL.eBOOk-sUppLeX.pdf", | |
"size": "4.6M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Apress.Pro.Ubuntu.Server.Administration.pdf", | |
"size": "4.7M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "BEGINNING.UBUNTU.LINUX.6th.EDITION.pdf", | |
"size": " 46M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Beginning Ubuntu LTS Administration.From Novice to Professional.2 ed.Apress[ENG,2008].pdf", | |
"size": "4.7M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Benjamin_Mako_Hill___The_Official_Ubuntu_Book_Fith_Edition___2010.pdf", | |
"size": " 13M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Blum R.Ubuntu Linux Secrets.Wiley.[ENG,2009].pdf", | |
"size": " 30M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Childers B.Ubuntu Hacks.Tips and Tools for Exploring Using and Tuning Linux.OReilly[ENG,2006].chm", | |
"size": "3.7M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "For.Dummies.Ubuntu.Linux.For.Dummies.Apr.2007.chm", | |
"size": "3.8M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Gagne M.Moving to Ubuntu Linux.Addison[ENG,2006].chm", | |
"size": " 16M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Grant R.Ubuntu for Non-Geeks.2 ed.NoStarch[ENG,2007].pdf", | |
"size": " 19M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Hadson A.Ubuntu 7.10 Linux Unleashed.Sams[ENG,2008].pdf", | |
"size": " 15M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Hadson A.Ubuntu Unleashed 2006 Edition.Sams[ENG,2006].chm", | |
"size": " 15M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Hadson A.Ubuntu Unleashed 2008 Edition.Sams[ENG,2009].pdf", | |
"size": " 15M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Hill B.The Official Ubuntu Book.Prentice[ENG,2006].chm", | |
"size": " 11M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Jang,_Michael-Ubuntu_Certified_Professional_Study_Guide-MGH.pdf", | |
"size": "8.8M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Krawetz N.Hacking Ubuntu Serious Hacks Mods and Customizations.Wiley[ENG,2007].chm", | |
"size": "9.7M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "McGraw.Hill.Osborne.Media.Ubuntu.Server.Administration.Nov.2008.eBook-DDU.pdf", | |
"size": " 14M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Michael_Jang-Ubuntu_Certified_Professional_Study_Guide_(Exam_LPI_199)(2008).pdf", | |
"size": "8.8M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Negus C.Ubuntu Linux Toolbox.1000 plus Commands for Ubuntu and Debian Power Users.Wiley[ENG,2008].pdf", | |
"size": "3.2M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "No.Starch.Ubuntu.Made.Easy.Jul.2012.pdf", | |
"size": " 22M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Oreilly.Ubuntu.Up.and.Running.Apr.2010.pdf", | |
"size": " 18M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Oreilly Ubuntu Hacks Tips And Tools For Exploring Using And Tuning Linux Jun 2006.chm", | |
"size": "3.7M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Petersen R.Ubuntu.The Complete Reference.McGraw-Hill[ENG,2009].pdf", | |
"size": "9.2M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Prentice.Hall.The.Official.Ubuntu.Book.7th.Edition.Jun.2012.pdf", | |
"size": " 11M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Robin Nixon - Ubuntu Up and Running 2010.pdf", | |
"size": " 18M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Rukovodstvo.po.perehodu.na.Ubuntu.9.10.pdf", | |
"size": " 17M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Sobel M.A Practical Guide to Ubuntu Linux.Prenice-Hall[ENG,2008].pdf", | |
"size": " 11M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "The_Official_Ubuntu_Book_6th_Edition.pdf", | |
"size": "9.6M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Thomas K.Beginning Ubuntu Linux.Apress[ENG,2007].pdf", | |
"size": " 24M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Thomas K.Ubuntu Kung Fu.Over 300 Tips,Trics,Hints and Hacs[ENG,2008].pdf", | |
"size": "6.2M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "UBUNTUserverguide.pdf", | |
"size": "895K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Ubuntu.Unleashed.2012.Edition.pdf", | |
"size": "5.4M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Ubuntu 10.04.pdf", | |
"size": " 15M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Ubuntu Powerfull Hacks And Coustomization.pdf", | |
"size": "4.4M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Ubuntu Server Guide.[ENG,2006].pdf", | |
"size": "697K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Ubuntu Unleashed 2010 Edition - Covering 9.10 and 10.4[Andrew Hudson][Sams][Dec 2009].pdf", | |
"size": " 12M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Ubuntu Unleashed 2011 Edition Covering 10.10 and 11.04, 6th Edition.pdf", | |
"size": " 10M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Ubuntu on a Dime, The Path to Low-Cost Computing.pdf", | |
"size": " 11M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Wiley.Ubuntu.Linux.Bible.Jan.2007.pdf", | |
"size": " 45M", | |
"type": "file" | |
}, | |
{ | |
"children": [ | |
{ | |
"children": [], | |
"name": "Packt Linux Email-2009.pdf", | |
"size": "7.1M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Zimbra Implement Administer and Manage.pdf", | |
"size": "5.8M", | |
"type": "file" | |
} | |
], | |
"name": "ZIMBRA", | |
"size": "-", | |
"type": "dir" | |
}, | |
{ | |
"children": [], | |
"name": "lucid-guide.pdf", | |
"size": " 14M", | |
"type": "file" | |
} | |
], | |
"name": "Ubuntu", | |
"size": "-", | |
"type": "dir" | |
}, | |
{ | |
"children": [], | |
"name": "Unix", | |
"size": "-", | |
"type": "dir" | |
}, | |
{ | |
"children": [ | |
{ | |
"children": [ | |
{ | |
"children": [], | |
"name": "O'Reilly Active Directory (2nd Edition).chm", | |
"size": "3.6M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "O'Reilly Active Directory Cookbook for Windows Server 2003 & Windows 2000.chm", | |
"size": "1.0M", | |
"type": "file" | |
} | |
], | |
"name": "Active Directory", | |
"size": "-", | |
"type": "dir" | |
}, | |
{ | |
"children": [], | |
"name": "Sybex.Mastering.System.Center.Configuration.Manager.2007.R2.Apr.2009.pdf", | |
"size": " 18M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Sybex.Windows.Server.2008.Hyper-V.Insiders.Guide.to.Microsofts.Hypervisor.Apr.2009.pdf", | |
"size": " 14M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Wiley.Windows.Server.2008.Bible.Jul.2008.pdf", | |
"size": " 16M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Windows Server 2003 For Dummies.pdf", | |
"size": " 45M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Windows Server 2003 for Dummies (2003).chm", | |
"size": " 10M", | |
"type": "file" | |
} | |
], | |
"name": "Windows Server", | |
"size": "-", | |
"type": "dir" | |
}, | |
{ | |
"children": [ | |
{ | |
"children": [], | |
"name": "Addison Wesley - Operating Systems Concurrent and Distributed Software Design (2003) [TeaM LiB] [.chm", | |
"size": "9.8M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Create Your Own Programming Language.pdf", | |
"size": "1.3M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Excel.2007.Power.Programming.with.VBA.chm", | |
"size": " 37M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Mastering Active Directory For Windows Server 2003, 3rd ed.chm", | |
"size": " 19M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Microsoft.Press.Introducing.Windows.Server.2008.May.2007.chm", | |
"size": " 14M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Microsoft.Press.Microsoft.Windows.Command-Line.Administrators.Pocket.Consultant.Apr.2004.eBook-DD.chm", | |
"size": "1.3M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Microsoft.Windows.Command.-.Line.Administrator's.Pocket.Consultant.chm", | |
"size": "1.3M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Microsoft Windows 2000 Server Resource Kit TCP_IP Core Networking Guide.CHM", | |
"size": "2.4M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Microsoft Windows Command Line Administrator's Pocket Consultant-2004-MS Press.chm", | |
"size": "1.3M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Microsoft Windows Shell Scripting Programming For The Absolute Beginner.chm", | |
"size": "3.6M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Mspress.-.Running.Ms-Dos.Version.6.22,.20Th.Anniversary.Edition(Van.Wolverton).chm", | |
"size": "2.0M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "O'Reilly - Windows Vista Administration - The Definitive Guide - Brian Culp - (Jun 2007).pdf", | |
"size": " 20M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "OReilly - Windows XP Annoyances.chm", | |
"size": "2.4M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "OReilly.DNS.and.BIND.5th.Edition.May.2006.chm", | |
"size": "2.4M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Silverlight.1.0-Development.with.JavaScript.chm", | |
"size": "3.0M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "The Microsoft Windows DDK Docs Online (Device Driver Kit).chm", | |
"size": " 19M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "The Windows 2000 Device Driver Book, 2nd Edition - Baker & Lozano.chm", | |
"size": "1.8M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Windows Admin Scripting Little Black Book, Second Edition.chm", | |
"size": "2.3M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Windows Api Guide.chm", | |
"size": "1.3M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Windows Script 56(WSH JS VBS).CHM", | |
"size": "1.3M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Windows Server Enterprise Administration 070-647.pdf", | |
"size": "9.9M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Windows Shell Scripting(Batch) Programming.chm", | |
"size": "3.6M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Windows Vista - The Definitive Guide (OReilly, 2007) WW.[sharethefiles.com].chm", | |
"size": " 15M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Windows XP Digital Music For Dummies (Nov 2004).pdf", | |
"size": "7.3M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Windows XP Gigabook For Dummies (2004).pdf", | |
"size": " 31M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Windows XP Hacks & Mods For Dummies (Sep 2005).pdf", | |
"size": " 14M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Windows XP Just the Steps for Dummies (2005).pdf", | |
"size": " 36M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Windows XP Timesaving Techniques for Dummies, 2nd Edition (Jan 2005).pdf", | |
"size": " 24M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Windows XP for Dummies, 2nd Edition.pdf", | |
"size": " 11M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Windows Xp For Dummies, 1st Edition (2001).pdf", | |
"size": "6.2M", | |
"type": "file" | |
} | |
], | |
"name": "Windows XP", | |
"size": "-", | |
"type": "dir" | |
}, | |
{ | |
"children": [], | |
"name": "os-dev.pdf", | |
"size": "756K", | |
"type": "file" | |
} | |
], | |
"name": "Operating Systems", | |
"size": "-", | |
"type": "dir" | |
}, | |
{ | |
"children": [ | |
{ | |
"children": [ | |
{ | |
"children": [], | |
"name": "O'Reilly ADO.NET Cookbook.chm", | |
"size": "882K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "O'Reilly ADO Activex Data Objects.pdf", | |
"size": "2.3M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "O'Reilly Programming ADO.NET.chm", | |
"size": "5.9M", | |
"type": "file" | |
} | |
], | |
"name": "ADO", | |
"size": "-", | |
"type": "dir" | |
}, | |
{ | |
"children": [ | |
{ | |
"children": [], | |
"name": "ASP.NET 2.0 Everyday Apps for Dummies.pdf", | |
"size": "9.5M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "O'Reilly ASP.NET 2.0 Cookbook (2nd Edition).chm", | |
"size": "3.9M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "O'Reilly ASP In a Nutshell.pdf", | |
"size": "3.9M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "O'Reilly Learning ASP.NET 2.0 with AJAX.pdf", | |
"size": " 12M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "O'Reilly Programming ASP.NET (3rd Edition).chm", | |
"size": "9.2M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "O'Reilly Programming ASP.NET AJAX.pdf", | |
"size": "6.8M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "OReilly.Learning.ASP.NET.3.5.2nd.Edition.Jul.2008.pdf", | |
"size": " 17M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Wrox.Professional.ASP.NET.3.5.Security.Membership.and.Role.Management.with.C.Sharp.and.VB.Nov.2008.pdf", | |
"size": " 12M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Wrox.Professional.ASP.NET.MVC.1.0.Apr.2009.pdf", | |
"size": " 18M", | |
"type": "file" | |
} | |
], | |
"name": "ASP.Net", | |
"size": "-", | |
"type": "dir" | |
}, | |
{ | |
"children": [ | |
{ | |
"children": [], | |
"name": "O'Reilly sed & awk (2nd Edition).pdf", | |
"size": "2.1M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "O'Reilly sed & awk Pocket Reference (2nd Edition).chm", | |
"size": " 91K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "The_AWK_Programming_Language_-_Aho,_Weinberger,_Kernighan.pdf", | |
"size": "7.8M", | |
"type": "file" | |
} | |
], | |
"name": "AWK", | |
"size": "-", | |
"type": "dir" | |
}, | |
{ | |
"children": [ | |
{ | |
"children": [], | |
"name": "ActionScript.3.0.Design.Patterns.Jul.2007.pdf", | |
"size": "4.0M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "ActionScript 3.0 Cookbook.pdf", | |
"size": "2.3M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "ActionScript 3.0 Game Programming University.zip", | |
"size": "6.3M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Actionscript 3.0 Animation Making Things Move!.zip", | |
"size": "2.8M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Advanced ActionScript 3 With Design Patterns.pdf", | |
"size": "1.3M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Foundation.Actionscript.3.0.Animation.Apr.2007.pdf", | |
"size": "3.4M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "FriendsofED.The.Essential.Guide.to.Open.Source.Flash.Development.Jul.2008.pdf", | |
"size": "8.6M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Learning ActionScript 3.0.pdf", | |
"size": " 26M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "O'Reilly - ActionScript 3.0 Cookbook (2006).PDF", | |
"size": "2.5M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "O'Reilly ActionScript Cookbook.chm", | |
"size": "1.4M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "O'Reilly Actionscript for Flash MX The Definitive Guide (2nd Edition).chm", | |
"size": "2.0M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "O'Reilly Essential Actionscript 2.0.chm", | |
"size": "914K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "OReilly Books Series - Essential ActionScript 3.0.pdf", | |
"size": "4.8M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Object-Oriented.ActionScript.3.0.zip", | |
"size": "5.7M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "flash_as3_programming.pdf", | |
"size": "7.1M", | |
"type": "file" | |
} | |
], | |
"name": "ActionScript", | |
"size": "-", | |
"type": "dir" | |
}, | |
{ | |
"children": [ | |
{ | |
"children": [], | |
"name": "Ada 95 - The Craft of Object-Oriented Programming.pdf", | |
"size": "4.3M", | |
"type": "file" | |
} | |
], | |
"name": "Ada", | |
"size": "-", | |
"type": "dir" | |
}, | |
{ | |
"children": [ | |
{ | |
"children": [], | |
"name": "AJAX - Creating Web Pages With Asynchronous JavaScript And XML (2006).chm", | |
"size": "2.9M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "AJAX And PHP - Building Responsive Web Applications (2006).pdf", | |
"size": "5.6M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Ajax Design Patterns (2006).chm", | |
"size": "7.2M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Ajax For Dummies (2006).pdf", | |
"size": "8.0M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Ajax For Web Application Developers (2006).chm", | |
"size": "1.4M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Ajax Hacks - Tips & Tools For Creating Responsive Websites (2006).chm", | |
"size": "2.9M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Ajax In Action (2006).pdf", | |
"size": "8.0M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Ajax On Rails (2006).chm", | |
"size": "1.5M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Ajax Patterns And Best Practices (2006).pdf", | |
"size": " 15M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Beginning Ajax With ASP.NET (2006).pdf", | |
"size": "6.9M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Beginning Ajax With PHP - From Novice To Professional (2006).pdf", | |
"size": "3.9M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Beginning Google Maps Applications With PHP And Ajax - From Novice To Professional (2006).pdf", | |
"size": " 15M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Beginning JavaScript With DOM Scripting And Ajax - From Novice To Professional (2006).pdf", | |
"size": " 16M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Beginning XML With DOM And Ajax - From Novice To Professional (2006).pdf", | |
"size": "9.1M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Bulletproof Ajax.pdf", | |
"size": "2.7M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Foundations Of Ajax (2006).pdf", | |
"size": " 38M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Foundations Of Atlas - Rapid Ajax Development With ASP.NET 2.0 (2006).pdf", | |
"size": " 14M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "JavaScript & AJAX For The Web - Visual QuickStart Guide, 6th Edition (2006).chm", | |
"size": " 13M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "O'Reilly Adding Ajax.chm", | |
"size": "4.2M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "O'Reilly Head Rush Ajax.chm", | |
"size": "463K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "O'Reilly Securing AJAX Applications.pdf", | |
"size": "1.9M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Pragmatic Ajax - A Web 2.0 Primer (2006).pdf", | |
"size": "3.8M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Pro Ajax And Java (2006).pdf", | |
"size": " 10M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Pro JSF And Ajax - Building Rich Internet Components (2006).pdf", | |
"size": "3.8M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Professional Ajax (2006).chm", | |
"size": "3.5M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Teach Yourself Ajax In 10 Minutes (2006).chm", | |
"size": "2.4M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Understanding AJAX - Using JavaScript To Create Rich Internet Applications (2006).chm", | |
"size": "6.2M", | |
"type": "file" | |
} | |
], | |
"name": "Ajax", | |
"size": "-", | |
"type": "dir" | |
}, | |
{ | |
"children": [ | |
{ | |
"children": [], | |
"name": "Addison-Wesley The Android Developer's Cookbook, Building Applications with the Android SDK (2011).pdf", | |
"size": "3.4M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Android.Application.Development.for.For.Dummies.pdf", | |
"size": "9.9M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Android.User.Interface.Development.Beginner.Guide.pdf", | |
"size": "2.2M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Android.in.Action.2nd.Edition.pdf", | |
"size": " 18M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Android.in.Action.3rd.Edition.pdf", | |
"size": " 15M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Android.pdf", | |
"size": "9.8M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Android Application Development from A to Z.pdf", | |
"size": "903K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Android Application Development in 24 Hours.pdf", | |
"size": " 27M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Android Apps For Absolute Beginners.pdf", | |
"size": " 68M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Android Cookbook.pdf", | |
"size": " 32M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "AndroidForAllrus.pdf", | |
"size": "6.4M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Android Forensics.pdf", | |
"size": " 39M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Android Fully Loaded by Rob Huddleston.pdf", | |
"size": "2.8M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Android Programming Tutorials.pdf", | |
"size": " 15M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Android Wireless Application Development Second Edition.pdf", | |
"size": " 13M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Android_Application_Development_For_Dummies.pdf", | |
"size": "9.9M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Application.Security.for.the.Android.Platform.pdf", | |
"size": "5.5M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Apress.Pro.Android.3.Apr.2011.pdf", | |
"size": " 25M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Apress. Robbie Matthews. Beginning Android Tablet Programming. 2011.pdf", | |
"size": " 55M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Apress Android Apps for Absolute Beginners (2011).pdf", | |
"size": " 68M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Apress Android Essentials (2008).pdf", | |
"size": "1.1M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Apress Beginning Android 4 (2012).pdf", | |
"size": " 28M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Beggining Android Development.pdf", | |
"size": " 60M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Beginning.Android.4.pdf", | |
"size": " 28M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Beginning Android.pdf", | |
"size": " 27M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Beginning Android ADK with Arduino (2012).pdf", | |
"size": "9.8M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Beginning Android Application Development (Wrox, 2011, 1118017110).pdf", | |
"size": " 22M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "CommonsWare.The.Busy.Coders.Guide.to.Advanced.Android.Development.Mar.2011.pdf", | |
"size": " 16M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Decompiling.Android.pdf", | |
"size": "4.5M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Embedded Android - Yaghmour - O'Reilly (2011).pdf", | |
"size": "2.2M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Frank Ableson, Robi Sen, Chris King - Android in Action 2nd Edition - 2011.pdf", | |
"size": " 16M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Head First Android Development.pdf", | |
"size": " 47M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Introducing Mobile Application Development for Android.pdf", | |
"size": "1.5M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "KomatineniSatyaProAndroid3-2011.pdf", | |
"size": " 24M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Learn Android App Development.pdf", | |
"size": " 41M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Lee Wei-Meng - Beginning Android 4 Application Development - 2012.pdf", | |
"size": " 60M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Mario Zechner - Beginning Android Games - 2011.pdf", | |
"size": " 47M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Mark L Murphy - Android Programming Tutorials, 3rd Edition - 2011.pdf", | |
"size": " 11M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Mednieks Z. - Programming Android 2nd Edition - 2012.pdf", | |
"size": "8.2M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Mednieks Zigurd - Programming Android - 2011.pdf", | |
"size": " 12M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Merrifield Mew K. - Android 3.0 Application Development Cookbook - 2011.pdf", | |
"size": "9.6M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Milano_Diego_Torres_-_Android_Application_Testing_Guide_-_2011.pdf", | |
"size": "7.0M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Milette G., Stroud A. - Professional Android Sensor Programming - 2012.pdf", | |
"size": " 15M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Nerd Android Guide.pdf", | |
"size": " 41M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "OReilly.Android.Application.Development.Programming.With.The.Google.SDK.2009.0596521472.pdf", | |
"size": "4.3M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "OReilly Learning Android (2011).pdf", | |
"size": "9.5M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "OReilly Programming Android (2011).pdf", | |
"size": " 10M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Oreilly.Developing.Android.Applications.with.Flex.4.5.May.2011.pdf", | |
"size": "8.6M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Oreilly.Learning.Android.Mar.2011.pdf", | |
"size": "9.5M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Ostrander J. - Android UI Fundamentals Develop and Design - 2012.pdf", | |
"size": "3.6M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Packtpub.Android.Database.Programming.Jun.2012.pdf", | |
"size": "3.0M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Practical.Android.Projects.pdf", | |
"size": " 17M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Prentice.Hall.Android.for.Programmers.pdf", | |
"size": " 15M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Pro.Android.Web.Apps.pdf", | |
"size": " 13M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Pro Android-3.pdf", | |
"size": " 27M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Professional.Android.2.Application.Development.(Wrox,.2010,.0470565527).pdf", | |
"size": " 20M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Satya Komatineni and Dave MacLean - Pro Android 4 - 2012.pdf", | |
"size": " 31M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Smith Dave - Android Recipes A Problem-Solution Approach - 2011.pdf", | |
"size": " 11M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "The.Android.Developers.Cookbook.pdf", | |
"size": "4.5M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "The Complete Guide to Google Android - 2010.pdf", | |
"size": " 43M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Veronique Brossier - Developing Android Applications with Adobe AIR - 2011.pdf", | |
"size": "7.5M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Wei-Meng Lee - Beginning Android Tablet Application Development- 2011.pdf", | |
"size": " 52M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Wiley - Amazing Android Apps For Dummies.pdf", | |
"size": " 70M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Wrox Press Beginning Android 4 Application Development (2012).pdf", | |
"size": " 60M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "professional_android_application_development.pdf", | |
"size": "7.4M", | |
"type": "file" | |
} | |
], | |
"name": "Android", | |
"size": "-", | |
"type": "dir" | |
}, | |
{ | |
"children": [ | |
{ | |
"children": [], | |
"name": "Arduino.pdf", | |
"size": "9.2M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Arduino Cookbook.pdf", | |
"size": "7.5M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Arduino for evil geniuses.pdf", | |
"size": "8.2M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Beginning C for Arduino.pdf", | |
"size": " 28M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "C Programming for Arduino.pdf", | |
"size": " 11M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Programming Embedded Systems In C And C++ (1999).pdf", | |
"size": "1.5M", | |
"type": "file" | |
} | |
], | |
"name": "Arduino", | |
"size": "-", | |
"type": "dir" | |
}, | |
{ | |
"children": [ | |
{ | |
"children": [], | |
"name": "2011 - Assembly Language for x86 Processors 6e (Prentice Hall).pdf", | |
"size": "1.8M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "ARM Assembly Language Programming - Pete Cockerell.pdf", | |
"size": "1.6M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "ASM_Language.pdf", | |
"size": "1.0M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "ASM in Linux.pdf", | |
"size": " 31M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Art of Assembly Language, The - Hyde, Randall.pdf", | |
"size": "6.2M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Assembly Language, The True Language Of Programmers.pdf", | |
"size": "4.9M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Assembly Language - The True Language Of Programmers.pdf", | |
"size": "5.0M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Assembly Language Step-by-Step Programming with DOS and Linux.chm", | |
"size": "8.6M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Assembly Language Step-by-Step_ Programming with Linux - Duntemann, Jeff.pdf", | |
"size": "9.2M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Assembly Language for x86 Processors 6th Ed.pdf", | |
"size": "2.9M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Guide To Assembly Language Programming In Linux (2005).pdf", | |
"size": " 31M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Introduction_to_64_Bit_Intel_Assembly_for_Linux.pdf", | |
"size": "4.9M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Introduction to 80x86 Assembly Language and Computer Architecture.pdf", | |
"size": "2.6M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Jones and Bartlett,Introduction to 80x86 Assembly Language and Computer Architecture.pdf", | |
"size": "4.9M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Kip_Irvine-Assembly_Language-Seventh_edition.pdf", | |
"size": " 12M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Linux Assembly Language Programming 2000.pdf", | |
"size": "2.5M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "MASMReference.pdf", | |
"size": "646K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "MIPS Assembly Language Programming 2003.pdf", | |
"size": "525K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Professional Assembly Language.pdf", | |
"size": "6.6M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Springer - Guide to Assembly Language Programming in Linux.pdf", | |
"size": " 31M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "The Art Of Assembly Language 2003.chm", | |
"size": " 18M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "The Art of Assembly Language.pdf", | |
"size": "4.3M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "The Zen Of Assembly Language 1990 - Michael Abrash.pdf", | |
"size": "2.5M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "The art of Assembly Language 8086.pdf", | |
"size": "4.3M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Tiny_Guide_to_X86_Assembly.pdf", | |
"size": " 80K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Unix Assembly Codes Development for Vulnerabilities.pdf", | |
"size": "274K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Windows Assembly Language & Systems Programming- 16 And 32 Bit Low-Level Programming for the PC and Windows 1997 - Barry Kauler.pdf", | |
"size": " 13M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Write Great Code - Thinking Low-Level Writing High-Level - Volume II.pdf", | |
"size": "4.3M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Write Great Code Understanding the Machine, Volume I.chm", | |
"size": "8.2M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "X86_Assembly.pdf", | |
"size": "429K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "[Kip_R._Irvine]_Assembly_Language_for_x86_processors.pdf", | |
"size": " 12M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "pcasm.pdf", | |
"size": "782K", | |
"type": "file" | |
}, | |
{ | |
"children": [ | |
{ | |
"children": [], | |
"name": "64-ia-32-architectures-software-developer-manual-325462.pdf", | |
"size": " 22M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "24594.pdf", | |
"size": "3.6M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "325462-sdm-vol-1-2abcd-3abcd.pdf", | |
"size": " 23M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "IA-32 Intel\u00c2\u00ae Architecture Software Developer's Manual (Volume 1 - Basic Architecture).pdf", | |
"size": "2.4M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "IA-64 Assembly Language Reference Guide.pdf", | |
"size": "932K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Intel32-1-Basic Architecture.pdf", | |
"size": "2.4M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Intel32-2-Instruction Set ReferenceA.pdf", | |
"size": "2.2M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Intel32-2-Instruction Set ReferenceB.pdf", | |
"size": "1.7M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Intel32-3-System Programming Guide.pdf", | |
"size": "4.4M", | |
"type": "file" | |
} | |
], | |
"name": "reference", | |
"size": "-", | |
"type": "dir" | |
}, | |
{ | |
"children": [], | |
"name": "w32_ASMCheatsheet.png", | |
"size": "717K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "x86 Disassembly.pdf", | |
"size": "1.1M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "x86 Instruction Set Architecture.pdf", | |
"size": "7.7M", | |
"type": "file" | |
} | |
], | |
"name": "Assembly", | |
"size": "-", | |
"type": "dir" | |
}, | |
{ | |
"children": [ | |
{ | |
"children": [], | |
"name": "Linux_Shell_Scripting_with_Bash-Burtch-2004.pdf", | |
"size": "4.5M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "O'Reilly - Learning the Bash Shell.chm", | |
"size": "636K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "O'Reilly bash CookBook.pdf", | |
"size": "1.9M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Sams - Teach Yourself Shell Programming in 24 Hours.pdf", | |
"size": " 96M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "bashcookbook.epub", | |
"size": "2.1M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "bashcookbook.mobi", | |
"size": "8.4M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "bashcookbook.pdf", | |
"size": " 11M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "bashpocketreference_2ndedition.epub", | |
"size": "2.4M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "bashpocketreference_2ndedition.mobi", | |
"size": "6.0M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "bashpocketreference_2ndedition.pdf", | |
"size": "2.5M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "classicshellscripting.epub", | |
"size": "1.7M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "classicshellscripting.mobi", | |
"size": "7.2M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "classicshellscripting.pdf", | |
"size": "7.5M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "learningthebashshell_3rdedition.epub", | |
"size": "1.5M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "learningthebashshell_3rdedition.mobi", | |
"size": "7.0M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "learningthebashshell_3rdedition.pdf", | |
"size": "2.0M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "learningtheviandvimeditors_7thedition.epub", | |
"size": "4.5M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "learningtheviandvimeditors_7thedition.mobi", | |
"size": "9.7M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "learningtheviandvimeditors_7thedition.pdf", | |
"size": "5.7M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "learningunixforosx_2ndedition.epub", | |
"size": " 10M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "learningunixforosx_2ndedition.mobi", | |
"size": " 26M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "learningunixforosx_2ndedition.pdf", | |
"size": " 12M", | |
"type": "file" | |
} | |
], | |
"name": "Bash", | |
"size": "-", | |
"type": "dir" | |
}, | |
{ | |
"children": [], | |
"name": "C++.tar.bz2", | |
"size": "2.1G", | |
"type": "file" | |
}, | |
{ | |
"children": [ | |
{ | |
"children": [], | |
"name": "(eBook) Intermediate C++ programming.pdf", | |
"size": "359K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "A Brief Look at C++.pdf", | |
"size": " 17K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "ANSI C++ Reference.pdf", | |
"size": "3.7M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "API Design for C++ by Martin Reddy.pdf", | |
"size": " 18M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "API Design for Cpp.pdf", | |
"size": " 18M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "A Perspective on ISO C++.pdf", | |
"size": " 28K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "AW - Effective STL.pdf", | |
"size": "1.8M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Accelerated C++ 2000.pdf", | |
"size": "2.6M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "ActiveX Programming with Visual C++.chm", | |
"size": "2.3M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Addison-Wesley - C++ Standard Library, The A Tutorial and Reference.chm", | |
"size": "3.3M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Addison-Wesley - C++ Standard Library, The A Tutorial and Reference.pdf", | |
"size": "3.8M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Addison-Wesley - Exceptional C++ Style 40 New Engineering Puzzles, Programming Problems and Solutions - Herb Sutter.chm", | |
"size": "551K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Addison-Wesley.Professional.Cross-Platform.Development.in.C++.pdf", | |
"size": "4.2M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Addison-Wesley C++ Templates, The Complete Guide.chm", | |
"size": "737K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Addison-Wesley C++ Templates, The Complete Guide.pdf", | |
"size": "2.3M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Addison-Wesley Modern C++ Design, Generic Programming and Design Patterns Applied.chm", | |
"size": "816K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Addison-Wesley Modern C++ Design, Generic Programming and Design Patterns Applied.pdf", | |
"size": "2.4M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Addison.Wesley.C++.Network Programming,Volume.1.chm", | |
"size": "2.3M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Addison.Wesley.C++.Network Programming,Volume.2.chm", | |
"size": "2.2M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Addison.Wesley.C++.Primer, Third Edition.chm", | |
"size": "1.4M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Addison.Wesley.C++.Standard Library,The.A.Tutorial.and.Reference.chm", | |
"size": "3.4M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Addison.Wesley.C++.Template.Metaprogramming.Concepts.Tools.and.Techniques.from.Boost.and.Beyond.chm", | |
"size": "731K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Addison.Wesley.C++.Templates-The.Complete.Guide.chm", | |
"size": "737K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Addison.Wesley.C++ Primer.By.Stanley B. Lippman.pdf", | |
"size": "3.0M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Addison.Wesley.C.Sharp.Developer's.Guide.to.ASP.NET.XML.and.ADO.NET.chm", | |
"size": "2.2M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Addison.Wesley.CPP.Primer.Plus.6th.Edition.Oct.2011.pdf", | |
"size": "7.7M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Addison.Wesley.Parallel.And.Distributed.Programming.Using.Cpp.eBook-LiB.chm", | |
"size": "2.0M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Addison Wesley - Accelerated C++.pdf", | |
"size": "2.6M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Addison Wesley - Accelerated C++ Practical Programming by Example.chm", | |
"size": "879K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Addison Wesley - Advanced CORBA Programming with C++.pdf", | |
"size": "4.8M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Addison Wesley - Algorithms, Data Structures, and Problem Solving with C++ .pdf", | |
"size": "1.1M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Addison Wesley - Applied C++ Practical Techniques for Building Better Software.chm", | |
"size": "2.1M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Addison Wesley - Applied C++ Practical Techniques for Building Better Software.chm", | |
"size": "2.1M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Addison Wesley - Applied C++ Techniques For Building Better Software.chm", | |
"size": "2.1M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Addison Wesley - Beyond the C++ Standard Library. An Introduction to Boost.chm", | |
"size": "519K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Addison Wesley - C++ By Dissection (Case Conflict).pdf", | |
"size": "5.2M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Addison Wesley - C++ By Dissection[1].pdf", | |
"size": "5.2M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Addison Wesley - C++ Coding Standards - 101 Rules Guidelines.chm", | |
"size": "525K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Addison Wesley - C++ Coding Standards. 101 Rules, Guidelines, and Best Practices.chm", | |
"size": "525K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Addison Wesley - C++ Common Knowledge Essential Intermediate Programming.chm", | |
"size": "499K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Addison Wesley - C++ FAQs (1998) .chm", | |
"size": "896K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Addison Wesley - C++ FAQs, Second Edition.chm", | |
"size": "896K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Addison Wesley - C++ Gotchas. Avoiding Common Problems in Coding and Design.chm", | |
"size": "717K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Addison Wesley - C++ Gotchas .chm", | |
"size": "717K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Addison Wesley - C++ Network Programming Vol 1.chm", | |
"size": "2.3M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Addison Wesley - C++ Network Programming Vol 2.chm", | |
"size": "2.2M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Addison Wesley - C++ Primer, Fourth Edition.chm", | |
"size": "1.6M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Addison Wesley - C++ Primer, Third Edition.chm", | |
"size": "1.4M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Addison Wesley - C++ Primer 3rd Ed.chm", | |
"size": "1.4M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Addison Wesley - C++ Standard Library, The A Tutorial and Reference.chm", | |
"size": "3.3M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Addison Wesley - C++ Standard Library. A Tutorial And Reference.chm", | |
"size": "3.3M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Addison Wesley - C++ Templates, The Complete Guide.chm", | |
"size": "737K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Addison Wesley - C++ Templates - The Complete Guide.chm", | |
"size": "737K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Addison Wesley - C++ Transparency.pdf", | |
"size": "1.6M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Addison Wesley - C++ by Dissection.pdf", | |
"size": "5.2M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Addison Wesley - Data Structures and Problem Solving with C++ (2003).pdf", | |
"size": " 63M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Addison Wesley - Design Patterns Explained.chm", | |
"size": "1.6M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Addison Wesley - Designing Components with the C++ STL.pdf", | |
"size": "1.1M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Addison Wesley - Effcient C++ Performance Programming Techniques.pdf", | |
"size": "1.7M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Addison Wesley - Effcient C++ Programming Techniques Ebook - fly.pdf", | |
"size": "1.7M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Addison Wesley - Effective C++ Third Edition 55 Specific Ways to Improve Your Programs and Desig.chm", | |
"size": "656K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Addison Wesley - Effective C++ Third Edition 55 Specific Ways to Improve Your Programs and Designs.chm", | |
"size": "656K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Addison Wesley - Efficient C++ Performance Programming Techniques.chm", | |
"size": "886K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Addison Wesley - Essential C++.chm", | |
"size": "401K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Addison Wesley - Essential C++.pdf", | |
"size": "1.4M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Addison Wesley - Essential C++ Ebook-fly.pdf", | |
"size": "1.4M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Addison Wesley - Exceptional C++ 47 Engineering Puzzles, Programming Problems, and Solutions.chm", | |
"size": "365K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Addison Wesley - How To Run Successfu .Projects III.chm", | |
"size": "1.5M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Addison Wesley - Imperfect C++ Practical Solutions for Real-Life Programming.chm", | |
"size": "1.1M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Addison Wesley - Imperfect C++_,Practical Solutions for Real-Life Programming.chm", | |
"size": "1.1M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Addison Wesley - Inside C++ Object Model.chm", | |
"size": "746K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Addison Wesley - Inside the C++ Object Model (1996).chm", | |
"size": "658K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Addison Wesley - Inside the C++ Object Model.chm", | |
"size": "658K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Addison Wesley - Leffingwell & Widrig - Managing Software Requirements, 1St Edition.pdf", | |
"size": "7.4M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Addison Wesley - Modern C++ Design, Generic Programming and Design Patterns Applied.chm", | |
"size": "816K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Addison Wesley - Modern C++ Design. Generic Programming and Design Patterns Applied.chm", | |
"size": "816K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Addison Wesley - Modern C++ Design. Generic Programming and Design Patterns Applied.chm", | |
"size": "816K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Addison Wesley - Modern C++ Design Generic Programming and Design Patterns Applied.chm", | |
"size": "816K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Addison Wesley - More Exceptional C++.chm", | |
"size": "505K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Addison Wesley - More Exceptional CPLUSPLUS.chm", | |
"size": "505K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Addison Wesley - Tcl and the Tk Toolkit[1993].pdf", | |
"size": "1.4M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Addison Wesley - The.C++ Standard Library - A Tutorial and Reference.chm", | |
"size": "3.4M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Addison Wesley - The C++ Programming Language (3rd) SPECIAL EDITION , B Stroustrup.pdf", | |
"size": "3.4M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Addison Wesley - The C++ Programming Language, Third Edition.pdf", | |
"size": "3.4M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Addison Wesley - The C++ Programming Language.pdf", | |
"size": "3.3M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Addison Wesley - The C++ Programming Language 3Rd Ed Bjarne Stroustrup.pdf", | |
"size": "4.4M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Addison Wesley - The C++ Standard Library. A Tutorial and Reference.chm", | |
"size": "3.4M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Addison Wesley - The C++ Standard Library. A Tutorial and Reference.pdf", | |
"size": "4.6M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Addison Wesley - The Design And Evolution Of C++ Bjarne Stroustrup.pdf", | |
"size": "9.1M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Addison Wesley - UNIX Network Programming Volume 1.3rd Ed The Sockets Networking API-LiB.chm", | |
"size": "5.4M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Addison Wesley.C++ Template Metaprogramming (2004) LiB.chm", | |
"size": "634K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Addison Wesley Professional - Beyond The C++ Standard Library - An Introduction To Boost (2005).chm", | |
"size": "519K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Addison Wesley Professional - C++ Primer 4th Ed (2005).chm", | |
"size": "1.6M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "AddisonWesley_CppStandardLibraryATutorialAndReference.chm", | |
"size": "3.4M", | |
"type": "file" | |
}, | |
{ | |
"children": [ | |
{ | |
"children": [], | |
"name": "Alexandrescu A. - Modern C++ Design (2001).pdf", | |
"size": "2.1M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Beyond the C++ Standard Library - An Introduction to Boost [Dark Demon] [h33t].chm", | |
"size": "519K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "C++ Concurrency in Action - Practical Multithreading.pdf", | |
"size": "6.2M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Josuttis N.M. - The C++ Standard Library A Tutorial and Reference - 2012.pdf", | |
"size": " 14M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Problem Solving with C++ (9th Edition) 2014.pdf", | |
"size": "9.7M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "[Antony Polukhin]Boost C++ Application Development Cookbook (pdf){Zzzzz}.pdf", | |
"size": "3.6M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "[Vic_Broquard]_C++_for_Computer_Science_and_Engine(Book4You).pdf", | |
"size": "8.6M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "algorithm-book-by-karumanchi.pdf", | |
"size": "1.7M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "coursereader.pdf", | |
"size": "6.4M", | |
"type": "file" | |
} | |
], | |
"name": "Advanced", | |
"size": "-", | |
"type": "dir" | |
}, | |
{ | |
"children": [], | |
"name": "Alavoor Vasudevan - Linux C++ Programming- Howto.pdf", | |
"size": "233K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Algorithms in C.zip", | |
"size": "4.9M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "An Introduction to Design Patterns in C++ with Qt4 (Prentice Hall, 2006).chm", | |
"size": "5.6M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Applied C - Practical Techniques For Building Better Software (2003).chm", | |
"size": "2.1M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Apress - ATL Server. High Performance CPLUSPLUS on .NET.chm", | |
"size": "3.2M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Apress - Cryptography in C and C++(2001).chm", | |
"size": "3.5M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Apress - Managed CPLUSPLUS and .NET Development.chm", | |
"size": " 59M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Apress.Exploring C++.2009.pdf", | |
"size": "3.0M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Barr - Programming Embedded Systems in C and C++ (O'Reilly, 1999).chm", | |
"size": "488K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Bartosz Milewski - C++ In Action, Industrial Strength Programming.rar", | |
"size": "1.2M", | |
"type": "file" | |
}, | |
{ | |
"children": [ | |
{ | |
"children": [], | |
"name": "0321992784CPP2.epub", | |
"size": " 33M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Accelerated C++ Practical Programming by Example.chm", | |
"size": "879K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "C++ Primer 5th Edition.pdf", | |
"size": " 50M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "C Programming.pdf", | |
"size": "256M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Effective & More Effective C++.chm", | |
"size": "3.2M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "EffectiveSTL.pdf", | |
"size": "1.8M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "OReilly - Effective Modern C++ - Scott Meyers.pdf", | |
"size": "4.5M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Programming__Principles_and_Practice_Using C++ (Cpp Cplusplus).pdf", | |
"size": " 25M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "ThinkingInCPlusPlusVolumeOne.pdf", | |
"size": "2.9M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "ThinkingInCPlusPlusVolumeTwo.pdf", | |
"size": "2.0M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "progr_princ_pract_cpp.pdf", | |
"size": "150M", | |
"type": "file" | |
} | |
], | |
"name": "Beginner", | |
"size": "-", | |
"type": "dir" | |
}, | |
{ | |
"children": [], | |
"name": "Beginning Visual C++ 2005 (2008).pdf", | |
"size": " 18M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Beyond The C Standard Library - An Introduction To Boost (2005).chm", | |
"size": "519K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Beyond the C++ Standard Library - An Introduction to Boost (Addison Wesley Professional, 2005).chm", | |
"size": "519K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Borland CPP Builder.chm", | |
"size": " 18M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "C# Language Specification 3.0.pdf", | |
"size": "2.7M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "C++ (14 Days Learning).pdf", | |
"size": "4.7M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "C++ - How To Program, 5th Edition (2005).pdf", | |
"size": " 16M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "C ++ - How To Program - Source Code Flowchart, 2 Ed.[Deitel].pdf", | |
"size": "1.3M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "C++ - Intel C++ Compiler - User's Guide.chm", | |
"size": "1.0M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "C++ - Vergleich Delphi und Visual C++.pdf", | |
"size": "641K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "C++.Programmieren.mit.Stil.pdf", | |
"size": "4.8M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "C++.pdf", | |
"size": "2.0M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "C++Better Device Software Developement.pdf", | |
"size": "369K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "C++ By Dissection (2002).pdf", | |
"size": "5.2M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "C++ Coding Standards - 101 Rules, Guidelines, And Best Practices (2004).chm", | |
"size": "525K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "C++ Coding Standards - 101 Rules, Guidelines, And Best Practices (2004).pdf", | |
"size": "4.2M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "C++ Complete Reference (3rd Ed.).pdf", | |
"size": "8.8M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "C++ Cookbook (2005).pdf", | |
"size": "2.9M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "C++ Demystified - A Self Teaching Guide (2004).pdf", | |
"size": "2.4M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "C++ Essential (for non-dummies) (2005).chm", | |
"size": "450K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "C++ For Business Programming, 2nd Edition (2005).chm", | |
"size": "3.6M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "C++ For Business Programming, 2nd Edition (2005).pdf", | |
"size": "5.9M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "C++ For Dummies, 5th Edition (2004).pdf", | |
"size": "7.7M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "C++ For Mathematicians - An Introduction For Students And Professionals (2006).pdf", | |
"size": " 30M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "C++ From The Ground Up, 3rd Edition (2003).pdf", | |
"size": "2.3M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "C++ GUI Programming With Qt 4 (2006).pdf", | |
"size": "7.0M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "C++ How to Program, Fifth Edition- Source Code.zip", | |
"size": "691K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "C++ How to Program, Fifth Edition.chm", | |
"size": " 10M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "C++ In A Nutshell (2003).chm", | |
"size": "1.2M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "C++ In A Nutshell (2003).pdf", | |
"size": "4.7M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "C++ Journal - Stroustrup's Guide To Learning C++ 1999.pdf", | |
"size": " 40K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "C++ Middle Enginnering Tutorial.pdf", | |
"size": "1.2M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "C++ Network Programming, Volume 2 - Systematic Reuse with ACE and Frameworks (Addison Wesley, 200.chm", | |
"size": "2.2M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "C++ Network Programming Volume 2.chm", | |
"size": "2.2M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "C++ Plus Data Structures, 3rd Edition (2003).pdf", | |
"size": " 18M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "C++ Primer, 4th Edition (2005).pdf", | |
"size": "5.5M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "C++ Primer - Fourth Edition - Stanley B. Lippman, Jos\u00c3\u00a9e Lajoie, Barbara E. Moo.chm", | |
"size": "1.6M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "C++ Primer Plus (5th Edition).pdf", | |
"size": "6.4M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "C++ Primer Plus, Fourth Edition.chm", | |
"size": "4.4M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "C++ Primer Plus.pdf", | |
"size": "6.4M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "C++ Primer Plus 4th Edition.pdf", | |
"size": " 25M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "C++ Primer Plus 5th Edition 2005.pdf", | |
"size": " 30M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "C++ Programming HOWTO.pdf", | |
"size": "237K", | |
"type": "file" | |
}, | |
{ | |
"children": [ | |
{ | |
"children": [], | |
"name": "C++ Programming Style Guidelines.pdf", | |
"size": "1.0M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "C++ Technical Performance report 2006-02 TR18015.pdf", | |
"size": "1.2M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Latest draft 2006-11 n2135.pdf", | |
"size": "7.5M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "OFFICIAL C++ LANGUAGE SPECIFICATIONS INCITS+ISO+IEC+14882-2003.pdf", | |
"size": "2.3M", | |
"type": "file" | |
} | |
], | |
"name": "C++ SPECIFICATIONS", | |
"size": "-", | |
"type": "dir" | |
}, | |
{ | |
"children": [], | |
"name": "C++ Standard - ANSI ISO IEC 14882 2003.pdf", | |
"size": "2.3M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "C++ Standard Library (STL) Tutorial and Reference (1999) - [Addison Wesley].chm", | |
"size": "3.3M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "C++ Templates - The Complete Guide (2002).pdf", | |
"size": "2.3M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "C++ Templates.chm", | |
"size": "737K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "C++ Timesaving Techniques For Dummies (2005)[1].pdf", | |
"size": "8.0M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "C++ Timesaving Techniques for Dummies (2005).pdf", | |
"size": "8.0M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "C++ Unleashed (UML).pdf", | |
"size": "4.0M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "C++_Deitel.chm", | |
"size": "4.8M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "C++_Primer_Plus_(5th_Edition).pdf", | |
"size": "6.4M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "C++_Trainer_Kit.zip", | |
"size": "7.9M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "C++_manual.zip", | |
"size": "696K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "C++_tutorial.zip", | |
"size": "245K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "C++_vol_1.zip", | |
"size": "7.9M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "C++_vol_2.zip", | |
"size": "3.4M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "C++ for Dummies 5th Edition.pdf", | |
"size": "7.7M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "C++ for Real Programmers.pdf", | |
"size": "1.9M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "C++ magnum.pdf", | |
"size": "6.4M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "C, C++ Win32 API Programming.pdf", | |
"size": "938K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "C-C++ Programmer's Reference, 3rd Edition (2003).pdf", | |
"size": "4.0M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "C-C Programmer's Reference, 3Rd Edition (2003).chm", | |
"size": "474K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "C-C Programmers Reference, 3rd Edition (2003).chm", | |
"size": "474K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "C By Dissection (2002).pdf", | |
"size": "5.2M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "C Coding Standards - 101 Rules, Guidelines, And Best Practices (2004).chm", | |
"size": "525K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "C Cookbook (2005).chm", | |
"size": "856K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "C Data Structure Practice.pdf", | |
"size": "4.7M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "C Demystified - A Self Teaching Guide (2004).chm", | |
"size": "2.5M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "C For Business Programming, 2nd Edition (2005)-2.chm", | |
"size": "3.6M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "C For Business Programming, 2nd Edition (2005).chm", | |
"size": "3.6M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "C For Dummies, 5th Edition (2004).pdf", | |
"size": "7.7M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "C How to Program.pdf", | |
"size": "8.6M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "CPP For Business Programming (2005) [eng].chm", | |
"size": "3.6M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "CPP For Mathematicians (2006) [eng].pdf", | |
"size": " 30M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "CPP From The Ground Up (2003) [eng].pdf", | |
"size": "2.3M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "CPP Timesaving Techniques (2005) [eng].pdf", | |
"size": "8.0M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "C Tutorial.pdf", | |
"size": "1.2M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "C___Programming_with_CORBA.pdf", | |
"size": "1.4M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Cambridge Press - The Elements of C++ Style.pdf", | |
"size": "1.8M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "C for Engineers and Scientists - An Introduction to Programming With ANSI C.pdf", | |
"size": " 27M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Chapman and Hall - C++ for Mathematicians - Edward Scheinerman - (2006).pdf", | |
"size": " 30M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Charles River Media - C AND Data Structures.chm", | |
"size": "7.5M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Complete.MAYA.Programming. MEL and CPP API(by D.Gould, Morgan Kaufmann, 2004, 532 pages)(Rus).pdf", | |
"size": " 44M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Computer - Sams Teach Yourself C++ in One Hour a Day, 6th Edition - (Jesse Liberty) Sams 2009.pdf", | |
"size": "4.0M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Core C++.pdf", | |
"size": "4.5M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Creating Games In C++ - A Step By Step Guide (2006).pdf", | |
"size": "3.6M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Cryptography In C And C++ (2001).chm", | |
"size": "3.5M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Cryptography In C And C++ (2001).pdf", | |
"size": "3.9M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Data structures and Program Design in C++.pdf", | |
"size": " 16M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Deitel, C++ How To Program 5th Edition.chm", | |
"size": " 10M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Design Patterns - Elements of Reusable Object-Oriented Software.rar", | |
"size": "4.0M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Effective C++, 3rd Edition (2005).pdf", | |
"size": "1.9M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Effective C++.chm", | |
"size": "6.2M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Effective C++ Third Edition 55 Specific Ways to Improve Your Programs and Designs.chm", | |
"size": "656K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Effective_Modern_C__Scott_Meyers_2015.pdf", | |
"size": "4.5M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Efficient C++.chm", | |
"size": "886K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Efficient C++ Performance Programming Techniques-Addison Wesley.chm", | |
"size": "886K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Exceptional C++ - 47 Engineering Puzzles, Programming Problems, And Solutions (1999).pdf", | |
"size": "1.4M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Exceptional C++ - 47 Engineering Puzzles, Programming Problems, and Solutions 1999,Herb Sutter.chm", | |
"size": "365K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Exceptional C++ Style - 40 New Engineering Puzzles, Programming Problems, And Solutions (2004).chm", | |
"size": "551K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Exceptional C++ Style - 40 New Engineering Puzzles, Programming Problems, And Solutions (2004).pdf", | |
"size": "1.6M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Financial Numerical Recipes in C++ -2006 - Odegaard.pdf", | |
"size": "1.0M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "For Dummies - C++.pdf", | |
"size": "7.9M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "For Dummies - C++ Timesaving Techniques.pdf", | |
"size": "8.1M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "For dummies_Microsoft Visual Studio C++ 6.pdf", | |
"size": " 11M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "GNU c++.chm", | |
"size": "1.7M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Griffiths D., Griffiths D. - Head First C - 2012-.pdf", | |
"size": " 53M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Griffiths D., Griffiths D. - Head First C - 2012.pdf", | |
"size": " 22M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Guide to Scientific Computing in Cpp.pdf", | |
"size": "2.6M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "How Not To Program In C (2003).chm", | |
"size": "796K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "How Not To Program In C++ (2003).pdf", | |
"size": "1.4M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "How To Program Python-Introducing Xml-2002-Deitel (Pythonhtp1 Toc).pdf", | |
"size": "246K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "How to Think Like a Computer Scientist, C++ Version.pdf", | |
"size": "757K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "IBM Redbooks - Developing and Porting C and CPLUSPLUS Applications On AIX.chm", | |
"size": "3.4M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "IDG - Visual C++ 6 For Dummies_ Quick Reference.pdf", | |
"size": " 10M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "ISO-IEC 14882-2011. Information Technology - Programming languages - Cpp, Third edition.pdf", | |
"size": " 13M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "InformIT - Stroustrup, Bjarne - C++ Programming Styles And Libraries (2002).pdf", | |
"size": " 12K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "InsideCOM.pdf", | |
"size": "2.3M", | |
"type": "file" | |
}, | |
{ | |
"children": [ | |
{ | |
"children": [], | |
"name": "C++11 for Programmers (2nd Edition).epub", | |
"size": " 37M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "C++ How To Program 8th Edition Dietel.pdf", | |
"size": " 56M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "C++ How to Program, 7th Edition.pdf", | |
"size": "6.4M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "C++ Templates - The Complete Guide.chm", | |
"size": "737K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "CPP101.pdf", | |
"size": "1.3M", | |
"type": "file" | |
} | |
], | |
"name": "Intermediate", | |
"size": "-", | |
"type": "dir" | |
}, | |
{ | |
"children": [], | |
"name": "Introduction To Game Programming with C++ Jun 2007.eBook-BBL.chm", | |
"size": "6.3M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Introduction to Design Patterns in C++ with Qt, 2-E.pdf", | |
"size": " 16M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Ivor Horton's Beginning Visual C++ 2005 (2006).pdf", | |
"size": " 18M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Ivor Hortons Beginning Visual C 2005 (2006).pdf", | |
"size": " 18M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Jones and Bartlett - C++ Plus Data Structures.pdf", | |
"size": " 18M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Jones and Bartlett Publishers, Inc - A Laboratory Course in CPLUSPLUS Data Structures.pdf", | |
"size": "3.9M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Just a brief introduction to C++ data types.pdf", | |
"size": "235K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Lambda Abstraction in C++.pdf", | |
"size": "166K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Learn To Program With C++ (2003).pdf", | |
"size": "7.7M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Learn To Program With CPP (2003) [eng].pdf", | |
"size": "7.7M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Learn Visual C++ 6.pdf", | |
"size": "1.8M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "MS Press - Visual C Sharp .NET--Core Reference [2002].chm", | |
"size": "5.0M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Manuale C++ builder 6.0.PDF", | |
"size": " 21M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Manuale C e C++.pdf", | |
"size": "1.4M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Margaret A. Ellis, Bjarne Stroustrup The Annotated Cpp Reference Manual 1990.djvu", | |
"size": "5.1M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "McGraw-Hill,Osborne - C++ Demystified A Self-Teaching Guide.chm", | |
"size": "2.5M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "McGraw-Hill - C++ Demystified. A Self-Teaching Guide.chm", | |
"size": "2.5M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "McGraw-Hill - CC++ Programmer's Reference, Third Edition.chm", | |
"size": "474K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Mcgraw Hill - C++ Demystified.chm", | |
"size": "2.5M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Mcgraw Hill - The Art of C++.chm", | |
"size": "1.0M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Memory Management - Algorithms And Implementation In C-CPP (2002) [eng].pdf", | |
"size": "4.0M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Memory_Management_Algorithms_and_Implementation_in_C_and_C++_(Wordware_2003).chm", | |
"size": "5.5M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Microsoft.Visual.C++.6.0.MFC.Programming.pdf", | |
"size": " 12M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Microsoft Visual C++ 2005 Express Edition - Aaron Ford.chm", | |
"size": " 25M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Microsoft_Visual_C++_6_Training_Kit.zip", | |
"size": "6.0M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Modern C++ Design - Generic Programming and Design Patterns Applied (2001).pdf", | |
"size": "2.4M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "More Exceptional C++ - 40 New Engineering Puzzles, Programming Problems, And Solutions (2001).chm", | |
"size": "505K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "More Exceptional C++ - 40 New Engineering Puzzles, Programming Problems, And Solutions (2001).pdf", | |
"size": "1.6M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Moving from C to C++.pdf", | |
"size": "3.7M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "NO-BUGS.pdf", | |
"size": "1.3M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "NeHe_OpenGL_PDF_NEW.pdf", | |
"size": "2.6M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Network Theory Ltd - An Introduction to GCC.pdf", | |
"size": "443K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "New.Riders.Beginning.Math.and.Physics.for.Game.Programmers.chm", | |
"size": "2.7M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "No Starch Press - How Not To Program In C++.chm", | |
"size": "796K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "No Starch Press - How Not to Program in C++.pdf", | |
"size": "1.6M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "No Starch Press - How Not to Program in C++[1].chm", | |
"size": "796K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "No Starch Press - How Not to Program in CPLUSPLUS.chm", | |
"size": "796K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Numerical Recipes in C++ Version 2.10.pdf", | |
"size": " 20M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "O'Reilly - C Pocket Reference.chm", | |
"size": "206K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "O'Reilly - C Sharp In a Nutshell.chm", | |
"size": "1.9M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "O'Reilly - Programming with Microsoft Visual C++ .NET 6th Edition.chm", | |
"size": " 14M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "O'Reilly - Programming with Microsoft Visual C++.NET 6th Edition.chm", | |
"size": " 14M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "O'Reilly - Secure Programming Cookbook for C and CPLUSPLUS.chm", | |
"size": "1.4M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "O'Reilly Intel Threading Building Blocks OutFitting C++ for Multi-Core Processor Parallelism.pdf", | |
"size": "1.5M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "O'Reilly Practical C++ Programming.chm", | |
"size": "1.6M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "O'reilly - C++ Cookbook (Case Conflict).chm", | |
"size": "856K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "O'reilly - C++ Cookbook.chm", | |
"size": "856K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "O'reilly - C++ In A Nutshell (Case Conflict).chm", | |
"size": "1.2M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "O'reilly - C++ In A Nutshell.chm", | |
"size": "1.2M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "O'reilly - Practical C Programming. 3rd Ed.pdf", | |
"size": "5.9M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "O'reilly - Programming Embedded Systems in C and C++ (1999).pdf", | |
"size": "963K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "O'reilly - Secure Programming Cookbook For C And C++.chm", | |
"size": "1.4M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "OReilly,.C++.Cookbook.(2005).BBL.LotB.(osloskop.net).chm", | |
"size": "856K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "OReilly - Practical C++ Programming.chm", | |
"size": "1.6M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Object-Oriented Programming Using C++ - Farrell - Course Tech (2009).pdf", | |
"size": " 11M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Object-Oriented Programming in C++, 3rd Edition.chm", | |
"size": "2.9M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Open Source Web Development With Lamp Using Linux, Apache, Mysql, Perl, And Php.pdf", | |
"size": "9.8M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Optimizing C++ (1999).pdf", | |
"size": "743K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Optimizing CPP (1999) [eng].chm", | |
"size": "287K", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Oreilly - Secure Programming Cookbook For C & C++.chm", | |
"size": "1.4M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Osborn - C++ --Complete Reference (3rd Ed.).pdf", | |
"size": "8.8M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Osborne - C++ Complete Reference, 3rd Ed.pdf", | |
"size": "8.8M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Packet C Programming.pdf", | |
"size": " 12M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Pearson Education - Navigating CPLUSPLUS and Object-Oriented Design.chm", | |
"size": "2.4M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Practical C++ Programming (2002).pdf", | |
"size": "5.1M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Practical C++ Programming 1995.pdf", | |
"size": "2.7M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Practical CPP Programming (2002) [eng].chm", | |
"size": "1.6M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Premier Press - Game Programming All in One (2002) (C++ Win32).pdf", | |
"size": "9.0M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Premier Press C++ Programming for the Absolute Beginner 2001.chm", | |
"size": "1.4M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Premier Press Cpp Programming for the Absolute Beginner 2001.chm", | |
"size": "1.4M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Prentice Hall - C++ GUI Programming with Qt4 (2006).chm", | |
"size": "6.1M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Prentice Hall - C++ How to Program, Fifth Edition.chm", | |
"size": " 10M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Prentice Hall - C++ for Business Programming, Second Edition.chm", | |
"size": "3.6M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Prentice Hall - Core C++ - A Software Engineering Approach 2000.pdf", | |
"size": "4.5M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Prentice Hall - Migrating to.NET A Pragmatic Path to Visual Basic.NET, Visual C++.NET, and ASP.NE.chm", | |
"size": "3.5M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Prentice Hall - Thinking in C++ Volume 1, 2nd Edition.pdf", | |
"size": "2.9M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Prentice Hall - Thinking in C++ Volume 2, 2nd Edition.pdf", | |
"size": "2.3M", | |
"type": "file" | |
}, | |
{ | |
"children": [], | |
"name": "Prentice Hall C++ GUI Programming with Qt4 (2nd Edition)Feb.2008_0132354160.chm", | |
"size": " 14M", | |
"type": "file" | |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment